Forcepoint Firewall Next Generation
Forcepoint Firewall Next Generation
No need for additional patches as the patches are included in the engine
upgrades.
1- The administrator creates elements for the remote Firewalls and specifies
the appliance POS (Proof of Serial code) in the Firewall properties. The
Firewalls must have a valid license bound to their POS code. In the Firewall
initial configuration settings, you must select the Upload to Installation
Server option and the Firewall policy to apply. The Management server
sends the Firewall’s initial configuration to the Forcepoint Installation
Cloud. The Installation Cloud stores the configurations and waits for
appliance contact.
2- The appliances are shipped to the remote site and cables are connected.
3. After boot up, the appliance automatically contacts the Installation Cloud
and asks if its initial configuration is available.
4. If the configuration is available, the Installation Cloud sends it to the
appliance
5. The appliance makes initial contact with the Management Server specified
in the initial configuration
6. The Management Server returns the predefined policy and configuration to
the appliance
=> In case of connection problems, Forcepoint support can check the status of
each appliance installation from the Installation Cloud
What offer the L3 FW: Layer 3 interfaces offer IPv4/IPv6 network boundaries,
NAT, authentication, routing, VPN, and deep packet inspection.
Layer 2 physical interfaces can also be configured in the Forcepoint NGFW.
1. Transparency: The firewall operates without requiring any changes to the network's
IP addressing scheme. Layer 2 interfaces perform transparent Layer 2
operations without the need of defining IPs or MAC addresses.
2. Bridge Mode: The firewall acts as a bridge between two network segments, allowing
it to monitor and control traffic passing through without being visible to the devices
communicating over the network.
3. No IP Address Configuration: Since it works at Layer 2, there's no need to configure
IP addresses on the firewall interfaces. This can simplify deployment, particularly in
complex network environments.
4. Traffic Inspection: Despite its transparency, the firewall can inspect, block, or allow
traffic based on policies. It can apply deep packet inspection (DPI), intrusion
prevention, and other security features to protect the network.
!!!!!!!!!! In an IPS deployment (but not a L2FW) fail-open network cards can be
used to ensure that traffic flow is not disrupted when the engine is offline.
Inline IPS and Layer 2 Firewall deployment require the configuration of inline
Layer 2 interface pair.
Layer 2 interfaces provide transparent access control and logging for any traffic
at Layer 2 and above.
Layer 2 interfaces perform transparent Layer 2 operations without the need of
defining IPs or MAC addresses.
The engine has full control over the traffic flow and can be used to block any
traffic. The inline engine can also enforce block listing commands received from
other components.
Inline deployment is good for blocking attacks if you can identify a clear threat
path
• From the Internet to the DMZ segment
• from anywhere to an important application server
• from internal networks to the Internet
In multi-layer deployment, a Firewall role NGFW can have both layer 2 physical
interfaces and layer 3 physical interfaces.
!!!!!!!!!!!!!! Layer 2 interfaces on NGFW Engines in the Firewall role provide the
following benefits: • When the same engine has both layer 2 and layer 3
interfaces, the administration is easier because there are fewer NGFW Engine
elements to manage in the SMC
• It is more efficient and economical to use one NGFW hardware device that has
both layer 2 and layer 3 interfaces because a smaller number of NGFW
appliances can provide the same traffic inspection.
• When you use layer 2 interfaces on NGFW Engines in the Firewall role, the
NGFW Engine can use options and features that are not available on NGFW
Engines in the IPS or Layer 2 Firewall roles. For example, an NGFW Engine in the
Firewall role can use Forcepoint Endpoint Context Agent (ECA), Forcepoint User ID
service, NetLinks for communication with the SMC, and dynamic control IP
addresses, while also being capable of being deployed similarly on the network
as with the IPS and Layer 2 Firewall roles.
It’s IDS or passive layer 2 firewall.
IDS or a Layer 2 Firewall in Passive mode can send block listing requests to other
NGW, but they cannot enforce block listing requests from other components.
IDS / Passive Firewall mode is good for monitoring the traffic within network
segments:
IDS / Passive Firewall mode cannot make any modifications to the data stream
(SSL decryption and other similar functions are not possible
SMC: enhance network visibility with centralized monitoring auditing logging,
Configuration using flexible re-usable elements
The SMC requires a management server and at least a log server. SMC is
composed of the management server and a log server .. If a management server
or log server is not availabale, the FW still works finely since it can still control
the network traffic è if NGFW lost connectivity with SMC , NGFW will still
operate .
The Management client is the unique graphical user interface for all day-to-day
configuration and management tasks.
Either you install MC on each workstation or use the web access feature in SMC
to start and run the management client in web browser.
if you install the MC locally, you can use the same media that you used when
you installed the mngmt, log srevers. MC can be deloyed anywhere in the
network.
All commands and configuration changes are relayed through the management
server, so the management clients never connect to the NGFW Engines directly
MC connect to log server to fetch for logs. One management server can manage
different FW , it stores all the configuration information ( NGFW
roles) ,administration , system commands, monitoring , notify users with alerts,
include basic CA root certificate that issue certificate that the system
components need and also for VPN authentication.
Each engine node communicates with the Management Server and log Server
256-bit encryption for the connections between NGFW Engines and the
management server can be enabled in one condition : Engine and management
server are version 5.5 or higher + use an Internal ECDSA Certificate Authority to
sign certificates for system communication
You can install MC on windows or linux machines. As an alternative to use the MC
locally , you can enable the SMC web access feature to start and run the
management server on a web browser. The Web Access feature can be enabled
on the Management Server and the Web Portal Server. No need to install the java
runtime to run the management client with the Web Access feature.
The web access feature on the smc can consmes a lot of ressources since many
administrators will use this feature. Forcepoint recommends to enable this
feature on the web portal servr . note that feature is limited to google chrome
and mozilla . this feature is not available on SMC appliance.
!!!! If the Management Server or Web Portal Server are installed on a Linux
platform, xvfb-run must be installed
The management server can run on different operating systems. As it offers a RESTful API ,
if the number of events exceed the 500000 event capacity of a single log server, another log
server can be added => scalability. Sometimes adding additional log is necessary to meet a
legal requirement ( based on countries laws in terms of data protection). At the federal
level ,collection and use of data is regulated by FADP, OFADP
using the web portal is recommended when the SMC web access is used by
administrators. when a web browser connect remotely to SMC ( SMC web access)
, it is equivalent of using the MC running locally on the management server. The
number of resources allocated on server is the sum of the resources used by
each remote MC
SMC is JAVA based management system . SMC components must have the same
versions. It’s recommended to have SMC on linux os.
SMC Web Access should be used when there is a need to connect to different
SMC servers that run different versions of software. Alternatively, different client
versions can be installed to different installation directories.
The SMC components can be installed on the same system or distributed
A combination of physical and virtual servers can be used also
We can add an additional management server for HA purpose( reduce delays,
loss of configuration if the active mngmnt server Is loss or inactive.)
Also when it comes to log servers we can think abt it in term of HA , when a log
server is unavailable , NGFW can send logs to the additional log server.
The users in the HQ location connect and communicate with the real IP , the
users from the extern use the contact IP ( the address that the fw at HQ provide
to SMC which is a public IP address)
Real IP= the internal IP address
Contact IP= the public IP address
Setup
Imagine an MSSP (Managed Security Service Provider) managing network security for three
different clients: Client A, Client B, and Client C. Each client has its own network
infrastructure and security requirements.
Summary
By using SMC Domains, the MSSP can efficiently manage multiple clients with a single
Management Server, ensuring each client's configurations are isolated and secure. Shared
policies and elements reduce redundancy, while specific administrative permissions enhance
security. The Web Portal provides clients with the necessary visibility into their security
posture without direct access to the SMC, maintaining a clear separation of duties and
responsibilities.
As the management server has all the configuration of all the components.
The engines contain a working copy of the configuration details that allows them
to carry out traffic inspection independently. It is not possible to extract this
information from the engines if the Management Server is lost.
We save and restore the configurations for the Management Server and Log
Server on the same physical host (for example, after a clean reinstallation) or a
different physical host (for example, after a hardware change)
If we add an additional management server then it should be a standby server.
On management server can be active. Maximum of 5 Management Servers: one
active Management Server and up to four standby Management Servers. They
are synchronized between each other incrementally in real time . you can control
the management servers through a dialog in the management client.
If an active MGTS become standby , it will release control of all the domains and
then a standby MGTS become active and take control.
Even if no MGTS is available or reacheable the fw can still operate => no
interruption in the network
Those are the steps to configure SMC administrator access : 1- create the role
Predefined roles that cannot be modified:
2-create the access control list :
Access Control Lists represent lists of elements that you can use to select the
granted elements to which the administrator rights apply.
The Access Control Lists that you create can include Firewall, IPS, Firewall Policy,
IPS Policy, Layer 2 Firewall and Layer 2 Firewall policy éléments
3-Define an administrator :
Two permissions : unrestricted for the Superuser ( account created during the
installation, he can create and modify administrator accounts ) and restricted
permissions where we need to specify the role and the elements or the access
control list.
If an administrator is allowed to view logs and alerts, you can optionally create
local filters that are applied to the log data before it is displayed to the
administrator.
In the first line in the figure , the NGFW configuration includes ( Policy
configuration, routing information, VPN configuration, engine configuration, etc.)
After the installation, the engine is ready to start processing traffic. The engines
do not have a working configuration until the first time you install a policy on
them and the working configuration is received from the Management Server
You still can view the configuration changes that you have made before the new
configuration is transferred.
By default, log browsing uses the local time zone set in the operating system of
the computer on which the Management Client runs
Logs have two operating modes:
• In Normal mode, you can browse stored log entries freely from any time period.
• In Current Events mode, the view automatically updates to show the most
recently received log entries until you select an entry or deactivate the Current
Events mode. Both Stored and Transient log entries appear in the Current Events
mode.
You can visualize log data in four different arrangements: records arrangements,
statistics arrangements, details arrangements, log analysis
arrangements( provide tools to analyze and visualize data).
Log data context specify which type of log data is displayed in the Logs view and
in the reports view.
Loal filters used in the MC : temporary filters that they disappear when you close
the view
Permanent filters : filters that you can use anywhere in MC. There are predefined
permanent filters and you can create custom ones (view page 96)
Each policy must always be based on a Template Policy. Template Policies contain
rules that are inherited by any template or policy below it in the policy hierarchy.
Template Policies are
usually based on predefined Template Policies. None of the default Template
Policies can be modified.
Reduce the need for creating the same rule or a similar rule in several
policies.
For each firewall role , there are predefined template policies that cannot be
modified. You can clone on it and made your change on the copied one.
For firewall role : there are Firewall Template (that has predefined access
rules to communicate with the MC and some external components) and
Firewall Inspection Template
!!!!!!!!!!!!! The Firewall Template does not enforce any inspection policy while
the Firewall Inspection Template enforces the High-Security Inspection Policy.
For layer 2 firewall role : there are layer 2 Firewall Template and layer 2
Firewall Inspection Template
For IPS role, two predefined templates: IPS template (predefined Access
rules necessary for the IPS engine to communicate with the Management
Center and some external components) + high-security IPS Template
Policy (provides an easy starting point for determining what kinds of rules
your system needs, to use IPS capabilities on FW and want to get all the traffic
inspected=è this is available for all the firewall roles )
As said , the firewall template do not enforce the inspection policy. It use NO
inspection policy
In the context of Forcepoint Next Generation Firewall (NGFW), the concept of "shared rules"
with Alias elements is a method to manage IP addresses in a flexible and dynamic manner.
Here's a breakdown of the provided statement:
1. Shared Rules: These are rules that are applied across multiple components (e.g.,
firewalls, engines) within the Forcepoint NGFW system.
2. Alias Elements: Aliases are placeholders or references for IP addresses or networks.
Instead of hardcoding IP addresses directly into the rules, you use aliases to represent
these addresses.
3. Environment-Dependent IP Addresses: Different environments (e.g., different
network segments, data centers, or locations) might have different IP addresses. Using
aliases allows the same rule to adapt to different environments by substituting the alias
with the appropriate IP address for each environment.
4. Translation Values for Aliases: Each alias can be assigned a specific translation
value (i.e., the actual IP address or network) in the properties of each engine (firewall
instance). This means that an alias like Server1 might translate to 192.168.1.10 on
one engine and 10.0.0.10 on another.
