0% found this document useful (0 votes)
113 views689 pages

附件02-CP R80.40 SmartProvisioning AdminGuide

Uploaded by

000-924680
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views689 pages

附件02-CP R80.40 SmartProvisioning AdminGuide

Uploaded by

000-924680
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 689

30 January 2020

SECURITY
MANAGEMENT

R80.40

Administration Guide
[Classification: Protected]
Check Point Copyright Notice
© 2020 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means
without prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.

RESTRICTED RIGHTS LEGEND:

Use, duplication, or disclosure by the government is subject to restrictions as set forth in


subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.

TRADEMARKS:

Refer to the Copyright page for a list of our trademarks.

Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
Security Management R80.40 Administration Guide

Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.

Certifications
For third party independent certification of Check Point products, see the Check
Point Certifications page.

Check Point R80.40


For more about this release, see the R80.40 home page.

Latest Version of this Document


Open the latest version of this document in a Web browser.
Download the latest version of this document in PDF format.

Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.

Revision History

Date Description

28 January 2020 First release of this document

Security Management R80.40 Administration Guide      |      3


Table of Contents

Table of Contents
Glossary 23

Welcome 35

Getting Started 36

Understanding SmartConsole 36

SmartConsole Window 36

SmartConsole Toolbars 37

Search Engine 40

IP Search 40

General IP Search 41

Packet Search 41

Rule Base Results 41

Access and Threat Tools 42

Access Tools in the Security Policies Access Control view 42

Threat Tools in the Security Policies Threat Prevention view 42

Shared Policies 43

API Command Line Interface 44

Keyboard Shortcuts for SmartConsole 44

Connecting to the Security Management Server through SmartConsole 46

Setting Up for Security Management 47

Setting up for Team Work 48

Managing Security through API 48

API 48

API Tools 49

Configuring the API Server 49

API Key Authentication 50

Configuring API key authentication for administrators 50

Planning Security Management 52

Security Management R80.40 Administration Guide      |      4


Table of Contents

Define your Organization's Topology 53

Define Access Rules for Protection of your Organization's Resources 53

Enforce Access Policies 53

Managing User and Administrator Accounts 54

Managing User Accounts 55

Configuring Authentication Methods for Users 55

Granting User Access Using RADIUS Server Groups 56

SecurID Authentication for Security Gateway 57

Configuring-TACACS+-Authentication 62

User Database 63

Creating, Modifying, Removing User Accounts 63

User > General Properties 64

Configuring Authentication 64

User > Location 65

User > Time 65

User > Certificates 65

User > Encryption 66

Configuring Default Expiration Settings for Users 66

Delete a User 67

Managing User Groups 67

Adding User Groups 67

LDAP and User Directory 68

User Directory and Identity Awareness 68

User Directory Considerations 69

The User Directory Schema 69

Check Point Schema for LDAP 69

Schema Checking 70

OID Proprietary Attributes 70

User Directory Schema Attributes 70

Fetch User Information Effectively 80

Security Management R80.40 Administration Guide      |      5


Table of Contents

Setting User-to-Group Membership Mode 81

Profile Attributes 81

Microsoft Active Directory 91

Updating the Registry Settings 93

Delegating Control 93

Extending the Active Directory Schema 93

Adding New Attributes to the Active Directory 94

Retrieving Information from a User Directory Server 95

Running User Directory Queries 95

Querying Multiple LDAP Servers 96

User Directory 96

Deploying User Directory 96

Enabling User Directory 97

Account Units 98

Working with LDAP Account Units 98

Configuring LDAP query parameters 102

Modifying the LDAP Server 103

Account Units and High Availability 103

Setting High Availability Priority 104

Authenticating with Certificates 104

Managing Users on a User Directory Server 105

Distributing Users in Multiple Servers 105

Managing LDAP Information 106

LDAP Groups for the User Directory 107

Access Roles 107

Adding Access Roles 108

Authentication Rules 109

Managing Administrator Accounts 110

Configuring Authentication Methods for Administrators 110

Configuring Check Point Password Authentication for Administrators 110

Security Management R80.40 Administration Guide      |      6


Table of Contents

Configuring OS Password Authentication for Administrators 111

Configuring a RADIUS Server for Administrators 111

Configuring a SecurID Server for Administrators 112

Configuring a TACACS Server for Administrators 113

Configuring API key authentication for administrators 114

Creating, Changing, and Deleting an Administrator Account 116

Creating an Administrator Account 118

Changing an Existing Administrator Account 119

Deleting an Administrator Account 119

Creating a Certificate for Logging in to SmartConsole 120

Configuring Default Expiration for Administrators 120

Setting SmartConsole Timeout 121

Revoking Administrator Certificate 121

Assigning Permission Profiles to Administrators 122

Changing and Creating Permission Profiles 122

Configuring Customized Permissions 123

Configuring Permissions for Access Control Layers 124

Configuring Permissions for Access Control and Threat Prevention 125

Configuring Permissions for Monitoring, Logging, Events, and Reports 126

Defining Trusted Clients 126

Restricting Administrator Login Attempts 128

Unlocking Administrators 129

Session Flow for Administrators 129

Publishing a Session 129

Working in SmartConsole Session View 130

Administrators Working with Multiple Sessions 131

Use Case 132

Managing Gateways 135

Creating a New Security Gateway 135

Manually Updating the Gateway Topology 136

Security Management R80.40 Administration Guide      |      7


Table of Contents

Dynamically Updating the Gateway Topology 136

Dynamic Anti-Spoofing 137

Secure Internal Communication (SIC) 137

Initializing Trust 138

SIC Status 138

Trust State 138

Troubleshooting SIC 139

Understanding the Check Point Internal Certificate Authority (ICA) 140

ICA Clients 141

SIC Certificate Management 141

Managing Software Blade Licenses 142

Configuring a Proxy Gateway 143

Viewing Licenses in SmartConsole 143

Monitoring Licenses in SmartConsole 145

Central Deployment of Hotfixes 148

Prerequisites 148

Limitations 149

Installing the Jumbo Hotfix Accumulator 149

Managing Objects 153

Object Categories 153

Actions with Objects 154

Object Tags 155

Adding a Tag to an Object 155

Network Object Types 155

Networks 155

Network Groups 155

Grouping Network Objects 156

Check Point Hosts 156

Gateway Cluster 157

Updatable Objects 157

Security Management R80.40 Administration Guide      |      8


Table of Contents

Adding an Updatable Object to the Security Policy 157

More Network Object Types 158

Address Ranges 158

Using Wildcard Objects 159

Understanding Wildcard Objects 159

IPv6 163

Domains 163

Dynamic Objects 164

Security Zones 164

Creating and Assigning Security Zones 165

Predefined Security Zones 166

Externally Managed Gateways/Hosts 166

Interoperable Devices 167

VoIP Domains 167

Logical Servers 167

Balance Method 168

Open Security Extension (OSE) Devices 168

Defining OSE Device Interfaces 169

OSE Device Properties Window - General Tab 169

Anti-Spoofing Parameters and OSE Devices Setup (Cisco) 169

Managing Policies 171

Working with Policy Packages 171

Viewing Rule Logs 176

Policy Installation History 177

Creating an Access Control Policy 179

Introducing the Unified Access Control Policy 179

The Columns of the Access Control Rule Base 180

The Columns of the Access ControlRule Base 180

Source and Destination Column 181

To Learn More About Network Objects 181

Security Management R80.40 Administration Guide      |      9


Table of Contents

VPN Column 181

IPsec VPN 182

Mobile Access to the Network 182

To Learn More About VPN 182

Services & Applications Column 183

Service Matching 183

Application Matching 183

Services and Applications on R77.30 and Lower Security Gateways, and after
Upgrade 186

Content Column 186

Actions 188

UserCheck Actions 189

To Learn More About UserCheck 190

Tracking Column 190

To Learn More About Tracking 190

Rule Matching in the Access Control Policy 190

The matching examples show that: 194

Creating a Basic Access Control Policy 194

Basic Rules 194

Use Case - Basic Access Control 195

Use Case - Inline Layer for Each Department 196

Creating Application Control and URL Filtering Rules 199

Blocking URL Categories 205

Ordered Layers and Inline Layers 205

The Need for Ordered Layers and Inline Layers 205

Order of Rule Enforcement in Inline Layers 206

Order of Rule Enforcement in Ordered Layers 207

Creating an Inline Layer 207

Creating a Ordered Layer 208

Enabling Access Control Features 210

Security Management R80.40 Administration Guide      |      10


Table of Contents

Types of Rules in the Rule Base 211

Administrators for Access Control Layers 214

Sharing Layers 214

Visual Division of the Rule Base with Sections 215

Managing Policies and Layers 216

Use Cases for the Unified Rule Base 216

Best Practices for Access Control Rules 227

Installing the Access Control Policy 229

Pre-R80 Gateways and the Unified Access Control Policy 230

Analyzing the Rule Base Hit Count 231

Enabling or Disabling Hit Count 231

Hit Count Display 232

Preventing IP Spoofing 233

Anti-Spoofing Options 236

Multicast Access Control 236

Configuring the NAT Policy 238

Translating IP Addresses 238

Using Hide NAT 239

Sample NAT Deployments 239

Static NAT 239

Hide NAT 240

NAT Rules 241

Automatic and Manual NAT Rules 241

Using Automatic Rules 241

Order of NAT Rule Enforcement 242

Sample Automatic Rules 242

Configuring Static and Hide NAT 243

Enabling Automatic NAT 244

Automatic Hide NAT to External Networks 244

Sample Deployment (Static and Hide NAT) 247

Security Management R80.40 Administration Guide      |      11


Table of Contents

Sample Deployment (Manual Rules for Port Translation) 248

Configuring Stateful NAT64 (IPv6 to IPv4 translation) 251

Preparing Security Gateway for NAT64 252

Defining NAT64 Rules 255

Configuring the Additional Settings for NAT64 261

Logging of NAT64 traffic 263

Example of NAT64 Translation Flow 263

Configuring Stateless NAT46 (IPv4 to IPv6 translation) 265

Preparing Security Gateway for NAT46 266

Advanced NAT Settings 276

Deployment Configurations 276

Automatic and Proxy ARP 277

NAT and Anti-Spoofing 277

Disabling NAT in a VPN Tunnel 278

Connecting Translated Objects on Different Interfaces 278

Internal Communication with Overlapping Addresses 278

Network Configuration 278

Communication Examples 279

Communication Between Internal Networks 279

Communication Between an Internal Network and the Internet 279

Routing Considerations 280

On Windows 280

On Linux 280

Object Database Configuration 280

Security Management Behind NAT 281

Non-Corresponding Gateway Addresses 282

IP Pool NAT 283

IP Pool Per Interface 283

NAT Priorities 284

Reusing IP Pool Addresses For Different Destinations 285

Security Management R80.40 Administration Guide      |      12


Table of Contents

IP Pool NAT for Clusters 288

Site-to-Site VPN 288

Sample Site-to-Site VPN Deployment 288

VPN Communities 289

Sample Combination VPN Community 292

Allowing VPN Connections 292

Sample VPN Access Control Rules 293

To Learn More About Site-to-Site VPN 293

Remote Access VPN 294

VPN Connectivity Modes 294

Sample Remote Access VPN Workflow 294

Configuring the Security Gateway for a Remote Access Community 295

Mobile Access to the Network 296

Check Point Mobile Access Solutions 297

Client-Based vs. Clientless 297

Mobile Access Clients 297

Mobile Access Web Portal 297

SSL Network Extender 298

Configuring Mobile Access to Network Resources 298

Sample Mobile Access Workflow 298

Sample Mobile Access Deployment 299

Using the Mobile Access Configuration Wizard 300

Allowing Mobile Connections 301

Defining Access to Applications 302

Activating Single Sign-On 302

Connecting to a Citrix Server 303

Sample Deployment with Citrix Server 303

Configuring Citrix Services for Mobile Access 304

Compliance Check 305

Compliance Policy Rules 305

Security Management R80.40 Administration Guide      |      13


Table of Contents

Creating a Compliance Policy 306

Configuring Compliance Settings for a Security Gateway 307

Secure Workspace 307

Secure Workspace 308

To Learn More About Mobile Access 309

Creating a New Threat Prevention Policy 310

HTTPS Inspection 311

Inspecting HTTPS Packets 311

Outbound Connections 311

Inbound Connections 312

Configuring Gateways to inspect outbound and inbound HTTPS 313

Enabling HTTPS Inspection 313

Creating an Outbound CA Certificate 314

Importing an Outbound CA Certificate 315

Exporting a Certificate from the Security Management Server 316

Exporting and Deploying the Generated CA 316

Deploying Certificates by Using Group Policy 317

Configuring Inbound HTTPS Inspection 318

Assigning a Server Certificate for Inbound HTTPS Inspection 318

HTTPS Inspection Policy 319

Configuring HTTPS Inspection Rules 321

Bypassing HTTPS Inspection for Software Update Services 322

Managing Certificates by Gateway 323

Adding Trusted CAs for Outbound HTTPS Inspection 323

Saving a CA Certificate 324

HTTPS Validation 324

Showing HTTPS Inspection Logs 324

SNI support for Site Categorization 325

Client Certificates for Smartphones and Tablets 326

Managing Client Certificates 326

Security Management R80.40 Administration Guide      |      14


Table of Contents

Creating Client Certificates 327

Revoking Certificates 328

Creating Templates for Certificate Distribution 328

Cloning a Template 330

Giving Permissions for Client Certificates 330

Preferences and Management Settings 331

Database Revisions 331

Use Case - Managing a Crisis Using Database Revisions 332

Setting IP Address Versions of the Environment 333

Restoring Window Defaults 333

Configuring the Login Window 333

Testing New SmartConsole Features 334

Sync with User Center 334

Inspection Settings 334

Configuring Inspection Settings 335

SmartTasks 337

Available Triggers 337

Available Actions 338

Configuring SmartTask Properties 338

SmartTask Advanced Properties 339

Send Web Request 339

Run script 339

Management High Availability 343

Overview of Management High Availability 343

The High Availability Environment 343

Configuring a Secondary Security Management Server in SmartConsole 344

Synchronizing Active and Standby Servers 345

Changeover Between Active and Standby 347

Overview of Management High Availability 347

The High Availability Environment 348

Security Management R80.40 Administration Guide      |      15


Table of Contents

Configuring a Secondary Security Management Server in SmartConsole 349

Synchronizing Active and Standby Servers 350

Monitoring High Availability 350

Monitoring Synchronization Status and Actions 351

Changeover Between Active and Standby 352

Changing a Server to Active or Standby 352

Working in Collision Mode 353

High Availability Troubleshooting 353

Not Communicating 353

Collision or HA Conflict 353

Sync Error 353

Environments with Endpoint Security 353

High Availability Disaster Recovery 354

Creating a New Primary Management Server 354

Promoting a Secondary Management Server to Primary 355

Network Security for IoT Devices 356

Introduction 356

Prerequisites 357

Network Overview 358

Network Diagram 358

Configuring the IoT Controller 358

Adding IoT Assets to the Policy 359

Infinity for IoT Logs: 360

The ICA Management Tool 362

Using the ICA Management Tool 362

Enabling and Connecting to the ICA Management Tool 362

The ICA Management Tool GUI 363

User Certificate Management 364

Modifying the Key Size for User Certificates 364

Performing Multiple Simultaneous Operations 365

Security Management R80.40 Administration Guide      |      16


Table of Contents

ICA Administrators with Reduced Privileges 365

Operations with Certificates 365

Management of SIC Certificates 365

Management of Gateway VPN Certificates 366

Management of User Certificates in SmartConsole 366

Notifying Users about Certificate Initialization 366

Retrieving the ICA Certificate 366

Searching for a Certificate 367

Basic Search Parameters 367

Advanced Search Attributes 367

The Search Results 368

Viewing and Saving Certificate Details 368

Removing and Revoking Certificates and Sending Email Notifications 369

Submitting a Certificate Request to the CA 369

Initializing Multiple Certificates Simultaneously 370

CRL 372

CRL Management 372

CRL Operations 372

CA Procedures 373

CA Cleanup 373

Configuring the CA 373

CA Data Types and Attributes 373

Certificate Longevity and Statuses 377

Command Line Reference 379

Syntax Legend 380

contract_util 382

contract_util check 384

contract_util cpmacro 385

contract_util download 386

contract_util mgmt 388

Security Management R80.40 Administration Guide      |      17


Table of Contents

contract_util print 389

contract_util summary 390

contract_util update 391

contract_util verify 392

cp_conf 393

cp_conf admin 395

cp_conf auto 398

cp_conf ca 399

cp_conf client 400

cp_conf finger 404

cp_conf lic 405

cp_log_export 408

cpca_client 414

cpca_client create_cert 416

cpca_client double_sign 418

cpca_client get_crldp 420

cpca_client get_pubkey 421

cpca_client init_certs 422

cpca_client lscert 423

cpca_client revoke_cert 426

cpca_client revoke_non_exist_cert 429

cpca_client search 430

cpca_client set_mgmt_tool 433

cpca_client set_sign_hash 436

cpca_create 438

cpconfig 439

cpinfo 442

cplic 443

cplic check 446

cplic contract 448

Security Management R80.40 Administration Guide      |      18


Table of Contents

cplic db_add 450

cplic db_print 452

cplic db_rm 454

cplic del 455

cplic del <object name> 456

cplic get 457

cplic print 459

cplic put 461

cplic put <object name> 463

cplic upgrade 466

cppkg 468

cppkg add 470

ppkg delete 471

cppkg get 473

cppkg getroot 474

cppkg print 475

cppkg setroot 476

cpprod_util 477

cprid 482

cprinstall 483

cprinstall boot 486

cprinstall cprestart 487

cprinstall cpstart 488

cprinstall cpstop 489

cprinstall delete 490

cprinstall get 491

cprinstall install 492

cprinstall revert 495

cprinstall show 496

cprinstall snapshot 497

Security Management R80.40 Administration Guide      |      19


Table of Contents

cprinstall transfer 498

cprinstall uninstall 500

cprinstall verify 502

cpstart 504

cpstat 505

cpstop 512

cpview 513

Overview of CPView 513

CPView User Interface 513

Using CPView 514

cpwd_admin 515

cpwd_admin config 518

cpwd_admin del 521

cpwd_admin detach 522

cpwd_admin exist 523

cpwd_admin flist 524

cpwd_admin getpid 526

cpwd_admin kill 527

cpwd_admin list 528

cpwd_admin monitor_list 530

cpwd_admin start 531

cpwd_admin start_monitor 533

cpwd_admin stop 534

cpwd_admin stop_monitor 536

dbedit 537

fw 549

fw fetchlogs 551

fw hastat 554

fw kill 555

fw log 556

Security Management R80.40 Administration Guide      |      20


Table of Contents

fw logswitch 565

fw lslogs 569

fw mergefiles 572

fw repairlog 575

fw sam 576

fw sam_policy 585

fw sam_policy add 588

fw sam_policy batch 601

fw sam_policy del 603

fw sam_policy get 606

fwm 610

fwm dbload 613

fwm exportcert 615

fwm fetchfile 616

fwm fingerprint 618

fwm getpcap 620

fwm ikecrypt 622

fwm load 623

fwm logexport 624

fwm mds 629

fwm printcert 631

fwm sic_reset 636

fwm snmp_trap 637

fwm unload 640

fwm ver 644

fwm verify 645

inet_alert 646

ldapcmd 649

ldapcompare 651

ldapmemberconvert 655

Security Management R80.40 Administration Guide      |      21


Table of Contents

ldapmodify 661

ldapsearch 663

mgmt_cli 666

migrate 667

migrate_server 671

queryDB_util 675

rs_db_tool 676

sam_alert 678

stattest 681

threshold_config 684

Security Management R80.40 Administration Guide      |      22


Glossary

Glossary
A

Administ rat or
A user with permissions to manage Check Point security products and the
network environment.

API
In computer programming, an application programming interface (API) is a set of
subroutine definitions, protocols, and tools for building application software. In
general terms, it is a set of clearly defined methods of communication between
various software components.

Appliance
A physical computer manufactured and distributed by Check Point.

Bond
A virtual interface that contains (enslaves) two or more physical interfaces for
redundancy and load sharing. The physical interfaces share one IP address and
one MAC address. See "Link Aggregation".

Bonding
See "Link Aggregation".

Bridge Mode
A Security Gateway or Virtual System that works as a Layer 2 bridge device for
easy deployment in an existing topology.

Security Management R80.40 Administration Guide      |      23


Glossary

CA
Certificate Authority. Issues certificates to gateways, users, or computers, to
identify itself to connecting entities with Distinguished Name, public key, and
sometimes IP address. After certificate validation, entities can send encrypted
data using the public keys in the certificates.

Cert ificat e
An electronic document that uses a digital signature to bind a cryptographic
public key to a specific identity. The identity can be an individual, organization, or
software entity. The certificate is used to authenticate one identity to another.

Clust er
Two or more Security Gateways that work together in a redundant configuration -
High Availability, or Load Sharing.

Clust er Member
A Security Gateway that is part of a cluster.

CoreXL
A performance-enhancing technology for Security Gateways on multi-core
processing platforms. Multiple Check Point Firewall instances are running in
parallel on multiple CPU cores.

CoreXL Firewall Inst ance


Also CoreXL FW Instance. On a Security Gateway with CoreXL enabled, the Firewall
kernel is copied multiple times. Each replicated copy, or firewall instance, runs on
one processing CPU core. These firewall instances handle traffic at the same time,
and each firewall instance is a complete and independent firewall inspection
kernel.

Security Management R80.40 Administration Guide      |      24


Glossary

CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing
incoming traffic from the network interfaces; Securely accelerating authorized
packets (if SecureXL is enabled); Distributing non-accelerated packets between
Firewall kernel instances (SND maintains global dispatching table, which maps
connections that were assigned to CoreXL Firewall instances). Traffic distribution
between CoreXL Firewall instances is statically based on Source IP addresses,
Destination IP addresses, and the IP 'Protocol' type. The CoreXL SND does not
really "touch" packets. The decision to stick to a particular FWK daemon is done at
the first packet of connection on a very high level, before anything else.
Depending on the SecureXL settings, and in most of the cases, the SecureXL can
be offloading decryption calculations. However, in some other cases, such as with
Route-Based VPN, it is done by FWK daemon.

CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you
can automatically update Check Point products for the Gaia OS, and the Gaia OS
itself. For details, see sk92449.

DAIP Gat eway


A Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway where
the IP address of the external interface is assigned dynamically by the ISP.

Dat a Type
A classification of data. The Firewall classifies incoming and outgoing traffic
according to Data Types, and enforces the Policy accordingly.

Dat abase
The Check Point database includes all objects, including network objects, users,
services, servers, and protection profiles.

Dist ribut ed Deployment


The Check Point Security Gateway and Security Management Server products are
deployed on different computers.

Security Management R80.40 Administration Guide      |      25


Glossary

Domain
A network or a collection of networks related to an entity, such as a company,
business unit or geographical location.

Domain Log Server


A Log Server for a specified Domain. It stores and processes logs from Security
Gateways that are managed by the corresponding Domain Management Server.
Acronym: DLS.

Domain Management Server


A virtual Security Management Server that manages Security Gateways for one
Domain, as part of a Multi-Domain Security Management environment. Acronym:
DMS.

Expert Mode
The name of the full command line shell that gives full system root permissions in
the Check Point Gaia operating system.

Ext ernal Net work


Computers and networks that are outside of the protected network.

Ext ernal Users


Users defined on external servers. External users are not defined in the Security
Management Server database or on an LDAP server. External user profiles tell the
system how to identify and authenticate externally defined users.

Firewall
The software and hardware that protects a computer network by analyzing the
incoming and outgoing network traffic (packets).

Security Management R80.40 Administration Guide      |      26


Glossary

Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.

Gaia Clish
The name of the default command line shell in Check Point Gaia operating system.
This is a restrictive shell (role-based administration controls the number of
commands available in the shell).

Gaia Port al
Web interface for Check Point Gaia operating system.

Hot fix
A piece of software installed on top of the current software in order to fix some
wrong or undesired behavior.

ICA
Internal Certificate Authority. A component on Check Point Management Server
that issues certificates for authentication.

Inline Layer
Set of rules used in another rule in Security Policy.

Int ernal Net work


Computers and resources protected by the Firewall and accessed by
authenticated users.

Security Management R80.40 Administration Guide      |      27


Glossary

IPv4
Internet Protocol Version 4 (see RFC 791). A 32-bit number - 4 sets of numbers,
each set can be from 0 - 255. For example, 192.168.2.1.

IPv6
Internet Protocol Version 6 (see RFC 2460 and RFC 3513). 128-bit number - 8 sets
of hexadecimal numbers, each set can be from 0 - ffff. For example,
FEDC:BA98:7654:3210:FEDC:BA98:7654:3210.

Jumbo Hot fix Accumulat or


Collection of hotfixes combined into a single package. Acronyms: JHA, JHF.

Link Aggregat ion


Various methods of combining (aggregating) multiple network connections in
parallel to increase throughput beyond what a single connection could sustain,
and to provide redundancy in case one of the links should fail.

Log
A record of an action that is done by a Software Blade.

Log Server
A dedicated Check Point computer that runs Check Point software to store and
process logs in Security Management Server or Multi-Domain Security
Management environment.

Security Management R80.40 Administration Guide      |      28


Glossary

Management High Availabilit y


Deployment and configuration mode of two Check Point Management Servers, in
which they automatically synchronize the management databases with each
other. In this mode, one Management Server is Active, and the other is Standby.
Acronyms: Management HA, MGMT HA.

Management Int erface


Interface on Gaia computer, through which users connect to Portal or CLI.
Interface on a Gaia Security Gateway or Cluster member, through which
Management Server connects to the Security Gateway or Cluster member.

Management Server
A Check Point Security Management Server or a Multi-Domain Server.

Mult i-Domain Log Server


A computer that runs Check Point software to store and process logs in Multi-
Domain Security Management environment. The Multi-Domain Log Server
consists of Domain Log Servers that store and process logs from Security
Gateways that are managed by the corresponding Domain Management Servers.
Acronym: MDLS.

Mult i-Domain Securit y Management


A centralized management solution for large-scale, distributed environments with
many different Domain networks.

Mult i-Domain Server


A computer that runs Check Point software to host virtual Security Management
Servers called Domain Management Servers. Acronym: MDS.

Security Management R80.40 Administration Guide      |      29


Glossary

Net work Object


Logical representation of every part of corporate topology (physical machine,
software component, IP Address range, service, and so on).

Open Server
A physical computer manufactured and distributed by a company, other than
Check Point.

Permission Profile
A predefined group of SmartConsole access permissions assigned to Domains
and administrators. With this feature you can configure complex permissions for
many administrators with one definition.

Policy Layer
A layer (set of rules) in a Security Policy.

Policy Package
A collection of different types of Security Policies, such as Access Control, Threat
Prevention, QoS, and Desktop Security. After installation, Security Gateways
enforce all Policies in the Policy Package.

Primary Mult i-Domain Server


The Multi-Domain Server in Management High Availability that you install as
Primary.

Security Management R80.40 Administration Guide      |      30


Glossary

Rule
A set of traffic parameters and other conditions in a Rule Base that cause
specified actions to be taken for a communication session.

Rule Base
Also Rulebase. All rules configured in a given Security Policy.

Secondary Mult i-Domain Server


The Multi-Domain Server in Management High Availability that you install as
Secondary.

SecureXL
Check Point product that accelerates IPv4 and IPv6 traffic. Installed on Security
Gateways for significant performance improvements.

Securit y Gat eway


A computer that runs Check Point software to inspect traffic and enforces
Security Policies for connected network resources.

Securit y Management Server


A computer that runs Check Point software to manage the objects and policies in
Check Point environment.

Securit y Policy
A collection of rules that control network traffic and enforce organization
guidelines for data protection and access to resources with packet inspection.

Security Management R80.40 Administration Guide      |      31


Glossary

SIC
Secure Internal Communication. The Check Point proprietary mechanism with
which Check Point computers that run Check Point software authenticate each
other over SSL, for secure communication. This authentication is based on the
certificates issued by the ICA on a Check Point Management Server.

Single Sign-On
A property of access control of multiple related, yet independent, software
systems. With this property, a user logs in with a single ID and password to gain
access to a connected system or systems without using different usernames or
passwords, or in some configurations seamlessly sign on at each system. This is
typically accomplished using the Lightweight Directory Access Protocol (LDAP)
and stored LDAP databases on (directory) servers. Acronym: SSO.

Smart Console
A Check Point GUI application used to manage Security Policies, monitor products
and events, install updates, provision new devices and appliances, and manage a
multi-domain environment and each domain.

Smart Dashboard
A legacy Check Point GUI client used to create and manage the security settings in
R77.30 and lower versions.

Soft ware Blade


A software blade is a security solution based on specific business needs. Each
blade is independent, modular and centrally managed. To extend security,
additional blades can be quickly added.

SSO
See "Single Sign-On".

St andalone
A Check Point computer, on which both the Security Gateway and Security
Management Server products are installed and configured.

Security Management R80.40 Administration Guide      |      32


Glossary

Traffic
Flow of data between network devices.

User Dat abase


Check Point internal database that contains all users defined and managed in
SmartConsole.

User Groups
Named groups of users with related responsibilities.

User Templat e
Property set that defines a type of user on which a security policy will be enforced.

Users
Personnel authorized to use network resources and applications.

VLAN
Virtual Local Area Network. Open servers or appliances connected to a virtual
network, which are not physically connected to the same network.

VLAN Trunk
A connection between two switches that contains multiple VLANs.

VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a
computer or cluster with virtual abstractions of Check Point Security Gateways
and other network devices. These Virtual Devices provide the same functionality
as their physical counterparts.

Security Management R80.40 Administration Guide      |      33


Glossary

VSX Gat eway


Physical server that hosts VSX virtual networks, including all Virtual Devices that
provide the functionality of physical network devices. It holds at least one Virtual
System, which is called VS0.

Security Management R80.40 Administration Guide      |      34


Welcome

Welcome
Check Point offers effective Security Management solutions to help you keep up with constantly
growing needs and challenges of your organizational network. This Administration Guide focuses
on the basic Security Management Server deployment.

If you are interested in deployments for organizations with multiple sites, refer to the R80.40
Multi-Domain Security Management Administration Guide.

These are the basic components of Check Point security architecture.

Item Description

1 SmartConsole - Check Point Graphical User Interface for connection to and


management of Security Management Servers.

2 Security Management Server - Manages Security Gateways with defined security


policies and monitors security events on the network.

3 Security Gateway - Placed at the perimeter of the network topology, to protect your
environment through enforcement of the security policies.

4 Your environment to protect.

Security Management R80.40 Administration Guide      |      35


Getting Started

Getting Started
Before you begin deploying a Check Point security solution, familiarize yourself with:

n Check Point SmartConsole

n Basic setup of a Check Point Security Management Server

n Basic setup of Check Point Security Gateways

n Administrative task delegation

n Security management in a non-GUI environment

Understanding SmartConsole
Check Point SmartConsole makes it easy to manage security for complex networks. Before you
start to configure your cyber security environment and policies, become familiar with Check Point
SmartConsole.

SmartConsole Window

Item Description Item Description

1 Global Toolbar 5 Objects Bar (F11)

2 Session Management Toolbar 6 Validations pane

Security Management R80.40 Administration Guide      |      36


Getting Started

Item Description Item Description

3 Navigation Toolbar 7 Command line interface button

4 System Information Area

SmartConsole Toolbars
Global Toolbar (top of SmartConsole)

Description

The main SmartConsole Menu. When SmartConsole is connected to a Security Management Server, this includes:

n Manage policies and layers


n Open Object Explorer
n New object (opens menu to create a new object)
n Publish session
n Discard session
n Session details
n Install policy
n Verify Access Control Policy
n Install Database
n Uninstall Threat Prevention policy
n Management High Availability
n Manage Licenses and Packages
n Global Properties
n View (opens menu to select a View to open)

Create new objects or open the Object Explorer

Install policy on managed gateways

Session Management Toolbar (top of SmartConsole)

Description

Discard changes made during the session

Enter session details and see the number of changes made in the session.

Publish the SmartConsole session, to make the changes visible to other administrators,
and ready to install on gateways.
Note - When the policy is installed, published changes are installed on the gateways and
enforced.

Security Management R80.40 Administration Guide      |      37


Getting Started

Navigation Toolbar (left side of SmartConsole)

Keyboard
Description
Shortcut

Ctrl+1 Gateways & Servers configuration view:

n Manage Security Gateways


n Activate Software Blades
n Add, edit, or delete gateways and clusters (including virtual
clusters)
n Run scripts
n Backup and restore gateways
n Open a command line interface on the gateway
n View gateway status

Ctrl+2 Security Policies Access Control view:

n Manage Access Control: Content Awareness, VPN, Application &


URL Filtering, and Mobile Access
n Edit multiple policies at the same time
n Add, edit, or delete NAT rules
n Use the Access Tools

Security Policies Threat Prevention view:

n Manage Threat Prevention: IPS, Anti-Bot, Anti-Virus, Threat


Emulation
n Edit the unified threat Rule Base
n Configure threat profiles
n Add, edit, or delete exceptions and exception groups
n Use the Threat Tools

Shared Policies Views:

n Manage Mobile Access, DLP, Geo Policy and inspection Settings

Ctrl+3 Logs & Monitor view:

n See high level graphs and plots


n Search through logs
n Schedule customized reports
n Monitor gateways
n See compliance information

Security Management R80.40 Administration Guide      |      38


Getting Started

Keyboard
Description
Shortcut

Ctrl+4 Manage & Settings view - review and configure the Security
Management Server settings:

n Administrators
n Permissions profiles
n Trusted clients
n Administrator sessions, and session settings
n Blades
n Revisions
n Preferences
n Sync with User Center

Command Line Interface Button (left bottom corner of SmartConsole)

Keyboard Shortcut Description

F9 Open a command line interface for management scripting and API

For more SmartConsole shortcuts, see "SmartConsole Toolbars" on page 37.

Objects Bar (right side of SmartConsole)

Description

Objects Manage security and network objects

Validations Pane (right side of SmartConsole)

Description

Validations See validation errors

System Information Area (bottom of SmartConsole)

Description

Task List See management tasks in progress and expand to see recent tasks

Server Details See the IP address of the server to which SmartConsole is connected. If
Management High Availability is configured, click to see the details.

Session Status See the number of changes made in the session and the session status.

Security Management R80.40 Administration Guide      |      39


Getting Started

Description

Connected See connected administrators: Yourself and others.


administrators

Search Engine
In each view you can search the Security Management Server database for information relevant to
the view. For example:

n Gateway, by name or IP address

n Access Control rule

n NAT rule

n Threat Prevention profile

n Specific threat or a threat category

n Object tags

You can search for an object in the Security Management Server database in two ways:

n Enter the prefix of the object's name. For example, to find USGlobalHost, you can enter USG
in the search box.

n Enter any sequence of characters in the object's name and add an asterisk (*) before such
sequence.

For example, to find USGlobalHost, you can enter *oba, *host, *SG and so on in the search
box.

IP Search
You can run an advanced search for an IP address, network, or port. It returns direct and indirect
matches for your search criteria.

n IP address: xxx.xxx.xxx.xxx

n Network: xxx.xxx.0.0/16 or xxx.xxx

n Port: svc:<xxx>

These are the different IP search modes:

n General - (Default). Returns direct matched results and indirect results in IP ranges,
networks, groups, groups with exclusion, and rules that contain these objects.

n Packet - Matches rules as if a packet with your IP address arrives at the gateway.

Security Management R80.40 Administration Guide      |      40


Getting Started

General IP Search
This is the default search mode. Use it to search in Rule Bases and in objects. If you enter a string
that is not a valid IP or network, the search engine treats it as text.

When you enter a valid IP address or network, an advanced search is done and on these objects
and rules:

n Objects that have the IP address as a text value for example, in a comment

n Objects that have an IP address property (direct results)

n Groups, networks, and address ranges that contain objects with the text value or address
value

n Rules that contain those objects

Packet Search
A Packet Search matches rules as if a packet with your IP address arrives at the gateway. It
matches rules that have:

n The IP address in a column of the rule

n "Any"

n A Group-with-exclusion or negated field with the IP address in its declaration

To run a Pack et Search:

1. Click the search box.

The search window opens.

2. Click Packet or enter: "mode:Packet"

3. To search a specific rule column, enter: ColumnName:Criteria

Rule Base Results


When you enter search criteria and view the matched results, the value that matched the criteria
in a rule is highlighted.

If there is... This is highlighted

A direct match on an object name or on textual Only the specific matched


columns characters

A direct match on object properties The entire object name

A negated column The negated label

Security Management R80.40 Administration Guide      |      41


Getting Started

If there is... This is highlighted

A match on "Any" "Any"

Know n Limitation:

n Packet search does not support IPv6.

Access and Threat Tools


The Access Tools section in the Security Policies Access Control view and the Threat Tools
section in the Security Policies Threat Prevention view give you more management and data
collection tools.

Access Tools in the Security Policies Access Control view

Tool Description

VPN Create, edit, or delete VPN Communities.


Communities

Updates Update the Application & URL Filtering database, schedule updates, and
configure updates.

UserCheck Configure UserCheck interaction objects for Access Control policy actions.

Client Create and distribute client certificates that allow users to authenticate to the
Certificates Gateway from handheld devices.

