Cap
Cap
Cap
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
R77VSX Introduction
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
2
2
R77 Introduction
Agenda
VSX introduction
VSX Clustering
VSX Management
Is my VSX
infrastructure robust,
scalable and fast?
Is management of a
VSX infrastructure
complex?
Gizmo vs R67
VSX Gizmo
What is a
User Space VSX?
4
4
Why Virtualization?
5
5
What is VSX
6
6
What do we Virtualize?
7
7
Firewall Module
Virtual System In
Bridge Mode
Firewall Module In
Bridge Mode
IP Router
Switch
Network Cable
8
8
Virtual Devices
Virtual System (VS)
9
9
Interfaces list
IP Addresses
Routing table
ARP table
Dynamic Routing
Configuration
Etc.
State Table
FW
Layer
3
Security
& VPN
VPN
Policies
Configuration
Parameters
Layer
2
Logging
Configuration
Cluster XL
Dynamic
Routing
SSL VPN
State Table
Security & VPN
Policies
Configuration
Parameters
Logging
Configuration
AUTH
(Client & Session)
Secure XL
10
10
11
11
12
12
Virtual Devices
Virtual Router (VR)
All other packets are forwarded according to the route table entries.
13
13
warp Interfaces
Regular Interfaces
Physical interfaces
Virtual interfaces - VLANS
VSX Gateway introduces a new type of interfaces
warp links interface between component of the VSX gateway
Eth0.101
Eth0.100
14
14
Internet
17
17
VSX
Internet
VS
X
Switch
18
18
VSX management
SMART
Consoles
Provider-1
SmartCenter
vsx_util
vsx_util
vsx_util
vsx_util
vsls
redistribute_vsls
reconfigure
add_member
VSX Gateways
19
19
VSX management
Provider-1 focus
20
20
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
21
21
Acceleration enhancements.
VPN enhancements.
22
22
Software Blades
R77 supports Software Blade Architecture on every
Virtual System
23
23
R77
Resilience
Segregation
Changing of CP
global kernel
parameters
24
24
fwd
UM
cpd
cplogd
vpnd
vpnd
vpnd
1.
KM
2.
Fw kernel virtualized
Ppack virtualized
3.
NIC
Tables per VS
Parameters per
VS or global
Most of the UM
processes were
virtualized
(fwd/cpd/cplogd)
Some were per
VS (vpnd)
NIC
25
25
cpd
cpd
fwd
fwd
fwd
vpnd
vpnd
vpnd
fwk
fwk
fwk
VS
VS
VS
UM
KM
1.
2.
Firewall dispatcher
3.
Ppack virtualized
NIC
NIC
CoreXL per VS - 1
27
27
CoreXL per VS - 2
28
28
Virtual System
Virtual Switch
Virtual Router
Virtual System in Bridge Mode
29
29
SNMP per VS
Default mode
- only monitors VS0
VS mode
- supports SNMP monitoring per VS
30
30
31
31
32
32
33
33
Thank you !
Please proceed to lab 1
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
36
36
VSX features
37
37
MPLS Core
Customer A
10.10.10.0/24
Customer B
10.10.10.0/24
10.10.10.0/24
2014 Check Point Software Technologies Ltd.
38
38
Inter-VS Routing
802.1q
Application Servers
Virtual Switch
802.1q
Database Servers
Virtual Router
Web Servers
39
39
Unnumbered interfaces
Unnumbered interfaces In order to reduce the number of IPs used
in a VSX configuration, a Virtual System, when connected to a Virtual
Router, can use the same IP for multiple interfaces.
Warp Links
P-T-P
connections
192.168.1.1
172.169.1.1
192.150.2.1
200.128.4.1
172.169.1.1
192.150.2.1
200.128.4.1
Internal Interface
Unnumbered interfaces borrow an IP
address from one of the VSs interfaces
40
40
Limitations
The following limitations apply to Unnumbered
Interfaces:
Unnumbered interfaces must connect to a Virtual
Router.
You can only "borrow" an individual interface IP
address once.
In order to use VPN or Hide NAT, the borrowed
address must be routable.