5. Consistent Policy Application: By using aliases and defining their translation values
separately for each engine, you can use the same policy, policy templates, or sub-
policies across multiple engines. This ensures that the IP address information is
correctly filled in for each engine based on its environment.
Example Scenario
Imagine you have two data centers, Data Center A and Data Center B, each with its own
firewall engine:
Data Center A:
o Alias: WebServer
o Translation Value: 192.168.10.10
Data Center B:
o Alias: WebServer
o Translation Value: 10.1.10.10
You create a shared rule that references the alias WebServer to allow HTTP traffic.
When this rule is applied to the firewall engine in Data Center A, WebServer
translates to 192.168.10.10.
When the same rule is applied to the firewall engine in Data Center B, WebServer
translates to 10.1.10.10
Predefined Alias elements provided by the system start with two $$ symbols.
cannot be modified.
User-modifiable and user-created Alias elements start with one $ symbol.
Options set in Continue rules are used for subsequent rules that match the same
criteria as the Continue rule unless the rules are specifically set to override the
options. This way, you do not have to define the settings for each rule separately.
Exemple :
Continue Rule:
1. Modular Structure: Sub-Policies are modular sections that can be inserted into main
policies, template policies, or even other sub-policies. They help in organizing and
managing rules more effectively.
2. Not Based on Template Policies: Sub-Policies are independent and are not derived
from any template policy.
3. Restrictions: You cannot include NAT (Network Address Translation) rules or
inspection rules within Sub-Policies.
4. Administrative Control: Sub-Policies allow for better delegation of administrative
rights. Specific administrators can be granted permission to edit only certain Sub-
Policies without having access to the entire main policy.
5. Insertion via Jump Rules: Sub-Policies are integrated into other policies using Jump
rules. A Jump rule directs traffic matching its criteria to the rules defined in the Sub-
Policy.
1. Top-Down Processing: The firewall processes rules from top to bottom. When it
encounters a Jump rule that matches, it transfers processing to the Sub-Policy.
2. Skipping Sub-Policies: If a Jump rule does not match, the firewall skips the entire
Sub-Policy and continues with the main policy rules.
3. Matching Jump Rules: When a Jump rule matches, the Sub-Policy is processed as if
it were part of the main policy.
4. Return to Main Policy: After processing the Sub-Policy, the firewall returns to the
main policy and continues processing from where it left off.
5. No Return to Previous Sub-Policies: To avoid continuous looping, Sub-Sub-Policies
do not return to their parent Sub-Policy.
Example Scenario
Imagine you have a corporate network with two departments: HR and IT. You want to create
separate access rules for each department within the main policy.
Main Policy
HR Sub-Policy
Processing Flow
1. Main Policy Rule 1: Traffic from the corporate network to the internet is allowed.
2. Main Policy Rule 2: For traffic coming from the HR department:
o If the traffic matches this rule, processing jumps to the HR Sub-Policy.
o HR Sub-Policy Rule HR1: If the traffic is for the HR application server, it is
allowed.
o HR Sub-Policy Rule HR2: If the traffic is for the email server, it is allowed.
o Processing returns to the main policy after the Sub-Policy.
3. Main Policy Rule 3: For traffic coming from the IT department:
o If the traffic matches this rule, processing jumps to the IT Sub-Policy.
o IT Sub-Policy Rule IT1: If the traffic is for the IT management server, it is
allowed.
o IT Sub-Policy Rule IT2: If the traffic is for the development environment, it
is allowed.
o Processing returns to the main policy after the Sub-Policy.
4. Main Policy Rule 4: All other traffic is denied by default.
Benefits
Clarity and Organization: The main policy remains clean and easy to read, while
specific rules for each department are organized within their respective Sub-Policies.
Administrative Control: HR and IT administrators can be granted permissions to
manage their respective Sub-Policies without affecting the main policy or other
departments' policies.
Efficiency: Jump rules allow the firewall to efficiently skip entire sets of rules if the
initial criteria are not met, speeding up the processing of traffic.
Policy: it gathers rules from different policies :
from the Template Policy
from the Inspection Policy
file filtering policy
rule order is so important !!!!!!!!!!!!!!!!
Rule Actions
Rule Placement
3. Placement of Rules:
o Rules with the actions mentioned above should be placed higher up in the rule
table if they are more specific in scope.
o The more specific a rule is, the higher it should be positioned to ensure it is
matched and processed before more general rules.
o This ensures that the most specific conditions are evaluated first, which helps
in precisely controlling the traffic based on detailed criteria.
Practical Implications
If you have a very specific rule (e.g., allow traffic from a specific IP address at certain
times), it should be placed above more general rules (e.g., allow all traffic from a
particular subnet).
This prevents a general rule from overriding a specific rule and ensures that traffic is
managed according to the intended priority and specificity.
Purpose: Ethernet rules are used by the Intrusion Prevention System (IPS), Layer 2
Firewall, and Layer 2 Policies in the Firewall role to define how Ethernet protocol
traffic is handled.
Matching Criteria: These rules specify criteria and actions based on Ethernet traffic
attributes to determine whether the traffic should be allowed or discarded.
Key Points
Practical Implications
Fine-Grained Control: Ethernet rules allow for detailed control over traffic based on
MAC addresses, providing an additional layer of security and management.
Versatility: These rules can generate logs and alerts, enabling better monitoring and
response to network events.
Flexibility with Interfaces: Logical interfaces can be used to simplify rule
management across multiple physical interfaces.
Layered Security: By combining Ethernet rules with IPv4 and IPv6 access control
rules, the firewall provides a comprehensive approach to traffic inspection and
management.
Actions:
Allow
Discard : The connection is silently dropped
Refuse : connection is dropped and an ICMP error message or a TCP reset
(for TCP connections) is sent in response to the source.
Blocklist : checks the packet against the blocklist requests received by the
engines. If the packet matches a blocklist entry, the connection is
discarded
Jump action is used, the matching is continued in the specified sub-policy
until a match is found. If there is no matching rule in the sub-policy, the
process resumes in the main policy. If, the jump rule does not match the
matching process continues to the next rule.
Continue: to set default values like logging or deep inspection.
Logging Options
Rule Identifiers
5. Rule Name:
o Each rule has a unique identifier called the rule name, which is automatically
created and updated by the system.
o You have the option to specify a custom name for each rule for easier
identification and management.
Connection Options
Connection Tracking
Idle Timeout
Purpose: This is used to clear the firewall's records of old connections that are no
longer active to free up resources.
Recommendation: Avoid setting excessively long timeouts to prevent
overconsumption of firewall resources.
Synchronize Connections
Definition: This option determines whether connections matching the rule are
synchronized to other nodes in a cluster, ensuring consistent state across the firewall
cluster.
Definition: This option defines whether the NGFW enforces a minimum or maximum
size for the TCP MSS, which is the size of the payload of a packet (excluding
headers).
Summary
These options provide advanced controls for managing connections through the firewall,
ensuring efficient and secure handling of traffic while optimizing resource usage and
maintaining consistency across clustered nodes.
User Responses allow you to send a customized reply to the user instead of just
ending the connection when an HTTP or HTTPS connection is not allowed to
continue. This makes it possible to explain to the user why the connection was
stopped, instead of simply closing the connection with no notification. User
Responses can be used in Access Rules and in Inspection Policies. You can define
a different User Response entry for each of the following cases in which an HTTP
or HTTPS connection is not allowed to continue:
• Connection Blocklisted: (HTTP only) The connection was discarded according
to a rule with the Apply Blocklist action.
• Connection Discarded by Access Rule: The connection was dropped
according to an Access rule with the Discard action.
• Connection Terminated by Inspection Rule: The connection was terminated
according to the Inspection Policy.
• URL Not Allowed: The connection was terminated by one of the special URL
filtering situations.
• Virus Found: The Anti-Virus feature found a virus on the web page.
Static Source NAT
Purpose: Static Source NAT translates the internal (real) IP address of a host on an internal
network to a different IP address on an external network. This is useful when an internal
device needs to communicate with external networks, such as the internet, using a consistent,
predefined external IP address.
Key Points:
1. Consistent Translation:
o With Static Source Address Translation, the IP address of a particular host is
always translated to the same specific external IP address.
o The internal source IP address (the actual IP address assigned to a device on
the internal network or DMZ) is translated to a public IP address. This public
IP address is part of a range assigned by the Internet Service Provider (ISP).
2. Network-Level Translation:
o Static translation can be defined for individual hosts or for entire networks,
provided the internal and external networks are the same size.
Process Explanation:
1. Initial Packet:
o Step 1: A packet is sent from an internal source (SRC) to an external
destination (DEST). The packet contains the internal source IP address.
2. Address Translation:
o Step 2: The firewall intercepts the packet and replaces the internal source IP
address with a new source address (the predefined public IP address).
3. Server Response:
o Step 3: The external server receives the packet with the new source address
and sends a response back to this new source address.
4. Reply Packet Translation:
o Step 4: The firewall uses connection tracking information to automatically
translate any reply packets. When the server responds, the firewall replaces the
destination address in the server’s response with the original internal IP
address of the host. This ensures that the response packet is correctly routed
back to the internal host.
Purpose: Dynamic Source NAT (Network Address Translation) translates the internal
IP addresses of several internal hosts to one or a few external IP addresses. This helps
to:
o Hide the internal network structure from outsiders.
o Avoid the need for a separate public IP address for each internal host.
Functionality:
o Translation: Many internal IP addresses are translated to a smaller pool of
external IP addresses, sometimes even to a single IP address.
o Use Case: Commonly used to mask the internal networks of a company behind
one or a few public IP addresses provided by an Internet Service Provider
(ISP).
1. Translation Process:
o When an internal host sends a packet, the firewall translates the source IP
address to an external IP address.
o The firewall also assigns a translated source port to the packet.
2. Handling Reply Packets:
o When the server replies to the packet, it sends the response to the translated IP
address and port.
o The firewall uses this translated port to identify the correct internal host.
o The firewall then translates the destination address and port in the reply packet
back to the original source address and port of the internal host.
Important Considerations
Purpose: Static destination NAT (Network Address Translation) allows an internal host (like
a server) with a private IP address to be accessible from external networks (like the Internet)
by translating its private IP address to a public IP address.
How It Works
Key Points
Static Destination Translation: This can be done for individual IP addresses and
ports or for entire networks of the same size.
Example:
o Step 1: An external host connects to the server's public IP address.
o Step 2: The firewall translates this public IP address to the server's private IP
address.
o Step 3: The server responds to the request.
o Step 4: The firewall translates the server's private IP address back to the public
IP address for the response.
Definition: Proxy ARP allows a device (in this case, the firewall) to respond to ARP requests
on behalf of another device on the network. This is particularly useful in network address
translation (NAT) scenarios.
Default Behavior: The firewall is configured to use proxy ARP by default. This
means it can answer ARP requests for NAT pool addresses.
Configuration: Proxy ARP is enabled by default in the NAT settings for each
translation type, but it can be disabled if needed.
Example Scenario:
Overview
NAT (Network Address Translation): This process changes the source and/or
destination IP addresses in packets to different IP addresses. This can help with
various network configurations, such as hiding internal IP addresses or allowing
multiple devices to share a single public IP address.
Order of Operations: NAT rules are applied after access rules. This means that a
connection must first be allowed by the access rules before it can be matched to a
NAT rule.
Rule Order: NAT rules are matched from top to bottom, so they should be ordered
from the most specific to the least specific. This ensures that the most precise rules are
applied first.
No NAT Cell
Definition: A NAT rule with no NAT cell specified means that no translation is done
for the matching traffic. This can be useful for allowing certain traffic to pass through
without any IP address changes.
Properties-Based Definitions: NAT rules can also be defined within the properties of
a firewall element. These rules are automatically generated but are not visible in the
main firewall policy.
Application Order: These automatically generated NAT rules are applied after the
manually added NAT rules in the policy. Therefore, a more specific manual NAT rule
can override an element-based NAT rule.
Summary
Access Rules: Administrators can define various criteria for access rules, which
determine how connections are handled.
Matching Criteria: These include:
o Zone Matching: Identifying traffic based on network zones.
o User Identification: Identifying traffic based on user information.
o IP List: Matching traffic based on specific IP addresses.
o Countries: Matching traffic based on geographic location.
o DNS Names: Matching traffic based on domain names.
These criteria allow for very detailed control over which connections are allowed or blocked.
Operating Modes
This mode ensures that only legitimate and expected traffic is allowed through, based
on the state of the connection.
Proxy Mode:
o Additional Security: This mode provides higher levels of security and control
over the connections.
