IBM Qradar DSMConfigurationGuide
IBM Qradar DSMConfigurationGuide
IBM Qradar DSMConfigurationGuide
CHECK POINT
This section provides information on the following DSMs for IBM Security QRadar:
Check Point
FireWall-1
You can configure QRadar to integrate with a Check Point FireWall-1 device using
one of the following methods:
Note: Depending on your Operating System, the procedures for the Check Point
FireWall-1 device might vary. The following procedures are based on the Check
Point SecurePlatform Operating system.
Integrating Check
Point FireWall-1
using OPSEC
This section describes how to ensure that QRadar accepts Check Point FireWall-1
events using Open Platform for Security (OPSEC/LEA).
To integrate Check Point OPSEC/LEA with QRadar, you must create two Secure
Internal Communication (SIC) files and enter the information in to QRadar as a
Check Point Firewall-1 log source.
120
CHECK POINT
Name: QRadar
IP Address: <IP address of QRadar>
Comment: <Optional>
Step 4 Click OK.
Step 5 Select Close.
You are now ready to create an OPSEC Application Object for Check Point
Firewall-1.
Creating an OPSEC Application Object
To create the OPSEC Application Object:
Step 1 Open the Check Point SmartDashboard user interface.
Step 2 Select Manage > Servers and OPSEC applications > New > OPSEC
Application Properties.
Step 3 Assign a name to the OPSEC Application Object.
For example:
QRadar-OPSEC
The OPSEC Application Object name must be different than the host name you
typed when creating the node in Step 3.
a
121
Note: The activation key is a password used to generate the SIC DN. When you
configure your Check Point log source in QRadar, the activation key is typed into
the Pull Certificate Password parameter.
f
Click Initialize.
The window updates the Trust state from Uninitialized to Initilialized
but trust not established.
Click Close.
The OPSEC Application Properties window is displayed.
Note: The displayed SIC value is required for the OPSEC Application Object SIC
Attribute parameter when you configure the Check Point log source in QRadar.
The OPSEC Application Object SIC resembles the following example:
CN=QRadar-OPSEC,O=cpmodule..tdfaaz.
You are now ready to locate the log source SIC for Check Point Firewall-1.
Locating the log source SIC
To locate the Log Source SIC from the Check Point SmartDashboard:
Step 1 Select Manage > Network Objects.
Step 2 Select your Check Point Log Host object.
Note: You must know if the Check Point Log Host is a separate object in your
configuration from the Check Point Management Server. In most cases, the Check
Point Log Host is the same object as the Check Point Management Server.
Step 3 Click Edit.
Note: Depending on your Check Point version, the Communication button might
not be available to display the SIC attribute. You can locate the SIC attribute from
the Check Point Management Server command-line interface. You must use the
cpca_client lscert command from the command-line interface of the
Management Server to display all certificates. The Log Source SIC Attribute
resembles the following example: cn=cp_mgmt,o=cpmoduletdfaaz. For more
information, see your Check Point Command Line Interface Guide.
You must now install the Security Policy from the Check Point SmartDashboard
user interface.
Step 5 Select Policy > Install > OK.
122
CHECK POINT
Parameter
Description
Log Source
Identifier
Type the IP address for the log source. This value must match
the value configured in the Server IP parameter.
The log source identifier must be unique for the log source type.
Server IP
Server Port
Select this check box if you want to use the LEA servers IP
address instead of the managed devices IP address for a log
source. By default, the check box is selected.
Statistics Report
Interval
Authentication
Type
From the list, select the authentication type you want to use for
this LEA configuration.
The options include:
sslca (default)
sslca_clear
clear
123
Parameter
Description
OPSEC
Type the Secure Internal Communications (SIC) name of the
Application Object OPSEC Application Object.
SIC Attribute (SIC The SIC name is the distinguished name (DN) of the application,
Name)
for example: CN=LEA, o=fwconsole..7psasx.
See Creating an OPSEC Application Object - step h.
