Go to the table of contents Go to the previous page Go to the next page
Integrating Web Security with Check Point > Configuring Check Point products to work with Web Security solutions
Configuring Check Point products to work with Web Security solutions
Deployment and Installation Center | Web Security Solutions | Version 7.7.x
 
In addition to defining Websense policies and assigning them to the appropriate clients, you must set up the Check Point product with the necessary objects and rules. In describing these objects and rules, this chapter assumes that you are familiar with general Check Point product concepts.
The following tasks must be completed before you begin to configure the Check Point product to communicate with Websense software:
*
*
*
*
See Check Point product documentation for more information on objects.
Configuring NGX for Websense content filtering involves the following procedures:
*
*
*
*
*
*
*
Creating a network object
1.
2.
If you have not already done so, create a network object (Manage > Network Objects > New > Node > Host) for the machine running Filtering Service.
This object is required only if Websense software runs on a separate machine behind the firewall, as recommended.
3.
Select General Properties in the left column. The following dialog box appears.
 
4.
 
Note: If you entered a host name for Name, you can click Get address to find the machine's IP address automatically. See the description for Name, above, for more information.
5.
Creating an OPSEC application object
After you create the network object for the machine running Filtering Service, you must create an OPSEC application object for the Websense UFP Server. The UFP server was installed with the other components when you chose Check Point as your integration product during installation.
1.
2.
Select Manage > Servers and OPSEC Applications.
3.
Click New, and then select OPSEC Application from the drop-down list.
4.
Select the General tab in the OPSEC Application Properties dialog box.
5.
 
Enter a descriptive name, such as Websense_ufp (make a note of this name for later use).
Select Websense.
UFP is checked automatically when you select Websense as the Vendor, and.cannot be changed.
6.
Select the UFP Options tab.
7.
Check the Use early versions compatibility mode option (Backwards Compatibility in earlier versions).
*
*
8.
Click Get Dictionary.
Websense software provides the Check Point product with a dictionary containing these categories: Blocked and Not Blocked. The full set of Websense categories is configured via TRITON - Web Security. See TRITON - Web Security Help for more information.
9.
10.
11.
Select Policy > Install to install the policy on the firewall.
See the Check Point product documentation for more information.
Creating Resource Objects
Create a Resource Object to define a Uniform Resource Identifier (URI) that uses the HTTP protocol. This URI identifies the Websense dictionary category Blocked.
1.
The Resources dialog box appears.
2.
Click New, and choose URI from the submenu to display the URI Resource Properties dialog box.
3.
Select the General tab, and complete the items in the tab.
 
Select Enforce URI capabilities.
 
4.
Select the Match tab, and complete the items in the tab.
 
No caching is the recommended setting for most networks.
Mark the Blocked check box.
5.
6.
7.
Select Policy > Install to install the policy on the firewall.
See Check Point product documentation for more information.
Defining rules
This section describes a content filtering scenario and its configuration. It includes information about the objects and rules that are needed to implement the suggested configuration.
 
Note 
In this scenario, the Check Point product denies access to any site that Websense software indicates is blocked, and allows access to any site that Websense software indicates is not blocked. The actual sites blocked may vary according to the computer making the request.
Use TRITON - Web Security to define policies that block the appropriate categories, and assign them to the desired computers or directory objects.
For example, you might modify the Default policy to use a category filter that blocks access to all categories except the Travel, and Business and Economy categories. This policy is applied to most computers.
A separate, more liberal policy could be defined for managers, which blocks only those categories considered a liability risk, such as Adult Material and Gambling. This policy, called Management, would be assigned to the computers used by top managers.
After the Websense policies are configured, you define rules in the Check Point product to prevent access to any site that Websense software indicates is blocked.
To set up this configuration in the Check Point product, you must create one URI Resource Object and one Network Object, and define two rules.
*
In this example, the URI Resource Object is called Blocked_Sites because Websense software is configured to block sites that are not required for business purposes.
*
*
RULE 1: Blocks access to undesirable Web sites. Add the new rule at an appropriate location in the Rule Base:
 
In the Service with Resource dialog box, select HTTP. Under Resource, select Blocked_Sites from the drop-down menu. This object was created in Creating Resource Objects.
RULE 2: The second rule allows access to all other Web sites. Add the second rule after Rule 1.
 