41
41
Routes Propagation
Virtual Router
Requires the VS to be
connected to VR or VSW
Virtual Switch
42
42
Destination: SUBNET
Destination: SUBNET
Next Hop:
Next Hop:
GW
wrpj interface
connecting VR to the VS
43
43
Destination: SUBNET
Destination: SUBNET
Next Hop:
GW
44
44
Routes Propagation
Simple & Easy configuration through the Interface properties of the VS
45
45
Some configuration
required when
connected to VR
46
46
47
47
Virtual System
connected to a
Virtual Switch.
4.0.0.1
192.168.8.1
Same behavior as
regular interfaces
192.168.8.9
Virtual Switch
4.0.0.2
192.168.8.1
4.0.0.9
192.168.8.9
4.0.0.9
192.168.8.9
2014 Check Point Software Technologies Ltd.
48
48
Source-Based Routing
Source-Based Routing:
49
49
Source-Based Routing
Internet
192.168.35.1
EVR
192.168.35.4
Each VS is connected to
Internal Virtual Router.
192.168.1.1
VS2
VS1
192.168.1.3
VS3
VSX
Gateway
192.168.1.1
192.168.1.2
192.168.1.3
IVR
192.168.50.4
VR forwarding routing
based on source IP
address.
192.168.1.2
192.168.50.1
Source-Based
Routing
10.50.50.2/24
10.1.1.2/24
10.100.100.2/24
50
50
Deployment scenarios
52
52
Interconnect Virtual
Systems
No shared interface
Virtual Switch
53
53
Internet
192.168.35.4
192.168.35.1
192.168.35.2
VS2
VS1
192.168.35.3
VS3
VSX
Gateway
192.168.50.1
192.168.50.2
192.168.50.3
192.168.50.4
Source-Based
Routing
10.50.50.2/24
10.1.1.2/24
10.100.100.2/24
54
54
Customers want to
manage their own
security policy.
Internet
VSX
Management
interface
Management P-1
VS
Virtual Switch
SmartDashboard
55
55
Internet
VSX
Management
interface
Management P-1
VS
Virtual Switch
SmartDashboard
56
56
Internet
Management + External
interface
External Interface
VSX
VSX
Management
interface
57
57
Thank you !
Please proceed to lab 2,3
VSX
CoreXL and CPU affinity
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
60
60
CoreXL
CoreXL architecture
Parallelise security gateway kernel
Leverage modern processor architectures
Suited to medium path
61
61
62
62
Record
Conn
fw0
WT
conn
table
fw1
WT
fw2
conn
table
WT
conn
table
2
Queue
Queue
Queue
Arbitrary
Decision
Lookup.
Not found
Dispatcher
PKT
2014 Check Point Software Technologies Ltd.
63
63
fw0
WT
Queue
conn
table
fw1
WT
fw2
conn
table
WT
Queue
Lookup.
Found
conn
table
Queue
Dispatcher
2
PKT
64
64
fw0
WT
Queue
conn
table
fw1
WT
fw2
conn
table
WT
Queue
conn
table
Queue
Dispatcher
0 1 2
PKT
2014 Check Point Software Technologies Ltd.
65
65
CoreXL
Core #0
Dispatcher
PPAK
SND
eth1
PPAK
SND
eth0
Dispatcher
Core #1
Core #2
Core #3
fw5
fw4
Medium Path
Queue
Medium Path
Queue
Core #4
Core #5
Core #6
Core #7
fw3
fw2
fw1
fw0
Medium Path
Queue
Medium Path
Queue
Medium Path
Queue
Medium Path
Queue
66
66
Core #4
Medium
Path
FW
Path
Queue
Core #...
Medium
Path
FW
Path
Queue
Core #0
C
Medium
Path
Queue
Core #1
Dispatcher
Dispatcher
Performance Pack
Performance Pack
eth0
eth1
Syn
SynAck + subsequent S2C packets
Subsequent C2S packets
2014 Check Point Software Technologies Ltd.
67
67
Core #4
Medium
Path
FW
Path
Queue
Core #...