Log Source SIC
Attribute (Entity
SIC Name)
Type the SIC name for the server generating log sources.
For example: cn=cp_mgmt,o=fwconsole..7psasx.
See Locating the log source SIC - Step 4.
Specify Certificate Select this check box to define a certificate for this LEA
configuration.
Certificate
Filename
Type the directory path of the certificate you want to use for this
configuration.
Certificate
Authority IP
Pull Certificate
Password
OPSEC
Application
You are now ready to verify your OPSEC/LEA communications for Check Point
Firewall-1.
Editing your OPSEC
communications
configuration
This section describes how to modify your Check Point FireWall-1 configuration to
allow OPSEC communications on non-standard ports, configure communications
in a clear text, un-authenticated stream, and verify the configuration in QRadar.
Changing your Check Point Custom Log Manager (CLM) IP address
If your Check Point configuration includes a Check Point Custom Log Manager
(CLM), you might eventually need to change the IP address for the CLM, which
impacts any of the automatically discovered Check Point log sources from that
CLM in QRadar. This is because when you manually add the log source for the
CLM using the OPSEC/LEA protocol, then all Check Point firewalls that forward
logs to the CLM are automatically discovered by QRadar. These automatically
discovered log sources cannot be edited. If the CLM IP address changes, you
must edit the original Check Point CLM log source that contains the OPSEC/LEA
protocol configuration and update the server IP address and log source identifier.
124
CHECK POINT
After you update the log source for the new Check Point CLM IP address, then any
new events reported from the automatically discovered Check Point log sources
are updated.
Note: Do not delete and recreate your Check Point CLM or automatically
discovered log sources in QRadar. Deleting a log source does not delete event
data, but can make finding previously recorded events more difficult to find.
To update your Check Point OPSEC log source:
Step 1 Log in to QRadar.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Select the original Check Point CLM log source containing the OPSEC/LEA
Point CLM.
Step 7 In the Server IP field, type the new IP address of your Check Point CLM.
Step 8 Click Save.
The IP address update for your Check Point CLM in QRadar is complete.
Changing the default port for OPSEC LEA communication
To change the default port on which OPSEC LEA communicates (that is, port
18184):
Step 1 At the command-line prompt of your Check Point SmartCenter Server, type the
following file:
Linux - $FWDIR\conf\fwopsec.conf
Windows - %FWDIR%\conf\fwopsec.conf
#
#
#
#
#
cpmi_server auth_port
18190
uaa_server
uaa_server
19191
0
auth_port
port
125
Step 3 Change the default lea_server auth_port from 18184 to another port number.
Step 4 Remove the hash (#) mark from that line.
For example:
lea_server auth_port
18888
# lea_server
port
0
Step 5 Save and close the file.
Step 6 Type the following command to start the firewall services:
cpstart
following file:
Linux - $FWDIR\conf\fwopsec.conf
Windows - %FWDIR%\conf\fwopsec.conf
For example:
lea_server
lea_server
auth_port
port
0
18184
cpstart
Step 8 You are now ready to configure the log source in QRadar.
126
CHECK POINT
Parameter
Description
Log Source
Identifier
Type the IP address for the log source. This value must match
the value configured in the Server IP parameter.
The log source identifier must be unique for the log source type.
Server IP
Server Port
Type the port used for OPSEC communication. The valid range
is 0 to 65,536 and the default is 18184.
Select this check box if you want to use the LEA servers IP
address instead of the managed devices IP address for a log
source. By default, the check box is selected.
Statistics Report
Interval
127
Parameter
Description
Authentication
Type
From the list box, select the authentication type you want to use
for this LEA configuration. The options are sslca (default),
sslca_clear, or clear. This value must match the authentication
method used by the server. The following parameters appear if
sslca or sslca_clear is selected as the authentication type.
