📜 ⬆️ ⬇️

10. Check Point Getting Started R80.20. Identity Awareness



Welcome to the anniversary - the 10th lesson. And today we will talk about another Check Point Blade - Identity Awareness . At the very beginning, when describing NGFW, we determined that it is obligatory for it to regulate access based on accounts and not IP addresses. This is primarily due to the increased mobility of users and the ubiquitous BYOD model - bring your device. The company may have a lot of people who connect via WiFi, get a dynamic IP, and even from different network segments. Try here create access lists based on ip-Schnick. Here, without the identification of users can not do. And it is precisely the Blade Identity Awareness that will help us in this matter.

But first, let's see what is the most commonly used user identification?
')
  1. To restrict network access by user accounts, not by IP addresses. Access can be regulated either simply to the Internet, or to any other network segments, such as the DMZ.
  2. VPN access. Agree that it is much more convenient for the user to use his domain account for authorization, and not another password that was invented.
  3. To manage Check Point, you also need an account that can have different rights.
  4. And the most enjoyable part is Reporting. It is much more pleasant to see specific users in the reports, not their ip-addresses.

At the same time, Check Point supports two types of accounts:


Today we will talk about network access. To control network access, if you have Active Directory, the so-called Access Role is used as an object (source or destination), which allows you to use three user parameters:

  1. Network - i.e. the network the user is trying to connect to
  2. AD User or User Group - this data is pulled directly from the AD server
  3. Machine - workstation.

In this case, user identification can be performed in several ways:


These are the three most common options, but there are three more:


In this lesson I will demonstrate the second option - Browser-Based. I think enough theory, let's move on to practice.

Video lesson




Stay tuned for more and join our YouTube channel :)

Source: https://habr.com/ru/post/450526/


All Articles