Medium
Path
FW
Path
Queue
Core #0
C
Medium
Path
Queue
Core #1
Dispatcher
Dispatcher
Performance Pack
Performance Pack
eth0
eth1
Syn + subsequent C2S packets
SynAck + subsequent S2C packets
2014 Check Point Software Technologies Ltd.
68
68
Core #4
Medium
Path
FW
Path
Queue
Core #...
Medium
Path
FW
Path
Queue
C
Medium
Path
Queue
Core #0
Core #1
Secure Dispatcher
Secure Dispatcher
Performance Pack
Performance Pack
eth0
eth1
Syn + subsequent C2S packets
SynAck + subsequent S2C packets
2014 Check Point Software Technologies Ltd.
69
69
VSX CoreXL
VSX CoreXL
Same idea as applied for SG is applied to VSX
CoreXL.
Main difference, instance in FWK (fw kernel
equivalent) are executed by UM threads.
VSX CoreXL can be applied for any existing
VS simultaneously with different number of
instances.
70
70
Note: changing CoreXL configuration (num of instances) will require downtime of the VS (VS0 or other).
72
72
Process affinity - fw ctl affinity -s -d -pname <process name> [-vsid <ranges>] -cpu <ranges>
Listing Affinity
Extended Affinity - fw ctl affinity -l -x [-vsid <ranges>] [-cpu <ranges>] [-flags e|k|t|n]
Flags:
e don't print exception processes
73
73
Usage Examples
Setting affinity examples
fw
fw
fw
fw
fw
ctl
ctl
ctl
ctl
ctl
affinity
affinity
affinity
affinity
affinity
-s
-i
-s
-s
-s
-d -fwkall 3
eth0 0 3 7
-d -inst 0 2 4 -cpu 5
-d -pname cpd -vsid 0-12 -cpu 7
-d -vsid 0-2 4 6-8 -cpu 0-2 4
CPU 0 1 2
CPU 0
CPU 1
CPU 2
74
74
NAME
routed
fwk_wd
cpd
|---cpd
|---cpd
|---cpd
mpdaemon
fwk1_dev
|---fwk1_0
|---fwk1_1
|---fwk1_2
|---fwk1_3
fw
|---fw
|---fw
|---fw
75
75
21115 |
21116 |
1 |
1 |
2 3 | P | |
0 | I | |
|
|
| fwk1_dev
| |---fwk1_0
|
|
|
|
|
|
|
|
|
|
fwk1_dev
|---fwk1_0
|---fwk1_1
|---fwk1_2
|---fwk1_3
|
|
|
|
|
fwk1_dev
|---fwk1_0
|---fwk1_1
|---fwk1_2
|---fwk1_3
21115
21116
21117
21118
21119
|
|
|
|
|
1
1
1
1
1
|
|
|
|
|
2
2
2
2
2
3
3
3
3
3
|
|
|
|
|
P
P
P
P
P
|
|
|
|
|
|
|
|
|
|
21115
21116
21117
21118
21119
|
|
|
|
|
1
1
1
1
1
|
|
|
|
|
2 3
0
2 3
2 3
2 3
|
|
|
|
|
P
I
P
P
P
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Set affinity for instance 2 and 3 (fw ctl affinity s d inst 2 3 cpu 1 2)