In proxy mode, the firewall acts as an intermediary between the client and the server,
inspecting and filtering traffic more thoroughly.
Matching Traffic
Service Elements: These match network traffic based on specific protocols (like TCP
or UDP) and ports (like port 80 for HTTP).
Protocol Set Options: These provide advanced inspection of traffic, allowing for
application-layer validation and handling of related connections.
Default Service Elements: Typically, you can use the pre-configured Service
elements for common protocols and ports without any changes.
Customization: If needed, you can duplicate a predefined Protocol Agent and adjust
its parameters to meet specific needs or requirements.
Summary
These settings enable the Forcepoint firewall to effectively manage and inspect network
traffic by associating services with protocols. This association allows for deeper inspection
and validation, ensuring that traffic complies with expected protocol behavior. The ability to
customize these elements provides flexibility to address specific security needs.
Protocol Validation
Purpose: This agent can strictly enforce which commands are allowed within an FTP
control connection.
Function: It limits commands to only those defined in the FTP standards.
Action: If any non-standard commands are sent, the connection is dropped.
URL filtering is used to control which websites end-users can access. It does this
by comparing the URLs users try to visit against predefined categories or lists of
URLs.
URL filtering: is used to control which websites end-users can access. It does this
by comparing the URLs users try to visit against predefined categories or lists of
URLs.
You can manually configure lists of specific URLs to block or allow.
!!!!!!!!!!! If you want to block a category like "social media" but still allow access
to a specific social media site for business purposes, you can block the category
but manually allow the specific site.
Forcepoint™ ThreatSeeker® Intelligence Cloud service provide URL
categorization, categories for malicious websites
In Forcepoint firewall and other security appliances, the concept of using Server Name
Indication (SNI) in HTTPS traffic for URL categorization without decrypting the HTTPS
connection is a way to identify and categorize web traffic while maintaining user privacy and
minimizing performance overhead.
Key Concepts
1. Reading the SNI Field: The Forcepoint firewall can inspect the SNI field in the initial
handshake of the HTTPS connection. Since this part of the communication is not
encrypted, the firewall can see the server name (e.g., www.example.com).
2. URL Categorization: Based on the server name extracted from the SNI field, the
firewall can perform URL categorization. This means it can identify the type of
website or service the user is accessing (e.g., social media, news, shopping) without
needing to decrypt the entire HTTPS traffic.
3. Policy Enforcement: Once the server name is categorized, the firewall can enforce
policies based on this information. For instance, it can allow, block, or log access to
certain categories of websites according to the organization's security policies.
Example Scenario
The firewall matches the application based on the payload of the packets. This means the
firewall inspects the actual data being transmitted to identify the application, not just the port
or protocol.
Forcepoint Firewalls use predefined TLS Match elements to identify applications without
needing to decrypt the TLS traffic. These elements can match traffic based on:
Tags are used to group Network Application elements, simplifying the creation and
management of policies. For example, a Media Tag might include applications related to
images, music, and videos. Tags can represent multiple applications, and several tags can be
associated with a single Network Application element, making policy creation more efficient
and easier to manage.
Example Scenario
Let's say you want to create a firewall rule to allow traffic for streaming media applications:
Misuse Detection
Malware Detection
File Extraction: The NGFW can identify and extract files from the traffic stream for
detailed security analysis.
File Reputation Check: The extracted file’s reputation is checked by querying the
Global Threat Intelligence cloud. This cloud-based service provides information on
known malicious files.
Antivirus Check: The file is scanned using an antivirus engine to detect known
malware based on virus definitions and signatures.
Advanced Malware Analysis:
o Cloud Sandbox: For files that are suspicious or not recognized by reputation
checks and antivirus scans, the file is sent to the Forcepoint cloud sandbox.
o Dynamic Sandboxing: This involves executing the file in a controlled,
isolated environment to observe its behavior and detect malicious activities
indicative of zero-day threats (new, previously unknown threats).
o Static Inspection: The code within the file is also inspected without executing
it, looking for suspicious patterns and anomalies that suggest malware.
Protocol Validation
1. Basic Evasion:
o Traffic Slicing: Network traffic containing exploits can be split into pieces and
sent out of order. This exploits the Internet's ability to handle out-of-order data
delivery, relying on the destination to reassemble the pieces.
2. Evasion Techniques:
o IP Fragmentation: Breaking IP datagrams into smaller fragments and sending
them out-of-order to evade detection.
o TCP Segment Duplication: Duplicating TCP segments and potentially
sending them in different sequences.
o Compressed HTTP: Using HTTP compression to hide malicious payloads.
3. Combination of Techniques:
o Advanced Evasion Techniques (AETs): When multiple evasion techniques
are combined, they become more sophisticated and harder to detect.
4. Virtual Patching:
o A method to temporarily protect against known vulnerabilities by blocking
attack vectors using NGFW or IPS inspections.
o Limitation: AETs can bypass virtual patching by evading the inspection
processes designed to protect against these vulnerabilities.
5. Traffic Normalization:
o The key to detecting AETs is to reassemble the data stream before inspection.
o This process ensures that fragmented and out-of-order data is reconstructed to
accurately detect malicious content.
When IP datagrams are too large for a network path, they are split into smaller
fragments.
A common evasion method involves sending these fragments out-of-order to bypass
security measures.
Memory Limitation: Network security devices can only keep connection data in
memory for a limited time (typically about seven seconds) due to handling millions of
connections every second.
Fragmentation Evasion: If the Conficker worm is split into two fragments and sent
with a delay of ten seconds between them:
o Initial Detection: The device detects the first fragment and waits for the
second.
o Memory Reset: After seven seconds, the device clears the memory of the first
fragment.
o Evasion Success: When the second fragment arrives, the device no longer
remembers the first, allowing both fragments to pass through undetected and
exploit the target device.
Out-of-order or overlapping TCP segments are techniques that can be used for evasion in
network traffic:
Detail Example:
IP fragmentation occurs when large IP packets are broken down into smaller fragments for
transmission across networks with smaller Maximum Transmission Units (MTUs). The
NGFW addresses this through:
Compressed HTTP
If the HTTP data is compressed in the client stream, the NGFW decompress it
before fingerprinting.
Key Detail:
Data Stream Inspection: NGFWs inspect the actual data transmitted within TCP
connections rather than inspecting individual TCP packets or segments. This involves
assembling TCP segments into a complete data stream before content inspection.
Buffering and Protection: TCP segments are buffered until the receiving endpoint
acknowledges them. This prevents network vulnerabilities that could arise from out-
of-order TCP segments or segments that overlap with conflicting content
TLS Inspection allows for the decryption of TLS connections to inspect traffic for
malicious content. Once inspected, the traffic is re-encrypted before reaching its
destination. This can be applied to both outgoing and incoming TLS connections,
enhancing security for both clients and servers
TLS Inspection can be configured for client-only, server-only, or both client and server
protection.
Client Protection focuses on outgoing traffic, safeguarding internal users.
Server Protection focuses on incoming traffic, securing web services
1. Unsupported Environments:
o Master NGFW Engines and Virtual NGFW Engines: Snort inspection is not
supported.
o Capture Interfaces: Snort inspection is not supported.
2. VLAN Interfaces:
o Snort inspection is supported, but rules are applied to traffic without
differentiating based on VLAN tags.
3. Logical Interfaces:
o Overlapping IP Address Spaces: Traffic might not match Snort rules as
intended if logical interfaces with overlapping IP address spaces are used as
matching criteria in IPS or L2FW Access rules.
4. Service Matching:
o Payload-Based Matching: Not recommended to use services that match based
on the payload of connections (e.g., Network Applications, URL Categories, or
URL List Applications) in Access rules selecting traffic for Snort inspection.
5. TLS Inspection:
o Decrypted Traffic: Snort inspection cannot be applied to traffic that has been
decrypted for TLS inspection.
6. Failure Handling:
o Default Action: If Snort inspection fails, the traffic is allowed by default.
7. Rule Set Updates:
o Manual Updates: NGFW Engines do not receive automatic updates for Snort
rule sets. Administrators must manually import new Snort configuration files
and refresh the policy on the NGFW Engine to apply new rule sets.
Redirection of web traffic is done transparently and configured in the access rule.
The “forward to proxy” allow action option must be selected and the proxy server
configured with Forcepoint Cloud Security Gateway settings
Forcepoint NGFW redirects web traffic to the Cloud Security Gateway using the
“Easy Connect” proxy redirection features or using a predefined policy-based VPN
To use the Forcepoint Cloud Security Gateway to inspect web traffic, you must
have a subscription to the Forcepoint Cloud Security Gateway service
Activating deeper packet inspection impacts resource consumption and
throughput
It's crucial to selectively send traffic for deep inspection to balance security and
performance.
Offloading tasks like file reputation and malware analysis to external
components, such as a cloud sandbox, can save NGFW resources and maintain
performance.
Process Flow:
If only basic access control is configured to allow traffic from an external network
to a web server located in (DMZ). Only checks IP addresses and ports,
No deep inspection enabled : no analysis of the content of the data packets,
can’t examine the content of the packets => potential exploit for the
vulnerabilities of the server, run malicious commands on the server
With deep packet inspection activated, Forcepoint NGFW examines the content of
the traffic (header and payload)
The HTTP traffic is matched against the inspection policy that detects the transfer
of the malicious string and drops the connection
NGFW provides full deep inspection functionality, and this is included in the
NGFW license
System fingerprint situations correspond to known exploits.
A situation and vulnerability description is attached to each system fingerprint
situation.
Access control rules : These rules set the criteria for what traffic will be inspected.
For example, you might have a rule that inspects all incoming HTTP traffic.
Inspection policy : Each rule points to a specific policy that dictates how the
traffic should be inspected. This policy will contain various checks and actions
based on the type of traffic and potential threats.
Protocol-Based Inspection: The protocol associated with the service element
(like HTTP, FTP, etc.) determines the nature of the inspection. Different protocols
might have different inspection requirements.
Packet Payload Examination: The inspection policies look at the actual data being
transmitted (the payload) rather than just the metadata (like headers).
Whole Connection Analysis: Instead of just examining individual packets, the policy looks
at the entire connection to identify threats.
Predefined Policies in SMC: The predefined policies in the SMC are templates or starting
points that can help you set up your system's inspection rules. They are designed to cover
common scenarios and can be customized as needed.
The Firewall Inspection Template that enables deep inspection for all traffic is based on the
Firewall Template
an easy starting point to use the deep inspection you can use Firewall Inspection Template
Using your own templates or policy, you can fine-tune which parts of the permitted traffic
you want to inspect and what inspection policy you want to enforce
Firewall Template
Purpose: The Firewall Template is primarily focused on establishing the necessary
communication rules between the firewall and the Security Management Center
(SMC).
Functionality: It contains automatic access rules that allow the firewall to
communicate with the SMC and, by default, deny all other traffic. This ensures that
the firewall is securely managed and controlled through the SMC.
IPS Template: For the Intrusion Prevention System (IPS) role, the IPS Template
similarly enables deep inspection by default for all supported protocols.
Disabling Deep Inspection: Like the Firewall Inspection Template, deep inspection
can be disabled for specific rules if necessary.
Key Points
Firewall Template: Primarily for establishing secure communication with the SMC
and denying all other traffic.
NGFW Inspection Template: Focused on deep inspection of traffic, with the ability
to customize and disable deep inspection for specific traffic if required.
IPS Template: Enables deep inspection for all supported protocols with the ability to
disable it for specific rules.
Introducing Inspection Policies
When implementing inspection on your network, starting with a predefined inspection policy
is the most common approach. However, these general policies might not perfectly fit your
specific network needs, so tuning is necessary. Tuning involves adjusting the policy by
activating or deactivating specific inspection checks based on what is found during the tuning
period and the particular needs of your network.
Forcepoint Firewall provides three main predefined inspection policies, each with different
levels of security and coverage:
No Inspection Policy
Tuning involves monitoring and adjusting the selected inspection policy over a period. This
helps to fine-tune the balance between detecting threats and minimizing false positives based
on the specific behavior and requirements of your network. By carefully adjusting the policy
settings, you can enhance the effectiveness of the firewall while reducing unnecessary
disruptions.
In Forcepoint firewall inspection policies, "Situations" are central elements used to define
traffic patterns and events that need detection. Here’s a detailed summary explaining this
concept:
Situations
Situations are used to specify the exact traffic patterns and events you want to detect within
your system through an inspection policy.