OPSEC Application Object SIC Attribute (SIC Name) Type the Secure Internal Communications (SIC) name of the
OPSEC Application Object. The SIC name is the
distinguished name (DN) of the application, for example:
CN=LEA, o=fwconsole..7psasx. The name can be up
to 255 characters in length and is case sensitive.
Log Source SIC Attribute (Entity SIC Name) - Type the SIC
name of the server, for example:
cn=cp_mgmt,o=fwconsole..7psasx. The name can be
up to 255 characters in length and is case sensitive.
128
CHECK POINT
Integrating Check
Point FireWall-1
using syslog
This section describes how to ensure that the QRadar Check Point FireWall-1
DSMs accepts FireWall-1 events using syslog.
Configuring Syslog for Check Point FireWall-1
Before you configure QRadar to integrate with a Check Point FireWall-1 device:
Note: If Check Point SmartCenter is installed on Microsoft Windows, you must
integrate Check Point with QRadar using OPSEC. For more information, see
Integrating Check Point FireWall-1 using OPSEC.
Step 1 Type the following command to access the Check Point console as an expert user:
expert
/etc/rc.d/rc3.d/S99local
Step 4 Add the following lines:
Where:
<facility> is a Syslog facility, for example, local3.
<priority> is a Syslog priority, for example, info.
For example:
$FWDIR/bin/fw log -ftn | /usr/bin/logger -p local3.info >
/dev/null 2>&1 &
Step 5 Save and close the file.
Step 6 Open the syslog.conf file.
Step 7 Add the following line:
<facility>.<priority> <TAB><TAB>@<host>
Where:
<facility> is the syslog facility, for example, local3. This value must match the
value you typed in Step 4.
<priority> is the syslog priority, for example, info or notice. This value must
match the value you typed in Step 4.
<TAB> indicates you must press the Tab key.
<host> indicates the QRadar Console or managed host.
Step 8 Save and close the file.
Step 9 Depending on your operating system, type the following command to restart
syslog:
129
Where:
<facility> is a Syslog facility, for example, local3. This value must match the
value you typed in Step 4.
<priority> is a Syslog priority, for example, info. This value must match the
value you typed in Step 4.
The configuration is complete. The log source is added to QRadar as Check Point
Firewall-1 syslog events are automatically discovered. Events forwarded to
QRadar are displayed on the Log Activity tab.
Configuring a log source
QRadar automatically discovers and creates a log source for syslog events from
Check Point FireWall-1. The following configuration steps are optional.
Procedure
Step 1 Log in to QRadar.
Step 2 Click the Admin tab.
Step 3 On the navigation menu, click Data Sources.
Step 4 Click the Log Sources icon.
Step 5 Click Add.
Step 6 In the Log Source Name field, type a name for your log source.
Step 7 In the Log Source Description field, type a description for the log source.
Step 8 From the Log Source Type list box, select Check Point FireWall-1.
Step 9 Using the Protocol Configuration list box, select Syslog.
Step 10 Configure the following values:
Parameter
Description
130
CHECK POINT
Integrating Check
Point Firewall events
from external syslog
forwarders
Check Point Firewall events can be forwarded from external sources, such as
Splunk Forwarders or other third party syslog forwarders that send events to
QRadar.
When Check Point Firewall events are provided from external sources in syslog
format, the events identify with IP address in the syslog header. This causes
events to identify incorrectly when they are processed with the standard syslog
protocol. The syslog redirect protocol provides administrators a method to
substitute an IP address from the event payload into the syslog header to correctly
identify the event source.
To substitute an IP address, administrators must identify a common field from their
Check Point Firewall event payload that contains the proper IP address. For
example, events from Splunk Forwarders use orig= in the event payload to
identify the original IP address for the Check Point firewall. The protocol
substitutes in the proper IP address to ensure that the device is properly identified
in the log source. As Check Point Firewall events are forwarded, QRadar
automatically discovers and create new log sources for each unique IP address.
Substitutions are done with regular expressions and can support either TCP or
UDP syslog events. The protocol automatically configures iptables for the initial log
source and port configuration. If an administrator decides to change the port
assignment a Deploy Full Configuration is required to update the iptables
configuration and use the new port assignment.