|
|
|
|
|
21115
21116
21117
21118
21119
|
|
|
|
|
1
1
1
1
1
|
|
|
|
|
2 3
0
2 3
1 2
1 2
|
|
|
|
|
P
I
P
I
I
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fwk1_dev
|---fwk1_0
|---fwk1_1
|---fwk1_2
|---fwk1_3
76
76
VSX R77
Virtual System Load
Sharing
Agenda
Genesis
Motivation
Architecture
State Synchronization
Virtual System Load Sharing Fail over
Performance
Summary
78
78
Genesis
First
there was HA
Member 1
Member 2
Member 3
Member 4
VS1
VS2
VS3
79
79
Course Timetables
Day 1
Day 2
Day 3
RC & QoS
10:00
11:00
vsx_utill
Mgmt. Implementation
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
80
80
Motivation
Standard Cluster
Performance
VSLS Cluster
81
81
Architecture
member
1
member
2
member
3
L2 switch
2014 Check Point Software Technologies Ltd.
82
82
Architecture
VS2
VS3
member 1
member 2
member 3
83
83
Architecture
A
A
Active VS
VS2
VS3
member 1
member 2
member 3
84
84
Architecture
VS2
VS3
member 1
member 2
member 3
Active VS
Standby VS
85
85
Architecture
VS2
Active VS
Standby VS
Backup VS
VS3
member 1
member 2
member 3
86
86
Architecture
VS2
Active VS
Standby VS
Backup VS
VS3
member 1
member 2
member 3
87
87
Architecture
VS2
Active VS
Standby VS
Backup VS
VS3
member 1
member 2
member 3
88
88
Architecture
VS2
Active VS
Standby VS
Backup VS
VS3
member 1
member 2
member 3
89
89
State Synchronization
90
90
Member 1
Member 2
Member 3
Member 4
VS1
VS2
VS3
Broadcast is more efficient when the VSs are installed on all the
members
2014 Check Point Software Technologies Ltd.
91
91
On 61000 appliance (starting in R75.40VS for 61000), the 'asg_sync_manager' option '8) Enable / Disable unicast sync' - enables the user to define its required
synchronization level - the user can enable / disableUnicast sync (correction
layer will be enabled / disabled accordingly) and return to legacy
synchronization scheme (synchronize connections to all SGMs).
2014 Check Point Software Technologies Ltd.
92
92
Member 1
Member 2
Member 3
Member 4
VS1
VS2
VS3
93
93
Member 1
Member 2
Member 3
Member 4
VS1
VS2
VS3
94
94
Member 1
Member 2
Member 3
Member 4
VS1
VS2
VS3
95
95
Member 1
VS1
VS2
Member 2
Member 3
Member 4
S
A
S
S
VS3
96
96
Member 1
VS1
VS2
Member 2
Member 3
Member 4
S
A
S
S
VS3
97
97
Member 1
VS1
VS2
Member 2
Member 3
Member 4
S
A
VS3
S
A
98
98
Member 1
VS1
VS2
Member 2
Member 3
Member 4
S
A
VS3
S
A
99
99
100
100
VS1
VS2
VS3
Member 1
Member 2
Member 3
101
101
VS1
S
A
VS2
VS3
Member 2
Member 3
Member 1
102
102
VS1
VS2
Member 2
Member 3
VS3
Member 1
Member 1 goes up again and the system performs full sync for VS1 and VS2.
2014 Check Point Software Technologies Ltd.
103
103
VS1
A
S
VS2
S
A
VS3
Member 1
Member 2
Member 3
The system can now force VS1 to become active on member 1, so the load is shared
equally between the machines.
2014 Check Point Software Technologies Ltd.
104
104
Performance
105
105
Limitations
When working with ClusterXL Virtual System Load
Sharing (VSLS):
106
106
Summary
107
107
Thank you !
Please proceed to Lab 4
R77 VSX
Memory Resource Control
Course Timetables
Day 1
Day 2
Day 3
RC & QoS
10:00
11:00
vsx_utill
Mgmt. Implementation
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
110
110
111
111
Overview cont.
The memory consumption per VS is a sum of the following:
Kernel Space
SIM (SecureXL) memory per VS allocations.
Accumulations of clean pages (private) and dirty pages (private) per process for all processes per VS
112
112
Overview cont.
Global info given about system:
113
113
Flags
fw vsx mstat debug - Displays memory consumption debug info per VS.
fw vsx mstat enable - Enables this feature, requires a reboot.
fw vsx mstat disable - Disables this feature, affected immediately.
fw vsx mstat status - Displays feature status, (enabled/disabled).
fw vsx mstat help - Displays help.
114
114
115
115
The vsx_util
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
117
117
vsx_util
118
118
119
119
Limitations
The new module must have the same configuration as the reconfigured
member (same number of interfaces, management IP etc.)