Application Browse to the Check Point AppWiki. Search and filter the Web 2.0 Applications
Wiki Database, to use Check Point security research in your policy rules for actions
on applications, apps, and widgets.

Installation See the Policy installation history for each Gateway, and who made the
History changes. See the revisions that were made during each installation, and who
made them. Install a specific version of the Policy.

Threat Tools in the Security Policies Threat Prevention view

Tool Description

Profiles Create, edit, or delete profiles.

IPS Edit IPS protections per profile.


Protections

Security Management R80.40 Administration Guide      |      42


Getting Started

Tool Description

Protections See statistics on different protections

Whitelist Configure Whitelist Files list


Files

Indicators Configure indicators of malicious activity and how to handle it

Updates Configure updates to the Malware database, Threat Emulation engine and
images, and the IPS database.

UserCheck Configure UserCheck interaction objects for Threat Prevention policy actions.

Threat Wiki Browse to the Check Point ThreatWiki. Search and filter Check Point's Malware
Database, to use Check Point security research to block malware before it enters
your environment, and to best respond if it does get in.

Installation See the Policy installation history for each Gateway, and who made the changes.
History See the revisions that were made during each installation, and who made them.
Install a specific version of the Policy.

Shared Policies
The Shared Policies section in the Security Policies shows the policies that are not in a Policy
package. They are shared between all Policy packages.

Shared policies are installed with the Access Control Policy.

Software
Description
Blade

Mobile Launch Mobile Access policy in a SmartConsole. Configure how your remote
Access users access internal resources, such as their email accounts, when they are
mobile.

DLP Launch Data Loss Prevention policy in a SmartConsole. Configure advanced tools
to automatically identify data that must not go outside the network, to block the
leak, and to educate users.

Geo Policy Create a policy for traffic to or from specific geographical or political locations.

HTTPS The HTTPS Policy allows the Security Gateway to inspect HTTPS traffic to prevent
Inspection security risks related to the SSL protocol. The HTTPS Policy shows if HTTPS
Inspection is enabled on one or more Gateways.

Security Management R80.40 Administration Guide      |      43


Getting Started

Software
Description
Blade

Inspection You can configure Inspection Settings for the Firewall:


Settings
n Deep packet inspection settings
n Protocol parsing inspection settings
n VoIP packet inspection settings

API Command Line Interface


You can also configure objects and rules through the API command line interface, which you can
access from SmartConsole.

Click to open the command line interface.

Click to open the API reference (in the command line interface).
Use the Command Line Reference to learn about Session management commands, Host
commands, Netw ork commands, and Rule commands.

In addition to the command line interface, you can create and run API scripts to manage
configuration and operations on the Security Management Server (see "API Command Line
Interface" above).

Keyboard Shortcuts for SmartConsole


From R80.20, there are additional keyboard shortcuts that you can use to navigate between the
different SmartConsole fields:

Keyboard shortcut Description

Ctrl+S Publish the SmartConsole session

Ctrl+Alt+S Discard the SmartConsole session.

Shift+Alt+Enter Install policy.

F10 Show/hide task details.

F11 Show/hide Object Explorer.

Ctrl+O Manage policies and layers

Ctrl+E Open Object Explorer

Ctrl+F3 Switch to high-contrast theme

Security Management R80.40 Administration Guide      |      44


Getting Started

Keyboard shortcut Description

Alt+Space System menu

F1 Open the relevant online help

Alt+F4 Close SmartConsole

Shortcuts for the specific views that support them:

Keyboard shortcut Description

Ctrl+T Open new tab

Ctrl+W or Ctrl+F4 Close current tab

Ctrl+Tab Move to the next tab

Ctrl+Shift+Tab Move to the previous tab

Delete Delete the currently selected item

Ctrl+A Select all elements

Esc Cancel operation to close window

Enter or mouse double-click Edit item

Shortcuts for views that contain a Rule Base:

Keyboard shortcut Description

Ctrl+G Go to rule (in the Access Control Rule Base)

Ctrl+X Cut rule

Ctrl+C Copy rule

Ctrl+V Paste rule below the selected rule

Delete Remove a used item from a rule cell

Ctrl+F Open Rule Base search

F3 Navigate to the next Rule Base search result

Ctrl+arrow up Go to the first rule in the Rule Base

Security Management R80.40 Administration Guide      |      45


Getting Started

Keyboard shortcut Description

Ctrl+arrow down Go to the last rule in the Rule Base

Space or + Open drop-down menu for the current cell in the Rule Base

Shift+arrow up/down Move between objects in the Rule Base

Shortcuts for the Logs & Monitor view:

Keyboard shortcut Description

Ctrl+G Switch to grid view (in the Logs and Audit Logs views)

Ctrl+L Switch to table view (in the Logs and Audit Logs views)

Ctrl+R Resolve objects

F5 Refresh query

F6 Enable auto-refresh

Ctrl+D Add to favorites

Ctrl+S Organize favorites

Connecting to the Security Management


Server through SmartConsole
To log in to a Security Management Server through Check Point SmartConsole, you must have an
administrator account configured on the Security Management Server. When installing the
Security Management Server, you create one administrator in the First Time Configuration Wizard.
After that, you can create additional administrators accounts with SmartConsole, or using the Gaia
Portal.

To log in to the Security Management Server through SmartConsole

1. Launch the SmartConsole application.

2. Enter your administrator authentication credentials. These can be a username, or a


certificate file, or a CAPI certificate.

Logging in with a username:

n Enter the Username and Passw ord.

Security Management R80.40 Administration Guide      |      46


Getting Started

Logging in with a certificate file:

n From the drop-down list, select Certificate File .

n Browse to the file.

n Enter the password of the certificate file.

Logging in with a certificate in the CAPI repository:

n From the drop-down list, select CAPI Certificate .

n Select the certificate from drop-down list.

3. Enter the name or the IP address of the Security Management Server.

4. Click Login .

The SmartConsole authenticates the Security Management Server. The first time you
connect, SmartConsole shows the fingerprint.

5. Confirm the fingerprint.

The fingerprint and the IP address of the Security Management Server are saved to the user
settings in Windows.

Setting Up for Security Management


To start setting up your security environment, configure the Security Management Server and the
Security Gateways. The Security Gateways enforce the security policy that you define on the
Security Management Server.

To configure the Security Management Server in SmartConsole

1. In the Gatew ays & Servers view, find the Security Management Server object.

You can search for it by name or IP address in the Search box at the top of the view.

When you select the Security Management Server object, the Summary tab at the
bottom of the pane shows the Software Blades that are enabled on it.

2. Open the object properties window, and enable the Management Software Blades, as
necessary:

n Netw ork Policy Management - Manage a comprehensive security policy, unified


for all security functionalities. This is automatically enabled.

n Endpoint Policy Management - Manage security and data on end-user


computers and hand-held devices. Enable this Software Blade if you have or will
install an Endpoint Security Management Server.

Security Management R80.40 Administration Guide      |      47


Getting Started

符合防火牆規 n Logging & Status - Monitor security events and status of gateways, VPNs, users,
則3.2.1(十六) and more, with advanced visuals and data management features.

n Identity Logging - Add user identities, and data of their computers and devices,
from Active Directory domains, to log entries.

n User Directory - Populate your security scope with user accounts from the LDAP servers
in your environment.

n Compliance - Optimize your security settings and comply with regulatory requirements

n SmartEvent - Manage and correlate security events in real-time.

To configure the Security Gateways in SmartConsole

1. From the navigation toolbar, select Gatew ays & Servers.

2. Click New , and select Gatew ay .

3. In the Check Point Security Gatew ay Creation window that opens, select a
configuration mode:

n Wizard Mode - run the configuration wizard

n Classic Mode - configure the gateway in classic mode

Setting up for Team Work


As an administrator, you can delegate tasks, such as defining objects and users, to other
administrators. Make sure to create administrator accounts (see "Managing Administrator
Accounts" on page 110) with the privileges that are required to accomplish those tasks.

If you are the only administrator, we recommend that you create a second administrator account
with Read Only permissions, which is useful for troubleshooting, consultation, or auditing.

Managing Security through API


This section describes the API Server on a Management Server and the applicable API Tools.

API
You can configure and control the Management Server through API Requests you send to the API
Server that runs on the Management Server.

The API Server runs scripts that automate daily tasks and integrate the Check Point solutions with
third party systems such as virtualization servers, ticketing systems, and change management
systems.

Security Management R80.40 Administration Guide      |      48


Getting Started

API Tools
You can use these tools to run API scripts on the Management Server:

n Standalone management tool, included with SmartConsole. You can copy this tool to
computers that run Windows or Gaia operating system.

l mgmt_cli.exe (for Windows operating system)

l mgmt_cli (for Gaia operating system)

n Web Services API that allow communication and data exchange between the clients and the
Management Server over the HTTP protocol.

These also let other Check Point processes communicate with the Management Server over
the HTTPS protocol.

To learn more about the management APIs, to see code samples, and to take advantage of user
forums, see:

n The Check Point Management API Reference.

n The Developers Netw ork section of Check Point CheckMates Community.

Configuring the API Server

To configure the API Server:

1. Connect with SmartConsole to the Security Management Server or Domain Management


Server.

2. From the left navigation panel, click Manage & Settings.

3. In the upper left section, click Blades.

4. In the Management API section, click Advanced Settings.

The Management API Settings window opens.

5. Configure the Startup Settings and the Access Settings.

Security Management R80.40 Administration Guide      |      49


Getting Started

Configuring Startup Settings

Select Automatic start to automatically start the API server when you start or reboot the
Management Server.

Notes:
n If the Management Server has more than 4GB of RAM installed,

the Automatic start option is activated by default during


Management Server installation.
n If the Management Server has less than 4GB of RAM, the

Automatic Start option is deactivated.

Configuring Access Settings

Select one of these options to configure which clients can connect to the API Server:

n Management server only - Only the Management Server itself can connect to the
API Server. This option only lets you use the mgmt_cli utility to send API requests.
You cannot use SmartConsole or web services to send API requests.

n All IP addresses that can be used for GUI clients - You can send API requests
from all IP addresses that are defined as Trusted Clients in SmartConsole. This
includes requests from SmartConsole, Web services and the mgmt_cli utility.

n All IP addresses - You can send API requests from all IP addresses. This includes
requests from SmartConsole, Web services and the mgmt_cli utility.

6. Publish the SmartConsole session.

7. Restart the API Server.

Run this command:

api restart

Note - On a Multi-Domain Server, you must run this command in the


context of the applicable Domain Management Server.

API Key Authentication


An API key is a token that a client provides when making API calls.

API key authentication provides an administrator the ability to use a token for authenticating to
the API interface instead of using a the usual username / password.

Configuring API key authentication for administrators


You can use SmartConsole to configure an API key for authenticating to the management API.

Security Management R80.40 Administration Guide      |      50


Getting Started

Note - The administrator can only use the API key for executing API commands
and cannot use it for SmartConsole authentication.

To configure API authentication for an administrator in SmartConsole

1. In SmartConsole click Manage & Settings > Permissions & Administrators >


Administrators

Click the New icon at the top menu.

The New Administrator window opens.

2. Give the administrator a name

3. In the Authentication Method field select API Key .

4. Click Generate API key .

5. A new API key window opens.

a. Click Copy key to Clipboard

b. Save the key for a later use (provide it to the relevant administrator).

Security Management R80.40 Administration Guide      |      51


Getting Started

6. Click OK

7. Publish the SmartConsole session.

Example

This example demonstrates how to use the API-key for login and creating a simple-gateway
using the API.

1. Log in to the Expert mode.

2. Use the previously generated key for the login, and save the standard output to a file
(redirect it to a file using the ">" sign):

Syntax:

mgmt_cli login api-key <api-key> > <path_to>/<filename>

Example:

mgmt_cli login api-key mvYSiHVmlJM+J0tu2FqGag12 >


/var/tmp/token.txt

3. Run a mgmt_cli command, use the -s <path_to>/<filename>flag

Syntax:

mgmt_cli -s <path_to>/<filename> add simple-gateway name


<gateway name> ip-address <ip address> one-time-password
<password> blade <true>

Example:

mgmt_cli -s /var/tmp/token.txt add simple-gateway name "gw1" ip-


address 192.168.3.181 one-time-password "aaaa" firewall true vpn
true

For more details, see the Check Point Management API Reference.

Planning Security Management


After installing the Security Management Server and Security Gateway, you can continue with
cyber security configuration for your environment.

Security Management R80.40 Administration Guide      |      52


Getting Started

Define your Organization's Topology


Network topology consists of network components, both physical and logical, such as physical and
virtual Security Gateways, hosts, hand-held devices, CA servers, third-party servers, services,
resources, networks, address ranges, and groups. Each of these components corresponds to an
object in your Check Point security management configuration. Configure those objects in
SmartConsole. See "Managing Objects" on page 153.

Define users and user groups that your security environment protects

You can add users and groups to the database manually, through LDAP and User Directory, or
with the help of Active Directory.

To add users: see "Managing User Accounts" on page 55.

To add groups: see "Managing User Accounts" on page 55.

To use LDAP and User Directory, see "Managing User Accounts" on page 55.

To use Active Directory, see "Managing User Accounts" on page 55.

Define Access Rules for Protection of your


Organization's Resources
Configure access rules and group them in policies that are enforced on the Security Gateways.
You can define access policies based on traffic, applications, Web sites, and data (see "Managing
Policies" on page 171). Set up preventative actions against known threats with Check Point Anti-
Virus and Anti-Malware. Educate users about the validity and security of the operations they
attempt with the help of UserCheck. Track network traffic and events through logging and
monitoring.

Enforce Access Policies


Configure the Security Gateways. Make sure to activate the appropriate Software Blades. Then,
install your policies on the Security Gateways.

Security Management R80.40 Administration Guide      |      53


Getting Started

Managing User and Administrator


Accounts
Check Point supports different Authentication Methods for end users and administrators.

Security Gateways authenticate individual users. The Security Management Server authenticates
administrators.

Users and Administrators authenticate using credentials. All the methods required a username
and password.

Users and administrators can be stored in the Check Point User Database or on an LDAP server.
See "User Database" on page 63.

Security Management R80.40 Administration Guide      |      54


Managing User Accounts

Managing User Accounts


The following sections describe the supported authentication methods for users.

Configuring Authentication Methods for Users


These instructions show how to configure authentication methods for users. For information
about administrators, see "Managing Administrator Accounts" on page 110.

Check Point Password

Check Point password is a static password that is configured in SmartConsole. For


administrators, the password is stored in the local database on the Security Management
Server. For users, it is stored on the local database on the Security Gateway. No additional
software is required.

Operating System Password

OS Password is stored on the operating system of the computer on which the Security Gateway
(for users) or Security Management Server (for administrators) is installed. You can also use
passwords that are stored in a Windows domain. No additional software is required.

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that
provides security and scalability by separating the authentication function from the access
server.

Using RADIUS, the Security Gateway forwards authentication requests by remote users to the
RADIUS server. For administrators, the Security Management Server forwards the
authentication requests. The RADIUS server, which stores user account information, does the
authentication.

The RADIUS protocol uses UDP to communicate with the gateway or the Security Management
Server.

RADIUS servers and RADIUS server group objects are defined in SmartConsole.

Security Management R80.40 Administration Guide      |      55


Managing User Accounts

TACACS

Terminal Access Controller Access Control System (TACACS) provides access control for routers,
network access servers and other networked devices through one or more centralized servers.

TACACS is an external authentication method that provides verification services. Using TACACS,
the Security Gateway forwards authentication requests by remote users to the TACACS server.
For administrators, it is the Security Management Server that forwards the requests. The
TACACS server, which stores user account information, authenticates users. The system
supports physical card key devices or token cards and Kerberos secret key authentication.
TACACS encrypts the user name, password, authentication services and accounting
information of all authentication requests to ensure secure communication.

SecurID

SecurID requires users to both possess a token authenticator and to supply a PIN or password.
Token authenticators generate one-time passwords that are synchronized to an RSA
Authentication Manager (AM) and may come in the form of hardware or software. Hardware
tokens are key-ring or credit card-sized devices, while software tokens reside on the PC or
device from which the user wants to authenticate. All tokens generate a random, one-time use
access code that changes approximately every minute. When a user attempts to authenticate
to a protected resource, the one-time use code must be validated by the AM.

Using SecurID, the Security Gateway forwards authentication requests by remote users to the
AM. For administrators, it is the Security Management Server that forwards the requests. The
AM manages the database of RSA users and their assigned hard or soft tokens. The Security
Gateway or the Security Management Server act as an AM agent and direct all access requests
to the RSA AM for authentication. For additional information on agent configuration, refer to
RSA Authentication Manager documentation.

There are no specific parameters required for the SecurID authentication method.
Authentication requests can be sent over SDK-supported API or through REST API.

There are no specific parameters required for the SecurID authentication method.

These instructions show how to configure authentication methods for users.

For information about administrators, see "Managing Administrator Accounts" on page 110 .

For background information about the authentication methods, see "Configuring Authentication
Methods for Users" on the previous page.

Granting User Access Using RADIUS Server Groups


The Security Gateway lets you control access privileges for authenticated RADIUS users, based on
the administrator's assignment of users to RADIUS groups. These groups are used in the Security
Rule Base to restrict or give users access to specified resources. Users are unaware of the groups
to which they belong.

Security Management R80.40 Administration Guide      |      56


Managing User Accounts

Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that
provides security and scalability by separating the authentication function from the access server.

Using RADIUS, the Security Gateway forwards authentication requests by remote users to the
RADIUS server. For administrators, the Security Management Server forwards the authentication
requests. The RADIUS server, which stores user account information, does the authentication.

The RADIUS protocol uses UDP to communicate with the gateway or the Security Management
Server.

RADIUS servers and RADIUS server group objects are defined in SmartConsole.

To use RADIUS groups, you must define a return attribute in the RADIUS user profile of the
RADIUS server. This attribute is returned to the Security Gateway and contains the group name
(for example, RAD_<group to w hich the RADIUS users belong>) to which the users belong.

Use these RADIUS attributes (refer to RFC 2865):

n For SecurePlatform - attribute "Class" (25)

n For other operating systems, including Gaia, Windows, and IPSO-attribute "Vendor-Specific"
(26)

SecurID Authentication for Security Gateway


Sample workflow for SecurID authentication configuration:

SecurID requires users to both possess a token authenticator and to supply a PIN or password.
Token authenticators generate one-time passwords that are synchronized to an RSA
Authentication Manager (AM) and may come in the form of hardware or software. Hardware
tokens are key-ring or credit card-sized devices, while software tokens reside on the PC or device
from which the user wants to authenticate. All tokens generate a random, one-time use access
code that changes approximately every minute. When a user attempts to authenticate to a
protected resource, the one-time use code must be validated by the AM.

Using SecurID, the Security Gateway forwards authentication requests by remote users to the AM.
For administrators, it is the Security Management Server that forwards the requests. The AM
manages the database of RSA users and their assigned hard or soft tokens. The gateway or the
Security Management Server act as an AM agent and direct all access requests to the AM for
authentication. For additional information on agent configuration, refer to RSA Authentication
Manager documentation. There are no specific parameters required for the SecurID
authentication method. Authentication requests can be sent over SDK-supported API or through
REST API.

There are no specific parameters required for the SecurID authentication method.

Security Management R80.40 Administration Guide      |      57


Managing User Accounts

To configure a Security Gateway to use SecurID Authentication:

1. Configure Security Gateway to use SecurID authentication

a. In SmartConsole, go to the Gatew ays & Servers view.

b. Right-click a Security Gateway object and select Edit .

c. From the left tree, click Other > Legacy Authentication .

d. In the Enabled Authentication Schemes section, make sure SecurID is selected.

e. Click OK .

2. Configure the API to send authentication requests

You can select to enable one of two API types:

n SDK-supported API

A proprietary API that uses a proprietary communication protocol on UDP port


5500 through SDKs available for selected platforms.

To enable SecurID authentication over SDK-supported API

a. Generate the sdconf.rec file on an ACE/Server and copy it to your


computer.

For details, refer to RSA documentation.

Important - Use the IP address of a Security Gateway


interface that connects to the ACE/Server:
l For a single Security Gatew ay – Configure the
single IP address as the Authentication Agent.
l For a Cluster – Configure these IP addresses as
Authentication Agents: Physical IP address of each
Cluster Member and Cluster Virtual IP address.
l For a VSX Virtual System on single VSX
Gatew ay – Configure these IP addresses as
Authentication Agents: IP address of the VSX
Gateway and IP address of the Virtual System.
l For a VSX Virtual System on VSX Cluster –
Configure these IP addresses as Authentication
Agents: Cluster Virtual IP address of the VSX
Cluster and Cluster Virtual IP address of the Virtual
System.

Security Management R80.40 Administration Guide      |      58


Managing User Accounts

b. Open the SecurID object in SmartConsole, click Brow se and import the
sdconf.rec file into the SecurID object.

c. Install policy.

Note - During the policy installation, the sdconf.rec


file is transferred the Security Gateway to
/var/ace/sdconf.rec.

n REST API

To enable SecurID authentication over REST API

a. Connect to the command line on the Security Gateway.

b. Log in to the Expert mode.

c. On a VSX Gateway or VSX Cluster Member, go to the context of VSID 0:


vsenv 0

d. Back up the current $CPDIR/conf/RSARestServer.conf file:


cp -v $CPDIR/conf/RSARestServer.conf{,_BKP}

e. Edit the $CPDIR/conf/RSARestServer.conf file.

Fill in these fields:

l host - The configured host name of the RSA server.

l port, client key, and accessid - From the RSA SecurID


Authentication API window.

l certificate - The name of the certificate file.

f. Save the changes in the file and exit the editor.

Note - If you do not complete the REST API configuration, the


authentication is performed through the SDK-supported API.

3. Define user groups

a. In SmartConsole, open the Objects Bar (F11) .

b. Click New > More > User > User Group.

The New User Group window opens.

c. Enter the name of the group, for example SecurID_Users.

Make sure the group is empty.

d. Click OK .

e. Publish the SmartConsole session

Security Management R80.40 Administration Guide      |      59


Managing User Accounts

f. Install the policy.

4. Configure SecurID authentication settings for users

The procedure for doing this is different for Internal Users (that are defined in the
internal User Database on the Security Management Server) and for External Users.

To configure SecurID authentication settings for Internal Users

Internal users are users that are defined in the internal User Database on the Security
Management Server.

a. Create a new user. In SmartConsole, open the Objects Bar (F11) .

b. Click New > More > User > User .

The New User window opens.

c. Choose a template.

d. Click OK .

e. In the General page:

n Enter a default Name . This name will be used to authenticate users on by


the Authentication Manager.

n Set the Expiration date.

f. In the Authentication page, from the Authentication Method drop-down list,


select SecurID.

g. Click OK .

To configure SecurID authentication settings for External Users

External users are users that are not defined in the internal Users Database on the
Security Management Server.

a. In SmartConsole, click Manage & Settings > Blades.

b. In the Mobile Access section, click Configure in SmartDashboard.

Legacy SmartDashboard opens.

c. In the bottom left Network Objects pane, and click Users.

Security Management R80.40 Administration Guide      |      60


Managing User Accounts

d. Right-click on an empty space and select the applicable option:

n If you support only one external authentication scheme, select New >
External User Profile > Match all users.

n If you support more than one external authentication scheme, select New
> External User Profile > Match by domain .

e. Configure the External User Profile properties:

i. General Properties page:

n If selected Match all users, then configure:

l In the External User Profile name field, leave the default


name generic*.

l In the Expiration Date field, set the applicable date.

n If selected Match by domain , then configure:

l In the External User Profile name field, enter the applicable


name. This name will be used to authenticate users on the
Authentication Manager.

l In the Expiration Date field, set the applicable date.

l In the Domain Name matching definitions section,


configure the applicable settings.

ii. Authentication page:

From the Authentication Scheme drop-down list, select SecurID.

iii. Click OK .

f. From the top toolbar, click Update (or press the CTRL S keys).

g. Close the Legacy SmartDashboard.

5. Complete the SecurID authentication configuration

a. Make sure that connections between the gateway and the Authentication Manager
are not NATed in the Address Translation Rule Base.

On a Virtual System, follow the instructions in sk107281.

b. Save, verify, and install the policy in SmartConsole.

When a Security Gateway has multiple interfaces, the SecurID agent on the Security
Gateway sometimes uses the wrong interface IP to decrypt the reply from the
Authentication Manager, and authentication fails.

To overcome this problem, place a new text file, named sdopts.rec in the same
directory as sdconf.rec.

Security Management R80.40 Administration Guide      |      61


Managing User Accounts

The file should contain this line:

CLIENT_IP=<IP Address>

Where <IP Address> is the primary IP address of the Security Gateway, as defined on
the Authentication Manager. This is the IP address of the interface, to which the server is
routed.

Example:

CLIENT_IP=192.168.20.30

Note - On a VSX Gateway and VSX Cluster Members, you must create
the same sdopts.rec file in the context VSID 0 and in the context of
each applicable Virtual System.

Configuring-TACACS+-Authentication
To configure a Security Gateway to use TACACS+ authentication, you must set up the server and
enable its use on the Security Gateway.

To define a TACACS+ server

1. Define a TACACS Host object: Object Explorer > New > Host

2. Enter a name and IP address.

3. Define a TACACS server: Object Explorer > New > Server > More > TACACS.

4. Enter a name.

5. In Host , select the TACACS host.

6. Select the Type .

Best Practice : The default is TACACS, but TACACS+ is recommended.

7. In Service , select the TACACSplus service (or TACACS UDP service if you selected
TACACS type).

8. Enter a Secret key . (If you selected TACACS type, this is not available. If you selected
TACACS+, it is required.)

9. Click OK .

To enable TACACS on the Security Gateway

1. Right-click the gateway object and select Edit .

2. Click Other > Legacy Authentication .

3. In the Enabled Authentication Schemes section, click TACACS.

Security Management R80.40 Administration Guide      |      62


Managing User Accounts

4. Click OK .

To enable TACACS authentication for users

1. In the Object Explorer, click Users > User Templates.

2. Edit the Default user template.

3. In the Authentication page, Authentication method list, select TACACS.

4. When TACACS server shows, select the TACACS server you defined.

5. Click OK .

When you create a new user account, TACACS is the default selected authentication.

User Database
Users defined in SmartConsole are saved to the User Database on the Security Management
Server, together with the user authentication schemes and encryption keys. Then, the user
database is installed on Security Gateways and Check Point hosts:

n On Security Gateways - When the policy is installed (Install Policy )

n On Check Point hosts with an active Management blade (such as Log Server) - When the
database is installed (Install Database )

The user database does not contain information about users defined elsewhere than on the
Security Management Server (such as users in external User Directory groups), but it does contain
information about the external groups themselves (for example, on which Account Unit the
external group is defined). Changes to external groups take effect only after the policy is installed,
or the user database is downloaded from the management server.

Creating, Modifying, Removing User Accounts


To create a new user

1. In the Object Bar (F11)tree, click New > More > User > User .

The New User window opens.

2. Choose a template.

3. Click OK .

4. Configure required and optional settings in General Properties. (see "User > General
Properties" on the next page).

5. Select and configure Authentication (see "Configuring Authentication" on the next page).

Security Management R80.40 Administration Guide      |      63


Managing User Accounts

Important - If you do not select an authentication method, the user


cannot log in or use network resources.

6. In Location , select objects from which this user can access or send data and traffic. See
"User > Location" on the next page.

7. If the user has specified working days or hours, configure when the user can be
authenticated for access. See "User > Time" on the next page.

8. Click OK .

To change an existing user

1. In the object tree, click Users > Users.

2. Double-click a user.

The User Properties window opens.

3. Change the properties as necessary.

4. Click OK .

User > General Properties

Required settings:

n User Name - A unique, case sensitive character string.

If you generate a user certificate with a non-Check Point Certificate Authority, enter the
Common Name (CN) component of the Distinguished Name (DN). For example, if the DN is:
[CN = James, O = My Organization, C = My Country],
enter James as the user name. If you use Common Names as user names, they must
contain exactly one string with no spaces.

n Expiration Date - The date, after which the user is no longer authorized to access network
resources and applications. By default, the date defined in the Default Expiration Settings
shows as the expiration date. See "Configuring Default Expiration Settings for Users" on
page 66.

Optional settings:

n Comment

n Email Address

n Mobile Phone Number

Configuring Authentication

Select an Authentication Scheme :

Security Management R80.40 Administration Guide      |      64


Managing User Accounts

n SecurID

n Check Point Passw ord - Enter the password string (between 4 and 8 characters) and
confirm it

n OS Passw ord

n RADIUS - Select a RADIUS server or a group of servers

n TACACS - Select a TACACS server

User > Location

In the Allow ed locations section:

Source - Click Add, to add selected objects to this user's permitted resources. The user can get
data and traffic from these objects.

Destination - Click Add, to add selected objects to this user's permitted destinations. The user
can send data and traffic to these objects.

User > Time

From and To - Enter start time and end time of an expected workday. This user will not be
authenticated if a login attempt is made on a time outside the given range.

Days in w eek or Daily - Select the days that the user can authenticate and access resources.
This user will not be authenticated if a login attempt is made on an unselected day.

User > Certificates

Generate and register SIC certificates for user accounts. This authenticates the user in the Check
Point system. Use certificates with required authentication for added access control.

To create a new certificate

1. Open the User Properties window > Certificates page.

2. Click New .

3. Select key or p12file:

n Registration key for certificate enrollment - Select to send a registration key


that activates the certificate. When prompted, select the number of days the user
has to activate the certificate, before the registration key expires.

n Certificate file (p12) - Select to create a .p12certificate file with a private


password for the user. When prompted, enter and confirm the certificate
password.

4. Click OK .

Security Management R80.40 Administration Guide      |      65


Managing User Accounts

If a user will not be in the system for some time (for example, going on an extended leave), you
can revoke the certificate. This leaves the user account in the system, but it cannot be accessed
until you renew the certificate.

To revoke a certificate , select the certificate and click Revoke .

User > Encryption

If the user will access resources from a remote location, traffic between the remote user and
internal resources will be encrypted. Configure encryption settings for remote access users.

To configure encryption

1. Open the User Properties window > Encryption page.

2. Select an encryption method for the user.

3. Click Edit .

The encryption Properties window opens.

The next steps are for IKE Phase 2. The options can be different for different methods.

4. Open the Authentication tab.

5. Select the authentication schemes:

a. Passw ord - The user authenticates with a pre-shared secret password. Enter and
confirm the password.

b. Public Key - The user authenticates with a public key contained in a certificate file.

6. Click OK .

7. Click OK .

Configuring Default Expiration Settings for Users

If a user account is about to expire, notifications show when you open the properties of the user
in SmartConsole.

To configure the default expiration settings

1. From the Menu , select Global Properties.

The Global Properties window opens.

2. Click User Accounts.

3. Select Expire at or Expire after .

Security Management R80.40 Administration Guide      |      66


Managing User Accounts

n Expire at - Select the expiration date from the calendar control.

n Expire after - Enter the number of days (from the day the account is made) before
user accounts expire.

4. Select Show accounts expiration indication , and enter the number of days.

Expiration warnings in the SmartConsole User object show this number of days before an
account expires. During this time, if the user account is to be active for longer, you can
edit the user account expiration configuration. This will avoid loss of working time.

Delete a User

To delete a user:

1. In the object tree, click Users > Users.

2. Right-click the account and select Delete .

The confirmation window opens.

3. Click Yes.

Managing User Groups


User groups are collections of user accounts. Add the user group to the Source or Destination of a
rule. You cannot add individual users to a rule.

You can also edit user groups, and delete user groups that are not used in the Rule Base.

Adding User Groups

To create a new user group

1. In the Object Bar (F11), click New > More > User > User Group.

The New User Group window opens.

2. Enter a name for the new group.

3. For each user or a group of users, click the [+] sign and select the object from the list.

4. Configure the optional settings:

n Mailing List Address

n Comment

n Tag

n Color

5. Click OK .

Security Management R80.40 Administration Guide      |      67


Managing User Accounts

To add new users or other user groups to a group

1. In the Object Bar (F11), select Object Categories > User > User Groups

2. Right-click the User group and click Edit .

The User Group window opens.

3. Click +

4. Select users or user groups.

5. Click OK .

LDAP and User Directory


Check Point User Directory integrates LDAP, and other external user management technologies,
with the Check Point solution. If you have a large user count, we recommend that you use an
external user management database such as LDAP for enhanced Security Management Server
performance.

n Users can be managed externally by an LDAP server.

n The gateways can retrieve CRLs.

n The Security Management Server can use the LDAP data to authenticate users.

n User data from other applications gathered in the LDAP user database can be shared by
different applications.

You can choose to manage Domains on the Check Point users' database, or to implement an
external LDAP server.

Note - User Directory requires a special license. If you have the Mobile Access
Software Blade, you have the User Directory license.

User Directory lets you configure:

n High Availability, to duplicate user data across multiple servers for backup. See "LDAP and
User Directory" above.

n Multiple Account Units, for distributed databases.

n Define LDAP Account Units, for encrypted User Directory connections. See "LDAP and User
Directory" above.

n Profiles, to support multiple LDAP vendors. See "User Directory Profiles" on page 79.

User Directory and Identity Awareness


Identity Awareness uses User Directory.

Security Management R80.40 Administration Guide      |      68


Managing User Accounts

Identity Awareness lets you enforce network access and audit data, based on network location,
the identity of the user, and the identity of the computer. You can use Identity Awareness in the
Access Control, Threat Prevention and DLP Rule Bases.

User Directory Considerations


Before you begin, plan your use of User Directory.

n Decide whether you will use the User Directory servers for user management, CRL retrieval,
user authentication, or all of those. See "LDAP and User Directory" on the previous page.

n Decide how many Account Units you will need. You can have one for each User Directory
server, or you can divide branches of one User Directory server among different Account
Units. See "LDAP and User Directory" on the previous page.

n Decide whether you will use High Availability setup. See "LDAP and User Directory" on the
previous page.

n Determine the order of priority among the User Directory servers for High Availability and
querying purposes. See "LDAP and User Directory" on the previous page.

n Assign users to different Account Units, branches, and sub-branches, so that users with
common attributes (such as their role in the organization, permissions, etc.) are grouped
together. See "LDAP and User Directory" on the previous page.

The User Directory Schema


The User Directory default schema is a description of the structure of the data in a user directory.
It has user definitions defined for an LDAP server. This schema does not have Security
Management Server or Security Gateway specific data, such as IKE-related attributes,
authentication methods, or values for remote users.

You can use the default User Directory schema, if all users have the same authentication method
and are defined according to a default template. But if users in the database have different
definitions, it is better to apply a Check Point schema to the LDAP server. See "Check Point Schema
for LDAP" below .

Check Point Schema for LDAP


The Check Point Schema adds Security Management Server and Security Gateway specific data to
the structure in the LDAP server. Use the Check Point Schema to extend the definition of objects
with user authentication functionality.

For example, an Object Class entitled fw 1Person is part of the Check Point schema. This Object
Class has mandatory and optional attributes to add to the definition of the Person attribute.
Another example is fw 1Template .This is a standalone attribute that defines a template of user
information.

Security Management R80.40 Administration Guide      |      69


Managing User Accounts

Schema Check ing

When schema checking is enabled, User Directory requires that every Check Point object class
and its associated attributes is defined in the directory schema.

Before you work with User Directory, make sure that schema checking is disabled. Otherwise the
integration will fail. After the Check Point object classes and attributes are applied to the User
Directory server's schema, you must enable schema checking again.

OID Proprietary Attributes

Each of the proprietary object classes and attributes (all of which begin with "fw1") has a
proprietary Object Identifier (OID), listed below.

Object Class OIDs

object class OID

fw1template 1.3.114.7.4.2.0.1

fw1person 1.3.114.7.4.2.0.2

The OIDs for the proprietary attributes begin with the same prefix ("1.3.114.7.4.2.0.X"). Only the
value of "X" is different for each attribute. See Attributes for the value of "X" (see "User Directory
Schema Attributes" below ).

User Directory Schema Attributes

cn

The entry's name. This is also referred to as "Common Name". For users this can be different
from the uid attribute, the name used to login to the Security Gateway. This attribute is also
used to build the User Directory entry's distinguished name, that is, it is the RDN of the DN.

uid

The user's login name, that is, the name used to login to the Security Gateway. This attribute is
passed to the external authentication system in all authentication methods except for "Internal
Password", and must be defined for all these authentication methods.

The login name is used by the Security Management Server to search the User Directory server
(s). For this reason, each user entry should have its own unique uid value.

It is also possible to login to the Security Gateway using the full DN. The DN can be used when
there is an ambiguity with this attribute or in "Internal Password" when this attribute may be
missing. The DN can also be used when the same user (with the same uid) is defined in more
than one Account Unit on different User Directory servers.

Security Management R80.40 Administration Guide      |      70


Managing User Accounts

description

Descriptive text about the user.

default

"no value"

mail

User's email address.

default

"no value"

member

An entry can have zero or more values for this attribute.

n In a template: The DN of user entries using this template. DNs that are not users (object
classes that are not one of: "person", "organizationalPerson", "inetOrgPerson" or
"fw1person") are ignored.

n In a group: The DN of user.

userPassword

Must be given if the authentication method (fw1auth-method) is "Internal Password". The value
can be hashed using "crypt". In this case the syntax of this attribute is:

"{crypt}xxyyyyyyyyyyy"
where "xx" is the "salt" and "yyyyyyyyyyy" is the hashed password.