Context
Definition: The context binds the situation to a specific type of traffic, which can
include protocol and direction of the stream.
Function: It provides a framework for defining parameters for each situation.
Usage: You can specify parameters using regular expressions or by selecting from a
set of fields and options, depending on the context chosen.
Example: If you want to monitor HTTP traffic for specific patterns, you would select
the HTTP protocol as the context and then define the specific patterns to look for.
Tags
Vulnerability
Type
Definition: The type determines the action taken when a situation is matched.
Function: Based on the situation type, the firewall can take different actions:
o Terminated: The connection is blocked.
o Permitted with stored logging entry: The connection is allowed, but an entry
is logged for monitoring purposes.
o Not inspected: The connection is identified but not inspected further.
Usage: These types are defined in the default system template rules.
Example: A situation involving a benign traffic pattern might be set to "Not
inspected," whereas a suspicious pattern might be set to "Terminated."
In summary, situations in Forcepoint firewall inspection policies are used to define specific
traffic patterns and events for detection. The context specifies the traffic type and pattern, tags
help group and simplify policy management, vulnerabilities link situations to known issues,
and types determine the action taken upon detection. This structured approach allows for
precise and efficient traffic monitoring and threat management.
The rules tree is the main tool for controlling the deep packet inspection.
You can define what kind of action the NGFW takes when situation matches are
found in traffic and how the match is logged.
the firewall performs a baseline level of inspection and action for all traffic, which
can then be customized as needed.
Scope of Checks: Unlike other firewall rules, the checks defined in the rules tree
cannot be limited by IP addresses or logical interfaces. This means the rules
apply universally to all traffic passing through the firewall.
You can edit the action or logging cell within a rule and select the appropriate
option
You can change the default action for an entire situation type but set different
actions for specific situations within that type.
Excerpt Stores an excerpt of the packet that matched. The maximum recorded
excerpt size is 4 KB. This allows you to quickly view the payload in the Logs view.
Record Records the traffic up to the limit you set in the record length field. This
allows for storing more data than the excerpt option.
The NGFW (Next-Generation Firewall) Inspection policy aims to provide the highest
accuracy by ensuring that:
Legitimate traffic passes through with minimal latency or bandwidth impact.
Clearly malicious traffic is terminated.
Suspicious traffic is usually allowed but logged for later analysis.
Predefined inspection policies are available, but they need to be tailored to specific
environments. A threat to one system might not be relevant in another, so tuning the
inspection policy to the network environment is crucial to avoid:
False Positives: Legitimate traffic incorrectly flagged as malicious, which can occur if
the inspection patterns are not accurate enough.
False Negatives: Malicious traffic not detected, which can happen due to:
o Attackers using techniques to bypass inspection.
o Permissive policies aimed at reducing false positives.
o Network configuration issues preventing the NGFW from seeing all traffic.
o Infrequent updates missing the latest attack signatures.
Properly configured, the NGFW Inspection policy can effectively notify and block malicious
traffic.
To verify and fine-tune inspection in Forcepoint firewalls, you generally start with a
predefined inspection policy. During a tuning period, gather information on detected events to
understand the nature of traffic in your network, including both malicious and harmless
traffic. This helps improve detection accuracy and reduce false alarms.
1. Passive Termination: This feature logs instances where a connection is selected for
termination without actually terminating it. This allows for policy adjustments without
disrupting important business communications.
2. Inspection Rule Overrides: These overrides permit or terminate specific situations
contrary to the larger situation type. Use overrides for broad rules and exception rules
for more specific cases.
3. Exception Rules in the Inspection Policy: These rules are processed before the main
rules and allow for detailed tuning. You can easily create exception rules by right-
clicking on log entries and using them as a basis.
exceptions are evaluated before the main rules. This is evident from the placement of the
exceptions panel above the main rules tree. Exceptions are primarily used to address false
positives by allowing certain patterns in specific parts of the traffic while still triggering
responses when encountered elsewhere.
The design principle for exception rules follows the same top-down reading order as access
rules. Specific rules must be placed above more general ones that match the same traffic.
However, in inspection rules, matching is primarily based on situation elements. Each
situation corresponds to a specific traffic pattern, so rules match the same traffic only if they
correspond to the same situation, even if they share identical source, destination, severity, and
protocol definitions
The examples :
1.1.1: Eliminates excessive logs for FTP anonymous logging to reduce noise.
Rule 1.1.1: New signatures from the last three update packages are temporarily
allowed for testing. Specific alerts are raised when these signatures match to identify
them easily and ensure they don't generate false positives.
Rule 1.1.2: A specific false positive situation is allowed from a specific internal
network to a specific server. If this situation occurs in any other traffic, the inspection
rule base will terminate the connection
new exploit signatures are obtained through dynamic updates. You can set up the
management server to regularly check for and download these updates. After
downloading, the updates must be activated in the Security Management Center
(SMC) before they can be installed on the firewall engine. Installing these
updated signatures on the engine requires a policy installation, which can be
configured and automated in the Global System Properties dialog box.
file scanning process :
This scanning process is managed by the file filtering policy of the NGFW
(NGFW) communicates with the Advanced Malware Detection (AMD) system by sending
file hashes. If AMD recognizes the file, it responds with a reputation score. Files that are
unfamiliar to AMD are forwarded for analysis in a controlled operating system environment.
After analysis, AMD provides a reputation score for these files based on their observed
behavior.
Additionally, through the Logs view in the Management Client, users can access an external
portal. This portal allows detailed inspection of reports generated by the Cloud Sandbox for
analyzed files. Users can utilize various analysis and reporting tools within this external portal
for further investigation and management of potential threats.
access control rules dictate which network traffic undergoes malware detection through File
Filtering Policies. Here are the key points:
Enabling File Filtering: File filtering is activated either by enabling it in the action
options of individual access rules or by adding a rule with the "Continue" action to set
defaults for file filtering.
Application of File Filtering: Traffic designated for file filtering in access rules is
routed to the File Filtering Policy. The protocol to which file filtering applies is
determined by the Service allowed in the access rule.
Supported Protocols: File filtering is supported for FTP, HTTP, HTTPS, IMAP,
IMAPS, POP3, and POP3S. For encrypted protocols, decryption of traffic is necessary
to apply file filtering effectively.
Default File Filtering Policy: Both the Firewall Template and the Firewall Inspection
Template utilize the rules defined in the Default File Filtering Policy by default. This
policy applies specific scanning methods and options based on file source, destination,
and type. It enforces antivirus checks across all file types if antivirus is enabled in the
engine editor and file filtering is activated in access rules. Additionally, the Default
File Filtering Policy incorporates sandbox scan settings defined for the engine by
default, applying them to relevant traffic.
the File Filtering Policy enables policy-based control over file types entering and leaving the
NGFW, incorporating malware detection capabilities. When a file transfer is detected, it
undergoes scrutiny against the File Filtering Policy's rules. The policy applies the first
matching rule to determine whether the transfer is permitted. If no match is found, the transfer
proceeds unhindered.
Matching Criteria: Rules can be configured based on Source, Destination, and File
Type. Here, Source and Destination refer to the file's endpoints, not the network
connection's endpoints. For instance, if a file is downloaded by a client from an
Internet web server, the Source is the web server, and the Destination is the client's
computer.
Malware Detection Options: Each rule within the File Filtering Policy allows
specific configurations for malware detection, which are executed sequentially:
1. File Reputation: Assessing the file based on its known history and reputation.
2. Anti-malware: Conducting traditional antivirus scans on the file.
3. Sandbox Scan: Subjecting the file to a sandbox environment to observe its
behavior and assess potential threats.
The Action defines how the engine handles the file:
▪ Allow: The file transfer is allowed without malware detection scanning. By default,
compressed files are decompressed, and the contents are matched against the File Filtering
Policy again.
▪ Discard: The file transfer is discarded without sending an ICMP error message or TCP reset
to the source.
▪ Allow After: This allows you to select options for malware detection, by specifying
malware detection scans are applied to the file.
If a file meets the rule action options, it's allowed; otherwise, it's discarded.
File Content analysis:
Sends a checksum to either McAfee Global Threat Intelligence cloud or McAfee TIE
cloud.
Returns a file reputation score.
o If the score is above the specified threshold, the file is allowed without further
scans.
o If the score is below the threshold, the file is discarded.
o If the score is inconclusive, the file proceeds to the next scan.
NGFW Anti-Malware:
None: No traffic buffering; traffic passes through before malware scans are complete,
minimizing delays but not blocking unknown malware.
Low: Only the last packet of the connection is buffered until scans are complete. The
other packets of the connection are allowed through before malware scans are
completedFor SMTP traffic, this behaves like the High level.
Medium: Part of the connection is buffered until scans are complete. For SMTP
traffic, this behaves like the High level.
High: All traffic is buffered until scans are complete, offering the highest security but
potentially delaying traffic.
Forcepoint NGFW can be integrated with on-premises DLP servers like Forcepoint DLP to
scan files as part of a file filtering policy. This integration primarily aims to prevent sensitive
data from being sent out during outbound file transfers, supporting protocols such as FTP,
HTTP, HTTPS, IMAP, IMAPS, POP3, POP3S, and SMTP. Communication between NGFW
Engines and DLP servers is facilitated via the ICAP protocol. DLP scanning is configured
within the File Filtering Policy and is enabled in the Allow After action of a File Filtering
rule. DLP scans can be combined with other Anti-Malware scanners for enhanced security.
Alerts are notifications for important events that need the administrator’s attention. They are
generated by:
Alerts differ from normal log entries because they are highlighted in the Management Client's
Active Alert view until acknowledged by an administrator. They can also be escalated
through external notification channels. Each alert is also recorded as a log entry and remains
even after acknowledgment. Normal log entries do not trigger notifications or escalation.
Alerts can be triggered by automatic test failures, unreachable monitored elements, or system
errors.
Alert Escalation in Forcepoint Firewall:
Alert escalation defines when and how administrators are notified about alert entries, which
indicate issues with SMC servers, NGFW Engines, failed tests, tasks, or matched rules.
Alert Process:
1. Alert Generation:
o Engine nodes send alert entries when a rule includes an alert element or when a
test fails.
o The SMC Server sends alerts for critical system events.
2. Alert Reception and Storage:
o The Log Server receives and stores the alerts, then forwards them to the
Management Server.
3. Alert Visibility and Matching:
o The Management Server displays alerts in the Active Alerts view.
o The alerts are matched against the Alert Policy rules on the Management
Server, determining which alerts are escalated through Alert Chains.
4. Alert Chains and Notifications:
o Alert Chains specify which administrators receive notifications, in what order,
and by which methods.
5. Acknowledging Alerts:
o Administrators acknowledge alerts in the Active Alerts view, removing them
from Active Alerts and stopping further Alert Chain processing for that alert.
This process ensures that administrators are promptly informed about significant events and
issues within the system.
When a component generates an alert, it is shown in both the Active Alerts and Logs
views.
Alerts are acknowledged by the administrator in the Active Alerts view, which aggregates
them by type and severity.
The Active Alerts view is accessible via the Monitoring Menu or the user notification icon
in the Management Client's bottom right corner.
Task 1: Define the Alert or Situation to escalate (optional)
System Alerts: Predefined for common alerts, based on specific situations (e.g.,
"Log Server: disk full").
This step is identified as optional because system alerts are already defined and may be all
you need in some circumstances. Alerts are sent when there is a problem with the system,
when a test or task fails, or when a rule that is configured to trigger an alert matches. Alerts
can also be sent when a set threshold for a monitored item in Overviews is exceeded.
Task 3: Define Alert Chains
Alert Chains determine how, in what order, and to whom notifications about alert entries are
sent. These chains list actions executed sequentially from top to bottom. Each row in an Alert
Chain specifies a Channel and a Destination address for the notification.
Custom Script: Executes a script stored on the Management Server. The Destination must be
the script's name.
DELAY: Adds a delay without any action. Useful for introducing a delay at the top of the
chain.
SMS: Sends a text message via a GSM mobile phone connected to the Management Server.
The Destination must be the recipient's phone number.
SMTP: Sends an email. The Destination must be an email address recognizable by the SMTP
server.
USER NOTIFICATION: Adds a blinking icon in the Management Client's bottom right
corner. The Destination can be ANY or specific Administrator elements.
Threshold to Block: Limits the number of notifications sent within a specified time period.
Delay: Sets the number of minutes before processing the next row.