The module must be newly installed without any previous VSX
configuration
Common Errors:
vsx_util reconfigure asks to re-install policy on the VSX and run the
command again
The message occurs when the reconfigure process cannot retrieve the name
of the policy installed on the VSX Gateway/Cluster
This might happen after the Management was upgraded using upgrade_import
from a version older than R61
Workaround: copy $FWDIR/state/links.C from the original Management
120
120
vsx_util add_member
vsx_util remove_member
121
121
vsx_util change_private_net
Limitations:
122
122
vsx_util change_mgmt_ip
Limitations:
123
123
vsx_util change_mgmt_subnet
124
124
vsx_util vsls
125
125
126
126
Notes:
A Virtual System is created with a default weight (10)
Changing the weight of a Virtual System will only have
influence when the Priority List for a new Virtual System
is calculated
For the new configured weight to take effect
immediately, the Virtual Systems need to be
redistributed automatically among all Cluster Members
The redistribution is a rather heavy operation because it
might trigger Virtual System Failovers from one Cluster
Member to another
127
127
vsx_util convert_cluster
128
128
vsx_util view_vs_conf
129
129
vsx_util change_interfaces
130
130
vsx_util show_interfaces
131
131
Resume capabilities
132
132
Thank you !
Please proceed to lab 5, 6
The vsx_util
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
135
135
vsx_util
136
136
137
137
Limitations
The new module must have the same configuration as the reconfigured
member (same number of interfaces, management IP etc.)
The module must be newly installed without any previous VSX
configuration
Common Errors:
vsx_util reconfigure asks to re-install policy on the VSX and run the
command again
The message occurs when the reconfigure process cannot retrieve the name
of the policy installed on the VSX Gateway/Cluster
This might happen after the Management was upgraded using upgrade_import
from a version older than R61
Workaround: copy $FWDIR/state/links.C from the original Management
138
138
vsx_util add_member
vsx_util remove_member
139
139
vsx_util change_private_net
Limitations:
140
140
vsx_util change_mgmt_ip
Limitations:
141
141
vsx_util change_mgmt_subnet
142
142
vsx_util vsls
143
143
144
144
Notes:
145
145
vsx_util convert_cluster
146
146
vsx_util view_vs_conf
147
147
vsx_util change_interfaces
148
148
vsx_util show_interfaces
149
149
Resume capabilities
150
150
Thank you !
Please proceed to lab 5, 6
VSX Management
Implementation
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
153
153
154
154
GUI - SmartDashboard
Management Server - Provider-1 or SmartCenter
VSX Gateway
SmartDashboard
Management Server
VSX Gateway
155
155
Management Models
VSX can be managed in two ways:
SmartCenter management
Provider-1 management
Each domain management
server (DMS) may manage one
or more Virtual Devices
156
156
VS A
DMS A (Target)
DMS B (Target)
VS B
157
157
Management database
Network object
vs_slot objects
158
158
Management database
vs_slot objects
159
159
VSX Management
160
160
Management Server
VSX Gateway
161
161
The NCS
Example of NCS file
Creates a VS with 2
interfaces
One VLAN interface
The other leading to
Virtual Switch
Adds routes
162
162
163
163
Composition of local.vs
interfaces
interfaces_installed
routes
routes_installed
164
164
165
165
Files Location
On the management
166
166
Management Server
Target
DMS
VSX Gateway
Main
DMS
167
167
168
168
SIC implementation
169
169
Management Server
VSX Gateway
VS
Target
DMS
Main
DMS
170
170
Management Server
Target
DMS
VSX Gateway
VS
Main
DMS
171
171
172
172
173
173
VSX - R77
Gateway
Implementation
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
175
175
176
176
fwd
UM
cpd
cplogd
vpnd
vpnd
vpnd
1.
KM
2.
Fw kernel virtualized
Ppack virtualized
3.
NIC
Tables per VS
Parameters per
VS or global
Most of the UM
processes were
virtualized
(fwd/cpd/cplogd)
Some were per
VS (vpnd)
NIC
177
177
cpd
cpd
fwd
fwd
fwd
vpnd
vpnd
vpnd
fwk
fwk
fwk
VS
VS
VS
UM
KM
1.
2.
Firewall dispatcher
3.
Ppack virtualized
NIC
NIC
FW-1 dispatcher is a driver, which sees the packets, and puts them in the
processing queue of the right FWK.
