For Check Point, and assumes all firewalls are Check Point:
If all firewalls are Check Point products, it's supremely easy to manage all
of them. CP uses a concept they call a "VPN community" where all of the VPN
setup is done once. As firewalls are added to the community, they are
configured for all of the IPSec and NAT settings in one place and use
certificate authentication. You can still control traffic flow between
individual firewalls independently if desired.
You can use hub-and-spoke or full-mesh in a community.
If you use Check Point's small disk-less SOHO box for smaller offices,
called the "Edge", all configuration is stored in a text file. If you have a
device failure, you can simply plug in a new box and remotely import the
text file into the new device and it's up and running. The Edge's can also
run in an HA configuration if you install two of them.
Check Point can handle a remote firewall that gets its IP address via DHCP
from the ISP. It uses certificate authentication, so effectively the DHCP
remote firewall is treated the same as a remote access laptop. Only the
primary firewall needs a static IP address.
If you use Nokia for the firewall, it can store at least two copies of the
operating system on the firewall. When you need to upgrade the OS, called
IPSO (a BSD variant), you install the new IPSO image to the firewall while
it's still running the previous version. Sometime later, you can click "Test
Reboot" and the firewall will reboot into the new IPSO image. If you fail to
login to the firewall within five minutes and click the button to keep the
new IPSO version, the firewall will automatically reboot back into the
previous version. This is a real worry-free method of upgrading or
rebuilding remote firewalls. If you have a device failure, you can rebuild a
firewall remotely from scratch in about an hour from when the drop-shipped
unit arrives.
Multiple firewalls use a "distributed' configuration. Virtually all of the
Check Point configuration (rules, user database, object definitions, etc.)
are stored on a separate server known as the SmartCenter. You can rebuild a
firewall remotely and then push the Check Point configuration to it from the
SmartCenter. This greatly simplifies disaster recovery requirements since
there is very little that needs to be backed up from the firewall itself
(proxy ARP, interface configration, routing table, etc.). I keep the backup
information from the firewalls themselves stored on the SmartCenter (running
Server 2003). I then export its configuration weekly and also create Ghost
images of it for DR purposes. The Ghost images then contain all of the
configuration backups for the SmartCenter and for each firewall. Burn it to
a DVD and send it off-site.
The SmartCenter can be set up in a high-availablity configuration by buying
a second one so if one is down, the firewalls can still be managed. If you
only have one SmartCenter, all of the firewalls keep on doing their thing
and they begin logging locally instead of sending the logs to the
SmartCenter. The CRL and user database are cached on the enforecment
modules, which is why everything can work while the SmartCenter is
unavailable. I think the cache period is seven days for the CRL.
All firewalls send their logs to the SmartCenter for easy, integrated review
and monitoring. We also use Eventia Reporter which takes all of the logs
from the SmartCenter and combines them into a MySQL database and provides a
report generator.
SmartView Monitor lets you look at each firewall and evaluate how it's
performing, bandwidth in use, historical performance, etc.
If you're going to be using it for remote access, SecureClient has a feature
called Visitor Mode. Visitor Mode encapsulates all of the IPSec protocols
and traffic in a single HTTPS connection. If you have a lousy home router or
a hotel where only web browsing is allowed, Visitor Mode still allows full
remote access capability. We have a JV partner that uses Cisco. Our execs
have commented that they will be sitting side-by-side with the JV employees
in a hotel or airport and they can connect using Visitor Mode, but the JV
employees cannot get their Cisco VPN connections to work.
SecureClient has a remotely configurable and manageable personal firewall to
protect the laptops.
SecureClient can send its logs to SmartCenter for integrated monitoring, the
same as a firewall.
HTH,
Ray
From: The Security Freak <[EMAIL PROTECTED]>
Reply-To: Mailing list for discussion of Firewall-1
<[email protected]>
To: [email protected]
Subject: [FW-1] Site to Site VPN roundup ?
Date: Sun, 23 Jul 2006 16:22:44 +0300
I`m currently managing a large project that covers around 50 sites (10 Big
ones / NOC / SOC) and 40 small ones for VPN Site 2 site
The company I`m working for has issued an RFP on the subject and we are
down
to 4 VPN vendors
I got to admit that I have a complete picture but still would like to learn
from you VPN (and Firewall) gurus what are the pros and cons fo the 3 major
vendors
(Check Point / CIsco / Juniper)
Min you guys I`m looking for bullets and not the whole 9 yards
Thx
Tsecfreak
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================