Alert Policies are used to determine which alerts from various sources are escalated to
specific Alert Chains. Here's a detailed summary:
This ensures that alerts are managed and escalated appropriately based on defined criteria.
To use the Alert Channels in the chains, you need to configure the corresponding Notification
parameters in the properties of the Management Server element first. The information
provided by the alert notification will vary depending on the Alert Channel used. For instance,
SMS alerts might be limited by the number of characters that can be sent.
Authentication can be performed in several ways. Combining several methods strengthens the
verification of the user. With authentication, a person can prove their identity using one or
more of the following:
The most common type of authentication is something the user knows, such as a password, or
something they have, such as an authorization card.
predefined authentication method :
Client Certificate ,
user password (User Password is for simple password authentication against the
internal LDAP database, including user authentication in Forcepoint VPN Client
hybrid authentication)
Authenticate end-user access through firewalls to the SMC against external authentication
servers that support either the RADIUS or TACACS+ protocol
If you use an external authentication server, multiple authentication methods are available,
such as onetime passwords and token cards.
the Management Server includes an internal LDAP directory to store user information. This
integrated directory can be used to authenticate users using passwords or certificates,
providing a simple solution when there's no need for an external LDAP server.
Key Points:
1. User and Group Storage: The user and user group information is stored on the
Management Server. Each firewall node keeps a replica of this database, ensuring that
any updates to the main database are promptly replicated to all firewall nodes. This
setup allows the firewalls to use their local copies of the directory, reducing the need
for constant network communication.
2. Management and Synchronization: Users are managed through the Management
Client, with their information residing on the Management Server. By default, the
internal user database is not automatically replicated to firewall nodes. To enable this
replication, administrators must enable the "User DB Replication" setting on each
firewall node. The "Reset User Database" command can be used to enforce
synchronization between the Management Server and firewall databases.
3. Access Restrictions: External components, such as external authentication servers,
cannot access the internal LDAP database.
4. Authentication Methods: Users can be authenticated using the methods provided by
the firewall, leveraging the internal LDAP directory for user data.
internal user accounts contain all the necessary information for authenticating users using the
firewall's authentication methods. These settings, such as user credentials for the User
Password method, are replicated across all firewalls.
1. Replication: Firewalls keep a local copy of the Management Server's internal LDAP
database. Any changes made to the user database in the Security Management Center
(SMC) are automatically synchronized with the firewalls.
2. Authentication and Access Control: If the user authentication succeeds, the firewall
lists the user as an authenticated user, taking note of both username and authentication
method. When the user opens new connections, access rules that contain an
authentication requirement, now match. These rules use both the username and the
authentication method as criteria. If the user attempts to establish new connections,
these criteria are used to verify access permissions.
3. Session Expiry: The authentication session has a configured timeout. Once this
timeout is reached, the user is removed from the list of authenticated users. At this
point, any access rules that require authentication will no longer apply to the user's
connections.
Forcepoint firewalls can integrate with external directory servers, such as Microsoft Active
Directory, to manage user and group information. This integration utilizes an LDAP client
built into both the Management Server and the firewall engines. Here's a detailed summary of
the process and its benefits:
1. External Directory Server Usage: Instead of relying solely on the internal user
database, the system can query an external directory server to obtain user and group
information. This eliminates the need to manually replicate user account data within
the system.
2. Automatic Synchronization: User and group elements from the external directory are
automatically imported into the Security Management Center (SMC), streamlining
user management and ensuring consistency.
3. Authentication Rules: With the integration, different authentication rules can be
applied to different users based on the information retrieved from the external
directory.
4. Direct Querying: The external directory server is queried directly for user
information. This query occurs both when viewing user elements in the Management
Server and when firewalls authenticate users. The information is not stored or
replicated within the internal directories of the Management Server or the local
directories on the firewalls.
5. Policy Configuration and Application: Through the Management Client,
administrators can browse users and groups in Active Directory and use this
information to configure firewall policies. These policies, along with settings for the
external directory server, are then installed onto the firewall.
6. Authentication Process: When a user attempts to authenticate, the Next Generation
Firewall (NGFW) queries the external LDAP server. The LDAP server can either
authenticate the user directly or redirect the authentication request to a third-party
authentication server, depending on the configuration and available methods supported
by the external directory server.
The integration with external directory servers, particularly Active Directory, is facilitated by
a dedicated element in the SMC, making the setup and management process more
straightforward.
the external directory server is queried directly by the Management Server when you view the
user elements and by the firewalls when a user attempts to authenticate.
In a Forcepoint firewall setup using Active Directory as the directory server, user
authentication can be performed via LDAP Authentication. The process involves the
following steps:
Administrators have the flexibility to customize the HTML pages (such as the login,
challenge, and status pages) that are displayed to users during authentication, allowing the
interface to match the company's branding.
Authentication can occur over either plain HTTP connections or encrypted HTTPS
connections, enhancing security. The firewall can restrict the interfaces through which users
can authenticate, and it supports both IPv4 and IPv6 for user authentication.
1. No LDAP Schema Changes: The Active Directory (AD) server does not require
modifications to its LDAP schema for integration.
2. Use of AD Security Groups: AD security groups can be directly utilized in firewall
access rules.
3. Authentication: End-users can authenticate using Windows passwords through LDAP
Bind, compatible with Windows Server 2012 and later.
Configuration Steps:
Create an Active Directory Server Element: This element represents the external
AD server, enabling the use of the AD user database as an external user database. It
includes both LDAP user database settings and authentication configuration, though
NPS authentication is optional. If using other external authentication servers, separate
server elements must be created for each feature.
Define LDAP Settings: Configure user account information (Bind User ID), Base DN
(the LDAP tree where user accounts are stored), and connection security options like
LDAPS or Start TLS to secure communications with the AD server.
To configure authentication server settings in Forcepoint firewall, follow these steps:
This setup ensures secure and versatile user authentication across different methods and
servers.
In Forcepoint Firewall, each LDAP server is associated with its own LDAP domain within the
Security Management Center (SMC). One of these domains can be designated as the default
LDAP domain. Users belonging to this default domain do not need to specify the domain
name (e.g., "username@domain") during authentication. This default domain can be set
individually for each Next-Generation Firewall (NGFW). Additionally, you can select default
authentication methods for all accounts within this LDAP domain, such as using LDAP
Authentication.
Example: A rule allows Jennifer and users in the "Mobile VPN users" group, who
authenticate via LDAP, to access the HQ network through a VPN tunnel. These users are
stored in Active Directory, and LDAP authentication uses their Windows account credentials.
access control by user allows the creation of rules based on specific users or user groups as
sources or destinations without needing user authentication. This feature requires either the
Forcepoint User ID Service (FUID) or the Endpoint Context Agent (ECA) to transparently
identify users and associate them with IP addresses. This setup simplifies the configuration of
access control and enhances the user experience by allowing seamless access to services for
trusted users in a secure environment. While user-specific rules provide convenience, they do
not replace user authentication. They can be used alongside user authentication rules to grant
specific user groups access to a service, while others might still require authentication.
The Forcepoint User ID Service gathers data on users, groups, and IP addresses from
Windows Active Directory (AD) servers and Exchange Servers. It can be configured for high
availability (HA) by installing it on multiple servers, with synchronization managed through
CockroachDB across the cluster. Additionally, you can deploy multiple instances of the DC
Agent. The service supports multiple AD domains and forests, ensuring broad integration
capabilities.
1. Components:
o DC Agent: Monitors user logins to the domain and reports user and IP address
information to the User ID Service. You can install multiple DC Agents in the
same Active Directory (AD) domain. Each DC Agent can manage up to 30
domain controllers and 30,000 users.
o User ID Service: Receives data from DC Agents and Active Directory
Servers, including domain, group, and user definitions, along with IP address
information. This service includes the UID Server and CockroachDB
components. Configuration and setup are managed through the Forcepoint
User ID Service Configuration Utility.
2. System Requirements:
o UID Service: Compatible with CentOS 7 and 8, and Red Hat Linux Enterprise
7 and 8.
o DC Agent: Compatible with Windows Server 2012, 2012 R2, 2016, and 2019.
3. Alternative Option:
o Integrated User ID Service: Can be used directly on NGFW (Next-
Generation Firewall) Engines for transparent user identification. This option is
mainly for demonstration and proof-of-concept testing.
The Forcepoint Endpoint Context Agent (ECA) is a Windows client application that provides
detailed endpoint information to the Forcepoint Next-Generation Firewall (NGFW). Here’s a
summary of its key functions:
User Identification: ECA helps in identifying users and logging their actions.
Access Control: The Forcepoint NGFW uses the data from ECA to enforce security
policies.
Information Collected: ECA provides information on:
o User Details: Identifies and logs user actions.
o Application Information: Details about applications running on the Windows
endpoint.
o Operating System Information: Includes OS version, anti-malware status,
and local firewall status.
This data can be used to monitor, report, and enhance security measures based on endpoint
activity and conditions.
e Forcepoint firewall User Dashboard allows administrators to access detailed user-specific
information by integrating data from Active Directory (AD) and the Endpoint Context Agent
(ECA). Here’s a summary with all key details:
1. Home View: The Management Client's Home view features user dashboards that
provide an overview of user activity. This includes tracking suspicious behavior, such
as the use of certain network applications or attempts to access restricted networks,
and identifying users linked to attack situations.
2. User Activity: Active users who generate log data are listed. You can adjust the time
period for which user activity is monitored. In cases where privacy laws prevent
identifying users by name, IP addresses can be shown instead.
3. Statistics and Details: The Statistics panes offer charts and general statistics on user
activities. Selecting a specific user provides more detailed insights into their activities.
4. Data Sources: If available, user information from AD and ECA is displayed in
separate panes in the Home view.
5. Logging Requirements: To monitor users by name, logging of user information in
the Firewall’s IPv4 and IPv6 access rules must be enabled.
6. Endpoint Information: Windows endpoint details, including OS version, anti-
malware status, and local firewall status, are also available.
This dashboard helps in tracking and analyzing user behavior, identifying potential threats,
and ensuring compliance with privacy regulations.
the User Behavior Events pane displays alerts related to User Alert Checks. Here’s a summary
of the checks available:
1. Client-based IPsec and SSL VPN: This method is used for secure access to both
HTTP-based and non-HTTP-based services within the protected network. It requires
the installation of the Forcepoint VPN client software. The VPN client settings are
managed centrally through the Security Management Center (SMC) and are
automatically updated on the clients when they connect.
2. Clientless remote access via SSL VPN Portal: This option provides secure access to
HTTP-based services from standard web browsers without needing to install
additional software. It's ideal for users who only need to access web-based resources
securely.
IPsec VPN
SSL VPN
Technology: Secure Sockets Layer (SSL) VPN uses SSL/TLS protocols to secure the
connection. It is similar to the security used in HTTPS for securing web traffic.
Usage: Often used for remote access VPNs, especially for accessing web-based
applications. It can be configured to provide full network access or limited access to
specific applications.
Client Software: May not require a client installation, especially for browser-based
access (clientless SSL VPN). When a client is required, it can often be lightweight and
simpler to manage.
Transport: Operates at the transport layer, primarily securing web traffic
(HTTP/HTTPS). It is particularly useful for environments where access to web-based
applications is needed.
Security: Provides secure, encrypted access to applications and data, and is often
easier to set up for users since it can use standard web browsers.
In summary, IPsec VPNs are more versatile and can secure a broader range of applications,
while SSL VPNs are more user-friendly and easier to deploy, particularly for web-based
applications. The choice between the two depends on the specific security requirements and
the types of applications or services that need to be accessed remotely.
Forcepoint firewalls support both SSL VPN and IPsec VPN tunnels simultaneously. Here's a
summary of the key details:
1. URL Rewrite: This method adds the name of the web service to the URL link,
simplifying setup. Incoming connections are routed based on the URL prefix, and
HTTP responses are rewritten to change outgoing URLs. No additional DNS entries
are required.
2. DNS Mapping: Each service is assigned its own DNS name. This method requires
more effort to set up but is beneficial for certain applications.
3. Freeform URL: Users manually enter the URLs they want to access.
Scenario
Imagine a company has an internal web service for employees to access their email, located at
an internal URL like http://intranet.company.com/email.
1. URL Rewrite
Here, each service has a unique DNS name. For example, the internal email service could be
accessed externally via https://email.vpn.company.com. This method involves setting up DNS
records to point email.vpn.company.com to the SSL VPN, which then directs the request to
http://intranet.company.com/email. This is more complex to set up but can handle more
specific application requirements.