The following illustrations provide examples of Security Rule Base after the rules are defined.
After defining the rules described above, Verify and Install the policy from the Policy menu. See Check Point product documentation for more information.
 
Important 
For normal operation, set Track to None in the Websense rules. This disables logging in the Check Point product.
When the Check Point product receives an HTTP request, it sends Websense software the address of the requested site, as well as the IP address of the computer requesting the site.
For example, the CNN Web site is requested by a top manager. Websense software categorizes the site as News and Media. Websense software indicates that the site is Not Blocked under the Management policy that you defined in TRITON - Web Security. The Check Point product allows the site according to Rule 2.
If the CNN site was requested from an accounting clerk's computer, Websense software indicates that the site is Blocked because that computer is governed by the Websense Default policy, which blocks the News and Media category. The Check Point product denies the request according to Rule 1, and a Block Page is displayed on the clerk's computer.
Any time a computer requests a site not categorized by the Websense Master Database, Websense software indicates that the site is not in the database. The Check Point product allows access to the site according to Rule 2.
Configuring enhanced UFP performance
Enhanced UFP performance improves the performance of the UFP Server by increasing the amount of traffic that Websense software and the Check Point product can filter while reducing CPU load.
Configuring enhanced UFP performance requires the proper settings in Websense Web Security or Websense Web Filter, and in the Check Point product. In order to use enhanced UFP Performance, clear communication is required between Websense software and the Check Point product.
 
Note 
Websense configuration
Before configuring the Check Point product for enhanced UFP performance, open the ufp.conf file and make sure Websense software is configured for clear communication:
1.
*
Windows: C:\Program Files or Program Files (x86)\Websense\Web Security\bin
*
Linux: /opt/Websense/bin
2.
Open the ufp.conf file in any text editor.
The file must contain the following line to be configured for clear communication:
ufp_server port 18182
Additional lines that appear in this file are used for Secure Internal Communication, and must be commented out using the comment symbol (#):
#ufp_server auth_port 18182
#opsec_sic_policy_file ufp_sic.conf
#opsec_sic_name "place_holder_for_opsec_SIC_name"
#opsec_sslca_file opsec.p12
3.
4.
Save and close the ufp.conf file.
5.
*
Windows: Use the Windows Services dialog box.
*
Linux: Use the ./WebsenseAdmin restart command.
See Starting and stopping Web Security services for instructions on stopping and restarting Websense services. See also Stopping and restarting the UFP Server.
Check Point product configuration
To configure for enhanced UFP performance in the Check Point product:
*
Configure the OPSEC Application object for the Websense UFP Server to operate in early versions compatibility mode (previously known as backwards compatibility mode) for clear communication.
Clear communication is the default for FireWall-1 NG with AI and FireWall-1 NGX. See Early versions compatibility mode.
*
Early versions compatibility mode
Follow these steps to configure the previously created OPSEC Application object for the Websense UFP Server to operate in early versions compatibility mode (clear communication) for enhanced UFP performance.
1.
Open the SmartDashboard, and select Manage > Servers and OPSEC Applications.
2.
The OPSEC Application Properties dialog box for this object appears.
3.
Select the UFP Options tab.
4.
Select Use early versions compatibility mode (Backwards Compatibility in earlier versions).
5.
Select Clear (opsec), then click OK and close the Servers and OPSEC Applications dialog box.
6.
Select Policy > Install to install the policy on the firewall. See Check Point product documentation for more information.
Enhanced UFP performance
To configure the previously created URI Resource Object that identifies the Websense dictionary category Blocked for enhanced UFP performance:
1.
The Resources dialog box appears.
2.
The URI Resource Properties dialog box for this resource appears.
3.
In the General tab, select Enhance UFP performance.
4.
Select the Match tab.
5.
6.
Clear and then mark the Blocked category, and click OK.
7.
Close the Resources dialog box.
8.
Select Policy > Install to install the policy on the firewall. See the Check Point product documentation for more information.

Go to the table of contents Go to the previous page Go to the next page
Integrating Web Security with Check Point > Configuring Check Point products to work with Web Security solutions
Copyright 2016 Forcepoint LLC. All rights reserved.