It is possible (but not recommended) to store the password without hashing. However, if
hashing is specified in the User Directory server, you should not specify hashing here, in order
to prevent the password from being hashed twice. You should also use SSL in this case, to
prevent sending an unencrypted password.

The Security Gateway never reads this attribute, though it does write it. Instead, the User
Directory bind operation is used to verify a password.

fw1authmethod

fw 1authmethod

One of these:

RADIUS, TACACS, SecurID, OS Password, Defender

Security Management R80.40 Administration Guide      |      71


Managing User Accounts

This default value for this attribute is overridden by Default authentication scheme in the
Authentication tab of the Account Unit window in SmartConsole. For example: a User
Directory server can contain User Directory entries that are all of the object-class "person"
even though the proprietary object-class "fw1person" was not added to the server's schema. If
Default authentication scheme in SmartConsole is "Internal Password", all the users will be
authenticated using the password stored in the "userPassword" attribute.

fw1authserver

"X" in OID fw1person fw1template default

1 y y "undefined"

The name of the server that will do the authentication. This field must be given if fw1auth-
method is "RADIUS" or "TACACS". For all other values of fw1auth-method, it is ignored. Its
meaning is given below:

method meaning

RADIUS name of a RADIUS server, a group of RADIUS servers, or "Any"

TACACS name of a TACACS server

"X" in OID fw1template

2 y

fw1pwdLastMod

fw 1pw dLastMod

The date on which the password was last modified. The format is yyyymmdd (for example, 20
August 1998 is 19980820). A password can be modified through the Security Gateway as a part
of the authentication process.

"X" in
fw1person fw1template default
OID

3 y y If no value is given, then the password has never


been modified.

fw1expiration-date

fw 1expiration-date

Security Management R80.40 Administration Guide      |      72


Managing User Accounts

The last date on which the user can login to a Security Gateway, or "no value" if there is no
expiration date. The format is yyyymmdd (for example, 20 August 1998 is 19980820). The
default is "no value".

"X" in OID fw1person fw1template default

8 y y "no value"

fw1hour-range-from

fw 1hour-range-from

The time from which the user can login to a Security Gateway. The format is hh:mm (for
example, 8:15 AM is 08:15).

"X" in OID fw1person fw1template default

9 y y "00:00"

fw1hour-range-to

fw 1hour-range-to

The time until which the user can login to a Security Gateway. The format is hh:mm (for
example, 8:15 AM is 08:15).

"X" in OID fw1person fw1template default

10 y y "23:59"

fw1day

fw 1day

The days on which the user can login to a Security Gateway. Can have the values "SUN","MON",
and so on.

"X" in OID fw1person fw1template default

11 y y all days of the week

fw1allowed-src

fw 1allow ed-src

The names of one or more network objects from which the user can run a client, or "Any" to
remove this limitation, or "no value" if there is no such client. The names should match the
name of network objects defined in Security Management server.

Security Management R80.40 Administration Guide      |      73


Managing User Accounts

"X" in OID fw1person fw1template default

12 y y "no value"

fw1allowed-dst

fw 1allow ed-dst

The names of one or more network objects which the user can access, or "Any" to remove this
limitation, or "no value" if there is no such network object. The names should match the name
of network objects defined on the Security Management server.

"X" in OID fw1person fw1template default

13 y y "no value"

fw1allowed-vlan

fw 1allow ed-vlan

Not currently used.

"X" in OID fw1person fw1template default

14 y y "no value"

fw1SR-k eym

fw 1SR-keym

The algorithm used to encrypt the session key in SecuRemote. Can be "CLEAR", "FWZ1", "DES"
or "Any".

"X" in OID fw1person fw1template default

15 y y "Any"

fw1SR-datam

fw 1SR-datam

The algorithm used to encrypt the data in SecuRemote. Can be "CLEAR", "FWZ1", "DES" or
"Any".

"X" in OID fw1person fw1template default

16 y y "Any"

Security Management R80.40 Administration Guide      |      74


Managing User Accounts

fw1SR-mdm

fw 1SR-mdm

The algorithm used to sign the data in SecuRemote. Can be "none" or "MD5".

"X" in OID fw1person fw1template default

17 y y "none"

fw1enc-fwz-expiration

fw 1enc-fw z-expiration

The number of minutes after which a SecuRemote user must re-authenticate himself or herself
to the Security Gateway.

"X" in OID fw1person fw1template

18 y y

fw1sr-auth-track

fw 1sr-auth-track

The exception to generate on successful authentication via SecuRemote. Can be "none",


"cryptlog" or "cryptalert".

"X" in OID fw1person fw1template default

19 y y "none"

fw1groupTemplate

fw 1groupTemplate

This flag is used to resolve a problem related to group membership.

The group membership of a user is stored in the group entries to which it belongs, in the user
entry itself, or in both entries. Therefore there is no clear indication in the user entry if
information from the template about group relationship should be used.

If this flag is "TRUE", then the user is taken to be a member of all the groups to which the
template is a member. This is in addition to all the groups in which the user is directly a
member.

"X" in OID fw1person fw1template default

20 y y "False"

Security Management R80.40 Administration Guide      |      75


Managing User Accounts

fw1ISAKMP-EncMethod

fw 1ISAKMP-EncMethod

The key encryption methods for SecuRemote users using IKE. This can be one or more of:
"DES", "3DES". A user using IKE (formerly known as ISAMP) may have both methods defined.

"X" in OID fw1person fw1template default

21 y y "DES", "3DES"

fw1ISAKMP-AuthMethods

fw 1ISAKMP-AuthMethods

The allowed authentication methods for SecuRemote users using IKE, (formerly known as
ISAMP). This can be one or more of: "preshared", "signatures".

"X" in OID fw1person fw1template default

22 y y "signatures"

fw1ISAKMP-HashMethods

fw 1ISAKMP-HashMethods

The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one or more of: "MD5", "SHA1". A user using IKE must have both methods defined.

"X" in OID fw1person fw1template default

23 y y "MD5", "SHA1"

fw1ISAKMP-Transform

fw 1ISAKMP-Transform

The IPSec Transform method for SecuRemote users using IKE, (formerly known as ISAMP). This
can be one of: "AH", "ESP".

"X" in OID fw1person fw1template default

24 y y "ESP"

fw1ISAKMP-DataIntegrityMethod

fw 1ISAKMP-DataIntegrityMethod

Security Management R80.40 Administration Guide      |      76


Managing User Accounts

The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one of: "MD5", "SHA1".

"X" in OID fw1person fw1template default

25 y y "SHA1"

fw1ISAKMP-SharedSecret

fw 1ISAKMP-SharedSecret

The pre-shared secret for SecuRemote users using IKE, (formerly known as ISAMP).

The value can be calculated using the fw ikecrypt command line.

"X" in OID fw1person fw1template

26 y y

fw1ISAKMP-DataEncMethod

fw 1ISAKMP-DataEncMethod

The data encryption method for SecuRemote users using IKE, (formerly known as ISAMP).

"X" in OID fw1person fw1template default

27 y y "DES"

fw1enc-Methods

fw 1enc-Methods

The encryption method allowed for SecuRemote users. This can be one or more of: "FWZ",
"ISAKMP" (meaning IKE).

"X" in OID fw1person fw1template default

28 y y "FWZ"

fw1userPwdPolicy

fw 1userPw dPolicy

Defines when and by whom the password should and can be changed.

"X" in OID fw1person

29 y

Security Management R80.40 Administration Guide      |      77


Managing User Accounts

fw1badPwdCount

fw 1badPw dCount

Number of allowed wrong passwords entered sequentially.

"X" in OID fw1person

30 y

fw1lastLoginFailure

fw 1lastLoginFailure

Time of the last login failure.

"X" in OID fw1person

31 4

memberof template

memberof template

DN of the template that the user is a member of.

"X" in OID fw1person

33 4

Netscape LDAP Schema

To add the propriety schema to your Netscape directory server, use the file schema.ldif in
the $FWDIR/lib/ldap directory.

Important - This deletes the object class definition from the schema and adds the updated
one in its place.

We recommend that you back up the User Directory server before you run the command.

The ldif file:

n Adds the new attributes to the schema

n Deletes old definitions of fw1person and fw1template

n Adds new definitions of fw1person and fw1template

To change the Netscape LDAP schema, run the ldapmodify command with the schema.ldif
file.

Security Management R80.40 Administration Guide      |      78


Managing User Accounts

On some server versions, the delete objectclass operation can return an error, even if
it was successful. Use ldapmodify with the -c (continuous) option.

User Directory Profiles

The User Directory profile is a configurable LDAP policy that lets you define more exact User
Directory requests and enhances communication with the server. Profiles control most of the
LDAP server-specific knowledge. You can manage diverse technical solutions, to integrate LDAP
servers from different vendors.

Use User Directory profiles to make sure that the user management attributes of a Security
Management Server are correct for its associated LDAP server. For example, if you have a
certified OPSEC User Directory server, apply the OPSEC_DS profile to get enhanced OPSEC-
specific attributes.

LDAP servers have difference object repositories, schemas, and object relations.

n The organization's user database may have unconventional object types and relations
because of a specific application.

n Some applications use the cn attribute in the User object's Relatively Distinguished
Name (RDN) while others use uid.

n In Microsoft Active Directory, the user attribute memberOf describes which group the
user belongs to, while standard LDAP methods define the member attribute in the group
object itself.

n Different servers implement different storage formats for passwords.

n Some servers are considered v3 but do not implement all v3 specifications. These servers
cannot extend the schema.

n Some LDAP servers already have built in support for certain user data, while others
require a Check Point schema extended attribute. For example, Microsoft Active Directory
has the accountExpiresuser attribute, but other servers require the Check Point
attribute fw1expirationdate, which is part of the Check Point defined fw1person
objectclass.

n Some servers allow queries with non-defined types, while others do not.

Default User Directory Profiles

These profiles are defined by default:

n OPSEC_DS - the default profile for a standard OPSEC certified User Directory.

n Netscape_DS - the profile for a Netscape Directory Server.

n Novell_DS - the profile for a Novell Directory Server.

n Microsoft_AD - the profile for Microsoft Active Directory.

Security Management R80.40 Administration Guide      |      79


Managing User Accounts

Modifying User Directory Profiles

Profiles have these major categories:

n Common - Profile settings for reading and writing to the User Directory.

n Read - Profile settings only for reading from the User Directory.

n Write - Profile settings only for writing to the User Directory.

Some of these categories list the same entry with different values, to let the server behave
according to type of operation. You can change certain parameters of the default profiles for
finer granularity and performance tuning.

To apply a profile

1. Open the Account Unit.

2. Select the profile.

To change a profile

1. Create a new profile.

2. Copy the settings of a User Directory profile into the new profile.

3. Change the values.

Fetch User Information Effectively

User Directory servers organize groups and members through different means and relations.
User Directory operations are performed by Check Point on users, groups of users, and user
templates where the template is defined as a group entry and users are its members. The mode
in which groups/templates and users are defined has a profound effect on the performance of
some of the Check Point functionality when fetching user information. There are three different
modes:

n Defining a "Member" attribute per member, or "Member" user-to-group membership mode.


In this case, each member of a specific group gets the 'Member" attribute, where the value
of this attribute is the DN of that member.

n Defining a "Memberof" attribute per group, or "MemberOf" user-to-group membership


mode. In this case, each group gets the "Memberof" attribute per group, where the value of
this attribute is the DN of a group entry. This is referred to as "MemberOf" user-to-group
membership mode.

n Defining a "Memberof" attribute per member and group, or "Both" user-to-group


membership mode. In this case both members and groups are given the "Memberof"
attribute.

The most effective mode is the "MemberOf" and "Both" modes where users' group membership
information is available on the user itself and no additional User Directory queries are necessary.

Security Management R80.40 Administration Guide      |      80


Managing User Accounts

Setting User-to-Group Membership Mode

Set the user-to-group membership mode in the profile objects for each User Directory server in
objects_5_0.C.

n To specify the user-to-group and template-to-group membership mode set the


GroupMembership attribute to one of the following values: Member, MemberOf, Both
accordingly.

n To specify the user-to-template membership mode set the TemplateMembership


attribute to one of the following values: Member, MemberOf accordingly.

After successfully converting the database, set the User Directory server profile in objects_5_
0.C to the proper membership setting and start the Security Management server. Make sure to
install policy/user database on all gateways to enable the new configuration.

Profile Attributes

UserLoginAttr

UserLoginAttr

The unique username User Directory attribute (uid). In addition, when fetching users by the
username, this attribute is used for query.

default Other

n uid (most servers) One value allowed


n SamAccountName (in
Microsoft_AD)

UserPasswordAttr

UserPassw ordAttr

This user password is User Directory attribute.

default Other

n userPassword (most One value allowed


servers)
n unicodePwd (in
Microsoft_AD)

TemplateObjectClass

TemplateObjectClass

Security Management R80.40 Administration Guide      |      81


Managing User Accounts

The object class for Check Point User Directory templates. If you change the default value with
another objectclass, make sure to extend that objectclass schema definition with relevant
attributes from fw1template.

default Other

fw1template Multiple values allowed

ExpirationDateAttr

ExpirationDateAttr

The account expiration date is User Directory attribute. This could be a Check Point extended
attribute or an existing attribute.

default Other

n fw1expiration-date (most One value allowed


servers)
n accountExpires (in
Microsoft_AD)

ExpirationDateFormat

ExpirationDateFormat

Expiration date format. This format will be applied to the value defined at
ExpirationDateAttr.

default Other

CP format is yyyymmdd One value allowed

PsswdDateFormat

Pssw dDateFormat

The format of the password modified date is User Directory attribute. This formation will be
applied to the value defined at PsswdDateAttr.

Security Management R80.40 Administration Guide      |      82


Managing User Accounts

default Other

n CP (most servers) format is One value allowed


yyyymmdd
n MS (in Microsoft_AD)

PsswdDateAttr

Pssw dDateAttr

The password last modified date is User Directory attribute.

default Other

n fw1pwdLastMod (most One value allowed


servers)
n pwdLastSet (in
Microsoft_AD)

BadPwdCountAttr

BadPw dCountAttr

User Directory attribute to store and read bad password authentication count.

default Other

fw1BadPwdCount One value allowed

ClientSideCrypt

ClientSideCrypt

If 0, the sent password will not be encrypted. If 1, the sent password will be encrypted with the
algorithm specified in the DefaultCryptAlgorithm.

default Other

n 0 for most servers One value allowed


n 1 for Netscape_DS

if not using encrypted password, SSL is recommended

DefaultCryptAlgorith

DefaultCryptAlgorith

Security Management R80.40 Administration Guide      |      83


Managing User Accounts

The algorithm used to encrypt a password before updating the User Directory server with a
new password.

default Other

n Plain (for most One value allowed


servers)
n Crypt (for
Netscape_DS)
n SHAI1

CryptedPasswordPrefix

CryptedPassw ordPrefix

The text to prefix to the encrypted password when updating the User Directory server with a
modified password.

default Other

{Crypt} (for Netscape_DS) One value allowed

PhoneNumberAttr

PhoneNumberAttr

User Directory attribute to store and read the user phone number.

default Other

internationalisednumber One value allowed

AttributesTranslationMap

AttributesTranslationMap

General purpose attribute translation map, to resolve problems related to peculiarities of


different server types. For example, an X.500 server does not allow the "-" character in an
attribute name. To enable the Check Point attributes containing "-", specify a translation entry:
(e.g., "fw1-expiration =fw1expiration").

default Other

none Multiple values allowed

ListOfAttrsToAvoid

ListOfAttrsToAvoid

Security Management R80.40 Administration Guide      |      84


Managing User Accounts

All attribute names listed here will be removed from the default list of attributes included in
read/write operations. This is most useful in cases where these attributes are not supported by
the User Directory server schema, which might fail the entire operation. This is especially
relevant when the User Directory server schema is not extended with the Check Point schema
extension.

Default Other

There are no values by default. In case the User Directory server was not Multiple
extended by the Check Point schema, the best thing to do is to list here all the values
new Check Point schema attributes. allowed

BranchObjectClass

BranchObjectClass

Use this attribute to define which type of objects (objectclass) is queried when the object tree
branches are displayed after the Account Unit is opened in SmartConsole.

Default Other

n Organization OrganizationalUnit Domain (most Multiple values allowed


servers)
n Container (extra for Microsoft_AD)

BranchOCOperator

BranchOCOperator

If One is set, an ORed query will be sent and every object that matches the criteria will be
displayed as a branch. If All, an ANDed query will be sent and only objects of all types will be
displayed.

Default Other

One One value allowed

OrganizationObjectClass

OrganizationObjectClass

This attribute defines what objects should be displayed with an organization object icon. A
new object type specified here should also be in BranchObjectClass.

Default Other

organization Multiple values allowed

Security Management R80.40 Administration Guide      |      85


Managing User Accounts

OrgUnitObjectClass

OrgUnitObjectClass

This attribute defines what objects should be displayed with an organization object icon. A
new object type specified here should also be in BranchObjectClass.

Default Other

n organizationalUnit (most Multiple values allowed


servers)
n Contained (added to
Microsoft_AD)

DomainObjectClass

DomainObjectClass

This attribute defines what objects should be displayed with a Domain object icon. A new
object type specified here should also be in BranchObjectClass.

Default Other

Domain Multiple values allowed

UserObjectClass

UserObjectClass

This attribute defines what objects should be read as user objects. The user icon will be
displayed on the tree for object types specified here.

Default Other

n User (in Microsoft_ Multiple values allowed


AD)
n Person

OrganizationalPerson
InertOrgPerson
FW1 Person (most servers)

UserOCOperator

UserOCOperator

If 'one' is set, an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' and ANDed query will be sent and only objects of all types will be
displayed.

Security Management R80.40 Administration Guide      |      86


Managing User Accounts

Default Other

One One value allowed

GroupObjectClass

GroupObjectClass

This attribute defines what objects should be read as groups. The group icon will be displayed
on the tree for objects of types specified here.

Default Other

Groupofnames Multiple values allowed


Groupofuniquenames (most servers)
Group
Groupofnames (in Microsoft_AD)

GroupOCOperator

GroupOCOperator

If 'one' is set an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' an ANDed query will be sent and only objects of all types will be
displayed.
GroupMembership

Default Other

One One value allowed

Defines the relationship Mode between the group and its members (user or template objects)
when reading group membership.

Default Other

n Member mode defines the member DN in the Group object (most One value
servers) allowed
n MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
n Modes define member DN in Group object and group DN in
Member object.

UserMembershipAttr

UserMembershipAttr

Security Management R80.40 Administration Guide      |      87


Managing User Accounts

Defines what User Directory attribute to use when reading group membership from the user or
template object if GroupMembership mode is 'MemberOf' or 'Both' you may be required to
extend the user/template object schema in order to use this attribute.

Default Other

MemberOf One value allowed

TemplateMembership

TemplateMembership

Defines the user to template membership mode when reading user template membership
information.

Default Other

n Member mode defines the member DN in the Group object (most One value
servers) allowed
n MemberOf mode defines the group DN in the member object (in
Microsoft_AD)

TemplateMembershipAttr

TemplateMembershipAttr

Defines which attribute to use when reading the User members from the template object, as
User DNs, if the TemplateMembership mode is Member.

Default Other

member Multiple values allowed

UserTemplateMembershipAttr

UserTemplateMembershipAttr

Defines which attribute to use when reading from the User object the template DN associated
with the user, if the TemplateMembership mode is MemberOf.

Default Other

member Multiple values allowed

OrganizationRDN

OrganizationRDN

Security Management R80.40 Administration Guide      |      88


Managing User Accounts

This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when
you create a new organizational unit in SmartConsole.

Default Other

o One value allowed

OrgUnitRDN

OrgUnitRDN

This value is used as the attribute name in the Relatively Distinguished Name (RDN) when you
create a new organizational Unit in SmartConsole.

Default Other

ou One value allowed

UserRDN

UserRDN

This value is used as the attribute name in the Relatively Distinguished Name (RDN), when you
create a new User object in SmartConsole.

Default Other

cn One value allowed

GroupRDN

GroupRDN

This value is used as the attribute name for the RDN, when you create a new Group object in
SmartConsole.

Default Other

cn One value allowed

DomainRDN

DomainRDN

This value is used as the attribute name for the RDN, when you create a new Domain object in
SmartConsole.

Security Management R80.40 Administration Guide      |      89


Managing User Accounts

Default Other

dc One value allowed

AutomaticAttrs

AutomaticAttrs

This field is relevant when you create objects in SmartConsole. The format of this field is
Objectclass:name:valuemeaning that if the object created is of type ObjectClass then
additional attributes will be included in the created object with name 'name' and value
'value'.

Default Other

user:userAccountControl:66048 Multiple
For Microsoft_AD This means that when a user object is created an extra values
attribute is included automatically: userAccountControl with the value 66048 allowed

GroupObjectClass

GroupObjectClass

This field is used when you modify a group in SmartConsole. The format of this field is
ObjectClass:memberattr meaning that for each group objectclass there is a group
membership attribute mapping. List here all the possible mappings for this User Directory
server profile. When a group is modified, based on the group's objectclass the right group
membership mapping is used.

Default Other

groupOfNames:member Multiple values allowed


groupOfUniqueNames:uniqueMember
(All other servers)

OrgUnitObjectClass

OrgUnitObjectClass

This determines which ObjectClass to use when creating/modifying an OrganizationalUnit


object. These values can be different from the read counterpart.

Default Other

OrganizationalUnit Multiple values allowed

Security Management R80.40 Administration Guide      |      90


Managing User Accounts

OrganizationObjectClass

OrganizationObjectClass

This determines which ObjectClass to use when creating and/or modifying an Organization
object. These values can be different from the read counterpart.

Default Other

Organization Multiple values allowed

UserObjectClass

UserObjectClass

This determines which ObjectClass to use when creating and/or modifying a user object. These
values can be different from the read counterpart.

Default Other

User (in Microsoft_AD) Multiple values allowed


person
organizationalPerson
inetOrgPerson
fw1Person
(All other servers)

DomainObjectClass

DomainObjectClass

Determines which ObjectClass to use when creating and/or modifying a domain context object.
These values can be different from the read counterpart.

Default Other

Domain Multiple values allowed

Microsoft Active Directory

The Microsoft Windows 2000 advanced server (or later) includes a sophisticated User Directory
server that can be adjusted to work as a user database for the Security Management server.

By default, the Active Directory services are disabled. In order to enable the directory services:

n run the dcpromo command from the Start > Run menu, or

n run the Active Directory setup wizard using the System Configuration window.

The Active Directory has the following structure:

Security Management R80.40 Administration Guide      |      91


Managing User Accounts

DC=qa, DC=checkpoint,DC=com
CN=Configuration,DCROOT
CN=Schema,CN=Configuration,DCROOT
CN=System,DCROOT
CN=Users,DCROOT
CN=Builtin,DCROOT
CN=Computers,DCOOT
OU=Domain Controllers,DCROOT
...

Most of the user objects and group objects created by Windows 2000 tools are stored under the
CN=Users, DCROOT branch, others under CN=Builtin, DCROOT branch, but these objects can
be created under other branches as well.

The branch CN=Schema, CN=Configuration, DCROOT contains all schema definitions.

Check Point can take advantage of an existing Active Directory object as well as add new types. For
users, the existing user can be used "as is" or be extended with fw1person as an auxiliary of
"User" for full feature granularity. The existing Active Directory "Group" type is supported "as is".
A User Directory template can be created by adding the fw1template objectclass. This information
is downloaded to the directory using the schema_microsoft_ad.ldif file (see "Adding New
Attributes to the Active Directory" on page 94).

Performance

The number of queries performed on the directory server is significantly low with Active
Directory. This is achieved by having a different object relations model. The Active Directory
group-related information is stored inside the user object. Therefore, when fetching the user
object no additional query is necessary to assign the user with the group. The same is true for
users and templates.

Manageability

SmartConsole allows the creation and management of existing and new objects. However, some
specific Active Directory fields are not enabled in SmartConsole.

Enforcement

It is possible to work with the existing Active Directory objects without extending the schema. This
is made possible by defining an Internal Template object and assigning it with the User Directory
Account Unit defined on the Active Directory server.

For example, if you wish to enable all users with IKE+Hybrid based on the Active Directory
passwords, create a new template with the IKE properties enabled and "Check Point password" as
the authentication method.

Security Management R80.40 Administration Guide      |      92


Managing User Accounts

Updating the Registry Settings

To modify the Active Directory schema, add a new registry DWORD key named Schema Update
Allowed with the value different from zero under
HKLM\System\CurrentControlSet\Services\NTDS\Parameters.

Delegating Control

Delegating control over the directory to a specific user or group is important since by default the
Administrator is not allowed to modify the schema or even manage directory objects through User
Directory protocol.

To delegate control over the directory

1. Display the Users and Computers Control console.

2. Right-click on the domain name displayed in the left pane and choose Delegate control
from the right-click menu.

The Delegation of Control wizard window is displayed.

3. Add an Administrator or another user from the System Administrators group to the list of
users who can control the directory.

4. Reboot the machine.

Extending the Active Directory Schema

Modify the file with the Active Directory schema, to use SmartConsole to configure the Active
Directory users.

To extend the Active Directory schema

1. From the Security Gateway, go to the directory of the schema file: $FWDIR/lib/ldap.

2. Copy schmea_microsoft_ad.ldif to the C:\ drive in the Active Directory server.

3. From Active Directory server, with a text editor open the schema file.

4. Find the value DOMAINNAME, and replace it with the name of your domain in LDIF format.

For example, the domain sample.checkpoint.com in LDIF format is:


DC=sample,DC=checkpoint,DC=com

5. Make sure that there is a dash character - at the end of the modifysection.

This is an example of the modify section.

Security Management R80.40 Administration Guide      |      93


Managing User Accounts

dn: CN=User,CN-
Schema,CN=Configuration,DC=sample,DC=checkpoint,DC=com
changetype: modify
add: auxiliaryClass
auxiliaryClass: 1.3.114.7.3.2.0.2
-

6. Run ldifde -i -f c:/schema_microsoft_ad.ldif

Adding New Attributes to the Active Directory

Below is the example in LDAP Data Interchange (LDIF) format that adds one attribute to the
Microsoft Active Directory:

dn:CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
changetype: add
adminDisplayName: fw1auth-method
attributeID: 1.3.114.7.4.2.0.1
attributeSyntax: 2.5.5.4
cn: fw1auth-method
distinguishedName:
CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
instanceType: 4
isSingleValued: FALSE
LDAPDisplayName: fw1auth-method
name: fw1auth-method
objectCategory:
CN=Attribute-Schema,CN=ConfigurationCN=Schema,CN=Configuration,DCROOT
ObjectClass: attributeSchema
oMSyntax: 20
rangeLower: 1
rangeUpper: 256
showInAdvancedViewOnly: TRUE

All Check Point attributes can be added in the same way.

The definitions of all attributes in LDIF format are contained in the schema_microsoft_
ad.ldif file located in the $FWDIR/lib/ldap directory.

Before attempting to run the ldapmodify command, edit schema_microsoft_ad.ldif and


replace all instances of DCROOT with the domain root of your organization. For example if your
domain is support.checkpoint.com, replace DCROOT with
dc=support,dc=checkpoint,dc=com.

After modifying the file, run the ldapmodify command to load the file into the directory. For
example if you use the Administrator account of the dc=support,dc=checkpoint,dc=com
domain the command syntax will be as follows:

Note - A shell script is available for UNIX gateways. The script is at:
$FWDIR/lib/ldap/update_schema_microsoft_ad

Security Management R80.40 Administration Guide      |      94


Managing User Accounts

ldapmodify -c -h support.checkpoint.com -D
cn=administrator,cn=users,dc=support,dc=checkpoint,dc=com" -w SeCrEt -
f $FWDIR/lib/ldap/schema_microsoft_ad.ldif

Retrieving Information from a User Directory Server


When a gateway requires user information for authentication, it goes through this process:

1. The gateway searches for the user in the internal users database.

2. If the specified user is not defined in the internal users database, the gateway queries the
LDAP server defined in the Account Unit with the highest priority.

3. If the query against an LDAP server with the highest priority fails (for example, the
connection is lost), the gateway queries the server with the next highest priority.

If there is more than one Account Unit, the Account Units are queried concurrently. The
results of the query are taken from the first Account Unit to meet the conditions, or from all
the Account Units which meet the conditions.

4. If the query against all LDAP servers fails, the gateway matches the user against the generic
external user profile..

Running User Directory Queries

Use queries to get User Directory user or group data. For best performance, query Account Units
when there are open connections. Some connections are kept open by the gateways, to make sure
the user belongs to a group that is permitted to do a specified operation.

To query User Directory

1. In SmartConsole, go to Manage & Settings > Blades.

2. Click Configure in SmartDashboard.

SmartDashboard opens.

3. In the Objects Tree , click Users.

4. Double-click the Account Unit to open a connection to the LDAP server.

5. Right-click the Account Unit and select Query Users/Group.

The LDAP Query Search window opens.

Click Advanced to select specified objects types, such as Users, groups, or templates.

6. Define the query.

7. To add more conditions, select or enter the values and click Add.

Query conditions:

Security Management R80.40 Administration Guide      |      95


Managing User Accounts

n Attributes - Select a user attribute from the drop-down list, or enter an attribute.

n Operators - Select an operator from the drop-down list.

n Value - Enter a value to compare to the entry's attribute. Use the same type and format
as the actual user attribute. For example, if Attribute is fw1expiration-date, then Value
must be in the yyyymmdd syntax.

n Free Form - Enter your own query expression. See RFC 1558 for information about the
syntax of User Directory (LDAP) query expressions.

n Add - Appends the condition to the query (in the text box to the right of Search
Method).

Example of a Query

If you create a query where:

n Attributes=mail

n Contains

n Value =Andy

The server queries the User Directory with this filter:

filter:(&(|(objectclass=fw1person)(objectclass=person)
(objectclass=organizationalPerson)(objectclass=inetOrgPerson))
(|(cn=Brad)(mail=*Andy*)))

Querying Multiple LDAP Servers

The Security Management server and the gateways can work with multiple LDAP servers
concurrently. For example, if a gateway needs to find user information, and it does not know
where the specified user is defined, it queries all the LDAP servers in the system. (Sometimes a
gateway can find the location of a user by looking at the user DN, when working with certificates.)

User Directory
Deploying User Directory
User Directory integrates the Security Management Server and an LDAP server and lets the
Security Gateways use the LDAP information.

Security Management R80.40 Administration Guide      |      96


Managing User Accounts

Item Description

1 Security Gateway - Retrieves LDAP user information and CRLs

2 Internet

3 Security Gateway - Queries LDAP user information, retrieves CRLs, and does bind
operations for authentication

4 Security Management Server - Uses User Directory to manage user information

5 LDAP server - Server that holds one or more Account Units

Enabling User Directory


In SmartConsole, enable the Security Management Server to manage users in the Account Unit.
See "User Directory" on the previous page.

Note - You cannot use the SmartConsole User Database when the User
Directory LDAP server is enabled.

To enable User Directory on the Security Management Server

1. From the Menu, select Global Properties > User Directory .

The User Directory page opens.

2. Select Use User Directory for Security Gatew ays.

3. Configure login and password settings.

4. Click OK .

5. In the Gatew ays & Servers view (Ctrl+1), open the Security Management Server object

Security Management R80.40 Administration Guide      |      97


Managing User Accounts

for editing

6. On General Properties page, Management tab, select Netw ork Policy Management
and User Directory .

7. Click OK .

8. Install the policy.

Account Units
An Account Unit represents branches of user information on one or more LDAP servers. The
Account Unit is the interface between the LDAP servers and the Security Management Server and
Security Gateways.

You can have a number of Account Units representing one or more LDAP servers. Users are
divided among the branches of one Account Unit, or between different Account Units.

Note - When you enable the Identity Awareness and Mobile Access Software
Blade , SmartConsole opens a First Time Configuration Wizard. The Active
Directory Integration window of this wizard lets you create a new AD Account
Unit. After you complete the wizard, SmartConsole creates the AD object and
Account Unit.

Working with LDAP Account Units


Use the LDAP Account Unit Properties window in SmartConsole to create a new or to edit an
existing Account Unit or to create a new one manually.

To create or edit an existing LDAP Account Unit:

1. n Create : In the Objects tab, click New > More > Server > LDAP Account unit .

n Edit : In SmartConsole, open the Object Explorer (press the CTRL+E keys) > Servers >
LDAP Account Units > Right-click the LDAP Account Unit and select Edit .

The LDAP Account Unit Properties window opens.

2. Edit the settings in these tabs:

n General

Configure how the Security Management Server uses the Account Unit

These are the configuration fields in the General tab:

l Name - Name for the Account Unit

l Comment - Optional comment

Security Management R80.40 Administration Guide      |      98


Managing User Accounts

l Color - Optional color associated with the Account Unit

l Profile - LDAP vendor

l Domain - Domain of the Active Directory servers, when the same user name
is used in multiple Account Units (this value is also necessary for AD Query
and SSO)

l Prefix - Prefix for non-Active Directory servers, when the same user name is
used in multiple Account Units

l Account Unit usage - Select applicable options:


o CRL retrieval - The Security Management Server manages how the CA
sends information about revoked licenses to the Security Gateways

o User Management - The Security Management Server uses the user


information from this LDAP server (User Directory must be enabled on
the Security Management Server).

Note - LDAP SSO (Single Sign On) is only supported


for Account Unit objects that use User
Management .
o Active Directory Query - This Active Directory server is used as an
Identity Awareness source.

Note - This option is only available if the Profile is


set to Microsoft_AD.

l Enable Unicode support - Encoding for LDAP user information in non-


English languages

l Active Directory SSO configuration - Click to configure Kerberos SSO for


Active Directory - Domain Name , Account Name , Passw ord, and Ticket
encryption method

Security Management R80.40 Administration Guide      |      99


Managing User Accounts

n Servers

Manage LDAP servers that are used by this Account Unit. You can add, edit, or
delete LDAP server objects.

To configure an LDAP server for the Account Unit

a. To add a new server, click Add. To edit an existing one, select it from the table
and click Edit .

The LDAP Server Properties window opens.

b. From the Host drop-down menu, select the server object.

If necessary, create a new SmartConsole server object:

i. Click New .

ii. In the New Host window opens, enter the settings for the LDAP server.

iii. Click OK .

c. Enter the login credentials and the Default priority .

d. Select access permissions for the Check Point Gateways:

l Read data from this server

l Write data to this server

e. In the Encryption tab, configure the optional SSL encryption settings. To


learn about these settings, see the Help. Click ? or press F1 in the Encryption
tab.

f. Click OK .

To remove an LDAP server from the Account Unit:

a. Select a server from the table.

b. Click Remove .

If all the configured servers use the same login credentials, you can modify those
simultaneously.

To configure the login credentials for all the servers simultaneously:

a. Click Update Account Credentials.

The Update Account to All Servers window opens.

b. Enter the login credentials.

c. Click OK .

Security Management R80.40 Administration Guide      |      100


Managing User Accounts

n Objects Management

Configure the LDAP server for the Security Management Server to query and the
branches to use

Note - Make sure there is LDAP connectivity between the


Security Management Server and the LDAP Server that holds the
management directory.

To configure LDAP query parameters:

a. From the Manage objects on drop-down menu, select the LDAP server
object.

b. Click Fetch branches.

The Security Management Server queries and shows the LDAP branches.

c. Configure Branches in use :

l To add a branch, click Add and in the LDAP Branch Definition window
that opens, enter a new Branch Path

l To edit a branch, click Edit and in the LDAP Branch Definition window
that opens, modify the Branch Path

l To delete a branch, select it and click Delete

d. Select Prompt for passw ord w hen opening this Account Unit , if
necessary (optional).

e. Configure the number of Return entries that are stored in the LDAP
database (the default is 500).

Security Management R80.40 Administration Guide      |      101


Managing User Accounts

n Authentication

Configure the authentication scheme for the Account Unit. These are the
configuration fields in the Authentication tab:

l Use common group path for queries - Select to use one path for all the
LDAP group objects (only one query is necessary for the group objects)

l Allow ed authentication schemes - Select one or more authentication


schemes allowed to authenticate users in this Account Unit - Check Point
Passw ord, SecurID, RADIUS, OS Passw ord, or TACACS

l Users' default values - The default settings for new LDAP users:

o User template - Template that you created


o Default authentication scheme - one of the authentication schemes
selected in the Allow ed authentication schemes section

l Limit login failures (optional):


o Lock user's account after - Number of login failures, after which the
account gets locked

o Unlock user's account after - Number of seconds, after which the


locked account becomes unlocked

l IKE pre-shared secret encryption key - Pre-shared secret key for IKE users
in this Account Unit

3. Click OK .

4. Install the Access Control Policy.

Configuring LDAP query parameters

1. From the Manage objects on drop-down menu, select the LDAP server object.

2. Click Fetch branches.

The Security Management Server queries and shows the LDAP branches.

3. Configure Branches in use :

n To add a branch, click Add and in the LDAP Branch Definition window that opens,
enter a new Branch Path

n To edit a branch, click Edit and in the LDAP Branch Definition window that opens,
modify the Branch Path

n To delete a branch, select it and click Delete

4. Select Prompt for passw ord w hen opening this Account Unit , if necessary (optional).

Security Management R80.40 Administration Guide      |      102


Managing User Accounts

5. Configure the number of Return entries that are stored in the LDAP database (the default
is 500).

Modifying the LDAP Server

1. On the LDAP Account Unit Properties > Servers tab, double-click a server.

The LDAP Server Properties window opens.

