To get started with this workshop, you’ll first need to gather some information from the CloudFormation stack that was used to build the Workshop Architecture.
Login to the AWS Console and navigate to the CloudFormation Console
Within the Stacks listing, deselect View Nested and choose the stack you created or the stack beginning with mod-module-1-######
Navigate to Stack Outputs and record all the credentials, keys, and values. We will need these later in the workshop
Now, we need to login to the Check Point Web SmartConsole to setup an initial security policy for the workshop, which will allow us to test all traffic flows.
From the CloudFormation Output, locate the Public IP provided for the Check Point Security Management Server
Login to the Check Point SmartConsole application via web console SmartClient:
If you need to install SmartConsole on Windows you can download HERE
Once logged in, Verify that the CloudGuard Network Security Gateways have been discovered by the Security Management Server
Now we, can create an initial Check Point Security Policy. Navigate to the Security Policies tab in SmartConsole
Create a new rule above the default Cleanup rule
Modify the new rule to allow the network 10.100.0.0/16 outbound access to ANY
Give your rule a name if preferred(not required)
Add a new network object that represents 10.100.0.0/16 to the Source field
Result should look like this:
Using the same procedure as above, create another rule that allows Inbound traffic to the following networks:
Install Policy to push the new security policy to the Security Gateways