Bootstrap Configuration Example for Check Point Security Gateway in AWS/Azure¶
This document applies to both AWS and Azure.
Using the bootstrap option significantly simplifies Check Point Security Gateway initial configuration setup.
In this document, we provide a basic bootstrap example for Check Point. Bootstrap Configuration can be a vendor specific script or configuration.
For a manual setup, follow manual setup example.
Configure Check Point Security Gateway using Custom Data¶
Follow the Aviatrix Firewall Network (FireNet) workflow to this step to launch the firewall instance.
To Configure Check Point Security Gateway using Custom Data, go to the Aviatrix Controller > Firewall Network > Setup > Launch & Associate Firewall Instance.
Fill in the required fields. Click Advanced. Fill in the following parameters. You must specify a custom username and password, and generate a hash string for the password.
|Advanced Field||Example Value|
|User Data||Bootstrap Configuration|
Sample Check Point Bootstrap Configuration to configure firewall “Allow-all” policy, health check policy and RFC 1918 static routes is shown below:
#!/bin/bash clish -c "set user <user> password-hash <100+ character hash string>" -s clish -c 'set interface eth1 state on' -s clish -c 'set hostname checkpoint' -s blink_config -s 'upload_info=false&download_info=false&install_security_gw=true&install_ppak=true&install_security_managment=false&ipstat_v6=off&ftw_sic_key=<password>'
Launch the instance. Wait for 15 minutes for it to boot up and initialize.
Log into the HTTPS interface of the public IP with the username and password specified in the Bootstrap Configuration file.
Ready to Go¶
Now your firewall instance is ready to receive packets.
Next step is to validate your configurations in the Check Point Security Gateway, and configure polices for Ingress and Egress inspection.
By default, all traffic is allowed in Check Point that can be verified by launching one instance in PROD Spoke VPC/VNet and DEV Spoke VPC/VNet. Start ping packets from a instance in DEV Spoke VPC/VNet to the private IP of another instance in PROD Spoke VPC/VNet. The ICMP traffic should go through the Check Point and be inspected in Security Gateway.