2. On the General tab, you can change:

n Port of the LDAP server

n Login DN

n Password

n Priority of the LDAP server, if there are multiple servers

n Security Gateway permissions on the LDAP server

3. On the Encryption tab, you can change the encryption settings between Security
Management Server / Security Gateways and LDAP server.

If the connections are encrypted, enter the encryption port and strength settings.

Note - User Directory connections can be authenticated by client


certificates from a Certificate Authority (CA). To use certificates, the LDAP
server must be configured with SSL strong authentication. See
"Authenticating with Certificates" on the next page.

Account Units and High Availability


With User Directory replications for High Availability, one Account Unit represents all the
replicated User Directory servers. For example, two User Directory server replications can be
defined on one Account Unit, and two Security Gateways can use the same Account unit.

Security Management R80.40 Administration Guide      |      103


Managing User Accounts

Item Description

1 Security Management Server . Manages user data in User Directory. It has an


Account Unit object, where the two servers are defined.

2 User Directory server replication.

3 Security Gatew ay . Queries user data and retrieves CRLs from nearest User Directory
server replication (2).

4 Internet

5 Security Gatew ay . Queries user data and retrieves CRLs from nearest User Directory
server replication (6).

6 User Directory server replication.

Setting High Availability Priority

With multiple replications, define the priority of each LDAP server in the Account Unit. Then you
can define a server list on the Security Gateways.

Select one LDAP server for the Security Management Server to connect to. The Security
Management Server can work with one LDAP server replication. All other replications must be
synchronized for standby.

To set priority on the Account Unit

1. Open the LDAP Account Unit Properties window.

2. Open the Servers tab.

3. Add the LDAP servers of this Account Unit in the order of the priority that you want.

Authenticating with Certificates

The Security Management Server and Security Gateways can use certificates to secure
communication with LDAP servers. If you do not configure certificates, the management server,
Security Gateways, and LDAP servers communicate without authentication.

To configure User Directory to use certificates

1. On each Account Unit, to which you want to authenticate with a certificate, set the ldap_
use_cert_auth attribute to true:

a. Connect with GuiDBedit Tool (see sk13009) to Security Management Server.

b. In the left pane, browse to Table > Managed Objects > servers.

Security Management R80.40 Administration Guide      |      104


Managing User Accounts

c. In the right pane, select the Account Unit object.

d. In the bottom pane, search for the ldap_use_cert_auth attribute, and set it to
true .

e. Save the changes and close GuiDBedit.

2. Log in to SmartConsole.

3. Add a CA object:

a. From the Objects Bar (F11), click New > More > Server > More > Trusted CA .

The Certificate Authority Properties window opens.

b. In Certificate Authority Type, select External Check Point CA .

c. Set the other options of the CA.

4. For all necessary network objects (such as Security Management Server, Security
Gateway, Policy Server) that require certificate-based User Directory connections:

a. On the IPSec VPN page of the network object properties, click Add in the
Repository of Certificates Available list.

Note - A management-only server does not have an IPSec VPN


page. The User Directory on a management-only server cannot
be configured to authenticate to an LDAP server using
certificates.

b. In the Certificate Properties window, select the defined CA.

5. Test connectivity between the Security Management Server and the LDAP Server. See
"Account Units" on page 98.

Managing Users on a User Directory Server


Managing Users on a User Directory Server

In SmartConsole, users and user groups in the Account Unit show in the same tree structure as
on the LDAP server.

n To see User Directory users, open Users and Administrators. The LDAP Groups folder
holds the structure and accounts of the server.

n You can change the User Directory templates. Users associated with this template get the
changes immediately. If you change user definitions manually in SmartConsole, the changes
are immediate on the server.

Distributing Users in Multiple Servers


The users of an organization can be distributed across several LDAP servers. Each LDAP server
must be represented by a separate Account Unit.

Security Management R80.40 Administration Guide      |      105


Managing User Accounts

Managing LDAP Information


User Directory lets you use SmartDashboard to manage information about users and OUs
(Organizational Units) that are stored on the LDAP server.

To manage LDAP information from SmartDashboard

1. In SmartConsole, go to Manage & Settings > Blades.

2. Click Configure in SmartDashboard.

SmartDashboard opens.

3. From the object tree, select Servers and OPSEC.

4. Double-click the Account Unit.

The LDAP domain is shown.

5. Double-click the LDAP branch.

The Security Management Server queries the LDAP server and SmartDashboard shows
the LDAP objects.

6. Expand the Objects List pane.

7. Double-click the LDAP object.

The Objects List pane shows the user information.

8. Right-click a user and select Edit .

The LDAP User Properties window opens.

9. Edit the user information and settings. Click OK .

Security Management R80.40 Administration Guide      |      106


Managing User Accounts

LDAP Groups for the User Directory


Create LDAP groups for the User Directory. These groups classify users according to type and can
be used in Policy rules. You can add users to groups, or you can create dynamic filters.

To create LDAP groups for User Directory

1. In SmartConsole, open Object Categories > New > More > Users > LDAP group.

2. In the New LDAP Group window that opens, select the Account Unit for the User
Directory group.

3. Define Group's Scope - select one of these:

n All Account-Unit's Users - All users in the group

n Only Sub Tree - Users in the specified branch

n Only Group in branch - Users in the branch with the specified DN prefix

4. Apply an advanced LDAP filter:

a. Click Apply filter for dynamic group.

b. Enter the filter criteria.

5. Click OK .

Examples

n If the User objects for managers in your organization have the object class
"myOrgManager", define the Managers group with the filter:
objectclass=myOrgManagers

n If users in your organization have an e-mail address ending with us.org.com, you can
define the US group with the filter:mail=*us.org.com

Access Roles
Access role objects let you configure network access according to:

n Networks

n Users and user groups

n Computers and computer groups

n Remote access clients (supported for Security GatewaysR80.10 and higher)

After you activate the Identity Awareness Software Blade, you can create access role objects and
use them in the Source and Destination columns of Access Control Policy rules.

Security Management R80.40 Administration Guide      |      107


Managing User Accounts

Adding Access Roles


Important - Before you add Active Directory users, machines, or groups to an
access role, make sure there is LDAP connectivity between the Security
Management Server and the AD Server that holds the management directory.
The management directory is defined on the Objects Management tab in the
Properties window of the LDAP Account Unit .
To create an access role

1. In the object tree, click New > More > Users > Access Role .

The New Access Role window opens.

2. Enter a Name for the access role.

3. Enter a Comment (optional).

4. Select a Color for the object (optional).

5. In the Netw orks pane, select one of these:

n Any netw ork

n Specific netw orks - For each network, click and select the network from the list

6. In the Users pane, select one of these:

n Any user

n All identified users - includes any user identified by a supported authentication


method (internal users, Active Directory users, or LDAP users).

n Specific users/groups - For each user or user group, click and select the user or
the group from the list

7. In the Machines pane, select one of these:

n Any machine

n All identified machines - includes machines identified by a supported


authentication method (Active Directory).

n Specific machines - For each machine, click and select the machine from the
list

8. In the Remote Access Clients pane, select the clients for remote access.

9. Click OK .

Identity Awareness engine automatically recognizes changes to LDAP group membership and
updates identity information, including access roles. For more, see the R80.40 Identity
Awareness Administration Guide.

Security Management R80.40 Administration Guide      |      108


Managing User Accounts

Authentication Rules

To mak e an authentication rule

1. Add users to user groups.

2. Define an access role for networks, users and user groups, and computers and computer
groups. See "Access Roles" on page 107.

3. Make the authentication rules with the access roles in the Source.

Security Management R80.40 Administration Guide      |      109


Managing Administrator Accounts

Managing Administrator Accounts


This section describes how to create and manage Administrator Accounts.

Configuring Authentication Methods for


Administrators
These instructions show how to configure authentication methods for administrators. For users,
see Configuring Authentication Methods for Users.

For background information about the authentication methods, see Authentication Methods for
Users and Administrators.

Configuring Check Point Password Authentication for


Administrators
These instructions show how to configure Check Point Password authentication for
administrators.

Check Point password is a static password that is configured in SmartConsole. For administrators,
the password is stored in the local database on the Security Management Server. For users, it is
stored on the local database on the Security Gateway. No additional software is required.

To configure a Check Point password for a SmartConsole administrator

1. Go to Manage & Settings> Permissions & Administrators > Administrators.

2. Click New .

3. The New Administrator window opens.

4. Give the administrator a name.

5. In Authentication method, select Check Point Password.

6. Click Set New Passw ord, type the Passw ord, and Confirm it.

7. Assign a Permission Profile .

8. Click OK .

9. Publish the SmartConsole session.

Security Management R80.40 Administration Guide      |      110


Managing Administrator Accounts

Configuring OS Password Authentication for Administrators


These instructions show how to configure OS Password Authentication for administrators.

OS Password is stored on the operating system of the computer on which the Security Gateway
(for users) or Security Management Server (for administrators) is installed. You can also use
passwords that are stored in a Windows domain. No additional software is required.

To configure an OS password for a SmartConsole administrator

1. Go to Manage & Settings > Permissions & Administrators > Administrators.

2. Click New .

3. The New Administrator window opens.

4. Give the administrator a name.

5. In Authentication method, select OS Password.

6. Assign a Permission Profile .

7. Click OK .

8. Publish the SmartConsole session.

Configuring a RADIUS Server for Administrators


These instructions show how to configure a RADIUS server for SmartConsole administrators. To
learn how to configure a RADIUS server, refer to the vendor documentation.

Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that
provides security and scalability by separating the authentication function from the access server.

Using RADIUS, the Security Gateway forwards authentication requests by remote users to the
RADIUS server. For administrators, the Security Management Server forwards the authentication
requests. The RADIUS server, which stores user account information, does the authentication.

The RADIUS protocol uses UDP to communicate with the gateway or the Security Management
Server.

RADIUS servers and RADIUS server group objects are defined in SmartConsole.

To configure a RADIUS Server for a SmartConsole administrator

1. In SmartConsole, add new RADIUS Server object

Click Objects > More Object Types > Server > More > New RADIUS.

2. Configure the RADIUS Server object

a. Give the server a Name . It can be any name.

Security Management R80.40 Administration Guide      |      111


Managing Administrator Accounts

b. Click New and create a New Host with the IP address of the RADIUS server.

c. Click OK .

d. Make sure that this host shows in the Host field of the Radius Server Properties
window.

e. In the Shared Secret field, type the secret key that you defined previously on the
RADIUS server.

f. Click OK .

g. Publish the SmartConsole session.

3. Add a new administrator

a. Go to Manage & Settings > Permissions & Administrators > Administrators.

b. Click New .

The New Administrator window opens.

c. Give the administrator the name that is defined on the RADIUS server.

d. Assign a Permission Profile .

e. In Authentication method, select RADIUS.

f. Select the RADIUS Server defined earlier.

g. Click OK .

h. Publish the SmartConsole session.

Configuring a SecurID Server for Administrators


These instructions show how to configure a SecurID server for SmartConsole administrators. To
learn how to configure a SecurID server, refer to the vendor documentation.

SecurID requires users to both possess a token authenticator and to supply a PIN or password.
Token authenticators generate one-time passwords that are synchronized to an RSA
Authentication Manager (AM) and may come in the form of hardware or software. Hardware
tokens are key-ring or credit card-sized devices, while software tokens reside on the PC or device
from which the user wants to authenticate. All tokens generate a random, one-time use access
code that changes approximately every minute. When a user attempts to authenticate to a
protected resource, the one-time use code must be validated by the AM.

Using SecurID, the Security Gateway forwards authentication requests by remote users to the AM.
For administrators, it is the Security Management Server that forwards the requests. The AM
manages the database of RSA users and their assigned hard or soft tokens. The gateway or the
Security Management Server act as an AM agent and direct all access requests to the RSA RM for
authentication. For additional information on agent configuration, refer to RSA Authentication
Manager documentation.

Security Management R80.40 Administration Guide      |      112


Managing Administrator Accounts

There are no specific parameters required for the SecurID authentication method. Authentication
requests can be sent over SDK-supported API or through REST API.

To configure the Security Management Server for SecurID (this procedure is only relevant if you
are using an SDK-supported API)

1. Connect to the Security Management Server.

2. Copy the sdconf.rec file to the /var/ace/ directory.

If the /var/ace/ directory does not exist, create it with this command:

mkdir -v /var/ace/

3. Assign all permissions to the sdconf.rec file:


chmod -v 777 /var/ace/sdconf.rec

To configure a SecurID Server for a SmartConsole administrator

1. In SmartConsole, click Objects > More Object Types > Server > More > New SecurID.

2. Configure the SecurID Properties:

a. Give the server a Name . It can be any name.

b. This step is relevant for SDK-supported API only: Click Brow se and select the
sdconf.rec file. This must be a copy of the file that is on the Security Management
Server.

c. Click OK .

3. Add a new administrator:

a. Go to Manage & Settings > Permissions & Administrators > Administrators.

b. Click New .

The New Administrator window opens.

c. Give the administrator a name.

d. Assign a Permission Profile .

e. In Authentication method, select SecurID.

4. In the SmartConsole Menu, click Install Database .

Configuring a TACACS Server for Administrators

These instructions show how to configure a TACACS server for SmartConsole administrators. To
learn how to configure a TACACS server, refer to the vendor documentation.

Security Management R80.40 Administration Guide      |      113


Managing Administrator Accounts

To configure a TACACS Server for a SmartConsole administrator

1. In SmartConsole, click Objects > More Object Types > Server > More > New TACACS.

2. Configure the TACACS Server Properties:

a. Give the server a Name . It can be any name.

b. Click New and create a New Host with the IP address of the TACACS server.

c. Click OK .

d. Make sure that this host shows in the Host field of the TACACS Server Properties
window.

e. In the Shared Secret field, type the secret key that you defined previously on the
TACACS server.

f. Click OK .

g. Publish the SmartConsole session.

3. Add a new administrator:

a. Go to Manage & Settings > Permissions & Administrators > Administrators.

b. Click New .

The New Administrator window opens.

c. Give the administrator the name that is defined on the TACACS server.

d. Assign a Permission Profile .

e. In Authentication method, select TACACS.

f. Select the TACACS Server defined earlier.

g. Click OK .

4. Publish the SmartConsole session.

Configuring API key authentication for administrators


You can use SmartConsole to configure an API key for administrators to use the management API.

Note - This administrator can only use the API for executing API commands and
cannot be used for SmartConsole authentication.

To configure API authentication for an Administrator using SmartConsole

1. In SmartConsole click Manage & Settings > Permissions & Administrators >


Administrators

Security Management R80.40 Administration Guide      |      114


Managing Administrator Accounts

Click the New icon at the top menu.

The New Administrator window opens.

2. Give the administrator a name

3. In the Authentication Method field select API Key .

4. Click Generate API key .

5. A new API key window opens.

a. Click Copy key to Clipboard

b. Save the key for a later use (provide it to the relevant administrator).

6. Click OK

7. Publish the SmartConsole session.

Example

This example demonstrates how to use the API-key for login and creating a simple-gateway
using the API.

Security Management R80.40 Administration Guide      |      115


Managing Administrator Accounts

1. Log in to the Expert mode.

2. Use the previously generated key for the login, and save the standard output to a file
(redirect it to a file using the ">" sign):

Syntax:

mgmt_cli login api-key <api-key> > /<path_to>/<filename>

Example:

mgmt_cli login api-key mvYSiHVmlJM+J0tu2FqGag12 >


/var/tmp/token.txt

3. Run a mgmt_cli command with the "-s" flag.

Syntax:

mgmt_cli -s /<path_to>/<filename> add simple-gateway name


<gateway name> ip-address <ip address> one-time-password
<password> blade <true>

Example:

mgmt_cli -s /var/tmp/token.txt add simple-gateway name "gw1" ip-


address 192.168.3.181 one-time-password "aaaa" firewall true vpn
true

For more details, see the Check Point Management API Reference.

Creating, Changing, and Deleting an Administrator


Account
To successfully manage security for a large network, we recommend that you first set up your
administrative team, and delegate tasks.

We recommend that you create administrator accounts in SmartConsole, with the procedure
below or with the First Time Configuration Wizard.

If you create it through the SmartConsole, you can choose one of these authentication methods:

Authentication
Description
Method

Check Point Check Point password is a static password that is configured in


Passw ord SmartConsole. For administrators, the password is stored in the local
database on the Security Management Server.
For users, it is stored on the local database on the Security Gateway.
No additional software is required.

Security Management R80.40 Administration Guide      |      116


Managing Administrator Accounts

Authentication
Description
Method

OS Passw ord OS Password is stored on the operating system of the computer on which
the Security Gateway (for users) or Security Management Server (for
administrators) is installed.
You can also use passwords that are stored in a Windows domain.
No additional software is required.

RADIUS Remote Authentication Dial-In User Service (RADIUS) is an external


authentication method that provides security and scalability by separating
the authentication function from the access server.
Using RADIUS, the Security Gateway forwards authentication requests by
remote users to the RADIUS server. For administrators, the Security
Management Server forwards the authentication requests. The RADIUS
server, which stores user account information, does the authentication.
The RADIUS protocol uses UDP to communicate with the gateway or the
Security Management Server.
RADIUS servers and RADIUS server group objects are defined in
SmartConsole.

SecurID SecurID requires users to both possess a token authenticator and to supply
a PIN or password. Token authenticators generate one-time passwords that
are synchronized to an RSA Authentication Manager (AM) and may come in
the form of hardware or software. Hardware tokens are key-ring or credit
card-sized devices, while software tokens reside on the PC or device from
which the user wants to authenticate. All tokens generate a random, one-
time use access code that changes approximately every minute. When a
user attempts to authenticate to a protected resource, the one-time use
code must be validated by the AM.
Using SecurID, the Security Gateway forwards authentication requests by
remote users to the AM. For administrators, it is the Security Management
Server that forwards the requests. The AM manages the database of the
RSA users and their assigned hard or soft tokens. The gateway or the
Security Management Server act as an AM Agent and direct all access
requests to the RSA AM for authentication. For additional information on
agent configuration, refer to the RSA Authentication Manager
documentation.
There are no specific parameters required for the SecurID authentication
method.

Security Management R80.40 Administration Guide      |      117


Managing Administrator Accounts

Authentication
Description
Method

TACACS Terminal Access Controller Access Control System (TACACS) provides access
control for routers, network access servers and other networked devices
through one or more centralized servers.
TACACS is an external authentication method that provides verification
services. Using TACACS, the Security Gateway forwards authentication
requests by remote users to the TACACS server. For administrators, it is the
Security Management Server that forwards the requests. The TACACS
server, which stores user account information, authenticates users. The
system supports physical card key devices or token cards and Kerberos
secret key authentication. TACACS encrypts the user name, password,
authentication services and accounting information of all authentication
requests to ensure secure communication.

Creating an Administrator Account

To create an Administrator Account Using SmartConsole

1. Click Manage & Settings > Permissions and Administrators.

The Administrators pane shows by default.

2. Click New Administrator .

The New Administrators window opens.

3. Enter a unique name for the administrator account.

Note - This parameter is case-sensitive.

4. Set the Authentication Method, or create a certificate, or the two of them.

Note - If you do not do this, the administrator will not be able to log in to
SmartConsole.

To define an Authentication Method:

In the Authentication Method section, select a method and follow the instructions in
Configuring Authentication Methods for Administrators.

To create a Certificate - If you want to use a certificate to log in:

In the Certificate Information section, click Create , and follow the instructions in Creating
a Certificate for Logging in to SmartConsole.

Security Management R80.40 Administration Guide      |      118


Managing Administrator Accounts

5. Select a Permissions profile for this administrator, or create a new one (see "Creating,
Changing, and Deleting an Administrator Account" on page 116)

6. Set the account Expiration date:

n For a permanent administrator - select Never

n For a temporary administrator - select an Expire At date from the calendar

The default expiration date shows, as defined in the Default Expiration Settings. After the
expiration date, the account is no longer authorized to access network resources and
applications.

7. Optional: Configure Additional Info - Contact Details, Email and Phone Number of the
administrator.

8. Click OK .

To create an Administrator Account with cpconfig

We do not recommend creating an administrator with cpconfig, the Check Point Configuration
Tool. Use it only if there is no access to SmartConsole or the Gaia Portal. If you use cpconfig to
create an administrator:

n You must restart Check Point Services to activate the administrator.

n It does not show the other administrators

n Check Point Password is automatically configured as the authentication method.

Changing an Existing Administrator Account


1. Click Manage & Settings > Permissions and Administrators.

2. Double-click an administrator account.

The Administrators properties window opens.

Deleting an Administrator Account


To make sure your environment is secure, the best practice is to delete administrator accounts
when personnel leave or transfer.

To remove an administrator account

1. Click Manage & Settings > Permissions and Administrators.

The Administrators pane shows by default.

2. Select an administrator account and click Delete .

3. Click Yes in the confirmation window that opens.

Security Management R80.40 Administration Guide      |      119


Managing Administrator Accounts

Creating a Certificate for Logging in to SmartConsole


When you define an administrator, you must configure the authentication credentials for the
administrator.

The authentication credentials for the administrator can be one of the supported authentication
methods, or a certificate, or the two of them.

You can create a certificate file in SmartConsole. The administrator can use this file to log in to
SmartConsole using the Certificate File option. The administrator must provide the password for
the certificate file.

You can import the certificate file to the CryptoAPI (CAPI) certificate repository on the Microsoft
Windows SmartConsole computer. The administrator can use this stored certificate to log in to
SmartConsole using the CAPI Certificate option. The SmartConsole administrator does not need to
provide a password.

To create a certificate file

1. In the New Administrator window, in the Certificate Information section, click


Create .

2. Enter a password.

3. Click OK .

4. Save the certificate file to a secure location on the SmartConsole computer.

The certificate file is in the PKCS #12 format, and has a .p12 extension.

Note - Give the certificate file and the password to the SmartConsole
administrators. The administrator must provide this password when logging
in to SmartConsole with the Certificate File option.

To Import the certificate file to the CAPI repository:

1. On the Microsoft Windows SmartConsole computer, double-click the certificate file.

2. Follow the instructions.

Configuring Default Expiration for Administrators


If you want to use the same expiration settings for multiple accounts, you can set the default
expiration for administrator accounts. You can also choose to show notifications about the
approaching expiration date at the time when an administrator logs into SmartConsole or one of
the SmartConsole clients. The remaining number of days, during which the account will be alive,
shows in the status bar.

Security Management R80.40 Administration Guide      |      120


Managing Administrator Accounts

To configure the default expiration settings

1. Click Manage & Settings > Permissions and Administrators > Advanced.

2. Click Advanced.

3. In the Default Expiration Date section, select a setting:

n Never expires

n Expire at - Select the expiration date from the calendar control

n Expire after - Enter the number of days, months, or years (from the day the
account is made) before administrator accounts expire

4. In the Expiration notifications section, select Show 'about to expire' indication in


administrators view and select the number of days in advance to show the message
about the approaching expiration date.

5. Publish the SmartConsole session.

Setting SmartConsole Timeout


Use the SmartConsole in a secure manner, and enforce secure usage for all administrators.
Setting a SmartConsole timeout is a basic requirement for secure usage. When an administrator
is not using the SmartConsole, it logs out.

To set the SmartConsole timeout

1. Click Manage & Settings.

2. Select Permissions & Administrators > Advanced.

3. In the Idle Timeout area , select Perform logout after being idle .

4. Enter a number of minutes.

When a SmartConsole is idle after this number of minutes, the SmartConsole


automatically logs out the connected administrator, but all changes are preserved.

Revok ing Administrator Certificate


If an administrator that authenticates through a certificate is temporarily unable to fulfill
administrator duties, you can revoke the certificate for the account. The administrator account
remains, but no one can authenticate to the Security Management Server with the certificate.
However, if the account has an additional authentication method (a password, for example), that
method can be used to authenticate to the account.

Security Management R80.40 Administration Guide      |      121


Managing Administrator Accounts

To revok e an administrator certificate

1. Click Manage & Settings > Permissions and Administrators.

2. Select an administrator account and click Edit .

3. In General > Authentication , click Revoke .

Assigning Permission Profiles to Administrators


A permission profile is a predefined set of Security Management Server and SmartConsole
administrative permissions that you can assign to administrators. You can assign a permission
profile to more than one administrator. Only Security Management Server administrators with the
Manage Administrators permission in the profile can create and manage permission profiles.

To learn about permission profiles for Multi-Domain Security Management administrators, see
the R80.40 Multi-Domain Security Management Administration Guide.

Changing and Creating Permission Profiles


Administrators with Super User permissions can edit, create, or delete permission profiles.

These are the predefined, default permission profiles. You cannot change or delete the default
permission profiles. You can clone them, and change the clones:

n Read Only All - Full Read Permissions. No Write permissions.

n Read Write All - Full Read and Write Permissions.

n Super User - Full Read and Write Permissions, including managing administrators and
sessions.

To change the permission profile of an administrator

1. Click Manage & Settings > Permissions and Administrators.

2. Double-click the administrator account.

The Administrators properties window opens.

3. In the Permissions section, select another Permission Profile from the list.

4. Click OK .

To change a permission profile

1. In SmartConsole, go to Manage & Settings > Permissions and Administrators >


Permission Profiles.

2. Double-click the profile to change.

3. In the Profile configuration window that opens change the settings as needed.

Security Management R80.40 Administration Guide      |      122


Managing Administrator Accounts

4. Click Close .

To create a new permission profile

1. In SmartConsole, go to Manage & Settings > Permissions and Administrators >


Permission Profiles.

2. Click New Profile .

The New Profile window opens.

3. Enter a unique name for the profile.

4. Select a profile type:

n Read/Write All - Administrators can make changes to all features

n Auditor (Read Only All) - Administrators can see all information but cannot make
changes

n Customized - Configure custom settings (see "Configuring Customized Permissions"


below ).

5. Click OK .

To delete a permission profile

1. In SmartConsole, go to Manage & Settings > Permissions and Administrators >


Permission Profiles.

2. Select a profile and click Delete .

You cannot delete a profile that is assigned to an administrator. To see which


administrators use a profile, in the error message, click Where Used.

If the profile is not assigned to administrators, a confirmation window opens.

3. Click Yes to confirm.

Configuring Customized Permissions


Configure administrator permissions for Gatew ays, Access Control, Threat Prevention ,
Others, Monitoring and Logging, Events and Reports, Management . For each resource,
define if administrators that are configured with this profile can configure the feature or only see
it.

Permissions:

n Selected - The administrator has this feature.

n Not selected - The administrator does not have this feature.

Security Management R80.40 Administration Guide      |      123


Managing Administrator Accounts

Note - If you cannot clear a feature selection, the administrator access to


it is mandatory.

Some features have Read and Write options. If the feature is selected:

n Read - The administrator has the feature but cannot make changes.

n Write - The administrator has the feature and can make changes.

To configure customized permissions

1. In the Profile object, in the Overview > Permissions section, select Customized.

2. Configure permissions in these pages of the Profile object:

n Gatew ays -configure the Provisioning and the Scripts permissions.

n Access Control - configure Access Control Policy permissions. (see "Configuring


Permissions for Access Control and Threat Prevention" on the next page).

n Threat Prevention - configure Threat Prevention Policy permissions (see


"Configuring Permissions for Access Control and Threat Prevention" on the next page).

n Others - configure permissions for Common Objects, user databases, HTTPS


Inspection features, and Client Certificates.

n Monitoring and Logging - configure permissions to generate and see logs and to
use monitoring features (see "Configuring Permissions for Monitoring, Logging,
Events, and Reports" on page 126).

n Events and Reports - configure permissions for SmartEvent features see


"Configuring Permissions for Monitoring, Logging, Events, and Reports" on page 126).

3. In the Management section, configure this profile with permissions to:

n Manage Administrators -Manage other administrator accounts.

n Manage Sessions -Lets the administrator configure the session management


settings (single or multiple sessions)

n the session mode for single or multiple sessions

n High Availability Operations -Configure and work with High Availability.

n Management API Login -Log in with the management API.

4. Click OK .

Configuring Permissions for Access Control Layers


You can simplify the management of the Access Control Policy by delegating ownership of
different Layers to different administrators.

Security Management R80.40 Administration Guide      |      124


Managing Administrator Accounts

To do this, assign a permission profile to the Layer. The permission Profile must have this
permission: Edit Layer by the selected profiles in a layer editor .

An administrator that has a permission profile with this permission can manage the Layer.

Work flow

1. Give Layer permissions to an administrator profile.

2. Assign the permission profile to the Layer.

To give Layer permissions to an administrator profile

1. In the Profile object, in the Access Control > Policy section, select Edit Layer by the
selected profiles in a layer editor .

2. Click OK .

To assign a permission profile to a Layer

1. In SmartConsole, click Menu > Manage policies and layers.

2. In the left pane, click Layers.

3. Select a Layer.

4. Click Edit .

5. In the left pane, select Permissions.

6. Click +

7. Select a profile with Layer permissions.

8. Click OK .

9. Click Close .

10. Publish the SmartConsole session.

Configuring Permissions for Access Control and Threat


Prevention
In the Profile object, select the features and the Read or Write administrator permissions for
them.

n Access Control

To edit a Layer, a user must have permissions for all Software Blades in the Layer.

Security Management R80.40 Administration Guide      |      125


Managing Administrator Accounts

l Actions
o Install Policy - Install the Access Control Policy on Security Gateways.
o Application & URL Filtering Update - Download and install new packages of
applications and websites, to use in access rules.

n Threat Prevention

l Actions
o Install Policy - Install the Threat Prevention Policy on Security Gateways.
o IPS Update -Download and install new packages for IPS protections.

Configuring Permissions for Monitoring, Logging, Events, and


Reports
In the Profile object, select the features and the Read or Write administrator permissions for
them.

n Monitoring and Logging Features

These are some of the available features:

n Monitoring

n Management Logs

n Track Logs

n Application and URL Filtering Logs

n Events and Reports Features

These are the permissions for SmartEvent:

l SmartEvent
o Events - views in SmartConsole > Logs & Monitor
o Policy - SmartEvent Policy and Settings on SmartEvent GUI.
o Reports - in SmartConsole > Logs & Monitor

l SmartEvent Application & URL Filtering reports only

Defining Trusted Clients


To limit the access to the Security Management Server from a specified list of hosts, you must
configure Trusted Clients.

You can configure Trusted Clients in these ways:

Security Management R80.40 Administration Guide      |      126


Managing Administrator Accounts

Trusted Client
Description
Definition

Any All hosts

IPv4 Address A single host with the specified IPv4 address

IPv4 Address Hosts with IPv4 addresses in the specified range


Range

IPv4 Netmask Hosts with IPv4 addresses in the subnet defined by the specified IPv4
address and netmask

IPv6 Address A single host with the specified IPv6 address

IPv6 Address Hosts with IPv6 addresses in the specified range


Range

IPv6 Netmask Hosts with IPv6 addresses in the subnet defined by the specified IPv6
address and netmask

Name A host with the specified hostname

Wild cards (IP only) Hosts with IP addresses described by the specified regular expression

Administrators with Super User permissions can add, edit, or delete trusted clients in
SmartConsole.

Adding a new trusted client

1. In SmartConsole, go to Manage & Settings > Permissions and Administrators >


Trusted Clients.

2. Click New .

The New Trusted Client window opens.

3. Enter a unique name for the client.

4. Select a client type and configure corresponding values:

n Any - No values to configure

n IPv4 Address - Enter an IPv4 address of a host

n IPv4 Address Range - Enter the first and the last address of an IPv4 address range

n IPv4 Netmask - Enter the IPv4 address and the netmask

n IPv6 Address - Enter an IPv6 address of a host

Security Management R80.40 Administration Guide      |      127


Managing Administrator Accounts

n IPv6 Address Range - Enter the first and the last address of an IPv6 address range

n IPv6 Netmask - Enter the IPv6 address and the netmask

n Name - Enter a host name

n Wild cards (IP only) - Enter a regular expression that describes a set of IP
addresses

5. Click OK .

Modifying a trusted client settings

1. In SmartConsole, go to Manage & Settings > Permissions and Administrators >


Trusted Clients.

2. Double-click the client you want to edit.

3. In the Trusted Client configuration window that opens, change the settings as needed.

4. Click OK .

Deleting a trusted client

1. In SmartConsole, go to Manage & Settings > Permissions and Administrators >


Trusted Clients.

2. Select a trusted client and click Delete .

The confirmation window opens.

3. Click Yes to confirm.

Note - Administrators can also configure the GUI Clients in the Check Point
Configuration Tool on the Security Management Server (see "cpconfig" on
page 439).

Restricting Administrator Login Attempts


For administrators that login to the Security Management Server using a Check Point password,
you can configure these login restrictions:

n The number of login attempts before SmartConsole automatically locks an administrator.

n The number of minutes before SmartConsole unlocks the administrator's account after it
was locked.

To configure login restrictions

1. Go to the Manage & Settings view or to the Multi-Domain view.

2. Go to Permissions & Administrators > Advanced > Login Restrictions.

Security Management R80.40 Administration Guide      |      128


Managing Administrator Accounts

Note - these restrictions apply only to administrators that authenticate to the


Security Management Server using a Check Point password.

Unlock ing Administrators


An administrator who has the Manage Administrators permission can unlock another
administrator if the locked administrator authenticates to the Security Management Server using a
Check Point password.

To unlock an administrator:

1. Go to the Manage & Settings view or to the Multi-Domain view.

2. Right-click the locked administrator and select Unlock Administrator .

Or:

Use the unlock administrator API command.

Note - The Unlock Administrator feature does not apply to administrators


using other authentication methods.

Session Flow for Administrators


In SmartConsole, administrators work with sessions. A session is created each time an
administrator logs into SmartConsole. Changes made in the session are saved automatically.
These changes are private and available only to the administrator. To avoid configuration
conflicts, other administrators see a lock icon on objects and rules that are being edited in other
sessions.

Administrators can publish or discard their private changes. To include private changes in the
policy installation, sessions containing these private changes must be published. This is also true
if you want to make your private changes available to other administrators. Unpublished changes
from other sessions are not included in the policy installation.

Before you publish a session, we recommend that you give the session a name and add a brief
description that documents the work process.

Publishing a Session
The validations pane in SmartConsole shows configuration error messages. Examples of errors
are object names that are not unique, or the use of objects that are not valid in the Rule Base.
Make sure you correct these errors before publishing.

Security Management R80.40 Administration Guide      |      129


Managing Administrator Accounts

To publish a SmartConsole session

On the SmartConsole toolbar, click Publish . When a session is published, a new database
version is created and shows in the list of database revisions.

To add a name or description to a session

1. In the SmartConsole toolbar, click Session .

The Session Details window opens.

2. Enter a name for the database version.

3. Enter a description.

4. Click OK .

To discard a session

In the SmartConsole toolbar, click Discard.

Working in SmartConsole Session View


The Session view shows all unpublished sessions in the system. The view shows the sessions of
the current administrator, sessions of other administrators and sessions from other applications.
The columns in the view can be customized and show the session owner, name, description,
connection mode, number of private changes, number of locks, application and other values.

To see session information, click Manage & Settings > Sessions > View Sessions.

Actions available to administrators on private sessions are determined by the Manage Sessions
permission on their profile.

Security Management R80.40 Administration Guide      |      130


Managing Administrator Accounts

Administrators without the Manage Administrators with the Manage Session


Session permission can: Permission can:

n Publish and discard their own n Publish and discard their own sessions
sessions n See sessions opened by other administrators,
n See sessions opened by other the number the locks they have and number
administrators, the number the changes they have made
locks they have and number of n Publish & Disconnect the private sessions of
changes they have made other administrators
n Take over sessions created by n Disconnect & Discard the private sessions
applications, for example sessions of other administrators
created by the API command line n Disconnect another administrator's private
tool session
n Take over sessions created by applications,
for example sessions created by the API
command line tool
n Take over the private sessions of other
administrators.
Note - If you want to keep changes
made in your own private session,
publish these changes before you
take over the session of another
administrator. If you do not publish
your changes, you will lose them.
When you take over, you disconnect
the other administrator's
SmartConsole session.
n Publish & Disconnect the private sessions of
other administrators. The action applies to
both SmartConsole sessions and command
line API sessions.
n Disconnect the private session of other
administrators
n Discard & Disconnect the private session of
other administrators

Administrators Working with Multiple Sessions


Administrators working with multiple sessions can open multiple new private sessions without
publishing changes made in their current private session.

Security Management R80.40 Administration Guide      |      131


Managing Administrator Accounts

Use Case

Suppose you are making changes in a private session and are asked to solve some immediate
problem. The task involves making a change and publishing it. You do not wish to publish or
discard your current private session.

You open a new private session, make the change required resolve the issue, publish the change,
then return to your previous private session.

To do this, you need to work with multiple sessions. To switch on multiple sessions, you need the
Manage Sessions permission selected on your administrator profile.

