How To Troubleshoot SIC Related Issues
How To Troubleshoot SIC Related Issues
11 January 2011
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional
improvements, stability fixes, security enhancements and protection against new and evolving attacks.
Latest Documentation
The latest version of this document is at:
http://supportcontent.checkpoint.com/documentation_download?ID=11880
For additional technical information, visit the Check Point Support Center
(http://supportcenter.checkpoint.com).
Revision History
Date
Description
1/9/2011
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:[email protected]?subject=Feedback on How To Troubleshoot SIC-related
Issues ).
Contents
Important Information .............................................................................................3
How To Troubleshoot SIC-related Issues .............................................................5
Objective ............................................................................................................. 5
Supported Versions ............................................................................................. 5
Supported OS...................................................................................................... 5
Supported Appliances ......................................................................................... 5
Before You Start .....................................................................................................6
Related Documentation and Assumed Knowledge .............................................. 6
Impact on the Environment and Warnings ........................................................... 7
Basic Information on SIC .......................................................................................8
Management and Gateway Servers Synchronization .......................................... 8
Troubleshooting Procedures .................................................................................9
Basic Troubleshooting Steps ............................................................................... 9
Checking Connectivity ........................................................................................10
Checking CPD Memory Consumption ................................................................10
High CPD Memory Consumption ...................................................................10
Collecting the Debug ..........................................................................................11
Option 1 .........................................................................................................11
Option 2 .........................................................................................................12
Completing the Procedure ...................................................................................12
Verifying ................................................................................................................12
Objective
Supported Versions
NGX R70
NGX R71
Supported OS
SecurePlatform
Supported Appliances
For Open servers, refer to the Hardware Compatibility List in Check Point public site at:
http://www.checkpoint.com/services/techsupport/hcl/all.html
(http://www.checkpoint.com/services/techsupport/hcl/all.html http://www.checkpoint.com/services/techsupport/hcl/all.html)
Page 5
sk12688 (http://supportcontent.checkpoint.com/solutions?id=sk12688)
sk35200 (http://supportcontent.checkpoint.com/solutions?id=sk35200)
sk25542 (http://supportcontent.checkpoint.com/solutions?id=sk25542)
sk37295 (http://supportcontent.checkpoint.com/solutions?id=sk37295)
sk37219 (http://supportcontent.checkpoint.com/solutions?id=sk37219)
sk32715 (http://supportcontent.checkpoint.com/solutions?id=sk32715)
sk16200 (http://supportcontent.checkpoint.com/solutions?id=sk16200)
sk33906 (http://supportcontent.checkpoint.com/solutions?id=sk33906)
Page 6
sk33764 (http://supportcontent.checkpoint.com/solutions?id=sk33764)
sk36082 (http://supportcontent.checkpoint.com/solutions?id=sk36082)
sk33849 (http://supportcontent.checkpoint.com/solutions?id=sk33849)
Others:
sk44272 (http://supportcontent.checkpoint.com/solutions?id=sk44272)
sk32183 (http://supportcontent.checkpoint.com/solutions?id=sk32183)
sk43744 (http://supportcontent.checkpoint.com/solutions?id=sk43744)
sk42916 (http://supportcontent.checkpoint.com/solutions?id=sk42916)
sk35200 (http://supportcontent.checkpoint.com/solutions?id=sk35200)
Licensing
In rare situations, CPD CPU usage can reach a high value during the debug procedure. If this happens, all
CPD-related operations can be affected. This means they will be slower and can have performance issues
for their specific purposes. Other than that, if the system is not extremely loaded, you should not experience
any major impact on it.
Page 7
The communication must be encrypted so that an impostor cannot send, receive or intercept
communication meant for someone else.
The communication must be authenticated, so that there can be no doubt as to the identity of the
communicating peers.
The transmitted communication should have data integrity (the communication has not been altered or
distorted in any form).
The SIC setup process allowing the intercommunication to take place must be user-friendly.
SIC relies on a process called CPD, which is responsible for performing all inter-module communications.
SIC is based on SSL with digital certificates. When the Management Server is installed, a Certificate
Authority (CA) is created. This Certificate Authority issues certificates for all components that need to
communicate to each other. For example, a remote FireWall-1 Module will need to have a certificate from
the Management Server before a policy can be downloaded to this module, or before a license can be
attached to the Module using SecureUpdate.
The purpose of the Communication Initialization process is to establish a trust between Security
Management server and the Check Point gateways. This trust enables these components to communicate
freely and securely. Trust can only be established when the gateways and the Security Management server
have been issued SIC certificates. After successful Initialization, the gateway can communicate with any
Check Point node that possesses a SIC certificate, signed by the same ICA.
Port 18209 is used for communication between the VPN-1/FireWall-1 Module and the Certificate
Authority (status, issue, revoke).
Port 18211 is the port used by the cpd daemon on the Module to receive the certificate (when clicking
Initialize in the Policy Editor).
Page 8
Troubleshooting Procedures
In this section:
Basic Troubleshooting Steps
Checking Connectivity
Checking CPD Memory Consumption
Collecting the Debug
9
9
10
11
Verify that server and gateway use the same SIC activation key.
