Integrate Check Point Security Gateway

This technical integration guide describes how to integrate Check Point Security Manager Gateway and Identity as a Service. The aim of this integration is to provide strong, second-factor authentication for your Check Point Security Manager Gateway using Identity as a Service.

Before you begin, review the following:

Supported authentication methods

Prerequisites

Integrate Check Point Security Gateway

Complete the following steps to integrate Check Point Security Gateway with IDaaS.

Step 1: Configure the Check Point Security Gateway

This section describes how to configure and integrate the Check Point Security Gateway with Identity as a Service. Check Point Security Gateway is used for Mobile Access (SSL VPN through a Web browser) and the IPSec VPN (Endpoint Security Client).

Step 1.1: Set the static IP address to access the Check Point Security Gateway

Step 1.2: Run the Check Point First Time Configuration Wizard

Step 1.3: Assign the IP addresses to internal and external interfaces

Step 1.4: Download the SmartConsole

Step 2: Configure Check Point Security Gateway to use Identity as a Service

When using an Identity as a Service RADIUS application to authenticate Check Point users, you must configure the VPN to recognize the Check Point as a client. You must also specify a shared secret for the RADIUS application used to authenticate the client request.

The Identity as a Service RADIUS application must be configured with the Check Point Security Gateway. This section describes how to add an Identity as a Service RADIUS application within your Check Point Security Gateway settings.

Step 2.1: Configure a connection between an Identity as a Service RADIUS application on Check Point Security Gateway

Step 2.2: Add the Identity as a Service RADIUS server host

Step 2.3: Create a RADIUS server object

Step 2.4: Create users

Step 2.5: Create a user group

Step 2.6: Set the topology

Step 3: Configure Check Point Mobile Remote Access

Check Point Mobile Remote Access allows users to connect to corporate applications over the Internet with a PC. The solution provides enterprise-grade remote access through IPsec and SSL VPN, allowing you simple, safe, and secure connectivity to your corporate email and corporate applications.

Complete the following steps to configure Check Point Security Gateway:

Step 3.1: Configure mobile access

Step 3.2: Configure the portal settings

Step 3.3: Configure RADIUS authentication for mobile access

Step 3.4: Create the mobile access policy

Step 3.5: Configure the remote access VPN (IPsec)

Step 3.6: Configure firewall rules for remote and mobile access VPN

Step 3.7: Install the policy

Step 4: Add Check Point Security Gateway to Identity as a Service

Step 4.1: Add Check Point Security Gateway to Identity as a Service

Step 4.2: Protect Check Point Security Access with a resource rule

Step 5: Test the Check Point integration

Test the integration to ensure that it has been configured properly.

Step 5.1: Test the authentication using a Web browser (Mobile Access SSL)

Step 5.2: Test using Check Point endpoint security client (IPsec)

Step 5.3: Test using Entrust Identity push authentication