To enable work ing in multiple sessions

1. Open the relevant permission profile.

2. Make sure the Manage Sessions permission is selected on the Management page.

3. Open SmartConsole > Manage & Settings View > Sessions > Advanced.

4. Select Each administrator can manage multiple SmartConsole sessions at the same
time .

5. Publish the change.

When working with multiple sessions, you can:

n Open and manage multiple sessions to the Security Management Server using the same
administrator account

n Switch between the active session and previously saved sessions

n Publish, discard and disconnect other sessions

n Take over other sessions

The SmartConsole Session menu

After multiple sessions are enabled, the SmartConsole Session menu has these new options:

Option Description

Edit Lets you change the session name and description.


sessions
details

Create In the current w indow


new Opens a new session in the current SmartConsole
session In a new w indow
Opens a new session in a new SmartConsole

Security Management R80.40 Administration Guide      |      132


Managing Administrator Accounts

Option Description

Recent Shows a list of recent sessions. Selecting a session opens the session in the
current SmartConsole

More Opens the Open Session window that shows sessions that you previously
created and saved.

n Sessions shown in this window are owned by the current user in the
current domain.
n The Open Session > Actions menu has options to open a saved session in
the current SmartConsole or open the session in a new SmartConsole.

The SmartConsole Session View

When multiple sessions are enabled, you can perform these additional actions:

Action You can:

For sessions that you own n Discard and


Disconnect
n Publish and Disconnect
n Disconnect
n Open an older session

For sessions owned by other administrators that have made n Publish and Disconnect
private changes their changes
n Discard and
Disconnect
n Disconnect
n Take over their
changes

For sessions owned by other administrators that have not n Disconnect


made private sessions n Take over

Notes:

n When working in single session, you need to publish or discard your


changes before taking over another session. In multiple sessions, you do
not have to publish or discard your session before taking over the session
of another administrator.
n In multiple sessions, an administrator connecting from another desktop
to an already connected session can still take over the connected session
by default.

Security Management R80.40 Administration Guide      |      133


Managing Administrator Accounts

Switching between Multiple and Single Session

If the session management settings switch from multiple SmartConsole sessions to allow only a
single SmartConsole session at a time:

n Administrators can still publish, discard and open sessions that they own.

n Cannot create new sessions until they have published or discarded all their unpublished
sessions with private sessions

n Cannot take over the sessions of other administrators or applications (for example sessions
created with API commands in the mgmt_cli utility) until they have published or discarded
all their previously saved private sessions.

Security Management R80.40 Administration Guide      |      134


Managing Gateways

Managing Gateways
This section describes how to create, update, and manage Security Gateways, and to use Secure
Internal Communication (SIC) methods for Check Point platforms and products to authenticate
each other.

Creating a New Security Gateway


A Security Gateway enforces security policies configured on the Security Management Server.

To install security policies on the Security Gateway, configure the gateway objects in
SmartConsole.

To define a new Security Gateway object

1. From the navigation toolbar, select Gateways & Servers.

2. Click New , and select Gatew ay .

The Check Point Security Gatew ay Creation window opens.

3. Click Classic Mode .

The Check Point Gatew ay properties window opens and shows the General Properties
screen.

4. Enter the host Name and the IPv4 Address or IPv6 Address.

5. Click Communication .

The Trusted Communication window opens.

6. Select a Platform.

7. In the Authentication section, enter and confirm the One-time passw ord.

If you selected Small Office Appliance platform, make sure Initiate trusted
communication automatically w hen the Gatew ay connects to the Security
Management Server for the first time is selected.

8. Click Initialize to establish trusted communication with the gateway (see "Creating a New
Security Gateway" above).

If trust fails to establish, Click OK to continue configuring the gateway.

9. Click OK .

10. The Get Topology Results window that opens, shows interfaces successfully configured on
the gateway.

11. Click Close .

Security Management R80.40 Administration Guide      |      135


Managing Gateways

12. In the Platform section, select the Hardw are , the Version , and the OS.

If trust is established between the server and the gateway, click Get to automatically
retrieve the information from the gateway.

13. Select the Software Blades to enable on the Security Gateway.

For some of the Software Blades a first-time setup wizard will open. You can run the wizard
now or later. For more on the setup wizards, see the relevant Administration Guide.

Manually Updating the Gateway Topology


As the network changes, you must update the gateway topology.

To update the gateway topology

1. In SmartConsole, click Gatew ays & Servers.

2. Double-click the gateway object.

The gateway property window opens.

3. Click Netw ork Management .

4. Click Get Interfaces.

A warning window asks if you want to overwrite the existing Topology and Anti-Spoofing
settings.

5. Click Yes.

6. The Get Topology Results window opens.

7. Click Accept .

8. Click OK .

Dynamically Updating the Gateway


Topology
This feature is supported only for Security Gateways R77.20 and above. Once selected, the range
of IP addresses behind the internal interface is automatically calculated every second (default
value) without the need for the administrator to click Get Interfaces and install a policy.

To configure dynamic topology updates

1. Open Gatew ay Properties > Netw ork Management .

2. Select an interface and click Edit .

Security Management R80.40 Administration Guide      |      136


Managing Gateways

3. In the Topology section, click Modify .

4. In the Leads To section, select Netw ork defined by routes.

5. Click OK .

This default update value is configured in SmartConsole > Preferences and set to one second.
The value set here applies to all internal interfaces for all gateways in the Domain.

To set the update value for a specific interface

1. Open Gatew ay Properties > Netw ork Management .

2. Select an interface and click Actions > Settings.

3. Select Use custom update time (seconds) and set the applicable update time.

4. Click OK .

Dynamic Anti-Spoofing
When Anti-Spoofing is selected and you click Get interfaces, the Security Gateway generates a
list of valid IP addresses based on the IP address and netmask of the interface and the routes
assigned to the interface.

Anti-Spoofing drops packets with a source IP address that does not belong to the network behind
the packet's interface. For example, packets with an internal IP address that comes from an
external interface.

When the Netw ork defined by routes option is selected along with Perform Anti-Spoofing
based on interface topology , you get Dynamic Anti-Spoofing. The valid IP addresses range is
automatically calculated without the administrator having to do click Get Interfaces or install a
policy.

Secure Internal Communication (SIC)


Check Point platforms and products authenticate each other through one of these Secure Internal
Communication (SIC) methods:

n Certificates.

n Standards-based TLS for the creation of secure channels.

n 3DES or AES128 for encryption.

Gateways above R71 use AES128 for SIC. If one of the gateways is below R71, the gateways
use 3DES.

SIC creates trusted connections between gateways, management servers and other Check Point
components. Trust is required to install polices on gateways and to send logs between gateways
and management servers.

Security Management R80.40 Administration Guide      |      137


Managing Gateways

Initializing Trust
To establish the initial trust, a gateway and a Security Management Server use a one-time
password. After the initial trust is established, further communication is based on security
certificates.

Note - Make sure the clocks of the gateway and Security Management Server
are synchronized, before you initialize trust between them. This is necessary for
SIC to succeed. To set the time settings of the gateway and Security
Management Server, go to the Gaia Portal > System Management > Time .
To initialize Trust

1. In SmartConsole, open the gateway network object.

2. In the General Properties page of the gateway, Click Communication .

3. In the Communication window, enter the Activation Key that you created during
installation of the gateway.

4. Click Initialize .

The ICA signs and issues a certificate to the gateway.

Trust state is Initialized but not trusted. The Internal Certificate Authority (ICA) issues a
certificate for the gateway, but does not yet deliver it.

The two communicating peers authenticate over SSL with the shared Activation Key. The
certificate is downloaded securely and stored on the gateway. The Activation Key is
deleted.

The gateway can communicate with Check Point hosts that have a security certificate
signed by the same ICA.

SIC Status
After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security
Management Server can communicate securely with this gateway:

n Communicating - The secure communication is established.

n Unknow n - There is no connection between the gateway and Security Management Server.

n Not Communicating - The Security Management Server can contact the gateway, but
cannot establish SIC. A message shows more information.

Trust State
If the Trust State is compromised (keys were leaked, certificates were lost) or objects changed
(user leaves, open server upgraded to appliance), reset the Trust State. When you reset Trust, the
SIC certificate is revoked.

Security Management R80.40 Administration Guide      |      138


Managing Gateways

The Certificate Revocation List (CRL) is updated for the serial number of the revoked certificate.
The ICA signs the updated CRL and issues it to all gateways during the next SIC connection. If two
gateways have different CRLs, they cannot authenticate.

1. In SmartConsole, open the General Properties window of the gateway.

2. Click Communication .

3. In the Trusted Communication window that opens, click Reset .

4. Install Policy on the gateways.

This deploys the updated CRL to all gateways. If you do not have a Rule Base (and therefore
cannot install a policy), you can reset Trust on the gateways.

Important - Before a new trust can be established in SmartConsole,


make sure the same one-time activation password is configured on the
gateway.

Troubleshooting SIC

If SIC fails to Initialize:

1. Make sure there is connectivity between the gateway and Security Management Server.

2. Make sure that the Security Management Server and the gateway use the same SIC
activation key (one-time password).

3. If the Security Management Server is behind a gateway, make sure there are rules that
allow connections between the Security Management Server and the remote gateway. Make
sure Anti-spoofing settings are correct.

4. Make sure the name and the IP address of the Security Management Server are in the
/etc/hosts file on the gateway.

If the IP address of the Security Management Server mapped through static NAT by its local
gateway, add the public IP address of the Security Management Server to the /etc/hosts
file on the remote gateway. Make sure the IP address resolves to the server's hostname.

5. Make sure the date and the time settings of the operating systems are correct. If the
Security Management Server and remote the gateway reside in different time zones, the
remote gateway may have to wait for the certificate to become valid.

6. Remove the security policy on the gateway to let all the traffic through: In the command line
interface of the gateway, type: fw unloadlocal

7. Try to establish SIC again.

Security Management R80.40 Administration Guide      |      139


Managing Gateways

Remote User access to resources and Mobile Access

If you install a certificate on a gateway that has the Mobile Access Software Blade already
enabled, you must install the policy again. Otherwise, remote users will not be able to reach
network resources.

To establish a new trust state for a gateway

1. Open the command line interface on the gateway.

2. Enter: cpconfig

3. Enter the number for Secure Internal Communication and press Enter.

4. Enter y to confirm.

5. Enter and confirm the activation key.

6. When done, enter the number for Exit .

7. Wait for Check Point processes to stop and automatically restart.

In SmartConsole:

1. In the General Properties window of the gateway, Click Communication .

2. In the Trusted Communication window, enter the one-time password (activation key)
that you entered on the gateway.

3. Click Initialize .

4. Wait for the Certificate State field to show Trust established.

5. Click OK .

Understanding the Check Point Internal Certificate


Authority (ICA)
The ICA (Internal Certificate Authority) is created on the Security Management Server when you
configure it for the first time. The ICA issues certificates for authentication:

n Secure Internal Communication (SIC) - Authenticates communication between Security


Management Servers, and between gateways and Security Management Servers.

n VPN certificates for gatew ays - Authentication between members of the VPN community,
to create the VPN tunnel.

n Users - For strong methods to authenticate user access according to authorization and
permissions.

Security Management R80.40 Administration Guide      |      140


Managing Gateways

ICA Clients
In most cases, certificates are handled as part of the object configuration. To control the ICA and
certificates in a more granular manner, you can use one of these ICA clients:

n The Check Point configuration utility - This is the cpconfig CLI utility. One of the options
creates the ICA, which issues a SIC certificate for the Security Management Server.

n SmartConsole - SIC certificates for Security Gateways and administrators, VPN certificates,
and user certificates.

n ICA Management tool - VPN certificates for users and advanced ICA operations.

See audit logs of the ICA in SmartConsole Logs & Monitor > New Tab > Open Audit Logs View .

SIC Certificate Management


Manage SIC certificates in the

n Communication tab of the gateway properties window.

n ICA Management Tool.

Certificates have these configurable attributes:

Attributes Default Comments

validity 5 years

key size 2048 bits

KeyUsage 5 Digital Signature and Key encipherment

ExtendedKeyUsage 0 (no KeyUsage) VPN certificates only

To learn more about key size values, see RSA key lengths.

To view license information for each Software Blade

Step Description

1 Select a Security Gateway or a Security Management Server.

Security Management R80.40 Administration Guide      |      141


Managing Gateways

Step Description

2 In the Summary tab below, click the object's License Status (for example: OK ).
The Device & License Information window opens. It shows basic object
information and License Status, license Expiration Date , and important quota
information (in the Additional Info column) for each Software Blade.
Notes:

n Quota information, quota-dependent license statuses, and blade information


messages are only supported for R80.
n The tooltip of the SKU is the product name.

The possible values for the Software Blade License Status are:

Status Description

Active The Software Blade is active and the license is valid.

Available The Software Blade is not active, but the license is valid.

No The Software Blade is active but the license is not valid.


License

Expired The Software Blade is active, but the license expired.

About to The Software Blade is active, but the license will expire in thirty days (default)
Expire or less (7 days or less for an evaluation license).

Quota The Software Blade is active, and the license is valid, but the quota of related
Exceeded objects (gateways, files, virtual systems, and so on, depending on the blade) is
exceeded.

Quota The Software Blade is active, and the license is valid, but the number of objects
Warning of this blade is 90% (default) or more of the licensed quota.

N/A The license information is not available.

Managing Software Blade Licenses


After an administrator runs the First Time Configuration Wizard on a Security Management
Server, and the Security Management Server connects to the Internet, it automatically activates its
license and synchronizes with the Check Point User Center. If the Security Management Server
loses Internet connectivity before the license is activated, it tries again, on an interval.

Security Management R80.40 Administration Guide      |      142


Managing Gateways

If the administrator makes changes to Management Software Blade licenses of a Security


Management Server in the Check Point User Center, these changes are automatically
synchronized with that Security Management Server.

Notes:

n Automatic activation is supported on Check Point appliances only.


n Automatic synchronization is supported on all servers R80.30 and
higher.

To make sure that your environment is synchronized with the User Center, even when the
Security Management Server is not connected to the Internet, we recommend that you configure a
Check Point server with Internet connectivity as a proxy.

In SmartConsole, you can see this information for most Software Blade licenses:

n License status

n Alerts

n Check Point User Center details

See the R80.40 Release Notes for a list of supported Software Blades

Configuring a Proxy Gateway

To configure a proxy on a Check Point server

1. On the Security Management Server, add these lines to $CPDIR/tmp/.CPprofile.sh:

n _cpprof_add HTTP_CLIENT_PROXY_SICNAME "<proxy server sic name>"


0 0
n _cpprof_add HTTP_CLIENT_PROXY_IP "<proxy server IP>" 0 0

2. Reboot the Security Management Server.

Viewing Licenses in SmartConsole

To view license information

Step Description

1 In SmartConsole, from the left navigation panel, click Gatew ays & Servers.

2 From the Columns drop-down list, select Licenses.

You can see these columns:

Security Management R80.40 Administration Guide      |      143


Managing Gateways

Column Description

License The general state of the Software Blade licenses:


Status
n OK - All the blade licenses are valid.
n Not Activated - Blade licenses are not installed. This is only possible in the
first 15 days after the establishment of the SIC with the Security
Management Server. After the initial 15 days, the absence of licenses will
result in the blade error message.
n Error w ith <number> blade(s) - The specified number of blade licenses
are not installed or not valid.
n Warning w ith <number> blade(s) - The specified number of blade
licenses have warnings.
n N/A - No available information.

CK Unique Certificate Key of the license instance.

SKU Catalog ID from the Check Point User Center.

Account User's account ID.


ID

Support Check Point level of support.


Level

Support Date when the Check Point support contract expires.


Expiration

To view license information for each Software Blade

Step Description

1 Select a Security Gateway or a Security Management Server.

2 In the Summary tab below, click the object's License Status (for example: OK ).
The Device & License Information window opens. It shows basic object information
and License Status, license Expiration Date , and important quota information (in the
Additional Info column) for each Software Blade.
Notes:

n Quota information, quota-dependent license statuses, and blade information


messages are only supported for R80.
n The tooltip of the SKU is the product name.

The possible values for the Software Blade License Status are:

Security Management R80.40 Administration Guide      |      144


Managing Gateways

Status Description

Active The Software Blade is active and the license is valid.

Available The Software Blade is not active, but the license is valid.

No The Software Blade is active but the license is not valid.


License

Expired The Software Blade is active, but the license expired.

About to The Software Blade is active, but the license will expire in thirty days (default) or
Expire less (7 days or less for an evaluation license).

Quota The Software Blade is active, and the license is valid, but the quota of related
Exceeded objects (gateways, files, virtual systems, and so on, depending on the blade) is
exceeded.

Quota The Software Blade is active, and the license is valid, but the number of objects of
Warning this blade is 90% (default) or more of the licensed quota.

N/A The license information is not available.

Monitoring Licenses in SmartConsole


To keep track of license issues, you can use these options:

Option Description

License To see and export license information for Software Blades on each specific
Status view Security Management Server, gateway, or Log Server object.

License To see, filter and export license status information for all configured Security
Status Management Server, gateway, or Log Server objects.
report

License To see, filter and export license information for Software Blades on all
Inventory configured Security Management Server, gateway, or Log Server objects.
report

The SmartEvent Software Blade lets you customize the License Status and License Inventory
information from the Logs & Monitor view of SmartConsole.

It is also possible to view license information from the Gatew ays & Servers view of SmartConsole
without enabling the SmartEvent blade on Security Management Server..

Security Management R80.40 Administration Guide      |      145


Managing Gateways

The Gateways & Servers view in SmartConsole lets you see and export the Lice n se In ve n tory
report.

Step Description

1 View the License Inventory report from the Gateways & Servers view:

1. In SmartConsole, from the left navigation panel, click Gatew ays & Servers.
2. From the top toolbar, click Actions > License Report .
3. Wait for the SmartView to load and show this report.
By default, this report contains:
n Inventory page: Blade Names, Devices Names, License Statuses
n License by Device page: Devices Names, License statuses, CK, SKU, Account
ID, Support Level, Next Expiration Date

2 Export the License Inventory report from the Gateways & Servers view:

1. In the top right corner, click the Options button.


2. Select the applicable export option - Export to Excel, or Export to PDF.

The Logs & Monitor view in SmartConsole lets you see, filter and export the Lice n se Statu s
report.

Step Description

1 View License Status report from the Logs & Monitor view:

1. In SmartConsole, from the left navigation panel, click Logs & Monitor
2. At the top, open a new tab by clicking New Tab, or [+].
3. In the left section, click View s.
4. In the list of reports, double-click License Status.
5. Wait for the SmartView to load and show this report.
By default, this report contains:
n Names of the configured objects, License status for each object, CK, SKU,
Account ID, Support Level, Next Expiration Date

Security Management R80.40 Administration Guide      |      146


Managing Gateways

Step Description

2 Filter the License Status report in the Logs & Monitor view:

1. In the top right corner, click the Options button > View Filter .
The Edit View Filter window opens.
2. Select a Field to filter results. For example, Device Name , License Status,
Account ID.
3. Select the logical operator - Equals, Not Equals, or Contains.
4. Select or enter a filter value.
Note - Click the X icon to delete a filter.
5. Optional: Click the + icon to configure additional filters.
6. Click OK to apply the configured filters.
The report is filtered based on the configured filters.

3 Export the License Status report in the Logs & Monitor view:

1. In the top right corner, click the Options button.


2. Select the applicable export option - Export to Excel, or Export to PDF.

The Logs & Monitor view in SmartConsole lets you see, filter and export the Lice n se In ve n tory
report.

Step Description

1 View the License Inventory report from the Logs & Monitor view:

1. In SmartConsole, from the left navigation panel, click Logs & Monitor
2. At the top, open a new tab by clicking New Tab, or [+].
3. In the left section, click Reports.
4. In the list of reports, double-click License Inventory .
5. Wait for the SmartView to load and show this report.
By default, this report contains:
n Inventory page: Blade Names, Devices Names, License Statuses
n License by Device page: Devices Names, License statuses, CK, SKU, Account
ID, Support Level, Next Expiration Date

Security Management R80.40 Administration Guide      |      147


Managing Gateways

Step Description

2 Filter the License Inventory report in the Logs & Monitor view:

1. In the top right corner, click the Options button > Report Filter .
The Edit Report Filter window opens.
2. Select a Field to filter results. For example, Blade Name , Device Name , License
Overall Status, Account ID.
3. Select the logical operator - Equals, Not Equals, or Contains.
4. Select or enter a filter value.
Note - Click the X icon to delete a filter.
5. Optional: Click the + icon to configure additional filters.
6. Click OK to apply the configured filters.
The report is filtered based on the configured filters.

3 Export the License Inventory report in the Logs & Monitor view:

1. In the top right corner, click the Options button.


2. Select the applicable export option - Export to Excel, or Export to PDF.

Central Deployment of Hotfixes


Central Deployment allows performing batch deployment of Jumbo Hotfix Accumulators and
Hotfixes using SmartConsole.

You can deploy a Recommended Jumbo Hotfix Accumulator or a specific Jumbo Hotfix
Accumulator take.

You can find the name of the specific Jumbo Hotfix Accumulator in the relevant SK article for the
applicable version.

Notes:

n You can select up to 30 Security Gateways and ClusterXL Cluster


Members.
n Up to 10 targets can be deployed concurrently.

Prerequisites
This table shows the Jumbo Hotfix Accumulator takes which are required to install the
recommended Jumbo Hotfix Accumulator.

Version Jumbo Hotfix Accumulator

R80.30 Take 76 or higher.

Security Management R80.40 Administration Guide      |      148


Managing Gateways

Version Jumbo Hotfix Accumulator

R80.20 A Take higher than Take 118.

R80.10 A Take higher than 245.

To use the Install Hotfix from SmartConsole options:

n The version of the installed Security Management Server must be R80.40 or higher.

n The Security Management Server and target Security Gateways must be able to connect to
the Check Point cloud.

n The administrator has the Manage Licenses and Packages permissions.

n The latest deployment agent is installed on the targets.

n SIC is already established for the target Security Gateways.

n A policy is installed on the target Security Gateways.

n To upgrade a configured ClusterXL, the Cluster object must be selected.

Limitations
Only recommended and on-going Jumbo Hotfix Accumulators Takes made available in the Check
Point update servers are supported.

The following are not supported with Hotfix Central Deployment:

n ClusterXL in Load Sharing mode and VRRP Clusters.

n VSX.

n Using Central Deployment from:

l A Global Domain or in the Multi-Domain Server context.

l A Standalone server.

l Standby Multi-Domain Security Management and Security Management Server.

Installing the Jumbo Hotfix Accumulator


Work flow

1. Select the target Security Gateways for upgrade.

2. Select the type of Jumbo Hotfix Accumulators to install.

3. Validate - This process makes sure that the package is available for download from
Check Point servers.

4. Verify - the process of verification is making sure that the selected Jumbo Hotfix

Security Management R80.40 Administration Guide      |      149


Managing Gateways

Accumulator Take can be installed on the target Security Gateways. The verification
process checks if other installed Hotfixes are not overridden and that enough free disk
space is available for the process to complete.

5. Install the Jumbo Hotfix Accumulator.

to Install a Jumbo Hotfix Accumulator or a Hotfix

1. In SmartConsole Go to the GATEWAYS & SERVERS view.

The list of available Jumbo Hotfix Accumulators shows in a new column.

2. Select the target Security Gateways for deployment.

3. From the Toolbar menu, select Actions ( ) > Install Hotfix

Alternatively, right-click the Gatew ays & Servers view > Actions ( ) > Install Hotfix.

The Install Hotfix window opens, and shows Information about the selected targets and
their corresponding recommended Jumbo Hotfix Accumulators.

Security Management R80.40 Administration Guide      |      150


Managing Gateways

4. Select one of the options:

n Install Recommended Jumbo Hotfix (default).

Note - If there is no recommended Jumbo Hotfix Accumulator for


the selected targets, this option is grayed out.
If a recommended Jumbo Hotfix Accumulator applies only to
some of the selected targets, the deployment takes place only for
those targets.

Or

n Install Specific Hotfix

a. Copy the Jumbo Hotfix Accumulator file name from the applicable SK article
and paste it in the Install Specific Hotfix text box.

b. Click Validate

5. Click Verify - The Install Hotfix window is minimized and the verification process starts.

Security Management R80.40 Administration Guide      |      151


Managing Gateways

a. To see the progress of the verification process open the Tasks view at the bottom
left corner of SmartConsole and click Details:

6. Click Install.

Security Management R80.40 Administration Guide      |      152


Managing Objects

Managing Objects
Network Objects, defined in SmartConsole and stored in the proprietary Check Point object
database, represent physical and virtual network components (such as gateways, servers, and
users), and logical components (such as IP address ranges and Dynamic Objects). Before you
create Network Objects, analyze the needs of your organization:

n What are the physical components of your network: devices, hosts, gateways and their
active Software Blades?

n What are the logical components: services, resources, applications, ranges?

n Who are the users? How should you group them, and with what permissions?

Object Categories
Objects in SmartConsole represent networks, devices, protocols and resources. SmartConsole
divides objects into these categories:

Icon Object Type Examples

Network Objects Gateways, hosts, networks, address ranges, dynamic objects,


security zones

Services Services, Service groups

Custom Applications, Categories, Mobile applications


Applications/Sites

VPN Communities Site to Site or Remote Access communities

Users Users, user groups, and user templates

Data Types International Bank Account Number - IBAN, HIPAA - Medical Record
Number - MRN, Source Code.

Servers Trusted Certificate Authorities, RADIUS, TACACS

Time Objects Time, Time groups

UserCheck Message windows: Ask, Cancel, Certificate Template, Inform, and


Interactions Drop

Security Management R80.40 Administration Guide      |      153


Managing Objects

Icon Object Type Examples

Limit Download and upload bandwidth

Actions with Objects


You can add, edit, delete, and clone objects. A clone is a copy of the original object, with a
different name. You can also replace one object in the Policy with another object.

Note - Do not create two objects with the same name. A validation error shows
when you try to publish the SmartConsole session. To resolve, change one of
the object names.

To work with objects, right-click the object in the object tree or in the Object Explorer, and select
the action.

You can delete objects that are not used, and you can find out where an object is used.

To clone an object

1. In the object tree or in the Object Explorer, right-click the object and select Clone .

The Clone Object window opens.

2. Enter a name for the cloned object.

3. Click OK .

To find out where an object is used

In the object tree or in the Object Explorer, right-click the object and select Where Used.

To replace an object with a different object

1. In the object tree or in the Object Explorer, right-click the object and select Where Used.

2. Click the Replace icon.

3. From the Replace w ith list, select an item.

4. Click Replace .

To delete all instances of an object

1. In the object tree or in the Object Explorer, right-click the object and select Where Used.

2. Click the Replace icon.

Security Management R80.40 Administration Guide      |      154


Managing Objects

3. From the Replace w ith list, select None (remove item) .

4. Click Replace .

Object Tags
Object tags are keywords or labels that you can assign to the network objects or groups of objects
for search purposes. These are the types of tags you can assign:

n User tags - Assigned manually to individual objects or groups of objects

n System tags - Predefined keywords, such as "application"

Each tag has a name and a value. The value can be static, or dynamically filled by detection
engines.

Adding a Tag to an Object

To add a tag to an object

1. Open the network object for editing.

2. In the Add Tag field, enter the label to associate with this object.

3. Press Enter .

The new tag shows to the right of the Add Tag field.

4. Click OK .

Network Object Types


Network s
A Network is a group of IP addresses defined by a network address and a net mask. The net mask
indicates the size of the network.

A Broadcast IP address is an IP address which is destined for all hosts on the specified network. If
this address is included, the Broadcast IP address will be considered as part of the network.

Network Groups
A network group is a collection of hosts, gateways, networks or other groups. Groups can be used
to facilitate and simplify network management. When you have the same set of objects which you
want to use in different places in the Rule Base, you can create a group to include such set of
objects and reuse it. Modifications are applied to the group instead of to each member of the
group.

Security Management R80.40 Administration Guide      |      155


Managing Objects

Groups are also used where SmartConsole lets you select only one object, but you need to work
with more than one. For example, in the gateway editor > Netw ork Management > VPN
Domain > Manually defined, you can only select on object from the drop-down menu. If you
want to select more than one object for your VPN Domain, you can create a group, add the
required objects to the group, and select the group from the drop-down menu.

Grouping Network Objects

To create a group of network objects

1. In the Objects tree, click New > Netw ork Group.

The New Netw ork Group window opens.

2. Enter a name for the group

3. Set optional parameters:

n Object comment

n Color

n Tag (as custom search criteria)

4. For each network object you want to add, click the [+] sign and select it from the list that
shows.

5. Click OK .

From version R80.20.M2, you can also associate groups to a network object directly from the
object editor.

To associate groups to a network object

1. Open the object editor, and go to Groups in the navigation tree.

2. For each group you want to add, click the [+] sign and select it from the list that shows.

Check Point Hosts


A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that
receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic
between its multiple interfaces.) For example, if you have two unconnected networks that share a
common Security Management Server and Log Server, configure the common server as a Check
Point Host object.

A Check Point Host has one or more Software Blades installed. But if the Firewall blade is installed
on the Check Point Host, it cannot function as a firewall. The Host requires SIC and other features
provided by the actual firewall.

Security Management R80.40 Administration Guide      |      156


Managing Objects

A Check Point Host has no routing mechanism, is not capable of IP forwarding, and cannot be
used to implement Anti-Spoofing. If the host must do any of these, convert it to be a Security
Gateway.

The Security Management Server object is a Check Point Host.

Note - When you upgrade a Management Server from R77.30 or earlier


versions, Node objects are converted to Host objects.

Gateway Cluster
A gateway cluster is a group of Security Gateways defined as one logical object. Clustered
gateways add redundancy through High Availability or Load Sharing.

Updatable Objects
An updatable object is a network object which represents an external service, such as Office 365,
AWS, GEO locations and more. External services providers publish lists of IP addresses or
Domains or both to allow access to their services. These lists are dynamically updated. Updatable
objects derive their contents from these published lists of the providers, which Check Point
uploads to the Check Point cloud. The updatable objects are updated automatically on the
Security Gateway each time the provider changes a list. There is no need to install policy for the
updates to take effect. You can use updatable objects in all three types of policies: Access Control,
Threat Prevention and HTTPS Inspection. You can use an updatable object in the Access Control,
Threat Prevention or the HTTPS Inspection policy as a source or a destination. In the Threat
Prevention policy, you can also use an updatable object as the protected scope.

These are the currently supported external services for updatable objects:

n Online services - Office 365, Azure, and AWS

n GEO locations - The GEO database provides mapping of location data to IP addresses. For
each location, there is a network object you can import to SmartConsole. You can block or
allow access to and from specific locations based on their IP addresses.

Note - For Access Control, this feature is supported for R80.20 and above gateways. For Threat
Prevention and HTTPS Inspection, this feature is supported for R80.40 and above gateways.

Adding an Updatable Object to the Security Policy


A customer uses Office365 and wants to allow access to Microsoft Exchange services.

To add the Microsoft Exchange Updatable Object to the Security Gateway

1. Make sure the Security Management Server and the Security Gateway have access to the
Check Point cloud.

2. Go to SmartConsole > Security Policies > Access Control > Policy .

Security Management R80.40 Administration Guide      |      157


Managing Objects

3. Create a new rule.

4. In the Destination column, click the + sign and select Import > Updatable Objects.

The Updatable Objects window opens.

5. Select the objects to add. For this use case, select the Exchange Services object.

Note - You can also add objects to the Source column.

6. Click OK .

7. Install policy.

The Exchange Services object is added to the Rule Base.

Services &
No Name Source Destination VPN Action Track
Applications

1 Accept WirelessZone Exchange Any Any Accept Log


Exchange Services

2 Accept Exchange WirelessZone Any Any Accept Log


Exchange Services

You can monitor the updates in the Logs & Monitor Logs view.

To monitor the updates

1. Go to SmartConsole > Logs & Monitor .

2. From the search bar, enter Updatable Objects.

3. Double-click the relevant log.

The Log Details window shows.

4. Succeeded shows in the Status field when the update is successful.

More Network Object Types


Address Ranges
An address range is a range of IP addresses on the network, defined by the lowest and the
highest IP addresses. Use an Address Range object when you cannot define a range of IP
addresses by a network IP and a net mask. The Address Range objects are also necessary for the
implementation of NAT and VPN.

Security Management R80.40 Administration Guide      |      158


Managing Objects

Using Wildcard Objects


Wildcard objects let you define IP address objects that share a common pattern that can be
permitted or denied access in a security policy.

Note - This feature is only supported for R80.20 and above gateways.

To create a new wildcard object

1. Open Object Explorer > New > More > Netw ork Object > Wildcard object .

2. Enter the Wildcard IP address and Wildcard Netmask in IPv4 or IPv6 Format.

3. Click OK .

Understanding Wildcard Objects

The wildcard object contains a wildcard IP address and a wildcard netmask.

The wildcard netmask is the mask of bits that indicate which parts of the IP address must match
and which do not have to match. For example:

Wildcard IP: 194. 29. 0. 1

Wildcard Netmask: 0. 0. 3. 0

The third octet represents the mask of bits. If we convert the 3 to binary, we get 00000011.

The 0 parts of the mask must match the equivalent bits of the IP address.

The 1 parts of the mask do not have to match, and can be any value.

0 0 0 0 0 0 1 1

Must match the equivalent bits in the IP address Do not have to match

The binary netmask produces these possible decimal values:

128 64 32 16 8 4 2 1

Binary Decimal

0 0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 1 1

0 0 0 0 0 0 1 0 2

0 0 0 0 0 0 1 1 3

Security Management R80.40 Administration Guide      |      159


Managing Objects

The netmask permits only these IP addresses:

n 194.29.0.1

n 194.29.1.1

n 192.29.2.1

n 194.29.3.1

Examples of Use Cases

Scenario One

A supermarket chain has all of its cash registers on subnet 194.29.x.1, where x defines the
region. In this use case, all the cash registers in this region must have access to the database
server at 194.30.1.1.

Instead of defining 256 hosts (194.29.0.1, 194.29.1.1, 194.29.2.1....194.29.255.1), the


administrator creates a wildcard object that represents all the cash registers in the region:

Wildcard IP: 194. 29. 0. 1

Wildcard Mask: 0. 0. 255. 0

The wildcard object can now be added to the Access Control Policy.

Source Destination Action Track

Wildcard Object Database server object Accept Log

Scenario Two

In this use case, a supermarket chain has stores in Europe and Asia.

The 192.30.0-255.1 network contains both the Asian and European regions, and the stores
within those regions.

Security Management R80.40 Administration Guide      |      160


Managing Objects

Item Description

1 Database Server for Europe

2 Database Server for Asia

3 European and Asia network

The administrator wants stores in the European and Asia regions to access different database
servers. In this topology, the third octet of the European and Asia network's IP address will be
subject to a wildcard. The first four bits of the wildcard will represent the region and the last
four bits will represent the store number.

Bits that represent the region Bits that represent the store number

0000 0000

In the Wildcard IP:

n The Asia region is represented by 0001xxxx (Region 1 in decimal)

n The European region is represented by 0010xxxx (Region 2 in decimal)

In binary:

Binary Decimal

Region Store

0001 0000 16 - Asia Region

0010 0000 32 - European Region

Security Management R80.40 Administration Guide      |      161


Managing Objects

To include all the stores of a particular region, the last four bits of the wildcard mask must be
set to 1 (15 in Decimal):

Binary Decimal

Region Store

xxxx 1111 15 - all Asian stores

xxxx 1111 15 - all European stores

A wildcard object that represents all the Asian stores will look like this:

Wildcard IP address 192.30.16.1 (The region)

Wildcard netmask 0.0.15.0 (for stores in the region)

For this range of IP addresses: 192.30.16-31.1

A wildcard object that represents all the European stores will look like this:

Wildcard IP address 192.30.32.1 (the region)

Wildcard netmask 0.0.15.0 (for stores in the region)

For this range of IP addresses: 192.30.32-47.1

The administrator can now use these wildcard objects in the Access Control Policy:

Source Destination Action Track

Asian Stores Wildcard Database Server for Asia Accept Log

European Stores Wildcard Database Server for Europe Accept Log

Scenario Three

In this scenario, the netmask bits are not consecutive.

Wildcard IP 1 1 0 1

Wildcard mask 0 0 5 0

Wildcard IP 00000001.00000001.00000000.00000001

Wildcard Mask 00000000.00000000.00000101.00000000

Mask:

0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

Security Management R80.40 Administration Guide      |      162


Managing Objects

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0

Which will match only these IP addresses:

IP
Binary Comment
Address

1.1.0.1 00000001.00000001.00000000.00000001 The IP address itself

1.1.1.1 00000001.00000001.00000001.00000001 The equivalent bit at position 23 does


not matter

1.1.4.1 00000001.00000001.00000100.00000001 The equivalent bit at position 21 does


not matter

1.1.5.1 00000001.00000001.00000101.00000001 The equivalent bits at positions 21


and 23 do not matter

IPv6

The same principles apply to IPv6 addresses. For example, if the wildcard object has these values:

IPv6 Address 2001::1:10:0:1:41

Wildcard netmask 0::ff:0:0

The wildcard will match: 2001::1:10:0-255:1:41

Domains

A Domain object lets you define a host or DNS domain by its name only. It is not necessary to have
the IP address of the site.

You can use the Domain object in the source and destination columns of an Access Control Policy.

You can configure a Domain object in two ways:

n Select FQDN

In the object name, use the Fully Qualified Domain Name (FQDN). Use the format .x.y.z
(with a dot "." before the FQDN). For example, if you use .www.example.com then the
Gateway matches www.example.com

This option is supported for R80.10 and higher, and is the default. It is more accurate and
faster than the non-FQDN option.