3.Freeform URL
In a Freeform URL scenario, the external URL provided to users might be something like
https://vpn.company.com. After logging in, users can manually enter specific paths or
identifiers that the SSL VPN then translates to the appropriate internal URL.
For instance, if an employee wants to access the internal email system, they might enter a
URL like https://vpn.company.com/email after connecting to the VPN. The SSL VPN server
is configured to recognize /email and map it to the internal address
http://intranet.company.com/email. This setup allows users to access internal resources by
using familiar paths without exposing internal URLs directly.
1. SSL VPN Portal Policy: This policy defines the rules for which users can access
specific SSL VPN Portal Services and the authentication requirements needed for
access.
2. Cryptographic Algorithms: The SSL VPN Portal supports specific SSL
cryptographic algorithms used to secure communications.
3. NGFW (Next-Generation Firewall): The portal is hosted on a list of firewalls,
ensuring secure access.
4. Server Credential: This includes the certificate used to secure the portal's HTTPS
connections. The certificate's Common Name (CN) must match the SSL VPN Portal
hostname. It can be signed by an external certificate authority that clients trust, such as
a commercial CA or an internal company CA.
The SSL VPN Portal in Forcepoint Firewall provides secure, browser-based access to services
within a protected network. To set up the portal, you first define the services you want to
offer.
SSL VPN Portal Services: These map external URLs to HTTP-based services within
the protected network.
Link Translation Methods: You can choose from URL Rewrite, DNS Mapping, or
Freeform URL for translating links.
External URL Prefix: This is the part of the URL used to access the service
externally.
Internal URL: The URL of the service within the protected network.
SSO Domain: Allows for single sign-on (SSO) across services that share the same
credentials.
Client Trust: Specifies which certificate authorities (CAs) the engine trusts when
connecting to the internal URL via HTTPS.
Additional Configurations:
Alternative Hosts: You can specify additional hostnames or IP addresses where the
services can be accessed.
Appearance Customization: On the Look & Feel tab, you can set the title, icon, and
start page for the service as it appears in the SSL VPN Portal. You can also choose to
hide the service link from the portal if desired.
In the Forcepoint firewall setup for SSL VPN, it's essential to define which users are allowed
to connect. This can be done either by creating users in the firewall's internal user database or
by integrating with an external directory server. In this example, an internal user is defined
using the User password authentication method provided by the firewall. The specific user
credentials, including the username and password, are set in the user's properties.
Task 3: Create the SSL VPN Portal Policy The SSL VPN Portal Policy contains rules that
define which users can use each SSL VPN Portal Service and the authentication requirements
for accessing the SSL VPN Portal Services.
the SSL VPN Portal configuration involves several key components:
1. SSL VPN Portal Policy: Defines available services and user access rights within the
portal.
2. Hostnames: Specifies the domain names and IP addresses for the SSL VPN portal.
3. Server Credentials: Includes the private key and certificate for secure
communication, referenced from a Server Credentials element.
4. Target Engine: Lists the firewalls where the SSL VPN Portal is enabled, which can
also be specified in the Engine editor.
5. Look and Feel: Allows customization of the portal's appearance, including graphics,
styles, fonts, layout, and text. This requires manual editing of HTML and CSS files.
Additionally, in the Advanced tab, settings like session timeout and log level for the SSL
VPN portal services can be configured.
In Forcepoint Firewall, if you need to modify the SSL cryptographic algorithms supported by
the SSL VPN Portal, you can create a TLS Cryptography Suite Set element. This element
defines which cryptographic algorithms are allowed. By default, the firewall uses NIST (SP
800-52) Compatible SSL Cryptographic Algorithms, which adhere to the "NIST SP 800-52
Rev.1 Guidelines for the Selection, Configuration, and Use of Transport Layer Security
(TLS)." These settings are available in the engine properties. If the default algorithms are
sufficient, there's no need to create a custom TLS Cryptography Suite Set element.
VPNs (Virtual Private Networks) provide secure communication over insecure networks
using authentication, encryption, and integrity-checking mechanisms. They are commonly
used to connect corporate LANs with branch offices, partner offices, telecommuters, or
mobile workers. The devices that manage VPNs are known as VPN Gateways. In Forcepoint's
Next Generation Firewall (NGFW), VPN capabilities include IPsec VPNs and SSL VPNs for
mobile users.
1. Policy-based VPNs:
o Traffic selection for the VPN is determined by the firewall's access rules.
o Site-to-Site VPNs: These connect two gateway devices, providing secure
access for other devices and supporting both IPv4 and IPv6 traffic.
o Mobile VPNs: These connect a gateway device with a VPN client installed on
a user's computer.
2. Route-based VPNs:
o The firewall's routing configuration determines which traffic is sent into the
VPN tunnel.
there are two types of site-to-site VPNs:
1. Policy-Based VPNs: Traffic is sent into the VPN based on firewall access rules.
These rules specify which traffic should enter the VPN and which traffic can exit.
2. Route-Based VPNs: Traffic routing into the VPN tunnel is determined by the
firewall's routing configurations, not by specific access rules.
The slides aim to introduce VPN-related terminology for the Next Generation Firewall
(NGFW). Here's a summary:
Site-to-Site VPN: This VPN connects two or more gateway devices, allowing
multiple hosts within their internal networks to communicate securely.
IPsec Standards: The NGFW Site-to-Site VPN adheres to these standards for
encryption and secure communication.
VPN Tunnel: When traffic needs to pass through the VPN, the source gateway
initiates a connection with the destination gateway to establish a tunnel.
Encapsulation/Deencapsulation: The original data packets are encapsulated
(wrapped) when entering the tunnel and deencapsulated (unwrapped) when exiting.
During transit, only encrypted packets are visible.
Host Transparency: The communicating hosts are unaware of the VPN process as it
is handled transparently by the gateways.
VPN gateways are devices that provide VPN access and are categorized into three types:
Endpoints: These are the IP addresses of the firewall used for communication
between VPN Gateways. Essentially, they are the contact points for VPN connections
from other VPN Gateways.
Site: This refers to the IP addresses and networks that are accessible through the VPN
behind a specific VPN Gateway. It represents the network resources available via that
VPN Gateway.
In VPN terminology for Forcepoint firewalls:
Endpoints: These are the IP addresses of the firewall used for communication
between VPN Gateways. Essentially, they are the contact points for VPN connections
from other VPN Gateways.
Site: This refers to the IP addresses and networks that are accessible through the VPN
behind a specific VPN Gateway. It represents the network resources available via that
VPN Gateway.
VPN topologies can be set up in Full-Mesh, Star, or VPN HUB configurations. Here's a
summary:
1. Topologies Supported:
o Full-Mesh: Every VPN Gateway connects to every other Gateway.
o Star: Gateways connect through a central hub.
o VPN HUB: Similar to Star, but with more complex configurations.
2. Gateway Classification: Gateways are classified as either Central or Satellite:
o Central Gateways: Act as hubs and can connect to all other Gateways.
o Satellite Gateways: Connect to Central Gateways and may not connect
directly to other Satellites.
3. Tunnel Management: By classifying Gateways, you define which tunnels are
created. You can disable unnecessary tunnels to optimize your network.
4. Full-Mesh Setup: To create a Full-Mesh topology, configure all Gateways as Central.
This ensures that every Gateway connects to every other Gateway, enabling direct
communication between all sites.
This configuration allows for flexible and comprehensive network connectivity based on your
needs.
Central Gateway: There is one central gateway that acts as the hub of the network.
Satellite Gateways: Several satellite gateways connect to the central gateway but not
to each other.
VPN Connections: VPNs are created between the central gateway and each satellite
gateway. Satellite gateways do not form VPNs with one another.
Configuration: Satellite gateways need to be configured specifically for their role in
the VPN setup.
Topology Combinations: You can have multiple central gateways in a Star topology.
In this scenario, the central gateways are connected in a full mesh topology among
themselves, while satellite gateways connect only to all central gateways, not to each
other.
In a Forcepoint firewall with a VPN hub topology, a hub gateway is used to manage and
forward VPN traffic between various VPN tunnels. Unlike a full mesh VPN, where each
gateway connects directly to every other gateway, the hub VPN simplifies connectivity by
routing traffic through the hub gateway. This reduces the number of tunnels needed compared
to a full mesh setup.
Deploying new gateways in a hub VPN is easier since they only need to connect to the hub
gateway rather than to every other gateway individually. However, this setup places more
resource demands on the hub gateway, as it handles the forwarding of traffic between all
connected gateways.
clustering firewalls and deploying Multi-Link VPN for VPN high availability:
1. Gateway Clustering: A VPN Gateway can be linked to a Firewall Cluster, which
provides redundancy and load balancing for the VPN Gateway.
2. Configuration: No additional configuration is needed compared to setting up a
gateway for a single firewall.
3. Single Endpoint: To other gateways, the firewall cluster appears as a single device
with a single IP address, known as the Cluster Virtual Interface.
4. Failover: If one node in the cluster fails, the remaining nodes take over the VPN
traffic handled by the failed node, ensuring continuous operation.
5. Enhanced Performance: In balancing cluster mode, the firewall cluster also offers
improved processing power for encryption and decryption tasks.
Routing Choices: You can choose specific VPN tunnels, ISP links, and proxy servers
for different network applications. For example, web applications like Office 365 and
YouTube might be routed directly to the internet, FTP connections through a VPN
tunnel, and voice traffic over MPLS.
Application Detection: This feature is most effective with protocols where the client
initiates data transmission, such as web-based protocols. To use a Network
Application element in application routing, ensure it has the Application Routing tag.
Use Cases:
o Traffic Routing: Route certain applications through a local internet
connection and other traffic through a different connection, like MPLS.
o Proxy Exclusion: Exclude specific applications from being routed through
proxies.
o Proxy Direction: Route some applications to one proxy and other web traffic
to a different proxy.
o ISP Connection: Direct traffic for a specific application to a particular ISP
connection, reserving others for more critical traffic. For instance, route
YouTube traffic through a cheaper ISP and critical business traffic through a
faster, more expensive ISP.
This approach helps optimize network performance and cost by aligning traffic routing with
application needs and connection types.
To set up a policy-based VPN between a Forcepoint NGFW engine and an external VPN
gateway not managed by the same Management Center, follow these steps:
Key Points:
Ensure you have correctly defined both the VPN Gateway (internal) and the External
VPN Gateway (third-party).
Use the Gateway Profile to validate that the VPN settings match the supported features
of the involved gateways.
In Forcepoint firewall, to define the End-Points for your VPN Gateways:
If the auto-defined settings are sufficient, there's no need for manual adjustments.
Task 3: Define the Site Content
1. Site Element: Specifies the internal IP addresses that can send or receive traffic
through the VPN.
2. Traffic Restrictions: Only IP addresses listed in the Sites element can communicate
through the VPN. Addresses not included cannot access the VPN.
3. VPN Gateway Elements: You can include a Site that is automatically updated based
on routing definitions.
4. External Gateways: For these, you need to manually define the protected IP
addresses in the Site associated with the Gateway.
5. Access Rules: While the Site element determines which IP addresses are valid for the
VPN, Access rules control the allowed connections entering and exiting the VPN
tunnel.
Here's a summary of the task for defining the Policy-Based VPN element in Forcepoint
firewall:
Each VPN uses a VPN Profile for IKE and IPsec settings, including integrity
checking, authentication, and encryption.
You can select settings based on compatibility with all involved gateways.
The VPN Profile can be shared across multiple VPNs if compatible.
The VPN Profile includes settings for IKE Authentication Method:
Pre-shared Key: Defined in Gateway-to-Gateway tunnel properties.
Certificates: Requires certificates for gateway authentication.
For internal VPN Gateways, the internal certificate authority (CA) can automate
certificate handling.
External CAs can also be used by adding them to the list of trusted CAs. You need to
export the gateway certificate request and import the signed certificate.
This setup ensures proper configuration and management of VPN connections using
Forcepoint firewall.
defining the VPN topology involves organizing Gateways into either "Central" or "Satellite"
categories for each VPN. This is done through a drag-and-drop interface. While site and
network configurations for each Gateway are generally consistent across VPNs, you can
exclude specific site elements from a VPN if needed.
Tunnels between Gateways and end-points are automatically created based on this topology,
but you can customize these tunnels, including specifying which Gateways and end-points
connect and adjusting properties like the VPN Profile used. In Multi-Link VPN
configurations, you can also set up standby and active tunnels.