Configuring a log
source for Check
Point forwarded
events
To collect raw events forwarded from an external source, you must configure a log
source before events are forwarded to QRadar.
Procedure
131
Parameter
Description
Listen Port
Protocol
Enabled
Select this check box to enable the log source. By default, the
check box is selected.
Credibility
From the list box, select the credibility of the log source. The
range is 0 - 10.
The credibility indicates the integrity of an event or offense as
determined by the credibility rating from the source devices.
Credibility increases if multiple sources report the same event.
The default is 5.
Target Event
Collector
From the list box, select the Event Collector to use as the
target for the log source.
Coalescing Events
Incoming Event
Payload
From the list box, select the incoming payload encoder for
parsing and storing the logs.
132
CHECK POINT
Parameter
Description
Select this check box to enable the log source to store event
payload information.
By default, automatically discovered log sources inherit the
value of the Store Event Payload list box from the System
Settings in QRadar. When you create a log source or edit an
existing configuration, you can override the default value by
configuring this option for each log source.
Check Point
Provider-1
You can configure QRadar to integrate with a Check Point Provider-1 device.
All events from Check Point Provider-1 are parsed using the Check Point
FireWall-1 DSM. You can integrate Check Point Provider-1 using one of the
following methods:
Note: Depending on your Operating System, the procedures for the Check Point
Provider-1 device can vary. The following procedures are based on the Check
Point SecurePlatform operating system.
Integrating syslog for
Check Point
Provider-1
This method ensures the Check Point FireWall-1 DSM for IBM Security QRadar
accepts Check Point Provider-1 events using syslog.
QRadar records all relevant Check Point Provider-1 events.
Configure syslog on Check Point Provider-1
To configure syslog on your Check Point Provider-1 device:
Step 1 Type the following command to access the console as an expert user:
expert
csh
Step 4 Select the desired customer logs:
133
Where:
<facility> is a Syslog facility, for example, local3.
<priority> is a Syslog priority, for example, info.
Parameter
Description
134
CHECK POINT
Configuring OPSEC
for Check Point
Provider-1
This method ensures the QRadar Check Point FireWall-1 DSM accepts Check
Point Provider-1 events using OPSEC.
Reconfigure Check Point Provider-1 SmartCenter
This section describes how to reconfigure the Check Point Provider-1
SmartCenter.
In the Check Point Provider-1 Management Domain GUI (MDG), create a host
object representing the QRadar. The leapipe is the connection between the Check
Point Provider-1 and QRadar.
To reconfigure the Check Point Provider-1 SmartCenter (MDG):
Step 1 To create a host object, open the Check Point SmartDashboard user interface and
select Manage > Network Objects > New > Node > Host.
Step 2 Type the Name, IP Address, and optional Comment for your host.
Step 3 Click OK.
Step 4 Select Close.
Step 5 To create the OPSEC connection, select Manage > Servers and OPSEC
The name you type must be different than the name used in Step 2.
Step 7 From the Host drop-down menu, select the QRadar host object that you just
created.
Step 8 From Application Properties, select User Defined as the Vendor type.
Step 9 From Client Entries, select LEA.
Step 10 Configure the Secure Internal Communication (SIC) certificate, click
135
Step 6 From the Log Source Type list box, select Check Point FireWall-1.
Step 7 Using the Protocol Configuration list box, select OPSEC/LEA.
b Log Source Identifier - Type the IP address for the log source. This value must
Server Port - Type the port used for OPSEC/LEA. The default is 18184.
You must ensure the existing firewall policy permits the LEA/OPSEC
connection from your QRadar.
OPSEC Application Object SIC Attribute - Type the SIC DN of the OPSEC
Application Object.
Log Source SIC Attribute - Type the SIC name for the server generating the
log source.
SIC attribute names can be up to 255 characters in length and are case
sensitive.