The Security Gateway looks up the FQDN with a direct DNS query, and uses the result in the Rule
Base.

Security Management R80.40 Administration Guide      |      163


Managing Objects

This option supports SecureXL Accept templates. Using domain objects with this option in a rule
has no effect on the performance of the rule, or of the rules that come after it.

n Clear FQDN

This option enforces the domain and its sub-domains. In the object name, use the format .x.y for
the name. For example, use .example.com or .example.co.uk for the name. If you use
.example.com, then the Gateway matches www.example.comand support.example.com

The Gateway does the name resolution using DNS reverse lookups, which can be inaccurate. The
Gateway uses the result in the Rule Base, and caches the result to use again.

When upgrading from R77, this option is enforced.

Dynamic Objects
A dynamic object is a "logical" object where the IP address is resolved differently for each Security
Gateway, using the dynamic_objects command.

For Security Gateways R80.10 and higher, dynamic objects support SecureXL Accept templates.
Therefore, there is no performance impact on a rule that uses a dynamic object, or on rules that
come after it.

Dynamic Objects are predefined for LocalMachine-all-interfaces. The DAIP computer interfaces
(static and dynamic) are resolved into this object.

Security Zones
Security Zones let you to create a strong Access Control Policy that controls the traffic between
parts of the network.

A Security Zone object represents a part of the network (for example, the internal network or the
external network). You assign a network interface of a Security Gateway to a Security Zone. You
can then use the Security Zone objects in the Source and Destination columns of the Rule Base.

Use Security Zones to:

n Simplify the Policy. Apply the same rule to many Gateways.

n Add networks to Gateways interfaces without changing the Rule Base.

For example, in the diagram, we have three Security Zones for a typical network: ExternalZone (1),
DMZZone (2) and InternalZone (3).

n Gateway (4) has three interfaces. One interface is assigned to ExternalZone (1), one interface
is assigned to DMZZone (2), and one interface is assigned to InternalZone (3).

n Gateway (5) has two interfaces. One interface is assigned to ExternalZone (1) and one
interface is assigned to InternalZone (3).

Security Management R80.40 Administration Guide      |      164


Managing Objects

A Security Gateway interface can belong to only one Security Zone. Interfaces to different
networks can be in the same Security Zone.

Workflow

1. Define Security Zone objects. Or, use the predefined Security Zones (see "Predefined Security
Zones" on the next page ).

2. Assign Gateway interfaces to Security Zones (see "Creating and Assigning Security Zones "
below ).

3. Use the Security Zone objects in the Source and Destination of a rule. For example:

Source Destination VPN Service Action

InternalZone ExternalZone Any Traffic Any Accept

4. Install the Access Control Policy (see "Creating an Access Control Policy" on page 179).

Creating and Assigning Security Zones

Before you can use Security Zones in the Rule Base, you must assign Gateway interfaces to
Security Zones.

To create a Security Zone

1. In the Objects bar (F11), click New > More > Netw ork Object > Security Zone .

The Security Zone window opens.

2. Enter a name for the Security Zone.

3. Enter an optional comment or tag.

4. Click OK .

Security Management R80.40 Administration Guide      |      165


Managing Objects

To assign an interface to a Security Zone

1. In the Gatew ays & Servers view, right-click a Security Gateway object and select Edit .

The Gatew ay Properties window opens.

2. In the Netw ork Management pane, right-click an interface and select Edit .

The Interface window opens. The Topology area of the General pane shows the Security
Zone to which the interface is already bound. By default, the Security Zone is calculated
according to where the interface Leads To.

3. Click Modify .

The Topology Settings window opens.

4. In the Security Zone area, click User Defined and select Specify Security Zone .

5. From the drop-down box, select a Security Zone.

Or click New to create a new one.

6. Click OK .

Predefined Security Zones

These are the predefined Security Zones, and their intended purposes:

n WirelessZone - Networks that can be accessed by users and applications with a wireless
connection.

n ExternalZone - Networks that are not secure, such as the Internet and other external
networks.

n DMZZone - A DMZ (demilitarized zone) is sometimes referred to as a perimeter network. It


contains company servers that can be accessed from external sources.

A DMZ lets external users and applications access specific internal servers, but prevents the
external users accessing secure company networks. Add rules to the firewall Rule Base that
allow traffic to the company DMZ. For example, a rule that allows HTTP and HTTPs traffic to
your web server in the DMZ.

n InternalZone - Company networks with sensitive data that must be protected and used
only by authenticated users.

Externally Managed Gateways/Hosts


An Externally Managed Security Gateway or a Host is a gateway or a Host which has Check Point
software installed on it. This Externally Managed gateway is managed by an external Security
Management Server. While it does not receive the Check Point Security Policy Security Policy, it
can participate in Check Point VPN communities and solutions.

Security Management R80.40 Administration Guide      |      166


Managing Objects

Interoperable Devices
An Interoperable Device is a device that has no Check Point Software Blades Software Blades
installed. The Interoperable Device:

n Cannot have a policy installed on it

n Can participate in Check Point VPN communities and solutions.

VoIP Domains
There are five types of VoIP Domain objects:

n VoIP Domain SIP Proxy

n VoIP Domain H.323 Gatekeeper

n VoIP Domain H.323 Gateway

n VoIP Domain MGCP Call Agent

n VoIP Domain SCCP CallManager

In many VoIP networks, the control signals follow a different route through the network than the
media. This is the case when the call is managed by a signal routing device. Signal routing is done
in SIP by the Redirect Server, Registrar, and/or Proxy. In SIP, signal routing is done by the Gatekeeper
and/or gateway.

Enforcing signal routing locations is an important aspect of VoIP security. It is possible to specify
the endpoints that the signal routing device is allowed to manage. This set of locations is called a
VoIP Domain . For more information, see the R80.40 VoIP Administration Guide.

Logical Servers
A Logical Server is a group of machines that provides the same services. The workload of this
group is distributed between all its members.

When a Server group is stipulated in the Servers group field, the client is bound to this physical
server. In Persistent server mode the client and the physical server are bound for the duration of
the session.

n Persistency by Service - once a client is connected to a physical server for a specified


service, subsequent connection to the same Logical Server and the same service will be
redirected to the same physical server for the duration of the session.

n Persistency by Server - once a client is connected to a physical server, subsequent


connections to the same Logical Server (for any service) will be redirected to the same
physical server for the duration of the session.

Security Management R80.40 Administration Guide      |      167


Managing Objects

Balance Method

The load balancing algorithm stipulates how the traffic is balanced between the servers. There
are several types of balancing methods:

n Server Load - The Security Gateway determines which Security Management Server is best
equipped to handle the new connection.

n Round Trip Time - On the basis of the shortest round trip time between Security Gateway
and the servers, executed by a simple ping, the Security Gateway determines which Security
Management Server is best equipped to handle the new connection.

n Round Robin - the new connection is assigned to the first available server.

n Random - the new connection is assigned to a server at random.

n Domain - the new connection is assigned to a server based on domain names.

Open Security Extension (OSE) Devices


The Open Security Extension features let you manage third-party devices with the Check Point
SmartConsole. The number of managed devices, both hardware and software packets, depends
on your license. OSE devices commonly include hardware security devices for routing or
dedicated Network Address Translation and Authentication appliances. Security devices are
managed in the Security Policy as Embedded Devices.

The Security Management Server generates Access Lists from the Security Policy and downloads
them to selected routers and open security device. Check Point supports these devices:

OSE Device Supported Versions

Cisco Systems 9.x, 10.x, 11.x, 12.x

The Check Point Rule Base must not have these objects. If it does, the Security Management
Server will not generate Access Lists.

n Drop (in the Action column)

n Encrypt (Action)

n Alert (Action)

n RPC (Service)

n ACE (Service)

n Authentication Rules

n Negate Cell

Security Management R80.40 Administration Guide      |      168


Managing Objects

Defining OSE Device Interfaces

OSE devices report their network interfaces and setup at boot time. Each OSE device has a
different command to list its configuration. You must define at least one interface for each device,
or Install Policy will fail.

To define an OSE Device

1. From the Object Explorer, click New > More .

2. Click Network Object > More > OSE Device .

3. Enter the general properties (see "OSE Device Properties Window - General Tab" below ).

We recommend that you also add the OSE device to the host lists on other servers: hosts
(Linus) and lmhosts (Windows).

4. Open the Topology tab and add the interfaces of the device.

You can enable Anti-Spoofing on the external interfaces of the device. Double-click the
interface. In the Interface Properties window > Topology tab, select External and
Perform Anti-Spoofing.

5. Open the Setup tab and define the OSE device and its administrator credentials (see "Anti-
Spoofing Parameters and OSE Devices Setup (Cisco)" below ).

OSE Device Properties Window - General Tab

n Name - The name of the OSE device, as it appears in the system database on the server.

n IP Address -The device's IP address.

n Get Address - Click this button to resolve the name to an address.

n Comment - Text to show on the bottom of the Netw ork Object window when this object is
selected.

n Color - Select a color from the drop-down list. The OSE device will be represented in the
selected color in SmartConsole, for easier tracking and management.

n Type - Select from the list of supported vendors.

Anti-Spoofing Parameters and OSE Devices Setup (Cisco)

For Cisco (Version 10.x and higher) devices, you must specify the direction of the filter rules
generated from anti-spoofing parameters. The direction of enforcement is specified in the Setup
tab of each router.

For Cisco routers, the direction of enforcement is defined by the Spoof Rules Interface
Direction property.

Security Management R80.40 Administration Guide      |      169


Managing Objects

Access List No - The number of Cisco access lists enforced. Cisco routers Version 12x and below
support an ACL number range from 101-200. Cisco routers Version 12x and above support an ACL
range number from 101-200 and also an ACL number range from 2000-2699. Inputting this ACL
number range enables the support of more interfaces.

For each credential, select an option:

n None - Credential is not needed.

n Know n - The administrator must enter the credentials.

n Prompt - The administrator will be prompted for the credentials.

Username - The name required to logon to the OSE device.

Passw ord - The Administrator password (Read only) as defined on the router.

Enable Username - The user name required to install Access Lists.

Enable Passw ord - The password required to install Access Lists.

Version - The Cisco OSE device version (9.x, 10.x, 11.x, 12.x).

OSE Device Interface Direction - Installed rules are enforced on data packets traveling in this
direction on all interfaces.

Spoof Rules Interface Direction - The spoof tracking rules are enforced on data packets
traveling in this direction on all interfaces.

Security Management R80.40 Administration Guide      |      170


Managing Policies

Managing Policies
SmartConsole offers a number of tools that address policy management tasks, both at the
definition stage and for maintenance.

At the definition stage:

n Policy Packages let you group different types of policies, to be installed together on the same
installation targets.

n Predefined Installation Targets let you associate each package with a set of gateways. You do
not have to repeat the gateway selection process each time you install a Policy Package.

At the maintenance level:

n Search gives versatile search capabilities for network objects and the rules in the Rule Base.

n Database version control lets you track past changes to the database.

Work ing with Policy Pack ages


A policy package is a collection of different types of policies. After installation, the Security
Gateway enforces all the policies in the package. A policy package can have one or more of these
policy types:

n Access Control - consists of these types of rules:

l Firewall

l NAT

l Application & URL Filtering

l Content Awareness

n QoS - Quality of Service rules for bandwidth management

n Desktop Security - the Firewall policy for endpoint computers that have the Endpoint
Security VPN remote access client installed as a standalone client.

n Threat Prevention - consists of:

l IPS - IPS protections continually updated by IPS Services

l Anti-Bot - Detects bot-infected machines, prevents bot damage by blocking bot


commands and Control (C&C) communications

l Anti-Virus - Includes heuristic analysis, stops viruses, worms, and other malware at
the gateway

Security Management R80.40 Administration Guide      |      171


Managing Policies

l Threat Emulation - Detects zero-day and advanced polymorphic attacks by opening


suspicious files in a sandbox

l Threat Extraction- Extracts potentially malicious content from e-mail attachments


before they enter the corporate network

n HTTPS Inspection - Consists of rules to inspect traffic encrypted by the Transport Layer
Security (TLS) protocol between internal browser clients and web servers.

The installation process:

n Runs a heuristic verification on rules to make sure they are consistent and that there are no
redundant rules.

If there are verification errors, the policy is not installed. If there are verification warnings
(for example, if anti-spoofing is not enabled for a Security Gateway with multiple interfaces),
the policy package is installed with a warning.

n Makes sure that each of the Security Gateways enforces at least one of the rules. If none of
the rules are enforced, the default drop rule is enforced.

n Distributes the user database and object database to the selected installation targets.

You can create different policy packages for different types of sites in an organization.

Example

An organization has four sites, each with its own requirements. Each site has a different set of
Software Blades installed on the Security Gateways:

Security Management R80.40 Administration Guide      |      172


Managing Policies

Item Security Gateway Installed Software Blades

1 Sales California Firewall, VPN

2 Sales Alaska Firewall, VPN, IPS, DLP

3 Executive management Firewall, VPN, QoS, and Mobile Access

4 Server farm Firewall

5 Internet

To manage these different types of sites efficiently, you need to create three different Policy
Packages . Each Package includes a combination of policy types that correspond to the
Software Blades installed on the site's gateway. For example:

n A policy package that includes the Access Control policy type. The Access Control policy
type controls the firewall, NAT, Application & URL Filtering, and Content Awareness
Software Blades. This package also determines the VPN configuration.

Install the Access Control policy package on all Security Gateways.

n A policy package that includes the QoS policy type for the QoS blade on gateway that
manages bandwidth.

Install this policy package on the executive management Gateway.

n A policy package that includes the Desktop Security Policy type for the gateway that
handles Mobile Access.

Install this policy package on the executive management Gateway.

Creating a New Policy Pack age

1. From the Menu, select Manage policies and layers.

The Manage policies and layers window opens.

2. Click New .

The New Policy window opens.

3. Enter a name for the policy package.

4. In the General page > Policy types section, select one or more of these policy types:

n Access Control & HTTPS Inspection

n Threat Prevention

Security Management R80.40 Administration Guide      |      173


Managing Policies

n QoS, select Recommended or Express

n Desktop Security

To see the QoS, and Desktop Security policy types, enable them on one or more
Gateways:

Go to gateway editor > General Properties > Netw ork Security tab:

n For QoS, select QoS

n For Desktop Security, select IPSec VPN and Policy Server Pol

5. On the Installation targets page, select the gateways the policy will be installed on:

n All gatew ays

n Specific gatew ays - For each gateway, click the [+] sign and select it from the list.

To install Policy Packages correctly and eliminate errors, each Policy Package is associated
with a set of appropriate installation targets.

6. Click OK .

7. Click Close .

The new policy shows on the Security Policies page.

Adding a Policy Type to an Existing Policy Pack age

1. From the Menu, select Manage policies and layers.

The Manage policies and layers window opens.

2. Select a policy package and click the Edit button.

3. The New Policy package window opens.

4. On the General > Policy types page, select the policy type to add:

n Access Control & HTTPS Inspection

n Threat Prevention

n QoS, select Recommended or Express

n Desktop Security

5. Click OK .

Installing a Policy Pack age

1. On the Global Toolbar, click Install Policy .

The Install Policy window opens and shows the installation targets (Security Gateways).

2. From the Select a policy menu, select a policy package.

Security Management R80.40 Administration Guide      |      174


Managing Policies

3. Select one or more policy types that are available in the package.

4. Select the Install Mode :

n Install on each selected gatew ay independently - Install the policy on each


target gateway independently of others, so that if the installation fails on one of
them, it doesn't affect the installation on the rest of the target gateways.

Note - If you select For Gatew ay clusters install on all the members, if fails do
not install at all, the Security Management Server makes sure that it can install
the policy on all cluster members before it begins the installation. If the policy
cannot be installed on one of the members, policy installation fails for all of them.

n Install on all selected gatew ays, if it fails do not install on gatew ays of the
same version - Install the policy on all the target gateways. If the policy fails to
install on one of the gateways, the policy is not installed on other target gateways.

5. Click Install.

Installing the User Database

When you make changes to user definitions through SmartConsole, they are saved to the user
database on the Security Management Server. User authentication methods and encryption
keys are also saved in this database. The user database does not contain information about
users defined externally to the Security Gateway (such as users in external User Directory
groups), but it does contain information about the external groups themselves (for example, on
which Account Unit the external group is defined). Changes to external groups take effect only
after the policy is installed, or the user database is downloaded from the Security Management
Server.

You must choose to install the policy or the user database, based on the changes you made:

n Install the policy, if you modified additional components of the Policy Package (for
example, added new Security Policy rules) that are used by the installation targets

n Install the user database, if you only changed the user definitions or the administrator
definitions - from the Menu, select Install Database

The user database is installed on:

n Security Gateways - during policy installation

n Check Point hosts with one or more Management Software Blades enabled - during
database installation

You can also install the user database on Security Gateways and on a remote server, such as a
Log Server, from the command line interface on the Security Management Server.

To install user database from the command line interface:

On the Security Management Server, run in the Expert mode:

Security Management R80.40 Administration Guide      |      175


Managing Policies

fwm dbload <Main IP address of Name of Security Gateway Object>

For more information, see the R80.40 CLI Reference Guide - Chapter Security Management Server
Commands - Section fwm - Sub-section fwm dbload.

Note - Check Point hosts that do not have active Management Software
Blades do not get the user database installed on them.

Uninstalling a Policy Pack age

You can uninstall a policy package through a command line interface on the gateway.

To uninstall a policy pack age

1. Connect to the command line on the Security Gateway.

2. Log in to the Expert mode.

3. Run:

fw unloadlocal

Warning

n The "fw unloadlocal" command prevents all traffic from passing


through the Security Gateway (Cluster Member), because it disables
the IP Forwarding in the Linux kernel on the Security Gateway
(Cluster Member).
n The "fw unloadlocal" command removes all policies from the
Security Gateway (Cluster Member). This means that the Security
Gateway (Cluster Member) accepts all incoming connections
destined to all active interfaces without any filtering or protection
enabled.

For more information, see the R80.40 CLI Reference Guide - Chapter Security Gateway
Commands - Section fw - Sub-section fw unloadlocal.

Viewing Rule Logs


You can search for the logs that are generated by a specific rule, from the Security Policy or from
the Logs & Monitor > Logs tab.

To see logs generated by a rule (from the Security Policy)

1. In SmartConsole, go to the Security Policies view.

2. In the Access Control Policy or Threat Prevention Policy , select a rule.

3. In the bottom pane, click one of these tabs to see:

Security Management R80.40 Administration Guide      |      176


Managing Policies

n Logs - By default, shows the logs for the Current Rule. You can filter them by Source ,
Destination , Blade , Action , Service , Port , Source Port , Rule (Current rule is the
default), Origin , User , or Other Fields.

n History (Access Control Policy only) - List of rule operations (Audit logs) related to the
rule in chronological order, with the information about the rule type and the
administrator that made the change.

To see logs generated by a rule (by Searching the Logs)

1. In SmartConsole, go to the Security Policies view.

2. In the Access Control Policy or Threat Prevention Policy , select a rule.

3. Right-click the rule number and select Copy Rule UID.

4. In the Logs & Monitor > Logs tab, search for the logs in one of these ways:

n Paste the Rule UID into the query search bar and press Enter.

n For faster results, use this syntax in the query search bar:

layer_uuid_rule_uuid:*_<UID>

For example, paste this into the query search bar and press Enter:

layer_uuid_rule_uuid:*_46f0ee3b-026d-45b0-b7f0-5d71f6d8eb10

Policy Installation History


How to work with the policy installation history

In the Installation History you can choose a Gateway, a date and time when the Policy was
installed, and:

n See the revisions that were installed on the Gateway and who installed the Policy.

n See the changes that were installed and who made the changes.

n Revert to a specific version, and install the last "good" Policy.

To work with the Policy installation history:

1. In SmartConsole, go to Security Policies.

2. From the Access Tools or the Threat Prevention Tools, select Installation History .

3. In the Gatew ays section, select a Gateway.

4. In the Policy Installation History section, select an installation date.

5. To see the revisions that w ere installed and w ho made them:

Security Management R80.40 Administration Guide      |      177


Managing Policies

Click View installed changes.

To see the changes that w ere installed and w ho made them :

Click View .

To revert to a specific version of the Policy:

Click Install specific version .

Security Management R80.40 Administration Guide      |      178


Creating an Access Control Policy

Creating an Access Control Policy


Introducing the Unified Access Control
Policy
Define one, unified Access Control Policy. The Access Control Policy lets you create a simple and
granular Rule Base that combines all these Access Control features:

n Firewall - Control access to and from the internal network.

n Application & URL Filtering - Block applications and sites.

n Content Awareness - Restrict the Data Types that users can upload or download.

n IPsec VPN and Mobile Access - Configure secure communication with Site-to-Site and
Remote Access VPN.

n Identity Awareness - Identify users, computers, and networks.

There is no need to manage separate Rule Bases. For example, you can define one, intuitive rule
that: Allows users in specified networks, to use a specified application, but prevents downloading
files larger than a specified size. You can use all these objects in one rule:

n Security Zones
n Services
n Applications and URLs
n Data Types
n Access Roles

Information about these features is collected in one log:

n Network
n Protocol
n Application
n User
n Accessed resources
n Data Types

Security Management R80.40 Administration Guide      |      179


Creating an Access Control Policy

The Columns of the Access Control Rule


Base
The Columns of the Access ControlRule Base
These are the columns of the rules in the Access Control policy. Not all of these are shown by
default. To select a column that does not show, right-click on the header of the Rule Base, and
select it.

Column Description

No Rule number in the Rule Base Layer.

Hits Number of times that connections match a rule (see "The Columns of the Access
Control Rule Base" above).

Name Name that the system administrator gives this rule.

Source Network objects that define

n Where the traffic starts


Destination
n The destination of the traffic

(see "Source and Destination Column" on the next page)

VPN The VPN Community to which the rule applies.


(see "VPN Column" on the next page).

Services & Services, Applications, Categories, and Sites.


Applications If Application & URL Filtering is not enabled, only Services show.
(see "Services & Applications Column" on page 183)

Content The data asset to protect, for example, credit card numbers or medical records.
You can set the direction of the data to Download Traffic (into the
organization), Upload Traffic (out of the organization), or Any Direction.
(see "Content Column" on page 186)

Action Action that is done when traffic matches the rule. Options include: Accept,
Drop, Ask, Inform (UserCheck message), Inline Layer, and Reject.
(see "Actions" on page 188)

Track Tracking and logging action that is done when traffic matches the rule.
(see "Tracking Column" on page 190)

Security Management R80.40 Administration Guide      |      180


Creating an Access Control Policy

Column Description

Install On Network objects that will get the rule(s) of the policy.
(see "The Columns of the Access Control Rule Base" on the previous page)

Time Time period that this rule is enforced.

Comment An optional field that lets you summarize the rule.

Source and Destination Column


In the Source and Destination columns of the Access Control Policy Rule Base, you can add
Network objects including groups of all types. Here are some of the network objects you can
include:

n Network

n Host

n Zones (see "Managing Objects" on page 153)

n Dynamic Objects

n Domain Objects

n Access Roles

n Updatable Objects

To Learn More About Network Objects

You can add network objects to the Source and Destination columns of the Access Control
Policy. See "Managing Objects" on page 153.

VPN Column
You can configure rules for Site-to-Site VPN, Remote Access VPN, and the Mobile Access portal and
clients.

To make a rule for a VPN Community, add a Site-to-Site Community or a Remote Access VPN
Community object to this column, or select Any to make the rule apply to all VPN Communities.

When you enable Mobile Access on a gateway, the gateway is automatically added to the
RemoteAccess VPN Community. Include that Community in the VPN column of the rule or use
Any to make the rule apply to Mobile Access gateways. If the gateway was removed from the VPN
Community, the VPN column must contain Any .

Security Management R80.40 Administration Guide      |      181


Creating an Access Control Policy

IPsec VPN

The IPsec VPN solution lets the Security Gateway encrypt and decrypt traffic to and from other
gateways and clients. Use SmartConsole SmartConsole to easily configure VPN connections
between Security Gateways and remote devices.

For Site-to-Site Communities, you can configure Star and Mesh topologies for VPN networks, and
include third-party gateways.

The VPN tunnel guarantees:

n Authenticity - Uses standard authentication methods

n Privacy - All VPN data is encrypted

n Integrity - Uses industry-standard integrity assurance methods

IKE and IPsec

The Check Point VPN solution uses these secure VPN protocols to manage encryption keys, and
send encrypted packets. IKE (Internet Key Exchange) is a standard key management protocol that
is used to create the VPN tunnels. IPsec is protocol that supports secure IP communications that
are authenticated and encrypted on private or public networks.

Mobile Access to the Network

Check PointMobile Access lets remote users easily and securely use the Internet to connect to
internal networks. Remote users start a standard HTTPS request to the Mobile AccessSecurity
Gateway, and authenticate with one or more secure authentication methods.

The Mobile Access Portal lets mobile and remote workers connect easily and securely to critical
resources over the internet. Check Point Mobile Apps enable secure encrypted communication
from unmanaged smartphones and tablets to your corporate resources. Access can include
internal apps, email, calendar, and contacts.

To include access to Mobile Access applications in the Rule Base, include the Mobile Application
in the Services & Applications column.

To give access to resources through specified remote access clients, create Access Roles for the
clients and include them in the Source column of a rule.

To Learn More About VPN

To learn more about Site-to-Site VPN and Remote Access VPN, see these guides:

n R80.40 Site to Site VPN Administration Guide

n R80.40 Remote Access VPN Administration Guide

n R80.40 Mobile Access Administration Guide

Security Management R80.40 Administration Guide      |      182


Creating an Access Control Policy

Services & Applications Column


In the Services & Applications column of the Access ControlRule Base, define the applications,
sites, and services that are included in the rule. A rule can contain one or more:

n Services

n Applications

n Mobile Applications for Mobile Access

n Web sites

n Default categories of Internet traffic

n Custom groups or categories that you create, that are not included in the Check Point
Application Database.

Service Matching

The Firewall identifies (matches) a service according to IP protocol, TCP and UDP port number, and
protocol signature.

To make it possible for the Firewall to match services by protocol signature, you must enable
Applications and URL Filtering on the Gateway and on the Ordered Layer. (see "The Columns of
the Access Control Rule Base" on page 180 ).

You can configure TCP and UDP services to be matched by source port.

Application Matching

If an application is allowed in the policy, the rule is matched only on the Recommended services
of the application. This default setting is more secure than allowing the application on all
services. For example: a rule that allows Facebook, allows it only on the Application Control Web
Brow sing Services: http, https, HTTP_proxy, and HTTPS_proxy.

If an application is blocked in the policy, it is blocked on all services. It is therefore blocked on all
ports.

You can change the default match settings for applications.

Configuring Matching for an Allowed Application

You can configure how a rule matches an application or category that is allowed in the policy.
You can configure the rule to match the application in one of these ways:

n On any service

n On a specified service

To do this, change the Match Settings of the application or category. The application or
category is changed everywhere that it is used in the policy.

Security Management R80.40 Administration Guide      |      183


Creating an Access Control Policy

To change the matched services for an allowed application or category:

1. In a rule which has applications or categories in the Services & Applications column,
double-click an application or category.

2. Select Match Settings.

3. Select an option:

n The default is Recommended services. The defaults for Web services are the
Application Control Web Brow sing Services.

n To match the application with all services, click Any .

n To match the application on specified services, click Customize , and add or remove
services.

n To match the application with all services and exclude specified services, click
Customize , add the services to exclude, and select Negate .

4. Click OK .

Configuring Matching for Block ed Applications

By default, if an application is blocked in the policy, it is blocked on all services. It is therefore


blocked on all ports.

You can configure the matching for blocked applications so that they are matched on the
recommended services. For Web applications, the recommended services are the Application
Control Web browsing services.

If the match settings of the application are configured to Customize , the blocked application is
matched on the customized services service. It is not matched on all ports.

To configure matching for block ed applications:

1. In SmartConsole, go to Manage & Settings > Blades > Application & URL Filtering >
Advanced Settings > Application Port Match

2. Configure Match application on 'Any' port w hen used in 'Block' rule :

n Selected - This is the default. If an application is blocked in the Rule Base, the
application is matched to Any port.

n Not selected - If an application is blocked in the Rule Base, the application is


matched to the services that are configured in the application object of the
application. However, some applications are still matched on Any. These are
applications (Skype, for example) that do not limit themselves to a standard set of
services.

Security Management R80.40 Administration Guide      |      184


Creating an Access Control Policy

Summary of Application Matching in a " Block " Rule

Application - Check box: Match web application on 'Any' Block ed Application is


Match Setting port when used in 'Block ' rule Matched on Service

Recommended Selected (default) Any


services (default)

Recommended Not selected Recommended services


services (default)

Customize Not relevant Customized

Any Not relevant Any

Adding Services, Applications, and Sites to a rule

You can add services, applications and sites to a rule.

Note - Rules with applications or categories do not apply to connections from or to the
Security Gateway.

To add services, applications or sites to a rule:

1. In the Security Policies view of SmartConsole, go to the Access Control Policy.

2. To add applications to a rule, select a Layer with Applications and URL Filtering
enabled.

3. Right-click the Services & Applications cell for the rule and select Add New Items.

4. Search for the services, sites, applications, or categories.

5. Click the + next to the ones you want to add.

Creating Custom Applications, Categories, and Groups

You can create custom applications, categories or groups, which are not included in the Check
Point Application Database.

To create a new application or site:

1. In the Security Policies view of SmartConsole, go to the Access Control Policy.

2. Select a Layer with Applications and URL Filtering enabled.

3. Right-click the Services & Applications cell for the rule and select Add New Items.

The Application viewer window opens.

Security Management R80.40 Administration Guide      |      185


Creating an Access Control Policy

4. Click New > Custom Applications/Site > Application/Site .

5. Enter a name for the object.

6. Enter one or more URLs.

If you used a regular expression in the URL, click URLs are defined as Regular
Expressions.

Note - If the application or site URL is defined as a regular expression


you must use the correct syntax.

7. Click OK .

To create a custom category

1. In the Security Policies view of SmartConsole, go to the Access Control Policy.

2. Select a Layer with Applications and URL Filtering enabled.

3. Right-click the Services & Applications cell for the rule and select Add New Items.

The Application viewer window opens.

4. Click New > Custom Applications/Site > User Category .

5. Enter a name for the object.

6. Enter a description for the object.

7. Click OK .

Services and Applications on R77.30 and Lower Security Gateways, and after
Upgrade

For Security Gateways R77.30 and lower:

n The Firewall matches TCP and UDP services by port number. The Firewall cannot match
services by protocol signature.

n The Firewall matches applications by the application signature.

When you upgrade the Security Management Server and the Security Gateways to R80 and
higher, this change of behavior occurs:

n Applications that were defined in the Application & URL FilteringRule Base are accepted on
their recommended ports

Content Column
You can add Data Types to the Content column of rules in the Access Control Policy.

Security Management R80.40 Administration Guide      |      186


Creating an Access Control Policy

To use the Content column, you must enable Content Aw areness, in the General Properties
page of the Security Gateway, and on the Layer.

A Data Type is a classification of data. The Firewall classifies incoming and outgoing traffic
according to Data Types, and enforces the Policy accordingly.

You can set the direction of the data in the Policy to Dow nload Traffic (into the organization),
Upload Traffic (out of the organization), or Any Direction .

There are two kinds of Data Types: Content Types (classified by analyzing the file content) and File
Types (classified by analyzing the file ID).

Content Type examples:

n PCI - credit card numbers

n HIPAA - Medical Records Number - MRN

n International Bank Account Numbers - IBAN

n Source Code - JAVA

n U.S. Social Security Numbers - According to SSA

n Salary Survey Terms

File type examples:

n Viewer File - PDF

n Executable file

n Database file

n Document file

n Presentation file

n Spreadsheet file

Note these limitations:

n Websocket content is not inspected.

n HTTP connections that are not RFC-compliant are not inspected.

To learn more about the Data Types, open the Data Type object in SmartConsole and press the ?
button (or F1 key) to see the Help.

Note - Content Awareness and Data Loss Prevention (DLP) both use Data Types. However, they
have different features and capabilities. They work independently, and the Security Gateway
enforces them separately.

To learn more about DLP, see the R80.40 Data Loss Prevention Administration Guide.

Security Management R80.40 Administration Guide      |      187


Creating an Access Control Policy

Actions

Action Meaning

Accept Accepts the traffic

Drop Drops the traffic. The Firewall does not send a response
to the originating end of the connection and the
connection eventually does a time-out. If no UserCheck
object is defined for this action, no page is displayed.

Ask Asks the user a question and adds a confirmatory check


box, or a reason box. Uses a UserCheck object.

Inform Sends a message to the user attempting to access the


application or the content. Uses a UserCheck object.

To see these
actions, right-
click and
select More :

Reject Rejects the traffic. The Firewall sends an RST packet to


the originating end of the connection and the connection
is closed.

UserCheck Configure how often the user sees the configured


Frequency message when the action is ask, inform, or block.

Confirm Select the action that triggers a UserCheck message:


UserCheck
n Per rule - UserCheck message shows only once
when traffic matches a rule.
n Per category - UserCheck message shows for each
matching category in a rule.
n Per application/Site - UserCheck message shows
for each matching application/site in a rule.
n Per Data type - UserCheck message shows for
each matching data type.

Limit Limits the bandwidth that is permitted for a rule. Add a


Limit object to configure a maximum throughput for
uploads and downloads.

Security Management R80.40 Administration Guide      |      188


Creating an Access Control Policy

Action Meaning

Enable Redirects HTTP traffic to an authentication (captive)


Identity portal. After the user is authenticated, new connections
Captive from this source are inspected without requiring
Portal authentication.

Important - A rule that drops traffic, with the Source and


Destination parameters defined as Any , also drops traffic to and
from the Captive Portal.

UserCheck Actions

UserCheck lets the Security Gateways send messages to users about possible non-compliant or
dangerous Internet browsing. In the Access Control Policy, it works with URL Filtering, Application
Control, and Content Awareness. (You can also use UserCheck in the Data Loss Prevention Policy,
in SmartConsole). Create UserCheck objects and use them in the Rule Base, to communicate with
the users. These actions use UserCheck objects:

n Inform

n Ask

n Drop

UserCheck on a Security Gateway

When UserCheck is enabled, the user's Internet browser shows the UserCheck messages in a new
window.

You can enable UserCheck on Security Gateways that use:

n Access Control features:

l Application Control

l URL Filtering

l Content Awareness

n Threat Prevention features:

l Anti-Virus

l Anti-Bot

l Threat Emulation

l Threat Extraction

n Data Loss Prevention

Security Management R80.40 Administration Guide      |      189


Creating an Access Control Policy

UserCheck on a computer

The UserCheck client is installed on endpoint computers. This client:

n Sends messages for applications that are not based on Internet browsers, such as Skype
and iTunes, and Internet browser add-ons and plug-ins.

n Shows a message on the computer when it cannot be shown in the Internet browser.

To Learn More About UserCheck

To learn more about UserCheck, see the R80.40 Next Generation Security Gateway Guide.

Tracking Column
These are some of the Tracking options:

n None - Do not generate a log.

n Log -This is the default Track option. It shows all the information that the Security Gateway
used to match the connection.

n Accounting - Select this to update the log at 10 minute intervals, to show how much data
has passed in the connection: Upload bytes, Download bytes, and browse time.

To Learn More About Track ing

To learn more about Tracking options, see the R80.40 Logging and Monitoring Administration Guide.

Rule Matching in the Access Control Policy


The Firewall determines the rule to apply to a connection. This is called matching a connection.
Understanding how the firewall matches connections will help you:

n Get better performance from the Rule Base.

n Understand the logs that show a matched connection.

Examples of Rule Matching

These example Rule Bases show how the Firewall matches connections.

Note that these Rule Bases intentionally do not follow the best practices for Access Control
Rules (see "Rule Matching in the Access Control Policy" above). This is to make the explanations of
rule matching clearer.

Rule Base Matching - Example 1

For this Rule Base:

Security Management R80.40 Administration Guide      |      190


Creating an Access Control Policy

Services &
No Source Destination Content Action
Applications

1 InternalZone Internet ftp-pasv Download executable Drop


file

2 Any Any Any Executable file Accept

3 Any Any Gambling Any Drop


(Category)

4 Any Any Any Any Accept

This is the matching procedure for an FTP connection:

Part of
Firewall action Inspection result
connection

SYN Run the Rule Base: Final match (drop on rule 1).
Look for the first rule Shows in the log.
that matches: The Firewall does not turn on the inspection
engines for the other rules.
n Rule 1 - Match.

Rule Base Matching - Example 2

For this Rule Base:

Services &
No. Source Destination Content Action
Applications

1 InternalZone Internet Any Download executable Drop


file

2 Any Any Gambling Any Drop


(category)

3 Any Any ftp Any Drop

4 Any Any Any Any Accept

This is the matching procedure when browsing to a file sharing Web site. Follow the rows
from top to bottom. Follow each row from left to right:

Security Management R80.40 Administration Guide      |      191


Creating an Access Control Policy

Part of
Firewall action Inspection result
connection

SYN Run the Rule Base. Possible match (Continue to


Look for the first rule that matches: inspect the connection).

n Rule 1 - Possible match.


n Rule 2 - Possible match.
n Rule 3 - No match.
n Rule 4 - Match.