For authentication with external Gateways, you can either set pre-shared keys agreed upon
with your partner or export automatically generated keys for your partner's use.
creating Access rules is essential for directing traffic through a VPN. These rules specify
which traffic is allowed to enter and exit the VPN. Here's a summary:
1. Traffic Control: Access rules determine which traffic is sent to the VPN and which is
permitted out. This is in addition to the Gateways' Site definitions, which outline the
allowed source and destination addresses for each VPN.
2. Rule Configuration: VPN Access rules are configured like other Access rules. You
set matching criteria, and all traffic that meets these criteria is handled according to the
defined Action. The "Allow" action includes options to "Apply VPN" and "Enforce
VPN":
o Apply VPN: Directs traffic from local networks into the VPN tunnel and
allows incoming VPN traffic.
o Enforce VPN: Drops any non-VPN traffic from external networks that
matches the rule, preventing unauthorized access.
3. Non-VPN Traffic Handling: If "Apply VPN" is used, non-VPN traffic not matching
the rule is processed by subsequent rules.
4. Forward Action: Mainly used in a Hub topology, it directs traffic from one VPN
tunnel into another.
5. Rule Example: Typically, two rules are created to manage VPN traffic in different
directions.
6. NAT Rules: By default, VPN traffic bypasses NAT rules. To change this, NAT must
be enabled for the VPN, and Private Sites with translated addresses must be defined.
7. Policy Application: The VPN configuration becomes effective once the policy is
installed on the firewall.
Link Summary: You can review the IP addresses and settings for individual VPN tunnels
by right-clicking on them in the End-Point<->End-Point list and selecting "View Link
Summary." This is useful for verifying details in complex configurations, particularly when
external components are involved, to ensure IP addresses and settings match with the external
setup.
VPN SA Monitoring: This view displays all currently negotiated VPN Security
Associations (SAs) in the firewall. It provides features such as filtering VPN SAs, creating
statistics, aggregating data by any field, and saving monitoring snapshots for further analysis.
Additionally, you can delete VPN SAs to reset VPN tunnels, which is particularly useful for
resolving issues with external third-party Gateway VPN tunnels that have stopped working.
Route-based VPNs can operate in either Tunnel mode or Transport mode, especially when
using additional tunnel types like GRE, IP-IP, or SIT:
In a VPN tunnel type configuration, there is no additional encapsulation beyond the standard
IPsec tunnel, meaning traffic is simply encrypted and sent over the IPsec tunnel.
In Forcepoint firewalls, log entries are primarily generated by Access rules, though other rule
types can also trigger logs. The system creates detailed Diagnostics logs and internal log
entries, including those related to policy installations.
Logs from firewalls, IPS engines, and Layer 2 firewalls are sent directly to the Log Server,
which either stores these entries or relays them for viewing. If administrative Domains are
configured, log, alert, and audit entries are domain-specific, meaning only entries related
to the specific Domain a user is logged into are visible or manageable. However, audit
entries from all Domains are accessible to administrators in the Shared Domain.
you can monitor logs from third-party devices directly within the Logs view. The Logging
Profile editor is a tool that defines how Syslog data from these devices is mapped to fields in
the Logs view. A validation tool is available to ensure that these mappings are correctly set
up. Additionally, if you are using IPFIX netFlow, it's necessary to enable log accounting to
ensure proper log file creation and managemen
The Details arrangement in the Logs view of Forcepoint Firewall offers an overview of
individual events, making it particularly useful for reviewing alerts and records generated by
Inspection rule matches. Users can browse log entries one-by-one using the back and forward
icons in the toolbar.
the Statistics section of the Logs view provides interactive charts for visualizing multiple
events. This feature allows you to quickly generate reports based on logs that match an active
query. It includes many predefined statistical items and offers up to 500 customizable
statistical items for creating your own statistics. The chart area can display various types of
charts, including pie, bar, line, stacked line, and map charts, with the map charts leveraging
the SMC’s internal Geolocation database.
The Log Analysis feature in Forcepoint Firewall provides tools to analyze logs, alerts, and
audit entries based on the active Query. It allows you to:
1. Aggregate Events: Sort log data by specific fields without duplicating rows.
2. View Data as Charts: Use predefined statistical items to visualize data.
3. Visualize Data on Diagrams:
o Audit Map: Shows how administrators manipulate elements.
o Network Application Usage: Maps users and the applications they access,
indicating allowed and disallowed connections.
o Service Map: Displays access to services in the network.
o Attack Analysis: Identifies hosts, targets, and detected attack patterns.
o Network Application and Client Executable Usage: Shows a map of users,
applications, and reported executables, indicating allowed and disallowed
access.
You can zoom in on these visualizations and create filters for more detailed analysis.
you can view logs related to specific rules directly from the policy editor. To do this, right-
click on a rule and select 'Show Related Logs.' Conversely, in the Logs view, you can use the
'View Rule' action to display the rule associated with a specific log entry.
You can also create new rules or exceptions based on existing log entries, particularly those
tagged with a rule identifier. This feature allows you to modify a rule’s action or logging
options for specific sources, destinations, and services. Additionally, you have the flexibility
to edit the rules generated from these logs.
filters are defined using a flexible syntax for precise data matching. A filter consists of event
data fields (like source IP address, time of the event) and operations that define how to filter
the data. There are three types of operations:
For complex filters, it's effective to start by creating a Filter element through a drag-and-drop
interface. This allows you to base the filter on specific criteria and edit it as needed, rather
than starting from scratch. Filters can also be saved locally as permanent Filter elements for
use throughout the Management Client.
managing capacity limitations involves configuring logging options to store only necessary
events. Instead of generating all logs and then removing unnecessary ones, it's more efficient
to adjust what logs are generated in the first place. This helps conserve system resources.
1. Immediate Discard Filters: Logs that match these filters are discarded immediately
by the Log Server.
2. Discard Before Storing Filters: If logs pass the first filter, they are displayed in the
management client. If they match this second filter, they won't be stored in the Log
Server.
Log pruning is useful when a rule generates both necessary and unnecessary logs, allowing
you to discard irrelevant logs on the Log Server. However, only logs can be pruned; alerts and
audit entries are always kept. Care should be taken when enabling log pruning, as overly
broad filters (like a "Match All" filter) can lead to the irreversible loss of important logs.
Log Servers can be configured to forward log data to external hosts. You can define which
type of log data you want to forward and in which format. You can also use Filters to specify
in detail which log data is forwarded. SMC provides predefined log forwarding formats to
facilitate the integration with SIEM systems. If log pruning is used, the Log entries must pass
the Immediate Discard filter to be forwarded from a Log Server to external servers. Note that
if you want to forward log data in the NetFlow or IPFIX format from the Log Server to
a third-party device, you must select Connection Closing with Log Accounting
Information in the logging option in the rule that creates the log data
a Policy Snapshot is created every time a policy is successfully uploaded to the engine. The
Management Server keeps the 100 most recent snapshots for each engine. These snapshots
allow administrators to compare the edited policy with the current one on the engine, which is
useful for reviewing changes made by others before uploading a new policy. Additionally,
policies can be restored from these snapshots if needed.
The rule search tool in Forcepoint firewall is available for Access rules, NAT rules, and
Exceptions within Inspection Policies. It enables users to search for rules by entering an IP
address or by dragging and dropping elements into designated cells. This tool also highlights
inherited rules and those in Sub-Policies. Additionally, in the Rules tree of the Inspection
Policy, a type-ahead search feature allows users to quickly locate specific Situations.
when a policy is installed, the entire configuration—including updates to routing information,
VPN settings, and engine configurations—is transferred to the Next-Generation Firewall
(NGFW) engines. This means that all aspects of the configuration are updated, not just the
changes made since the last installation. Additionally, the system includes a fail-safe
mechanism that automatically rolls back the installation if the new policies would disrupt
management connections, ensuring continuous manageability of the firewall.
monitoring is conducted through the Management Client. The Dashboard views provide a
comprehensive overview of the operational and connectivity status of Security Management
Center (SMC) components and third-party elements integrated for monitoring. Details on
active alerts are available, which highlight unresolved issues.
The status information is aggregated from data stored on Log Servers, which the Management
Server uses to create the Dashboard views. The Status Tree in the interface lists all
monitorable components, along with diagrams and groups containing these elements.
Selecting an item in the Status Tree shifts the main view to graphical monitoring, displaying
the status of the selected component and its connections within the system.
Specifically, choosing an engine node in the Status Tree switches the view to hardware
monitoring, showing detailed information about network port statuses. The Info panel offers
further specifics about selected components. Users can customize the information panes and
diagrams shown in the home view to suit their preferences.
the System Connections Monitoring feature allows you to view all connections between an
engine node and other system components. When an engine node is selected in the Status tree,
the Appliance Status Monitoring feature provides detailed information about the hardware
status, including network port statuses, fan speed, temperature, and NIC statuses. This
monitoring helps identify hardware problems early. Additionally, you can create custom
diagrams to visualize and monitor the status of various system elements
firewall's session monitoring views, you can observe the following:
These views include tools for data visualization, like log aggregation and statistics.
Additionally, snapshots of session monitoring can be saved. You can manage connections,
VPN SAs, and user sessions directly from these views, allowing you to terminate connections,
delete VPN SAs, and close user sessions as needed.
The SD-WAN dashboard in Forcepoint Firewall is a tool for monitoring and managing SD-
WAN features, including Multi-Link and VPNs. It provides statistics and reports related to
these features. In the dashboard:
Branches: Represent VPN gateways and NetLink elements associated with each
NGFW Engine. The dashboard shows the status of all branches and VPNs.
Status Tree: Selecting a branch reveals detailed information about NetLinks, VPN
tunnels, and associated traffic. Selecting a VPN shows its configuration status.
Customization: Users can customize the dashboard to display various statistics items
related to SD-WAN monitoring, which can also be used in reports and overviews.
The User Dashboard in the Forcepoint Management Client provides an overview of user
activities, highlighting potentially suspicious behavior, such as the use of certain network
applications, attempts to access specific networks, or associations with attack situations. This
dashboard is customizable and displays user activity data, which can be filtered based on a
configurable active period.
Users appear in the dashboard when their actions generate log data. In regions with privacy
laws, or when usernames are not stored, user activity can be tracked using IP addresses
instead of names. The dashboard includes statistics panes with charts and general user activity
data, and selecting an individual user provides more detailed information.
For comprehensive monitoring, Active Directory (AD) and Endpoint Context Agent (ECA)
data can be integrated, displaying in separate panes. To monitor users effectively, options in
the global system properties must be enabled, including logging user information in Firewall
IPv4 and IPv6 Access rules.
"Overviews" are monitoring views that provide real-time information on traffic and the
operating state of Security Management Center (SMC) components. These overviews include
predefined types like Access Overview, Inspection Overview, Application Usage Overview,
and VPN Overview. Administrators can customize these overviews by selecting from
hundreds of statistics reported by the Next-Generation Firewall (NGFW) engines.
Overviews are composed of one or more sections that display a wide range of system
information, including:
Sections can be of two types: Counters Statistics or System Summary. The statistics types
available for these sections include:
Progress (displayed as curves or bars)
Top rate (shown as pie charts or bars)
Period total summary tables
you can set a threshold to enable automatic tracking of monitored items in Overviews. Here's
how it works:
1. Threshold Definition: You can define specific thresholds for monitored items.
2. Automatic Tracking: These thresholds activate automatic tracking. The monitored
items are checked periodically based on your configuration.
3. Alert System: If a monitored item exceeds the defined threshold, an alert is triggered.
4. Alert Escalation: The alerts generated can be escalated and managed just like other
alerts in the system.
This feature helps in proactively managing and responding to critical issues by automating the
monitoring and alerting process.
reports are tools that transform extensive log data and statistical monitoring information into
clear, easy-to-read formats. They process this data into diagrams, charts, and tables, helping
you to identify specific details from large datasets. Reports can be automated and scheduled
for various purposes such as customer service, supervision, troubleshooting, and intrusion
investigation.
You can generate reports based on NGFW engine logs, alerts, audit entries, and statistical
information. These reports can be viewed on-screen, printed, or exported as PDF files or tab-
delimited text files. PDF reports can be customized using specific templates. On-screen
reports allow interactive features, such as highlighting and selecting chart items for detailed
display. Additionally, reports can be automatically emailed from the SMC to designated
addresses and are also accessible through the Web Portal.
1. Report Designs: Define the structure and content of a report, including the reporting
period and time resolution. There are predefined Report Designs for NGFW Engines
and system components.