FWK process does kernel processing. Has libfwk.so, libvpnk.so, librtmk.so
loaded into it, multiple times if multiple instances are configured.
FWK is per VS, so all parameters, policy, tables, inspect code, etc. are
obviously separate, without the need to change almost anything in the code.
179
179
180
180
CP
drivers
Linux
kernel
VS
VRF 0
VR
VS
VRF 1
wrp1 wrpj1
eth2.5 eth2.10
VSW
VRF 2
VRF 3
VS
VRF 4
eth2.30
eth5
eth3
2014 Check Point Software Technologies Ltd.
181
181
182
182
183
183
184
184
Internet
Routing
Is the VR a performance
bottleneck? NO!
Inspection
190
190
Inspection
following packets go
directly from the Virtual
System to the Physical
interface.
191
191
Files Structure
192
192
193
193
194
194
FWK_forker
195
195
Technology
CPSICDemux
196
196
CPSICDEMUX
Check Point SIC Demultiplexer runs in VSX context (VS 0), listens
to many SIC ports (18191, 18192, 257, 256, etc.).
New SIC connections from other member or from management
arrives to cpsicdemux, starts SIC handshake, and then connection is
passed to the correct CPD/FWD/etc. according to SIC name in the
handshake.
197
197
CPSICDEMUX
199
199
ROUTED manager
Routed manager
200
200
Dynamic Routing
201
201
202
202
203
203
204
204
205
205
Thank you !
Please proceed to lab 7
VSX R77
Debug &
Troubleshooting
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
208
208
Management
Debugging
2014 Check Point Software Technologies Ltd.
209
209
210
210
211
211
Export TDERROR_ALL_ALL=INFO
Restart fwm process
212
212
213
213
214
214
Debugging SIC
216
216
SmartView Monitor
SmartView Monitor
Various counters (Dropped, accepted, rejected) available per VS
Real time monitoring (Top Connections , Users) available per VS
SNMP
Chkpnt.mib available in the VSX module under $CPDIR/lib/snmp
OID for VSX queries 1.3.6.1.4.1.2620.1.16
All VS are queried via the only management IP (of the VSX GW)
217
217
Module
Debugging
2014 Check Point Software Technologies Ltd.
218
218
vsx stat
219
219
OS sniffer
220
220
Firewall monitor
fw monitor [v <vsid>] [-e expression]
Example: fw monitor v 4 e port(520) and
ip_p=17,accept;
221
221
Firewall tables
Per context command.
fw [-i k] tab -t table_name [-s]
Example - obtain vs4 connections table:
fw tab t connections -s
222
222
Kernel debugs
223
223
224
224
ClusterXL debugs
Advanced debugging:
clusterXL_admin up/down
2014 Check Point Software Technologies Ltd.
225
225
ClusterXL Cont.
226
226
SecureXL
fwaccel vs <vsid>
{conns|templates|stat|on|off}
227
227
SecureXL debugs
Setting debugs:
fwaccel dbg
228
228
CPD debugs
$CPDIR/log/cpd.elg
2014 Check Point Software Technologies Ltd.
229
229
Fetching policy
230
230
Fetching Configuration
Fetching configuration:
fw vsx fetch
231
231
fw vsx fetch n
232
232
NCS
Shows the
part of
local.vsall
that is
relevant for
VS with
vsid 1
233
233
SIC
234
234
Watchdog
cpwd_admin list
235
235
FWK Debugging
$FWDIR/log/fwk.elg
fw ctl zdebug v <fwk VSID>
gdb/valgrind (or any other U/M debugging tool).
236
236
Common Error
Messages
237
237
238
238
Error Scenario
Push
configuration
to VS1 fails
Module error
Try to manually load and debug the
new configuration on the module:
fw d vsx fetch -v lastbad
Press the OK
button again
239
239
Thank you !
Please proceed to lab 8
VSX R77
Conversion to VSX
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
242
242
Agenda
Conversion
Implicit conversion
243
243
Conversion to VSX
244
244
Conversion to VSX
245
245
Conversion to VSX
246
246
Firewall must be on
blades that are not supported in VSX must be off( Mobile access, Anti-spam, DLP)
Legacy blades must be off ( URL filtering, Traditional Anti-Virus .)