HTTP The Firewall turns on inspection engines to Application: File sharing


Header examine the data in the connection. (category).
In this example turn on the: Content: Don't know yet.

n URL Filtering engine - Is it a gambling


site?
n Content Awareness engine - Is it an
executable file?

Optimize the Rule Base matching. Possible match (Continue to


Look for the first rule that matches: inspect the connection).

n Rule 1 - Possible match.


n Rule 2 - No match.
n Rule 3 - No match.
n Rule 4 - Match.

HTTP Body Examine the file. Data: PDF file.

Optimize the Rule Base matching. Final match (accept on rule


Look for the first rule that matches: 4).
Shows in the log.
n Rule 1 - No match.
n Rule 2 - No match.
n Rule 3 - No match.
n Rule 4 - Match.

Rule Base Matching - Example 3

For this Rule Base:

Security Management R80.40 Administration Guide      |      192


Creating an Access Control Policy

Services &
No. Source Destination Content Action
Applications

1 InternalZone Internet Any Download executable Drop


file

2 Any Any Gambling Any Drop


(Category)

3 Any Any Any Any Accept

This is the matching procedure when downloading an executable file from a business Web
site. Follow the rows from top to bottom. Follow each row from left to right:

Part of
Firewall action Inspection result
connection

SYN Run the Rule Base. Possible match (Continue to


Look for the first rule that matches: inspect the connection).

n Rule 1 - Possible match.


n Rule 2 - Possible match.
n Rule 3 - Match.

HTTP The Firewall turns on inspection engines to Application: Business


Header examine the content in the connection. (Category).
In this example turn on the: Content: Don't know yet.

n URL Filtering engine - Is it a gambling


site?
n Content Awareness engine - Is it an
executable file?

Optimize the Rule Base matching. Possible match (Continue to


Look for the first rule that matches: inspect the connection).

n Rule 1 - Possible match.


n Rule 2 - No match.
n Rule 3 - Match.

HTTP Body Examine the file. Content: Executable file.

Security Management R80.40 Administration Guide      |      193


Creating an Access Control Policy

Part of
Firewall action Inspection result
connection

Optimize the Rule Base matching. Final match (accept on rule


Look for the first rule that matches: 1).
Shows in the log.
n Rule 1 - Match.
n Rule 2 - No match.
n Rule 3 - Match.

The matching examples show that:

n The Firewall sometimes runs the Rule Base more than one time. Each time it runs, the
Firewall optimizes the matching, to find the first rule that applies to the connection.

n If the rule includes an application, or a site, or a service with a protocol signature (in
the Application and Services column), or a Data Type (in the Content column), the
Firewall:

l Turns on one or more inspection engines.

l Postpones making the final match decision until it has inspected the body of the
connection.

n The Firewall searches for the first rule that applies to (matches) a connection. If the
Firewall does not have all the information it needs to identify the matching rule, it
continues to inspect the traffic.

Creating a Basic Access Control Policy


A firewall controls access to computers, clients, servers, and applications using a set of rules that
make up an Access ControlRule Base. You need to configure a Rule Base with secure Access
Control and optimized network performance.

A strong Access ControlRule Base:

n Allows only authorized connections and prevents vulnerabilities in a network.


n Gives authorized users access to the correct internal resources.
n Efficiently inspects connections.

Basic Rules
Best Practice - These are basic Access Control rules we recommend for all Rule Bases:

n Stealth rule that prevents direct access to the Security Gateway


n Cleanup rule that drops all traffic that is not matched by the earlier rules in the
policy

Security Management R80.40 Administration Guide      |      194


Creating an Access Control Policy

Use Case - Basic Access Control


This use case shows a Rule Base for a simple Access Control security policy. (The Hits, VPN and
Content columns are not shown.)

Services &
No Name Source Destination Action Track Install On
Applications

1 Admin Admins Gateways- Any Accept Log Policy


Access to (Access Role) group Targets
Gateways

2 Stealth Any Gateways- Any Drop Alert Policy


group Targets

3 Critical Internal Finance Any Accept Log CorpGW


subnet HR
R&D

4 Tech TechSupport Remote1- HTTP Accept Alert Remote1GW


support web

5 DNS Any DNS Domain UDP Accept None Policy


server Targets

6 Mail and Any DMZ HTTP Accept Log Policy


Web HTTPS Targets
servers SMTP

7 SMTP Mail NOT SMTP Accept Log Policy


Internal Targets
net group

8 DMZ & IntGroup Any Any Accept Log Policy


Internet Targets

9 Cleanup Any Any Any Drop Log Policy


rule Targets

Explanations for rules:

Rule Explanation

1 Admin Access to Gatew ays - SmartConsole administrators are allowed to connect to


the Security Gateways.

Security Management R80.40 Administration Guide      |      195


Creating an Access Control Policy

Rule Explanation

2 Stealth - All internal traffic that is NOT from the SmartConsole administrators to one of
the Security Gateways is dropped. When a connection matches the Stealth rule, an alert
window opens in SmartView Monitor.

3 Critical subnet - Traffic from the internal network to the specified resources is logged.
This rule defines three subnets as critical resources: Finance, HR, and R&D.

4 Tech support - Allows the Technical Support server to access the Remote-1 web server
which is behind the Remote-1 Security Gateway. Only HTTP traffic is allowed. When a
packet matches the Tech support rule, the Alert action is done.

5 DNS server - Allows UDP traffic to the external DNS server. This traffic is not logged.

6 Mail and Web servers - Allows incoming traffic to the mail and web servers that are
located in the DMZ. HTTP, HTTPS, and SMTP traffic is allowed.

7 SMTP - Allows outgoing SMTP connections to the mail server. Does not allow SMTP
connections to the internal network, to protect against a compromised mail server.

8 DMZ and Internet - Allows traffic from the internal network to the DMZ and Internet.

9 Cleanup rule - Drops all traffic that does not match one of the earlier rules.

Use Case - Inline Layer for Each Department


This use case shows a basic Access Control Policy with a sub-policy for each department. The
rules for each department are in an Inline Layer. An Inline Layer is independent of the rest of the
Rule Base. You can delegate ownership of different Layers to different administrators.

Services &
N Destinatio Conten Trac
Name Source Application Action
o n t k
s

1 Critical Internal Finance Any Any Accept Log


subnet HR

2 SMTP Mail NOT smtp Any Accept Log


internal
network
(Group)

Security Management R80.40 Administration Guide      |      196


Creating an Access Control Policy

Services &
N Destinatio Conten Trac
Name Source Application Action
o n t k
s

3 R&D R&D Roles Any Any Any TechSuppor N/A


departmen t Layer
t

3. R&D Any R&D Any Any Accept Log


1 servers servers
(Group)
QA
network

3. R&D InternalZon Source ssh Any Accept Log


2 source e control http
control servers https
(Group)

--- --- --- --- --- --- --- ---

3. Cleanup Any Any Any Any Drop Log


X rule

4 QA QA network Any Any Any QA Layer N/A


departmen
t

4. Allow Any R&D Web Any Accept Log


1 access to Servers Services
R&D (Group)
servers

--- --- --- --- --- --- --- ---

4. Cleanup Any Any Any Any Drop Log


Y rule

5 Allow all Any Employee Web Any Accept None


users to portal Services
access
employee
portal

--- --- --- --- --- --- --- ---

Security Management R80.40 Administration Guide      |      197


Creating an Access Control Policy

Services &
N Destinatio Conten Trac
Name Source Application Action
o n t k
s

9 Cleanup Any Any Any Any Drop Log


rule

Explanations for rules:

Rules Explanation

1 General rules for the whole organization.


2

3 An Inline Layer for the R&D department.


3.1 Rule 3 is the parent rules of the Inline Layer. The Action is the name of the Inline
3.2 Layer.
--- If a packet does not match on parent rule 3:
3.X Matching continues to the next rule outside the Inline Layer (rule 4).
If a packet matches on parent rule 3:
Matching continues to 3.1, first rule inside the Inline Layer. If a packet matches on this
rule, the rule action is done on the packet.
If a packet does not match on rule 3.1, continue to the next rule inside the Inline Layer,
rule 3.2. If there is no match, continue to the remaining rules in the Inline Layer. ---
means one or more rules.
The packet is matched only inside the inline layer. It never leaves the inline layer,
because the inline layer has an implicit cleanup rule. It is not matched on rules 4, 5
and the other rules in the Ordered Layer.
Rule 3.X is a cleanup rule . It drops all traffic that does not match one of the earlier
rules in the Inline Layer. This is a default explicit rule. You can change or delete it.
Best Practice -Have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.

4 Another Inline Layer, for the QA department.


4.1
---
4.Y

5 More general rules for the whole organization.

-- One or more rules.

Security Management R80.40 Administration Guide      |      198


Creating an Access Control Policy

Rules Explanation

9 Cleanup rule - Drop all traffic that does not match one of the earlier rules in the
Ordered Layer. This is a default explicit rule. You can change or delete it.
Best Practice -Have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.

Creating Application Control and URL


Filtering Rules
Create and manage the Policy for Application Control and URL Filtering in the Access Control
Policy, in the Access Control view of SmartConsole. Application Control and URL Filtering rules
define which users can use specified applications and sites from within your organization and
what application and site usage is recorded in the logs.

To learn which applications and categories have a high risk, look through the Application Wiki in
the Access Tools part of the Security Policies view. Find ideas for applications and categories to
include in your Policy.

To see an overview of your Access Control Policy and traffic, see the Access Control view in Logs
& Monitor > New Tab > View s.

Monitoring Applications

Scenario: I want to monitor all Facebook traffic in my organization. How can I do this?

To monitor all Facebook application traffic:

1. In the Security Policies view of SmartConsole, go to the Access Control Policy.

2. Choose a Layer with Applications and URL Filtering enabled.

3. Click one of the Add rule toolbar buttons to add the rule in the position that you choose
in the Rule Base. The first rule matched is applied.

4. Create a rule that includes these components:

n Name - Give the rule a name, such as Monitor Facebook .


n Source - Keep it as Any so that it applies to all traffic from the organization.
n Destination - Keep it as Internet so that it applies to all traffic going to the
internet or DMZ.

Security Management R80.40 Administration Guide      |      199


Creating an Access Control Policy

n Services & Applications - Click the plus sign to open the Application viewer. Add
the Facebook application to the rule:

l Start to type "face" in the Search field. In the Available list, see the Facebook
application.

n Click each item to see more details in the description pane.

n Select the items to add to the rule.

Note - Applications are matched by default on their Recommended


services. You can change this (see "Creating Application Control and URL
Filtering Rules" on the previous page). Each service runs on a specific port. The
recommended Web Brow sing Services are http, https, HTTP_proxy, and
HTTPS_proxy.

n Action - Select Accept

n Track - Select Log

n Install On - Keep it as Policy Targets for or all gateways, or choose specific Security
Gateways on which to install the rule

The rule allows all Facebook traffic but logs it. You can see the logs in the Logs & Monitor
view, in the Logs tab. To monitor how people use Facebook in your organization, see the
Access Control view (SmartEvent Server required).

Block ing Applications and Informing Users

Scenario: I want to block pornographic sites in my organization, and tell the user about the
violation. How can I do this?

To block an application or category of applications and tell the user about the policy
violation:

1. In the Security Policies view of SmartConsole, go to the Access Control Policy.

2. Choose a Layer with Applications and URL Filtering enabled.

3. Create a rule that includes these components:

n Services & Applications - Select the Pornography category.

n Action - Drop, and a UserCheck Blocked Message - Access Control

The message informs users that their actions are against company policy and can

Security Management R80.40 Administration Guide      |      200


Creating an Access Control Policy

include a link to report if the website is included in an incorrect category.

n Track - Log

Note - This Rule Base example contains only those columns that
are applicable to this subject.

Services & Install


Name Source Destination Action Track
Applications On

Block Any Internet Pornography Drop Log Policy


Porn (category) Blocked Targets
Message

The rule blocks traffic to pornographic sites and logs attempts to access those sites. Users who
violate the rule receive a UserCheck message that informs them that the application is blocked
according to company security policy. The message can include a link to report if the website is
included in an incorrect category.

Important - A rule that blocks traffic, with the Source and Destination parameters defined
as Any , also blocks traffic to and from the Captive Portal.

Limiting Application Traffic

Scenario: I want to limit my employees' access to streaming media so that it does not impede
business tasks.

If you do not want to block an application or category, there are different ways to set limits for
employee access:

n Add a Limit object to a rule to limit the bandwidth that is permitted for the rule.

n Add one or more Time objects to a rule to make it active only during specified times.

The example rule below:

n Allows access to streaming media during non-peak business hours only.

n Limits the upload throughput for streaming media in the company to 1 Gbps.

To create a rule that allows streaming media with time and bandwidth limits:

1. In the Security Policies view of SmartConsole, go to the Access Control Policy.

2. Choose a Layer with Applications and URL Filtering enabled.

3. Click one of the Add Rule toolbar buttons to add the rule in the position that you choose
in the Rule Base.

4. Create a rule that includes these components:

Security Management R80.40 Administration Guide      |      201


Creating an Access Control Policy

n Services & Applications - Media Streams category.

Note - Applications are matched on their Recommended


services, where each service runs on a specific port, such as the
default Application Control Web brow sing Services: http,
https, HTTP_proxy, and HTTPS_proxy. To change this, see
"Creating Application Control and URL Filtering Rules" on page 199.

n Action - Click More and select Action : Accept, and a Limit object.

n Time - Add a Time object that specifies the hours or time period in which the rule
is active.

Note - The Time column is not shown by default in the Rule Base table. To see it,
right-click on the table header and select Time .

Services
Sourc Destinatio and Trac Insta Tim
Name Action
e n Applicatio k ll On e
ns

Limit Any Internet Media Accept Log All Off-


Streamin Streams Uploa Wor
g Media (Category) d_ k
1Gbps

Note - In a cluster environment, the specified bandwidth limit is divided


between all defined cluster members, whether active or not. For example, if
a rule sets 1Gbps limit in a three member cluster, each member has a fixed
limit of 333 Mbps.

Using Identity Awareness Features in Rules

Scenario: I want to allow a Remote Access application for a specified group of users and block the
same application for other users. I also want to block other Remote Access applications for
everyone. How can I do this?

If you enable Identity Awareness on a Security Gateway, you can use it together with
Application Control to make rules that apply to an access role. Use access role objects to define
users, machines, and network locations as one object.

In this example:

n You have already created an Access Role Identified_Users that represents all identified
users in the organization. You can use this to allow access to applications only for users
who are identified on the Security Gateway.

n You want to allow access to the Radmin Remote Access tool for all identified users.

n You want to block all other Remote Access tools for everyone within your organization.

Security Management R80.40 Administration Guide      |      202


Creating an Access Control Policy

You also want to block any other application that can establish remote connections or
remote control.

To do this, add two new rules to the Rule Base:

1. Create a rule and include these components:

n Source - The Identified_Users access role

n Destination - Internet

n Services & Applications - Radmin

n Action - Accept

2. Create another rule below and include these components:

n Source - Any

n Destination - Internet

n Services & Applications - The category: Remote Administration

n Action - Block

Services & Install


Name Source Destination Action Track
Applications On

Allow Radmin to Identified_ Internet Radmin Allow Log All


Identified Users Users

Block other Any Internet Remote Block Log All


Remote Admins Administration

Notes on these rules::

n Because the rule that allows Radmin is above the rule that blocks other
Remote Administration tools, it is matched first.
n The Source of the first rule is the Identified_Users access role. If you
use an access role that represents the Technical Support department,
then only users from the technical support department are allowed to
use Radmin.
n Applications are matched on their Recommended services, where
each service runs on a specific port, such as the default Application
Control Web brow sing services: http, https, HTTP_proxy, and
HTTPS_proxy. To change this see Changing Services for Applications
and Categories.

For more about Access Roles and Identity Awareness, see the R80.40 Identity Awareness
Administration Guide.

Security Management R80.40 Administration Guide      |      203


Creating an Access Control Policy

Block ing Sites

Scenario: I want to block sites that are associated with categories that can cause liability issues.
Most of these categories exist in the Application Database but there is also a custom defined site
that must be included. How can I do this?

You can do this by creating a custom group and adding all applicable categories and the site to
it. If you enable Identity Awareness on a Security Gateway, you can use it together with URL
Filtering to make rules that apply to an access role. Use access role objects to define users,
machines, and network locations as one object.

In this example:

n You have already created

l An Access Role that represents all identified users in the organization (Identified_
Users).

l A custom application for a site named FreeMovies.

n You want to block sites that can cause liability issues for everyone within your
organization.

n You will create a custom group that includes Application Database categories as well as
the previously defined custom site named FreeMovies.

To create a custom group

1. In the Object Explorer, click New > More > Custom Application/Site >
Application/Site Group.

2. Give the group a name. For example, Liability_Sites.

3. Click + to add the group members:

n Search for and add the custom application FreeMovies.

n Select Categories, and add the ones you want to block (for example Anonymizer,
Critical Risk, and Gambling)

n Click Close

4. Click OK .

You can now use the Liability_Sitesgroup in the Access ControlRule Base.

In the Rule Base, add a rule similar to this

In the Security Policies view of SmartConsole, go to the Access Control Policy.

n Source - The Identified_Users access role

n Destination - Internet

Security Management R80.40 Administration Guide      |      204


Creating an Access Control Policy

n Services & Applications - Liability_Sites

n Action - Drop

Note - Applications are matched on their Recommended services,


where each service runs on a specific port, such as the default
Application Control Web Brow sing Services: http, https, HTTP_
proxy, and HTTPS_proxy. To change this see Changing Services
for Applications and Categories.

Services &
Name Source Destination Action Track
Applications

Block sites that may Identified_ Internet Liability_Sites Drop Log


cause a liability Users

Blocking URL Categories


Scenario: I want to block pornographic sites. How can I do this?

You can do this by creating a rule that blocks all sites with pornographic material with the
Pornography category. If you enable Identity Awareness on a Security Gateway, you can use it
together with URL Filtering to make rules that apply to an access role. Use access role objects to
define users, machines, and network locations as one object.

In this example:

n You have already created an Access Role (Identified_Users) that represents all identified
users in the organization.

n You want to block sites related to pornography.

The procedure is similar to "Creating Application Control and URL Filtering Rules" on page 199.

Ordered Layers and Inline Layers


A policy is a set of rules that the gateway enforces on incoming and outgoing traffic. There are
different policies for Access Control and for Threat Prevention.

You can organize the Access Control rules in more manageable subsets of rules using Ordered
Layers and Inline Layers.

The Need for Ordered Layers and Inline Layers


Ordered Layers and Inline Layers helps you manage your cyber security more efficiently. You can:

n Simplify the Rule Base, or organize parts of it for specific purposes.

n Organize the Policy into a hierarchy, using Inline Layers, rather than having a flat Rule Base.

Security Management R80.40 Administration Guide      |      205


Creating an Access Control Policy

An Inline Layer is a sub-policy which is independent of the rest of the Rule Base.

n Reuse Ordered Layers in multiple Policy packages, and reuse Inline Layers in multiple
Layers.

n Simplify the management of the Policy by delegating ownership of different Layers to


different administrators.

n Improve performance by reducing the number of rules in a Layer.

Order of Rule Enforcement in Inline Layers


The Ordered Layer can contain Inline Layers.

This is an example of an Inline Layer:

No. Source Destination VPN Services Action

2 Lab_network Any Any Any Lab_rules

2.1 Any Any Any https Allow


http

2.2 Any Any Any Any Drop

The Inline Layer has a parent rule (Rule 2 in the example), and sub rules (Rules 2.1 and 2.2). The
Action of the parent rule is the name of the Inline Layer.

If the packet does not match the parent rule of the Inline Layer, the matching continues to the
next rule of the Ordered Layer (Rule 3).

If a packet matches the parent rule of the Inline Layer (Rule 2), the Firewall checks it against the
sub rules:

n If the packet matches a sub rule in the Inline Layer (Rule 2.1), no more rule matching is
done.

n If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup
Rule is applied (Rule 2.2). If this rule is missing, the Implicit Cleanup Rule is applied (see
"Types of Rules in the Rule Base" on page 211). No more rule matching is done.

Important - Always add an explicit Cleanup Rule at the end of each Inline
Layer, and make sure that its Action is the same as the Action of the Implicit
Cleanup Rule .

Security Management R80.40 Administration Guide      |      206


Creating an Access Control Policy

Order of Rule Enforcement in Ordered Layers


When a packet arrives at the gateway, the gateway checks it against the rules in the first Ordered
Layer, sequentially from top to bottom, and enforces the first rule that matches a packet.

If the Action of the matching rule is Drop, the gateway stops matching against later rules in the
Policy Rule Base and drops the packet. If the Action is Accept , the gateway continues to check
rules in the next Ordered Layer.

Item Description

1 Ordered Layer 1

2 Ordered Layer 2

3 Ordered Layer 3

If none of the rules in the Ordered Layer match the packet, the explicit Default Cleanup Rule is
applied. If this rule is missing, the Implicit Cleanup Rule is applied (see "Types of Rules in the Rule
Base" on page 211).

Every Ordered Layer has its own implicit cleanup rule. You can configure the rule to Acceptor Drop
in the Layer settings. (see "Configuring the Implicit Cleanup Rule" on page 214).

Important - Always add an explicit Cleanup Rule at the end of each Ordered
Layer, and make sure that its Action is the same as the Action of the Implicit
Cleanup Rule .

Creating an Inline Layer


An Inline Layer is a sub-policy, which is independent of the rest of the Rule Base.

The workflow for making an Inline Layer is:

Security Management R80.40 Administration Guide      |      207


Creating an Access Control Policy

1. Create a parent rule for the Inline Layer. Make a rule that has one or more properties that
are the same for all the rules in the Inline Layer. For example, rules that have the same
source, or service, or group of users.

2. Create sub-rules for the Inline Layer. These are rules that define in more detail what to do if
the Firewall matches a connection to the parent rule. For example, each sub-rule can apply
to specified hosts, or users, or services, or Data Types.

To create an Inline Layer

1. Add a rule to the Ordered Layer. This is the parent rule.

2. In the Source , Destination , VPN , and Services & Applications cells, define the match
conditions for the Inline Layer.

3. Click the Action cell of the rule. Instead of selecting a standard action, select Inline
Layer > New Layer .

4. The Layer Editor window opens.

5. Configure the properties of the Inline Layer:

a. Enable one or more of these Blades for the rules of Inline Layer:

n Firew all

n Application & URL Filtering

n Content Aw areness

n Mobile Access

b. Optional: It is a best practice to share Layers with other Policy packages when
possible. To enable this select Multiple policies can use this layer .

c. Click Advanced.

d. Configure the Implicit Cleanup Rule to Drop or Accept (see "Types of Rules in the
Rule Base" on page 211).

e. Click OK .

The name of the Inline Layer shows in the Action cell of the rule.

6. Under the parent rule of the Inline Layer, add sub-rules.

7. Make sure there is an explicit cleanup rule as the last rule of the Inline Layer. (see "Types
of Rules in the Rule Base" on page 211).

Creating a Ordered Layer


To create an Ordered Layer

1. In SmartConsole, click Menu > Manage Policies and Layers.

Security Management R80.40 Administration Guide      |      208


Creating an Access Control Policy

2. In the left pane, click Layers.

You will see a list of the Layers. You can select Show only shared Layers.

3. Click the New icon in the upper toolbar.

4. Configure the settings in the Layer Editor window.

5. Optional: It is a best practice to share Layers with other Policy packages when possible.
To enable this select Multiple policies can use this layer .

6. Click OK .

7. Click Close .

8. Publish the SmartConsole session.

This Ordered Layer is not yet assigned to a Policy Package.

To add an Ordered Layer to the Access Control Policy

1. In SmartConsole, click Security Policies.

2. Right-click a Layer in the Access Control Policy section and select Edit Policy .

The Policy window opens.

3. In the Access Control section, click the plus sign.

You will see a list of the Layers that you can add. These are Layers that have Multiple
policies can use this layer enabled.

4. Select the Layer.

5. Click OK .

6. Publish the SmartConsole session.

Pre-R80.10 Gateways: To create a Layer for URL Filtering and Application Control

1. In SmartConsole, click Security Policies.

2. Right-click a Layer in the Access Control Policy section and select Edit Policy .

The Policy window opens.

3. In the Access Control section, click the plus sign.

4. Click New Layer .

The Layer Editor window opens and shows the General view.

5. Enable Application & URL Filtering on the Layer.

Security Management R80.40 Administration Guide      |      209


Creating an Access Control Policy

a. Enter a name for the Layer.

We recommend the name Application .

b. In the Blades section, select Applications & URL Filtering.

c. Click OK and the Layer Editor window closes.

d. Click OK and the Policy window closes.

6. Publish the SmartConsole session.

Enabling Access Control Features


Before creating the Access Control Policy, you must enable the Access Control features that you
will use in the Policy.

Enable the features on the:

n Security Gateways on which you will install the Policy.

n Ordered Layers and Inline Layers of the Policy. Here you can enable:

l Firewall. This includes VPN (see "Ordered Layers and Inline Layers" on page 205).

l Applications & URL Filtering (see "Ordered Layers and Inline Layers" on page 205).

l Content Awareness (see "Ordered Layers and Inline Layers" on page 205).

l Mobile Access (see "Ordered Layers and Inline Layers" on page 205).

Enabling Access Control Features on a Gateway

1. In SmartConsole, go to Gatew ays & Servers and double-click the gateway object.

The General Properties window of the gateway opens.

2. From the navigation tree, click General Properties.

3. In the Netw ork Security tab, select one or more of these Access Control features:

n IPsec VPN

n Mobile Access

n Application Control

n URL Filtering

n Content Aw areness

n Identity Aw areness

4. Click OK .

Security Management R80.40 Administration Guide      |      210


Creating an Access Control Policy

Enabling Access Control Features on a Layer

To enable the Access Control features on an Ordered Layer:

1. In SmartConsole, click Security Policies.

2. Under Access Control, right-click Policy and select Edit Policy .

3. Click options for the Layer.

4. Click Edit Layer .

The Layer Editor window opens and shows the General view.

5. Enable the Blades that you will use in the Ordered Layer:

n Firew all.

n Applications & URL Filtering

n Content Aw areness

n Mobile Access

6. Click OK .

To enable the Access Control features on an Inline Layer

1. In SmartConsole, click Security Policies.

2. Select the Ordered Layer.

3. In the parent rule of the Inline Layer, right-click the Action column, and select Inline
Layer > Edit Layer .

4. Enable the Blades that you will use in the Inline Layer:

n Firew all.

n Applications & URL Filtering

n Content Aw areness

n Mobile Access

Note - Do not enable a Blade that is not enabled in the Ordered Layer.

5. Click OK .

Types of Rules in the Rule Base


There are three types of rules in the Rule Base- explicit , implied and implicit .

Security Management R80.40 Administration Guide      |      211


Creating an Access Control Policy

Explicit rules

The rules that the administrator configures explicitly, to allow or to block traffic based on
specified criteria.

Important - The defaultCleanup rule is an explicit rule that is added by


default to every new layer. You can change or delete the default Cleanup rule.
We recommend that you have an explicit Cleanup rule as the last rule in each
layer.

Implied rules

The default rules that are available as part of the Global properties configuration and cannot be
edited. You can only select the implied rules and configure their position in the Rule Base:

n First - Applied first, before all other rules in the Rule Base - explicit or implied

n Last - Applied last, after all other rules in the Rule Base - explicit or implied, but before the
Implicit Cleanup Rule

n Before Last - Applied before the last explicit rule in the Rule Base

Implied rules are configured to allow connections for different services that the Security Gateway
uses. For example, the Accept Control Connections rules allow packets that control these
services:

n Installation of the security policy on a Security Gateway

n Sending logs from a Security Gateway to the Security Management Server

n Connecting to third party application servers, such as RADIUS and TACACS authentication
servers

Implicit cleanup rule

The default "catch-all" rule for the Layer that deals with traffic that does not match any explicit or
implied rules in the Layer. It is made automatically when you create a Layer.

Implicit cleanup rules do not show in the Rule Base.

For Security Gateways R80.10 and higher, the default implicit cleanup rule action is Drop. This is
because most Policies have Whitelist rules (the Accept action). If the Layer has Blacklist rules (the
Drop action), you can change the action of the implicit cleanup rule to Accept in the Layer Editor.

For Security Gateways R77.30 and lower, the action of the implicit rule depends on the Ordered
Layer:

n Drop - for the Netw ork Layer

n Accept - for a Layer with Applications and URL Filtering enabled

Security Management R80.40 Administration Guide      |      212


Creating an Access Control Policy

Note - If you change the default values, the policy installation will fail on R77.30
or earlier versions Security Gateways

Order in which the Firewall Applies the Rules

1. First Implied Rule - No explicit rules can be placed before it.

2. Explicit Rules - These are the rules that you create.

3. Before Last Implied Rules - Applied before the last explicit rule.

4. Last Explicit Rule - We recommend that you use a Cleanup rule as the last explicit rule.

Note - If you use the Cleanup rule as the last explicit rule, the Last
Implied Rule and the Implicit Cleanup Rule are not enforced.

5. Last Implied Rule - Remember that although this rule is applied after all other explicit and
implied rules, the Implicit Cleanup Rule is still applied last.

6. Implicit Cleanup Rule - The default rule that is applied if none of the rules in the Layer
match.

Configuring the Implied Rules

Some of the implied rules are enabled by default. You can change the default configuration as
necessary.

To configure the implied rules:

1. In SmartConsole, select the Access Control Policy.

2. From the toolbar above the policy, select Actions > Implied Rules.

The Implied Policy window opens.

3. In the left pane, click Configuration .

4. Select a rule to enable it, or clear a rule to disable it.

5. For the enabled rules, select the position of the rules in the Rule Base: First , Last , or
Before Last (see "Types of Rules in the Rule Base" on page 211).

6. Click OK and install the policy.

Showing the Implied Rules

In SmartConsole , from the Security Policies View, select Actions > Implied Rules.

The Implied Policy window opens.

It shows only the implied rules, not the explicit rules.

Security Management R80.40 Administration Guide      |      213


Creating an Access Control Policy

Configuring the Implicit Cleanup Rule

To configure the Implicit Cleanup Rule:

1. In SmartConsole, click Menu > Manage Policies and Layers.

2. In the left pane, click Layers.

3. Select a Layer and click Edit .

The Layer Editor opens.

4. Click Advanced

5. Configure the Implicit Cleanup Rule to Drop or Accept.

6. Click OK .

7. Click Close .

8. Publish the SmartConsole session.

Administrators for Access Control Layers


You can create administrator accounts dedicated to the role of Access Control, with their own
installation and SmartConsole Read/Write permissions.

You can also delegate ownership of different Layers to different administrators.

Sharing Layers
You may need to use the same rules in different parts of a Policy, or have the same rules in
multiple Policy packages.

There is no need to create the rules multiple times. Define an Ordered Layer or an Inline Layer
one time, and mark it as shared. You can then reuse the Inline Layer or Ordered layer in multiple
policy packages or use the Inline Layer in multiple places in an Ordered Layer. This is useful, for
example, if you are an administrator of a corporation and want to share some of the rules among
multiple branches of the corporation:

n It saves time and prevents mistakes.

n To change a shared rule in all of the corporation's branches, you must only make the
change once.

To mark a Layer as shared

1. In SmartConsole, click Menu > Manage policies and layers.

2. In the left pane, click Layers.

3. Select a Layer in Access Control or in Threat Prevention .

Security Management R80.40 Administration Guide      |      214


Creating an Access Control Policy

4. Right-click and select Edit Layer .

5. Configure the settings in the Layer Editor window.

6. In General, select Multiple policies and rules can use this layer .

7. Click OK .

8. Click Close .

9. Publish the SmartConsole session.

To reuse a Threat Prevention Ordered Layer

1. In SmartConsole, go to Menu > Manage policies and layers > Policies.

2. Right-click the required policy and click Edit . The policy properties window opens.

3. In the Threat Prevention box, click the + sign.

4. Select the layer you want to include in this policy package.

5. Click OK .

6. Close the policy properties window.

7. Install Policy .

8. Repeat this procedure for all policy packages.

For examples of Inline Layers and Ordered Layer, see "Ordered Layers and Inline Layers" on
page 205.

Visual Division of the Rule Base with Sections


To better manage a policy with a large number of rules, you can use Sections to divide the Rule
Base into smaller, logical components. The division is only visual and does not make it possible to
delegate administration of different Sections to different administrators.

Exporting Layer Rules to a .CSV File

You can export Layer rules to a .CSV file. You can open and change the .CSV file in a
spreadsheet application such as Microsoft Excel.

To export Layer rules to a .CSV file:

1. In SmartConsole, click Menu > Manage Policies and Layers.

The Manage Layers window opens.

2. Click Layers.

Security Management R80.40 Administration Guide      |      215


Creating an Access Control Policy

3. Select a Layer, and then click Actions > Export selected Layer .

4. Enter a path and file name.

Managing Policies and Layers


To work with Ordered Layers and Inline Layers in the Access Control Policy, select Menu >
Manage policies and layers in SmartConsole.

The Manage policies and layers window shows.

To see the Layer in the policy pack age and their attributes:

In the Layers pane of the window, you can see:

n Name - Layer name

n Number of Rules - Number of rules in the Layer

n Modifier - The administrator who last changed the Layer configuration.

n Last Modified -Date the Layer was changed.

n Show only Shared Layers - A shared Layer has the Multiple policies and rules can use
this Layer option selected. (see "Sharing Layers" on page 214).

n Layer Details

l Used in policies - Policy packages that use the Layer

l Mode :
o Ordered - An Ordered Layer. In a Multi-Domain Security Management
environment, it includes global rules and a placeholder for local, Domain rules.

o Inline - An Inline Layer, also known as a Sub-Policy.


o Not in use - A Layer that is not used in a Policy package.

To see the rules in the Layer:

1. Select a Layer.

2. Right-click and select Open layer in policy .

Use Cases for the Unified Rule Base


Here are some use cases that show examples of rules that you can define for the Access Control
Policy.

Use Case - Application Control and Content Awareness Ordered Layer

This use case shows an example unified Access Control Policy. It controls applications and

Security Management R80.40 Administration Guide      |      216


Creating an Access Control Policy

content in one Ordered Layer.

Services &
N Destina Actio Tra
Name Source VPN Applicatio Content
o. tion n ck
ns

General compliance (1)

1 Block Any Internet Any Anonymiz Any Drop Log


categories er   Bloc
Critical k
Risk Mess
age

Block risky executables (2)

2 Block InternalZ Internet Any Uncategor Downloa Drop Log


download one ized d Traffic
of High Risk   Execut
executabl able File
e files
from
uncategor
ized and
high risk
sites

Credit card data (3-4)

3 Allow Finance Web Any https Upload Accep Log


uploading (Access Servers Traffic t
of credit Role)   PCI -
cards Credit
numbers, Card
by Number
finance, s
and only
over
HTTPS

Security Management R80.40 Administration Guide      |      217


Creating an Access Control Policy

Services &
N Destina Actio Tra
Name Source VPN Applicatio Content
o. tion n ck
ns

4 Block Any Web Any Any Any Drop Log


other Servers Directio
credit n
cards   PCI -
from Credit
company Card
Web Number
servers s

Inform about sensitive data over VPN (5)

5 Inform Any Any RemoteAc Any Any Infor Log


the user cess Directio m
about n
sensitive   Salary
data from Survey
VPN sites Report

Cleanup (6)

6 Cleanup Any Any Any Any Any Accep Log


rule t

Explanations for rules:

Rule Explanation

1 General Compliance section -Block access to unacceptable Web sites and


applications.

2 Block risky executables section - Block downloading of high risk executable files.

3-4 Credit card data section -Allow uploading of credit cards numbers only by the
finance department, and only over HTTPS. Block other credit cards.

5 Block sensitive data over VPN section - A remote user that connects over the
organization's VPN sees an informational message.

6 cleanup rule - Accept all traffic that does not match one of the earlier rules.

Use Case - Inline Layer for Web Traffic

This use case shows an example Access Control Policy that controls Web traffic. The Web

Security Management R80.40 Administration Guide      |      218


Creating an Access Control Policy

server rules are in an Inline Layer.

Services &
N Destinatio Trac
Name Source Application Content Action
o n k
s

1 Headquarte HQ Proxy Web Proxy Any Ask Log


r WEB Web
traffic - via Access
proxy Policy
  Access
Noti...
once a
day
per
applic...

2 Allow Proxy Proxy Internet Web Any Accept Non


to the e
Internet

3 Allow local Local Internet Web Any Ask Log


branch to Branch   Web
access the Access
internet Policy
directly   Access
Noti...
once a
day
per
applic...

4 Web InternalZon Web Web Any Web N/A


Servers e Servers Servers
protectio
n

4. Block Any Any NEGATED Any Drop Log


1 browsing Google
with Chrome
unapprove Internet
d browsers Explorer 11
Firefox
Safari

Security Management R80.40 Administration Guide      |      219


Creating an Access Control Policy

Services &
N Destinatio Trac
Name Source Application Content Action
o n k
s

4. Inform user Any Any https Upload Inform Log


2 when Traffic   Access
uploading PCI - Noti...
Credit Credit once a
Cards only Card day
over HTTPS Number per
s applic...