2. Report Sections: Within a Report Design, Report Sections dictate how information is
graphically displayed. These sections can be reused across different Report Designs.
The SMC offers a variety of predefined Report Sections, and you can also create
numerous custom statistics sections.
3. Report Items: Each Report Section is composed of Report Items, which represent
specific data types from logs and monitoring statistics, like traffic load or connection
counts. Report Items align with log field values and are presented in the report
according to the properties set in the Report Sectio
reporting details:
Map Diagrams: Available in Reports, Statistics, and Overviews, and can display Top
Rate data as a map.
Database: The geolocation data is retrieved from a database included in the Security
Management Center (SMC), which updates during SMC upgrades.
Log Records: Geolocations are shown in log records with country flags next to IP
addresses, aiding in anomaly detection by visually linking related log entries.
Whois Records: For more details on traffic sources, you can look up Whois records
of IP addresses in log entries. This information is queried from Regional Internet
Registries (RIRs) such as ARIN, RIPE NCC, and APNIC.
the Security Management Center (SMC) can monitor the status of third-party devices using
various methods:
Ping
TCP
SNMP (Simple Network Management Protocol): supports versions v1, v2, and v3
You configure a probing profile for each third-party device, which allows the SMC to display
the device status. For SNMP-based probing, you can also gather detailed statistics from the
device, including:
the "Top Network Applications" option automatically discovers and ranks applications based
on traffic volume observed by NGFWs (Next-Generation Firewalls). To use this feature,
accounting logging must be enabled so that NGFWs can log traffic rates for each connection.
By default, the system monitors the top 10 applications, but the admin can adjust this number.
Alternatively, the "Network Applications" option requires the admin to manually define
which applications are monitored. Enabling accounting logging is also recommended with
this option to improve application visibility.
access rules are used to specify which traffic should be monitored for application health,
allowing you to focus on particular traffic types. For example, you might choose to monitor
only internet traffic and exclude internal traffic from this monitoring.
You also have the option to disable application health monitoring in the Next-Generation
Firewall (NGFW) engine properties. This feature is useful if you want to apply the same
policy across multiple NGFWs but only monitor applications on specific ones.
the SMC (Security Management Center) provides various tools to diagnose issues. You can
use logs and monitoring data from your Next-Generation Firewall Gateways (NGFGWs).
Collecting traffic captures from each engine interface is straightforward. If you need
Forcepoint support, gather sginfos before making any changes, installing policies, or
rebooting the SMC server or NGFW.
The sgInfo command collects essential system information needed by Forcepoint support.
Note that NGFW Engine and SMC each have their own sgInfos. To maximize the usefulness
of sginfos and tcpdump captures, collect them while the issue is occurring. Forcepoint
Support might also request a backup of the management server to expedite problem resolution
and potentially provide a fix. Optionally, you can take a backup of the Management Server
and share it with Support.
various modules can generate log events, each logged with a facility field indicating its
source. Here's a summary of key log types and their details:
Connection Closed Logs: By default, Forcepoint firewalls do not log the closing of
standard TCP connections. You need to enable this in the logging settings of the access rules
if you want to log connection closures.
Logging Traffic Volume: To collect traffic volume information for reporting purposes,
you must enable logging with the "Log Accounting Information" option.
TCP Reset: If a connection is closed due to a TCP Reset, a log entry is generated
indicating the source of the reset.
The incomplete handshake can be due to various reasons, such as the destination server being
unavailable, the destination port being closed, or issues caused by asymmetric routing, where
the firewall cannot see the full handshake.
The "Not a Valid SYN Packet" message in Forcepoint firewall logs indicates that a TCP
packet is not the first packet of a connection (missing the SYN flag) and isn't part of an
existing connection. This packet would typically be allowed if it were part of an established
connection. This issue can arise from:
1. Asymmetric Routing: The initial packet bypasses the firewall, but the reply
(SYN/ACK) does not, indicating a routing configuration error.
2. Network Scans or Attacks: Use of ACK or FIN packets can generate these logs,
often related to scanning or attack attempts.
3. Timed-Out Connections: If a server or client sends a packet after the connection has
timed out and been closed, this message may appear.
4. Idle Timeout: When a connection is idle beyond the defined timeout, it is removed
from the firewall's records. If communication resumes, packets may be discarded with
this log. Adjusting the timeout value in the access rule can help mitigate this issue.
you can capture network traffic data for troubleshooting purposes. This involves creating
a .zip file containing a tcpdump CAP file, which can be analyzed using tools like tcpdump,
WinDump, or Wireshark. The capture can include full packet information or just IP address
headers, and you can add a description and configuration details to the capture file. This tool
is available in the Security Management Center (SMC), and the captured data can be stored
on the Management Server or your local workstation for later analysis.
Contents: Contains configuration files for the Management Server, Log Server, and
Management Client, along with program trace files detailing logs of problem
situations.
Exclusions: Does not include information on engine configuration, traffic passing
through the engines, or engine status.
Additional Notes:
SgInfo can be run from the Management Client and retrieved on the client machine.
It's crucial to collect SgInfo data when a problem is occurring to capture relevant
information, as older sgInfo files may not reflect the current situation.
The sginfo script in Forcepoint NGFW (Next-Generation Firewall) is a tool used to gather
comprehensive information from the NGFW environment, packaging it into a compressed
file. This script is included by default in all NGFW engines and management/log server
distributions. It is primarily used for troubleshooting purposes when requested by Forcepoint
support. The data collected provides a snapshot of the current configuration and status, so it's
crucial to ensure that any problematic configurations are active when the sginfo script is run
to capture the relevant issues.
An administrator who has unrestricted permissions can change any password in the
Management Center. In an emergency situation, there is the possibility to create a new
account with unrestricted permissions on the Management Server
To troubleshoot a connection problem between the Management Client and the Management
Server in Forcepoint Firewall:
1. Verify Management Server Address: Ensure the correct Management Server address
is entered on the login screen. If there's NAT between the client and server, use the
NAT address. "Locations" and "Contact Addresses" do not influence the correct
address selection for logging in.
2. Network and Firewall Check: Confirm that the network is functioning and routing
traffic properly between the client and server. Check for any server firewall or external
firewall blocking traffic on ports 8902-8913/TCP.
3. Check Management Server Status: If the Management Server is not running,
attempt to start it manually from the command line. Check the tmp directory in your
SMC installation for the latest file starting with "MGTSRV" and review the trace logs
for errors.
4. Gather Additional Information: If the issue persists, collect an SMC sginfo and, if
possible, obtain the Management Backup for further analysis
common issues with viewing logs in a Forcepoint firewall system:
1. Logs and Troubleshooting: Logs are essential for troubleshooting your NGFW
system. They help diagnose issues and monitor activities.
2. Logging Rules:
o Rules can generate log or alert entries when matched. By default, logging
options from a previous "Continue" rule are used.
o If there are no preceding rules, Firewalls and Layer 2 Firewalls log connections
by default, but IPS engines do not.
o Individual rules can be configured to override default logging settings.
3. Log Pruning: If you suspect missing log entries, check whether log pruning settings
are inadvertently removing the logs you want to see
The Forcepoint Next Generation Firewall (NGFW) sends logged data to the Log Server using
port 3020. If a firewall exists between the NGFW engine and the Log Server, the firewall
must permit this connection. If the logged data cannot be sent to the Log Server, it is
temporarily stored (spooled) on the NGFW engines.
If the Log Server in the Forcepoint firewall is not operational, it's crucial to determine the
cause. You can try to start the log server manually using the command line to gather more
information. If the issue is related to insufficient disk space for logs, the system will alert you
to this problem before the log server stops functioning.
To view logs on a Forcepoint firewall, the Log Server must be accessible from the computer
running the Management Client. If a NAT device is between the Management Client and the
Log Server, you need to select the appropriate Location for the Management Client in the
status bar at the bottom right of the Management Client window. This ensures that the
Management Client can properly communicate with the Log Server through the NAT.
Log Server Certificate: If the Log Server’s certificate has expired, been deleted, or is
otherwise invalid, you need to re-certify the Log Server. This is done using the
sgCertifyLogServer script.
Licensing: All Security Management Center (SMC) components must have a valid
license. If the license is bound to an IP address, that IP address must be active on the server.
Software Version: All SMC servers must run the exact same software version to ensure
proper system operation.
SMC servers and Next-Generation Firewall (NGFW) Engines use certificates for
secure communication. These certificates are generated by an internal Certificate
Authority (CA) on the Management Server.
SMC and NGFW certificates are valid for three years. SMC server certificates must be
renewed before or when they expire.
You can certify again your log server or your management server by launching
respectively the sgCertifyLogServer or the sgCertifyMgtServer script.
NGFW Engine certificates are renewed automatically by default.
The internal CA used by the SMC is valid for 10 years.
Troubleshooting: If you have issues with logs, collect cleartext sginfo from the NGFW
node and a SMC sginfo for further analysis.
Policy failure in Forcepoint firewalls can occur due to errors in the firewall configuration. The
Security Management Center (SMC) validates configurations when generating policies. If
there are any configuration errors, policy installation will be halted, and an error message will
clearly indicate the specific configuration issue.
firewall policy installation issue:
1. Early Installation Failure: If policy installation fails early, it's typically due to
connectivity problems between the Security Management Center (SMC) and the
Firewall.
2. Potential Causes:
o Incorrect IP Address: The engine or Management Server might be using the
wrong IP address.
o Certificate Issues: The engine and Management Server may be rejecting each
other's certificates.
3. Troubleshooting: If you can't resolve the issue, gather an sgInfo report from the
nodes that are refusing the configuration for further analysis.
Initial Contact and Policy Definition: After the initial connection with the Management
Server, you set the policy for the firewall engine. This policy includes not only the security
rules but also the entire firewall configuration—like interface settings, routing, anti-spoofing
measures, and VPN settings.
Policy Roll-back Mechanism: To prevent connectivity issues between the firewall engine
and the Management Server, there's a roll-back mechanism. After a new policy is installed,
the firewall engine applies the policy and waits for a confirmation from the Security
Management Console (SMC). If the SMC doesn’t contact the engine within a specified
timeout, the engine automatically reverts to the previous policy to maintain connectivity.
Example Scenario: If the policy installation fails due to an incomplete configuration (like
missing default gateway), the firewall might not be able to communicate with the SMC. In
this case, it would roll back to the last working policy to avoid disruption.
Ethernet Rules: The firewall first checks Ethernet frames against the policy's Ethernet
rules. The packet is processed until it matches a rule dictating whether to allow or discard it.
Packet Sanity Checks: This phase includes dropping packets that fail sanity checks (e.g.,
TCP Segment-SYN-No-Options) and logging these drops. Note that not all invalid packets are
logged unless Packet Filter diagnostics are enabled.
Anti-Spoofing: The firewall verifies that traffic is coming through the correct interface
based on routing and anti-spoofing settings.
Access Rules Matching: If the packet isn't part of an existing connection, it is compared
against Access rules in the firewall policy. The packet is allowed or blocked based on
matching rules. If no match is found, the packet is discarded.
Protocol Validation: For packets that are allowed either as part of an existing connection
or by Access rules, the firewall checks if the packet conforms to protocol standards (e.g., a
new TCP connection must start with a SYN packet). Non-compliant packets are dropped.
Inspection and File Filtering Rules: The firewall applies Inspection rules to connections
selected for deep packet inspection or file filtering. These rules scan for patterns indicating
threats or anomalies and take actions based on rule definitions. This inspection applies to all
packets in a connection, regardless of whether they are part of an existing connection.
NAT Modifications: Network Address Translation (NAT) rules are applied to IPv4 and
IPv6 connections. The packet's source and destination addresses are translated according to
the first matching NAT rule. If no rules match, the packet retains its original addresses. NAT
is typically not applied to traffic for policy-based VPNs.
VPN: For policy-based VPNs, the firewall identifies the correct VPN tunnel from the
configuration. If the configuration doesn't match Access rules, packets may be discarded with
the message “VPN tunnel selection failed”.
Routing / Route-Based VPN: If a Zone is used as the Destination in an Access rule, the
packet is checked against Access rules after routing. If NAT affects the routing, the packet
may be discarded. Packets routed to a tunnel interface are encapsulated as per route-based
VPN configurations. For GRE/IP-IP packets with policy-based VPN, the packet reverts to
policy-based VPN processing.
QoS: The firewall allows packets through based on their priority and any applied
bandwidth limits or guarantees.