Check the date and time of the operating systems and make sure the time is accurate. If the Security
Management server and remote gateway reside in two different time zones, the remote gateway may
need to wait for the certificate to become valid.
If the Security Management server is behind another gateway, make sure there are rules that allow
connections between the Security Management server and the remote gateway.
Ensure the Security Management server's IP address and name, are in the /etc/hosts file on the
gateway.
If the IP address of the Security Management server undergoes static NAT by its local Security
Gateway, add the public IP address of the Security Management server to the /etc/hosts file on the
remote Security Gateway, to resolve to its hostname.
Based on sk33764, using the command line of the gateway, type: fw unloadlocal. This removes
the security policy from the Security Gateway server, hence all traffic is allowed through it.
Troubleshooting Procedures
Page 9
Checking Connectivity
Checking Connectivity
Ensure that the SIC ports are open. As previously mentioned, the SIC ports are:
Port 18209 is used for communication between the VPN-1/FireWall-1 Module and the Certificate
Authority (status, issue, revoke).
Port 18211 is the port used by the cpd daemon on the Module to receive the certificate (when clicking
Initialize in the Policy Editor).
To determine if SIC is listening to its network ports on your Check Point device (can be Security Gateway
server or Security Management Server), use the following command:
On Windows platforms:
On Linux platforms:
A NAT device between the SmartCenter Server and Security Gateway will not have any effect on the ability
of a Check Point enabled entity to communicate using SIC, since the protocol is based on Certificates and
SIC names (and not IPs).
To verify the Gateway is listening for the SmartCenter Server for getting certificates, the CPD debug output
should be as follows:
[CPD ID]@cpmodule[Date] Get_SIC_KeyHolder: SIC certificate read successfully
[CPD ID]@cpmodule[Date] SIC initialization started
[CPD ID]@cpmodule[Date] get_my_sicname_from_registry: Read the machine's sic
name: CN=member_1,O=cpmodule..6vxoys
[CPD ID]@cpmodule[Date] Initialized sic infrastructure
[CPD ID]@cpmodule[Date] SIC certificate read successfully
[CPD ID]@cpmodule[Date] Initialized SIC authentication methods
RES (or RSS) For high memory consumption of specific process (for example fwm).
Troubleshooting Procedures
Page 10
Usually, when the server suffers from high memory consumption, the affected process will eventually crash,
since (due to Linux limitation) it can only reach a memory consumption of ~2GB.
To create the core file, enable the option of a core dump creation, as follows:
On the server where the process crashes:
# um_core enable
# ulimit c unlimited
# reboot
which provides the core file that will be generated after the next crash.
The process can crash immediately after performing the operation which is related for that process (means it
it is not necessarily a leak, just large enough to cause a crash at a specific point). In such cases, the core
dump file size can take few hundred MB, or after some time on which the memory usage for this process
reaches the highest limit it is capable of, where the core dump file can take more than 2 GB.
Many high memory consumptions issues are solved on the HFA releases, therefore, if you encounter such
an issue, try to install the latest HFA. If it is a known issue, the HFA will probablyovercome it.
If the issue was not solved during the latest HFA, collect the core file (if it was created), together with the
TOP command output that shows the high usage and send this information to Check Point support.
Since SIC operations are performed by the CPD daemon, the monitored process should be the CPD on
both the Security Management server and the Security Gateway server.
Refer to sk35496 (http://supportcontent.checkpoint.com/solutions?id=sk35496 ) for instructions how to
detect high memory consumption (memory leak) on your Security Gateway server.
Option 1
1. Clean the old log file(s), by issuing:
# rm $CPDIR/log/cpd.elg.*
# echo '
$CPDIR/log/cpd.elg*
Troubleshooting Procedures
Page 11
Option 2
1. Stop the CPD process:
# export TDERROR_ALL_ALL=5
# export OPSEC_DEBUG_LEVEL=9
# unset TDERROR_ALL_ALL
# unset OPSEC_DEBUG_LEVEL
The debug output file is cpd_debug.txt which is located on your current directory.These should provide
an indication about the issue that causes the SIC failure. When finding a suspicious log entry within these
files (look for error, fail, etc.), it is necessary to look for it on Secure Knowledge database (Check Point
public site). If nothing similar is found, open a new Service Request with Check Point support and provide
the information you collected.
For further debug information, please refer to sk41513
(http://supportcontent.checkpoint.com/solutions?id=sk41513 ) - How to debug SIC problems.
Make sure you have gone through all the steps in the Troubleshooting Procedures.
Verifying
To verify that the issue you encountered has been solved:
1. Check that SIC is established with the Security gateway. Go to the gateway object in SmartDashboard.
2. In the General Properties tab, under the Secure Internal Communication section, click Communicate.
3. In the opened window, click Test SIC Status.
The most typical status is Communicating. Any other status indicates that the SIC communication is
problematic. If the SIC status is Not Communicating, the Security Management server is able to
contact the gateway, but SIC communication cannot be established.
If after going over the steps in this guide the SIC status is anything other than Communicating, contact
Check Point support and open a new Service Request with all the relevant information collected in this
procedure.
Page 12