247
247
248
248
249
249
250
250
251
251
252
252
253
253
254
254
Summary
255
255
Thank you !
Please proceed to lab 9
Course Timetables
9:00
Day 1
Day 2
Day 3
Course Introduction
VSX Clustering
VSX Conversion
vsx_utill
Mgmt. Implementation
10:00
11:00
12:00
13:00
Lunch Break
14:00
VSX Networking
GW Implementation
15:00
Open Questions
16:00
17:00
258
258
Agenda
259
259
260
260
What is STP?
261
261
My ID is:
My ID is:
AA:AA:AA:AA:AA:AA
BB:BB:BB:BB:BB:BB
Election!
My ID is:
My ID is:
CC:CC:CC:CC:CC:CC
DD:DD:DD:DD:DD:DD
262
262
Im the root!
Ok
Ok
Ok
263
263
19
B
38
19
I will block
this port
4
Sender ID is:
BB:BB:BB:BB:BB:BB
38
I found a
loop!
Sender ID is:
CC:CC:CC:CC:CC:CC
2014 Check Point Software Technologies Ltd.
264
264
265
265
266
266
Root
Processing
All traffic
Traffic arrives
to switch
B
Processing
some of the traffic
Traffic blocked
Trafficby
is switch
sent
but dropped
because the
port is blocked
267
267
268
268
Active streaming
VPN
Authentication
Security Servers
NAT
269
269
Access
Its main function is to connect users.
LAN Switches
Distribution
The distribution or policy layer performs the policy-based
operations: routing, firewalling.
Routers
Core
The backbone of the network. It should be high-speed and
concerned mainly with switching traffic as quickly as possible.
Backbone Switches
2014 Check Point Software Technologies Ltd.
270
270
Deployment Scenario
VLAN 20
VLAN 20
VLAN 10
VLAN 10
271
271
272
272
273
273
br_shadow
br_shadow
00:12:00:ab:00:01 eth0
00:12:00:ab:00:02 eth0
00:12:00:ab:00:03 eth1
00:12:00:ab:00:04 eth1
00:12:00:ab:00:05 eth1
00:12:00:ab:00:06 eth1
A
S
00:12:00:ab:00:01 eth0
00:12:00:ab:00:02 eth0
00:12:00:ab:00:03 eth1
00:12:00:ab:00:04 eth1
00:12:00:ab:00:05 eth1
00:12:00:ab:00:06 eth1
274
274
Analysis
Advantages
Limitations
275
275
276
276
277
277
LACP
278
278
LACP example
LACP negotiation
LACP packets
LACP packets
279
279
280
280
281
281
282
282
283
283
284
284
LACP packets
285
285
Analysis
Advantages
Limitations
286
286
Summary
287
287
Thank you !
Motivation
2.
290
290
Design Overview
There are two modes of SNMP monitoring that you can use with VSX:
1.
Default mode
291
291
292
292
2.
Enable VS mode
VSX-Box> set snmp mode vs
3.
293
293
OS OIDs request
[Expert@VSX-Box:2]
Query from VS
context:
snmpwalk
-v 2c -c public localhost ifDescr
snmpwalk
-n ctxname_vsid2
-v 3 -l authNoPriv
[Expert@VSX-Box:0]
Query non-VS0
from
VS0 context:
-u admin -A zubur123 localhost ifDescr
294
294
CP OIDs request:
[Expert@VSX-Box:2]
Query from VS
context:
snmpwalk
-m $CPDIR/lib/snmp/chkpnt.mib -v 2c -c public
localhost fwFilterDate
-vQuery
non-VS0
from
VS0 context:
3 -l authNoPriv
-u admin
-A zubur123
localhost fwFilterDate
295
295
296
296
Troubleshooting
1.
297
297
Troubleshooting
2.
3.
298
298
R77
Gaia and VSX specific
commands
300
300
Gaia uses a WebUI which is available only during the First Time
Wizard
All configuration,
whether done from
WebUI or clish,
is saved under
/config/active
301
301
302
302