4. Block Credit Any Any Any Any Drop Log


3 Cards Direction Block
PCI - Message
Credit
Card
Number
s

4. Block Any Any Any Downloa Drop Log


4 downloadin d Traffic
g of HIPAA -
sensitive Medical
content Record
Headers

4. Cleanup Any Any Any Any Accept Non


5 rule e

5 Ask user InternalZon Internet PayPal Any Ask Log


when e Direction Company
sending PCI - Policy
credit cards Credit   Access
to PayPal Card Noti...
Number once a
s day
per
applic...

6 Cleanup Any Any Any Any Drop Log


rule

Explanations for rules:

Security Management R80.40 Administration Guide      |      220


Creating an Access Control Policy

Rule Explanation

4 This is the parent rule of the Inline Layer. The Action is the name of the Inline Layer.
If a packet matches on the parent rule, the matching continues to rule 4.1 of the
Inline Layer. If a packet does not match on the parent rule, the matching continues to
rule 5.

4.1 If a packet matches on rule 4.1, the rule action is done on the packet, and no more
-4.4 rule matching is done. If a packet does not match on rule 4.1, continue to rule 4.2.
The same logic applies to the remaining rules in the Inline Layer.

4.5 If none of the higher rules in the Ordered Layer match the packet, the explicit
Cleanup Rule is applied. The Cleanup rule is a default explicit rule. You can change or
delete it. We recommend that you have an explicit cleanup rule as the last rule in
each Inline Layer and Ordered Layer.

Use Case - Content Awareness Ordered Layer

This use case shows a Policy that controls the upload and download of data from and to the
organization.

There is an explanation of some of the rules below the Rule Base.

Services &
N Destinatio Trac
Name Source Applicatio Content Action
o n k
ns

Regulatory compliance

1 Block the InternalZo Internet Any Downloa Drop Log


download of ne d Traffic
executable
files Executab
le file

2 Allow Finance Web https Upload Accept Log


uploading of (Access Servers Traffic
credit cards Role)   PCI -
numbers by Credit
finance Card
users, only Numbers
over HTTPS

Security Management R80.40 Administration Guide      |      221


Creating an Access Control Policy

Services &
N Destinatio Trac
Name Source Applicatio Content Action
o n k
ns

3 Block other InternalZo Web Any Any Drop Log


credit cards ne Servers Direction   Block
from   PCI - Message
company Credit
Web servers Card
Numbers

Personally Identifiable Information

4 Matches U.S. InternalZo Internet Any Upload Inform Log


Social ne Traffic   Access
Security   U.S. Notifi...
Numbers Social once a
(SSN) Security day
allocated by Numbers per
the U.S. - applicat
Social Accordin i...
Security g to SSA
Administrati
on (SSA).

5 Block InternalZo Internet Any Downloa Drop Log


downloading ne d Traffic   Block
of sensitive   HIPAA - Message
medical Medical
information Records
Headers

Human Resources

6 Ask user InternalZo Internet Any Upload Ask Log


when ne Traffic   Compa
uploading   Salary ny Policy
documents Survey once a
containing Report day
salary survey per
reports. applicat
i...

Intellectual Property

Security Management R80.40 Administration Guide      |      222


Creating an Access Control Policy

Services &
N Destinatio Trac
Name Source Applicatio Content Action
o n k
ns

7 Matches InternalZo Internet Any Any Restrict N/A


data ne Direction source
containing Source code
source code Code

7. Any Any Any Downloa Accept Log


1 d Traffic
  Source
Code

7. Any Any Any Upload Ask Log


2 Traffic Company
  Source Policy
Code once a
day
per
applicat
i...

7. Cleanup Any Any Any Any Drop Log


3 Inline Layer   Block
Message

Explanations for rules:

Rule Explanation

1-3 Regulatory Compliance section -Control the upload and download of executable
files and credit cards.
You can set the direction of the Content . In rule 1 it is Dow nload Traffic , in rule 2 it
is Upload Traffic , and in rule 3 it is Any Direction .
Rule 1 controls executable files, which are File Types. The File Type rule is higher in
the Rule Base than rules with Content Types (Rules 2 to 7). This improves the
efficiency of the Rule Base, because File Types are matched sooner than Content
Types.

4-5 Personally Identifiable Information section - Controls the upload and download of
social security number and medical records.
The rule Action for rule 4 is Inform. When an internal user uploads a file with a
social security number, the user sees a message.

Security Management R80.40 Administration Guide      |      223


Creating an Access Control Policy

Rule Explanation

6 Human resources section -controls the sending of salary survey information


outside of the organization.
The rule action is Ask . If sensitive content is detected, the user must confirm that the
upload complies with the organization's policy.

7 Intellectual Property section - A group of rules that control how source code leaves
the organization.
Rule 7 is the parent rule of an Inline Layer (see " Use Cases for the Unified Rule Base"
on page 216). The Action is the name of the Inline Layer.
If a packet matches on rule 7.1, matching stops.
If a packet does not match on rule 7.1, continue to rule 7.2. In a similar way, if there
is no match, continue to 7.3. The matching stops on the last rule of the Inline Layer.
We recommend that you have an explicit cleanup rule as the last rule in each Inline
Layer

Use Case - Application & URL Filtering Ordered Layer

This use case shows some examples of URL Filtering and Application Control rules for a typical
policy that monitors and controls Internet browsing. (The Hits, VPN and Install On columns
are not shown.)

Services &
No. Name Source Destination Action Track Time
Applications

1 Liability Any Internet Potential Drop Log Any


sites liability Blocked
(group) Message

2 High risk Any Internet High Risk Drop Log Any


applications iTunes Blocked
Anonymizer Message
(category)

3 Allow IT IT Any Radmin Allow Log Work-


department (Access Hours
Remote Role)
Admin

4 Allow HR Internet Facebook Allow Log Any


Facebook for (Access Download_
HR Role) 1Gbps

Security Management R80.40 Administration Guide      |      224


Creating an Access Control Policy

Services &
No. Name Source Destination Action Track Time
Applications

5 Block these Any Internet Streaming Drop Log Any


categories Media Blocked
Protocols Message
Social
Networking
P2P File
Sharing
Remote
Administration

6 Log all Any Internet Any Allow Log Any


applications

Explanations for rules:

Security Management R80.40 Administration Guide      |      225


Creating an Access Control Policy

Rule Explanation

1 Liability sites - Blocks traffic to sites and applications in the custom Potential_liability
group. The UserCheck Blocked Message is shown to users and explains why their
traffic is blocked. See " Use Cases for the Unified Rule Base" on page 216.
Scenario: I want to block sites that are associated with categories that can cause liability
issues. Most of these categories exist in the Application Database but there is also a
custom defined site that must be included. How can I do this?
You can do this by creating a custom group and adding all applicable categories and
the site to it. If you enable Identity Awareness on a Security Gateway, you can use it
together with URL Filtering to make rules that apply to an access role. Use access role
objects to define users, machines, and network locations as one object.
In this example:

n You have already created


l An Access Role that represents all identified users in the organization
(Identified_Users).
l A custom application for a site named FreeMovies.
n You want to block sites that can cause liability issues for everyone within your
organization.
n You will create a custom group that includes Application Database categories
as well as the previously defined custom site named FreeMovies.

To create a custom group:

1. In the Object Explorer, click New > More > Custom Application/Site >
Application/Site Group.
2. Give the group a name. For example, Liability_Sites.
3. Click + to add the group members:
n Search for and add the custom application FreeMovies.

n Select Categories, and add the ones you want to block (for example

Anonymizer, Critical Risk, and Gambling)


n Click Close

4. Click OK .

You can now use the Liability_Sites group in the Access ControlRule Base.

In the Rule Base, add a rule similar to this:


In the Security Policies view of SmartConsole, go to the Access Control Policy.

n Source - The Identified_Users access role


n Destination - Internet
n Services & Applications - Liability_Sites
n Action - Drop

Security Management R80.40 Administration Guide      |      226


Creating an Access Control Policy

Rule Explanation

Note - Applications are matched on their Recommended services,


where each service runs on a specific port, such as the default
Application Control Web Brow sing Services: http, https, HTTP_
proxy, and HTTPS_proxy. To change this see Changing Services for
Applications and Categories.

Services &
Name Source Destination Action Track
Applications

Block sites that Identified_ Internet Liability_Sites Drop Log


may cause a Users
liability

2 High risk applications - Blocks traffic to sites and applications in the High Risk
category and blocks the iTunes application. The UserCheck Block Message is shown to
users and explains why their traffic is blocked.

3 Allow IT department Remote Admin - Allows the computers in the IT department


network to use the Radmin application. Traffic that uses Radmin is allowed only
during the Work-Hours (set to 8:00 through 18:30, for example).

4 Allow Facebook for HR - Allows computers in the HR network to use Facebook. The
total traffic downloaded from Facebook is limited to 1 Gbps, there is no upload limit.

5 Block these categories - Blocks traffic to these categories: Streaming Media, Social
Networking, P2P File Sharing, and Remote Administration. The UserCheck Blocked
Message is shown to users and explains why their traffic is blocked.
Note - The Remote Administration category blocks traffic that uses the
Radmin application. If this rule is placed before rule 3, then this rule can
also block Radmin for the IT department.

6 Log all applications - Logs all traffic that matches any of the URL Filtering and
Application Control categories.

Best Practices for Access Control Rules


1. Make sure you have these rules:

n Stealth rule that prevents direct access to the Security Gateway

n Cleanup rule that drops all traffic that is not allowed by the earlier rules in the policy.

2. Use Layers to add structure and hierarchy of rules in the Rule Base.

Security Management R80.40 Administration Guide      |      227


Creating an Access Control Policy

3. Add all rules that are based only on source and destination IP addresses and ports, in a
Firewall/Network Ordered Layer at the top of the Rule Base.

4. Create Firewall/Network rules to explicitly accept safe traffic, and add an explicit cleanup
rule at the bottom of the Ordered Layer to drop everything else.

5. Create an Application Control Ordered Layer after the Firewall/Network Ordered Layer. Add
rules to explicitly drop unwanted or unsafe traffic. Add an explicit cleanup rule at the
bottom of the Ordered Layer to accept everything else.

Alternatively, put Application Control rules in an Inline Layer as part of the Firewall/Network
rules. In the parent rule of the Inline Layer, define the Source and Destination.

6. Share Ordered Layers and Inline Layers when possible.

7. For Security GatewaysR80.10 and higher: If you have one Ordered Layer for
Firewall/Network rules, and another Ordered Layer for Application Control - Add all rules
that examine applications, Data Type, or Mobile Access elements, to the Application Control
Ordered Layer, or to an Ordered Layer after it.

8. Turn off XFF inspection, unless the gateway is behind a proxy server. For more, see:
sk92839.

9. Disable a rule when working on it. Enable the rule when you want to use it. Disabled rules
do not affect the performance of the Gateway. To disable a rule, right-click in the No
column of the rule and select Disable .

Best Practices for Efficient rule Matching

1. Place rules that check the source, destination, and port (network rules) higher in the Rule
Base.

Reason: Network rules are matched sooner, and turn on fewer inspection engines.

2. Place rules that check applications and content (Data Types) below network rules.

3. Do not define a rule with Any in the Source and in the Destination, and with an Application
or a Data Type. For example these rules are not recommended:

Services &
Source Destination Content
Applications

Any Any Facebook

Any Any Credit Card numbers

Instead, define one of these recommended rules:

Security Management R80.40 Administration Guide      |      228


Creating an Access Control Policy

Services &
Source Destination Content
Applications

Any Internet Facebook

Any Server Credit Card numbers

Reason for 2 and 3: Application Control and Content Awareness rules require content
inspection. Therefore, they:

n Allow the connection until the Firewall has inspected connection header and body.

n May affect performance.

4. For rules with Data Types: Place rules that check File Types higher in the Rule Base than
rules that check for Content Types. See "Best Practices for Access Control Rules" on page 227.

Reason: File Types are matched sooner than Content Types.

To see examples of some of these best practices, see the "Best Practices for Access Control Rules"
on page 227 and "Best Practices for Access Control Rules" on page 227.

Installing the Access Control Policy


1. On the Global Toolbar, click Menu > Install Policy .

The Install Policy window opens showing the Security Gateways.

2. If there is more than one Policy package: From the Policy drop-down list, select a policy
package.

3. Select Access Control. You can also select other Policies.

4. If there is more than one gateway: Select the gateways on which to install the Policy.

5. Select the Install Mode :

n Install on each selected gatew ay independently - Install the policy on each target
gateway independently of others, so that if the installation fails on one of them, it
doesn't affect the installation on the rest of the target gateways.

Note - If you select For Gatew ay Clusters, if installation on a cluster member


fails, do not install on that cluster , the Security Management Server makes sure
that it can install the policy on all cluster members before it begins the installation. If
the policy cannot be installed on one of the members, policy installation fails for all of
them.

Security Management R80.40 Administration Guide      |      229


Creating an Access Control Policy

n Install on all selected gatew ays, if it fails do not install on gatew ays of the same
version - Install the policy on all the target gateways. If the policy fails to install on
one of the gateways, the policy is not installed on other target gateways.

6. Click Install.

Pre-R80 Gateways and the Unified Access


Control Policy
When you upgrade an R77.30 or lower Security Management Server, which manages R77.30 or
lower Security Gateways, to R80 or higher, the existing Access Control policies are converted in
this way:

n The pre-R80Firew all policy is converted into the Netw ork Policy Layer of the R80Access
Control Policy. The implicit cleanup rule for it is set to Drop all traffic that is not matched by
any rule in this Layer.

n The pre-R80Application & URL Filtering policy is converted into the Application Policy
Layer, which is the second Layer of the R80Access Control Policy. The implicit cleanup rule
for it is set to Accept all traffic that is not matched by any rule in this Layer.

Important - After upgrade, do not change the Action of the implicit cleanup
rules, or the order of the Policy Layers. If you do, the policy installation will fail.

New Access Control Policy for pre-R80.10Security Gateways on an R80Security Management


Server must have this structure:

1. The first Policy Layer is the Network Layer (with the Firew all blade enabled on it).

2. The second Policy Layer is the Application & URL Filtering Layer (with the Application & URL
Filtering blade enabled on it).

3. There are no other Policy Layers.

If the Access Control Policy has a different structure, the policy will fail to install.

You can change the names of the Layers, for example, to make them more descriptive.

Each new Policy Layer will have the explicit default rule, added automatically and set to Drop all
the traffic that does not match any rule in that Policy Layer. We recommend that the Action is set
to Drop for the Network Policy Layer and Accept for the Application Control Policy Layer.

If you remove the default rule, the Implicit Cleanup Rule will be enforced. The Implicit Cleanup
Rule is configured in the Policy configuration window and is not visible in the Rule Base table.
Make sure the Implicit Cleanup Rule is configured to Drop the unmatched traffic for the
Network Policy Layer and to Accept the unmatched traffic for the Application Control Policy Layer.

Security Management R80.40 Administration Guide      |      230


Creating an Access Control Policy

符合防火牆規
則3.2.1(十七)
Analyzing the Rule Base Hit Count
Use the Hit Count feature to show the number of connections that each rule matches. Use the Hit
Count data to:

n Analyze a Rule Base - You can delete rules that have no matching connection

Note - If you see a rule with a zero hit count it only means that in the Security
Gateways enabled with Hit Count there were no matching connections. There
can be matching connections on other Security Gateways.

n Better understand the behavior of the Access Control Policy

You can show Hit Count for the rules in these options:

n The percentage of the rule hits from total hits

n The indicator level (very high, high, medium, low, or zero)

These options are configured in the Access Control Policy Rule Base and also changes how Hit
Count is shown in other supported Software Blades.

When you enable Hit Count, the Security Management Server collects the data from supported
Security Gateways (from version R75.40 and up). Hit Count works independently from logging and
tracks the hits even if the Track option is None .

Enabling or Disabling Hit Count


By default, Hit Count is globally enabled for all supported Security Gateways. The timeframe
setting that defines the data collection time range is configured globally. If necessary, you can
disable Hit Count for one or more Security Gateways.

After you enable or disable Hit Count you must install the Policy for the Security Gateway to start
or stop collecting data.

To enable or disable Hit Count globally

1. In SmartConsole, click Menu > Global properties.

2. Select Hit Count from the tree.

3. Select the options:

n Enable Hit Count - Select to enable or clear to disable all Security Gateways to
monitor the number of connections each rule matches.

n Keep Hit Count data up to - Select one of the time range options. The default is 3
months. Data is kept in the Security Management Server database for this period
and is shown in the Hits column.

4. Click OK .

Security Management R80.40 Administration Guide      |      231


Creating an Access Control Policy

5. Install the Policy.

To enable or disable Hit Count on each Security Gateway:

1. From the Gatew ay Properties for the Security Gateway, select Hit Count from the
navigation tree.

2. Select Enable Hit Count to enable the feature or clear it to disable Hit Count.

3. Click OK .

4. Install the Policy.

Hit Count Display


Configuring the Hit Count Display

These are the options you can configure for how matched connection data is shown in the Hits
column:

n Value - Shows the number of matched hits for the rule from supported Security
Gateways. Connection hits are not accumulated in the total hit count for:

l Security Gateways that are not supported

l Security Gateways that have disabled the hit count feature

The values are shown with these letter abbreviations:

l K = 1,000

l M = 1,000,000

l G = 1,000,000,000

l T = 1,000,000,000,000

For example, 259K represents 259 thousand connections and 2M represents 2 million
connections.

n Percentage -Shows the percentage of the number of matched hits for the rule from the
total number of matched connections. The percentage is rounded to a tenth of a percent.

n Level -The hit count level is a label for the range of hits according to the table.

The hit count range = Maximum hit value - Minimum hit value (does not include zero
hits)

Hit Count Level Icon Range

Zero 0 hits

Security Management R80.40 Administration Guide      |      232


Creating an Access Control Policy

Hit Count Level Icon Range

Low Less than 10 percent of the hit count range

Medium Between 10 - 70 percent of the hit count range

High Between 70 - 90 percent of the hit count range

Very High Above 90 percent of the hit count range

To show the Hit Count in the Rule Base:

Right-click the heading row of the Rule Base and select Hits.

To configure the Hit Count in a rule

1. Right-click the rule number of the rule.

2. Select Hit Count and one of these options (you can repeat this action to configure more
options):

n Timeframe - Select All, 1 day , 7 days, 1 month , or 3 months

n Display - Select Percentage , Value , or Level

To update the Hit Count in a rule

1. Right-click the rule number of the rule.

2. Select Hit Count > Refresh .

Preventing IP Spoofing
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your
protected network, to execute DoS attacks, or to gain unauthorized access.

Anti-Spoofing detects if a packet with an IP address that is behind a certain interface, arrives from
a different interface. For example, if a packet from an external network has an internal IP address,
Anti-Spoofing blocks that packet.

Example:

The diagram shows a Gateway with interfaces 2 and 3, and 4, and some example networks behind
the interfaces.

Security Management R80.40 Administration Guide      |      233


Creating an Access Control Policy

For the Gateway, anti-spoofing makes sure that

n All incoming packets to 2 come from the Internet (1)


n All incoming packets to 3 come from 192.168.33.0
n All incoming packets to 4 come from 192.0.2.0 or 10.10.10.0

If an incoming packet to B has a source IP address in network 192.168.33.0, the packet is blocked,
because the source address is spoofed.

When you configure Anti-Spoofing protection on a Check Point Security Gateway interface, the
Anti-Spoofing is done based on the interface topology. The interface topology defines where the
interface Leads To (for example, External (Internet) or Internal), and the Security Zone of
interface.

Configuring Anti-Spoofing

Make sure to configure Anti-Spoofing protection on all the interfaces of the Security Gateway,
including internal interfaces.

To configure Anti-Spoofing for an interface:

1. In SmartConsole, go to Gatew ays & Servers and double-click the Gateway object.

The Gatew ay Properties window opens.

2. From the navigation tree, select Netw ork Management .

3. Click Get Interfaces.

4. Click Accept .

The gateway network topology shows. If SmartConsole fails to automatically retrieve the
topology, make sure that the details in the General Properties section are correct and
the Security Gateway, the Security Management Server, and the SmartConsole can
communicate with each other.

5. Select an interface and click Edit .

The interface properties window opens.

Security Management R80.40 Administration Guide      |      234


Creating an Access Control Policy

6. From the navigation tree, click General.

7. In the Topology section of the page, click Modify .

The Topology Settings window opens.

8. In the Leads To section, select the type of network, to which this interface leads:

n Internet (External)-This is the default setting. It is automatically calculated from


the topology of the Security Gateway. To update the topology of an internal network
after changes to static routes, click Netw ork Management > Get Interfaces in
the Gatew ay Properties window.
n Override - Override the default setting.

If you Override the default setting:

n Internet (External) - All external/Internet addresses

n This Netw ork (Internal) -

l Not Defined - All IP addresses behind this interface are considered a part of
the internal network that connects to this interface
l Netw ork defined by the interface IP and Net Mask - Only the network
that directly connects to this internal interface
l Netw ork defined by routes - The Security Gateway dynamically calculates
the topology behind this interface. If the network of this interface changes,
there is no need to click Get Interfaces and install a policy. For more, see
the section Dynamically Updating the Topology.
l Specific - A specific object (a Network, a Host, an Address Range, or a
Network Group) behind this internal interface
l Interface leads to DMZ - The DMZ that directly connects to this internal
interface

9. Optional: In the Security Zone section, select User defined, check Specify Security
Zone and choose the zone of the interface.

10. Configure Anti-Spoofing options (see "Preventing IP Spoofing" on page 233). Make sure
that Perform Anti-Spoofing based on interface topology is selected.

11. Select an Anti-Spoofing action :

n Prevent - Drops spoofed packets


n Detect - Allows spoofed packets. To monitor traffic and to learn about the network
topology without dropping packets, select this option together with the Spoof
Tracking Log option.

12. Configure Anti-Spoofing exceptions (optional). For example, configure addresses, from
which packets are not inspected by Anti-Spoofing:

a. Select Don't check packets from.

b. Select an object from the drop-down list, or click New to create a new object.

Security Management R80.40 Administration Guide      |      235


Creating an Access Control Policy

13. Configure Spoof Tracking - select the tracking action that is done when spoofed packets
are detected:

n Log - Create a log entry (default)


n Alert - Show an alert
n None - Do not log or alert

14. Click OK twice to save Anti-Spoofing settings for the interface.

For each interface, repeat the configuration steps. When finished, install the Access Control
policy.

Anti-Spoofing Options
n Perform Anti-Spoofing based on interface topology - Select this option to enable
spoofing protection on this external interface.

n Anti-Spoofing action is set to - Select this option to define if packets will be rejected (the
Prevent option) or whether the packets will be monitored (the Detect option). The Detect
option is used for monitoring purposes and should be used in conjunction with one of the
tracking options. It serves as a tool for learning the topology of a network without actually
preventing packets from passing.

n Don't check packets from - Select this option to make sure anti-spoofing does not take
place for traffic from internal networks that reaches the external interface. Define a network
object that represents those internal networks with valid addresses, and from the drop-
down list, select that network object. The anti-spoofing enforcement mechanism disregards
objects selected in the Don't check packets from drop-down menu.

n Spoof Tracking - Select a tracking option.

Multicast Access Control


Multicast IP transmits one copy of each datagram (IP packet) to a multicast address, where each
recipient in the group takes their copy. The routers in the network forward the datagrams only to
routers and hosts with access to receive the multicast packets.

To configure multicast access control

1. Open a gateway object.

2. On the Netw ork Management page, select an interface and click Edit .

3. On Interface > Advanced, click Drop Multicast packets by the follow ing conditions.

4. Select a multicast policy for the interface:

Security Management R80.40 Administration Guide      |      236


Creating an Access Control Policy

n Drop multicast packets w hose destination is in the list

n Drop all multicast packets except those w hose destination is in the list

When access is denied to a multicast group on an interface for outbound IGMP packets,
inbound packets are also denied.

If you do not define access restrictions for multicast packets, multicast datagrams to one
interface of the gateway are allowed out of all other interfaces.

5. Click Add.

The Add Object window opens, with the Multicast Address Ranges object selected.

6. Click New > Multicast Address Range .

The Multicast Address Range Properties window opens.

7. Enter a name for this range.

8. Define an IP address Range or a Single IP Address in the range: 224.0.0.0 -


239.255.255.255.

Class D IP addresses are reserved for multicast traffic and are allocated dynamically. The
multicast address range 224.0.0.0 - 239.255.255.255 is used only for the
destination address of IP multicast traffic.

Every IP datagram whose destination address starts with 1110is an IP multicast


datagram. The remaining 28 bits of the multicast address range identify the group to
which the datagram is sent.

The 224.0.0.0 - 224.0.0.255 range is reserved for LAN applications that are never
forwarded by a router. These addresses are permanent host groups. For example: an
ICMP request to 224.0.0.1 is answered by all multicast capable hosts on the network,
224.0.0.2is answered by all routers with multicast interfaces, and 224.0.0.13 is
answered by all PIM routers. To learn more, see the IANA website.

The source address for multicast datagrams is always the unicast source address.

9. Click OK .

10. In the Add Object window, Click OK .

11. In the Interface Properties window, Click OK .

12. In the gateway window, Click OK .

13. In the Rule Base, add a rule that allows the multicast address range as the Destination .

14. In the Services of the rule, add the multicast protocols.

n Multicast routing protocols - For example: Protocol-Independent Multicast (PIM),


Distance Vector Multicast Routing Protocol (DVMRP), and Multicast Extensions to

Security Management R80.40 Administration Guide      |      237


Creating an Access Control Policy

OSPF (MOSPF).

n Dynamic registration -Hosts use the Internet Group Management Protocol (IGMP)
to let the nearest multicast router know they want to belong to a specified
multicast group. Hosts can leave or join the group at any time.

15. Install the policy.

Configuring the NAT Policy


Translating IP Addresses
NAT (Network Address Translation) is a feature of the Firewall Software Blade and replaces IPv4
and IPv6 addresses to add more security. You can enable NAT for all SmartConsole objects to help
manage network traffic. NAT protects the identity of a network and does not show internal IP
addresses to the Internet. You can also use NAT to supply more IPv4 addresses for the network.

The Firewall can change both the source and destination IP addresses in a packet. For example,
when an internal computer sends a packet to an external computer, the Firewall translates the
source IP address to a new one. The packet comes back from the external computer; the Firewall
translates the new IP address back to the original IP address. The packet from the external
computer goes to the correct internal computer.

SmartConsole gives you the flexibility to make necessary configurations for your network:

n Easily enable the Firewall to translate all traffic that goes to the internal network.

n SmartConsole can automatically create Static and Hide NAT rules that translate the
applicable traffic.

n You can manually create NAT rules for different configurations and deployments.

How Security Gateways Translate Traffic

A Security Gateway can use these procedures to translate IP addresses in your network:

n Static NAT - Each internal IP address is translated to a different public IP address. The
Firewall can allow external traffic to access internal resources.

The configuration of static NAT on a range results in the translation of the IP addresses in
the range into a range of the same size, starting with the IP address specified.

n Hide NAT - The Firewall uses port numbers to translate all specified internal IP addresses
to a single public IP address and hides the internal IP structure. Connections can only start
from internal computers; external computers CANNOT access internal servers. The Firewall
can translate up to 50,000 connections at the same time from external computers and
servers.

n Hide NAT w ith Port Translation - Use one IP address and let external users access

Security Management R80.40 Administration Guide      |      238


Creating an Access Control Policy

multiple application servers in a hidden network. The Firewall uses the requested service
(or destination port) to send the traffic to the correct server. A typical configuration can use
these ports: FTP server (port 21), SMTP server (port 25) and an HTTP server (port 80). It is
necessary to create manual NAT rules to use Port Translation.

Using Hide NAT


For each SmartConsole object, you can configure the IP address that is used to translate
addresses for Hide NAT mode:

n Use the IP address of the external Security Gateway interface

n Enter an IP address for the object

Hide NAT uses dynamically assigned port numbers to identify the original IP addresses. There are
two pools of port numbers: 600 to 1023, and 10,000 to 60,000. Port numbers are usually assigned
from the second pool. The first pool is used for these services:

n rlogin (destination port 512)

n rshell (destination port 513)

n rexec (destination port 514)

If the connection uses one of these services, and the source port number is below 1024, then a
port number is assigned from the first pool.

You cannot use Hide NAT for these configurations:

n Traffic that uses protocols where the port number cannot be changed

n An external server that uses IP addresses to identify different computers and clients

Sample NAT Deployments


Static NAT

Firewalls that do Static NAT, translate each internal IP address to a different external IP address.

Item Description

3 External computers and servers in the Internet

Security Management R80.40 Administration Guide      |      239


Creating an Access Control Policy

Item Description

2 Security Gateway - Firewall is configured with Static NAT

1 Internal computers

Sample Static NAT Work flow

An external computer in the Internet sends a packet to 192.0.2.5. The Firewall translates the IP
address to 10.10.0.26 and sends the packet to internal computer A. Internal computer A sends
back a packet to the external computer. The Firewall intercepts the packet and translates the
source IP address to 192.0.2.5.

Internal computer B (10.10.0.37) sends a packet to an external computer. The Firewall intercepts
the packet translates the source IP address to 192.0.2.16.

Firewall translates this Internal computer A


Internet sends packet to 192.0.2.5
address to 10.10.0.26 receives packet

Internal computer A (10.10.0.26) Firewall translates this Internet receives packet


sends packet to Internet address to 192.0.2.5 from 192.0.2.5

Internal computer B (10.10.0.37) Firewall translates this Internet receives packet


sends packet to Internet address to 192.0.2.16 from 192.0.2.16

Hide NAT

Firewalls that do Hide NAT use different port numbers to translate internal IP address to one
external IP address. External computers cannot start a connection to an internal computer.

Item Description

1 Internal computers

2 Security Gateway - Firewall is configured with Hide NAT

Security Management R80.40 Administration Guide      |      240


Creating an Access Control Policy

Item Description

3 External computers and servers in the Internet

Sample Hide NAT Work flow

Internal computer A (10.10.0.26) sends a packet to an external computer. The Firewall intercepts
the packet and translates the source IP address to 192.0.2.1 port 11000. The external computer
sends back a packet to 192.0.2.1 port 11000. The Firewall translates the packet to 10.10.0.26 and
sends it to internal computer A.

Internet receives
Internal computer A (10.10.0.26) Firewall translates this address
packet from 192.0.2.1
sends packet to Internet to 192.0.2.1 port 11000
port 11000

Internet sends back packet to


Firewall translates this address Internal computer A
192.0.2.1
to 10.10.0.26 receives packet
port 11000

NAT Rules
The NAT Rule Base has two sections that specify how the IP addresses are translated:

n Original Packet

n Translated Packet

Each section in the NAT Rule Base is divided into cells that define the Source , Destination , and
Service for the traffic.

Automatic and Manual NAT Rules

There are two types of NAT rules for network objects:

n Rules that SmartConsole automatically creates and adds to the NAT Rule Base

n Rules that you manually create and then add to the NAT Rule Base

When you create manual NAT rules, it can be necessary to create the translated NAT objects for
the rule.

Using Automatic Rules

You can enable automatic NAT rules for these SmartConsole objects:

n Security Gateways

n Hosts

Security Management R80.40 Administration Guide      |      241


Creating an Access Control Policy

n Networks

n Address Ranges

SmartConsole creates two automatic rules for Static NAT, to translate the source and the
destination of the packets.

For Hide NAT, one rule is created to translate the source of the packets.

For network and address range objects, SmartConsole creates a different rule to NOT translate
intranet traffic. IP addresses for computers on the same object are not translated.

This table summarizes the NAT automatic rules:

Type of Traffic Static NAT Hide NAT

Internal to external Rule translates source IP Rule translates source IP


address address

External to internal Rule translates N/A (External connections are


destination IP address not allowed)

Intranet (for network and address Rule does not translate IP Rule does not translate IP
range objects) address address

Order of NAT Rule Enforcement

The Firewall enforces the NAT Rule Base in a sequential manner. Automatic and manual rules are
enforced differently. Automatic rules can use bidirectional NAT to let two rules be enforced for a
connection.

n Manual rules - The first manual NAT rule that matches a connection is enforced. The
Firewall does not enforce a different NAT rule that can be more applicable.

n Automatic rules - Two automatic NAT rules that match a connection, one rule for the
Source and one for the Destination can be enforced. When a connection matches two
automatic rules, those rules are enforced.

SmartConsole organizes the automatic NAT rules in this order:

1. Static NAT rules for Firewall, or host (computer or server) objects

2. Hide NAT rules for Firewall, or host objects

3. Static NAT rules for network or address range objects

4. Hide NAT rules for network or address range objects

Sample Automatic Rules

Here are some sample automatic rules.

Security Management R80.40 Administration Guide      |      242


Creating an Access Control Policy

Static NAT for a Network Object

1. Intranet connections in the HR network are not translated. The Firewall does not
translate a connection between two computers that are part of the HR object.

The Firewall does not apply rules 2 and 3 to traffic that matches rule 1.

2. Connections from IP addresses from the HR network to any IP address (usually external
computers) are translated to the Static NAT IP address.

3. Connections from any IP address (usually external computers) to the HR are translated to
the Static NAT IP address.

Hide NAT for Address Range

1. Intranet connections in the Sales address range are not translated. The Firewall does not
translate a connection between two computers that use IP addresses that are included in
the Sales object.

The Firewall does not apply rule 2 to traffic that matches rule 1.

2. Connections from IP addresses from the Sales address range to any IP address (usually
external computers) are translated to the Hide NAT IP address.

Configuring Static and Hide NAT

You can enable and configure NAT for SmartConsole objects.

Configuring Static NAT

When you enable Static NAT, each object is translated to a different IP address. SmartConsole
can automatically create the NAT rules, or you can create them manually.

Configuring Hide NAT

Hide NAT uses different port numbers to identify the internal IP addresses. When you enable
Hide NAT mode, the Firewall can translates the IP address to:

n The IP address of the external Security Gateway interface

n The IP address for the object

Note - You cannot use Hide NAT for these configurations:

n Traffic that uses protocols where the port number cannot be changed
n An external server that uses IP addresses to identify different computers and
clients

Security Management R80.40 Administration Guide      |      243


Creating an Access Control Policy

Enabling Automatic NAT

SmartConsole can automatically create and configure the NAT rules for a network. Enable
automatic NAT for every object, for which you are translating the IP address. Then configure the
Access Control Rule Base to allow traffic to the applicable objects.

To enable automatic NAT

1. In SmartConsole, go to Gatew ays & Servers and double-click the gateway object.

The General Properties window of the gateway opens.

2. From the navigation tree, select NAT > Advanced.

3. Select Add automatic address translation rules to hide this Gatew ay behind
another Gatew ay .

4. Select the Translation method: Hide or Static .

5. Configure the NAT IP address for the object.

n Hide behind Gatew ay - Use the IP address of the Security Gateway

n Hide behind IP address - Enter the IP address.

6. Click Install on Gatew ay and select All or the Security Gateway that translates the IP
address.

7. Click OK .

8. Install the Access Control Policy.

After you enable and configure NAT on all applicable gateways, install the policy.

Automatic Hide NAT to External Network s

For large and complex networks, it can be impractical to configure the Hide NAT settings for all
the internal IP addresses. An easy alternative is to enable a Firewall to automatically Hide NAT for
all traffic with external networks. The Firewall translates all traffic that goes through an external
interface to the valid IP address of that interface.

In this sample configuration, computers in internal networks open connections to external servers
on the Internet. The source IP addresses of internal clients are translated to the IP address of an
external interface.

Security Management R80.40 Administration Guide      |      244


Creating an Access Control Policy

Item Description

1 Internal networks

2 Security Gateway - Firewall is configured with automatic Hide NAT.

2A and 2B Two external interfaces 192.0.2.1 and 192.0.2.100.

1 -->3 External computers and servers on the Internet

Source IP addresses are translated to the applicable external interface IP address: 192.0.2.1 or
192.0.2.100.

Note - If a connection matches a regular NAT rule and a NAT-for-internal-


networks rule, the regular NAT rule takes precedence.

To enable automatic Hide NAT

1. In SmartConsole, go to Gatew ays & Servers and double-click the gateway object.

The General Properties window of the gateway opens.

2. From the navigation tree, select NAT.

3. Select Hide internal netw orks behind the Gatew ay's external IP.

Security Management R80.40 Administration Guide      |      245


Creating an Access Control Policy

4. Click OK .

5. Install the Access Control Policy.

Enabling Manual NAT

For some deployments, it is necessary to manually define the NAT rules. Create SmartConsole
objects that use the valid (NATed) IP addresses. Create NAT rules to translate the original IP
addresses of the objects to valid IP addresses. Then configure the Firewall Rule Base to allow
traffic to the applicable translated objects with these valid IP addresses.

Note - For manual NAT rules, it is necessary to configure Proxy ARP entries
to associate the translated IP address. See "Automatic and Proxy ARP" on
page 277.

These are some situations that must use manual NAT rules:

n Rules that are restricted to specified destination IP addresses and to specified source IP
addresses

n Translate both source and destination IP addresses in the same packet.

n Static NAT in only one direction

n Translate services (destination ports)

n Rules that only use specified services (ports)

n Translate IP addresses for dynamic objects

This procedure explains how to configure manual Static NAT for a web server. You can also
configure manual Hide NAT for SmartConsole objects. See "Sample Deployment (Manual Rules
for Port Translation)" on page 248.

To enable manual Static NAT, follow this work flow

1. Create a clone from the network object, for example, the Web server.

2. Add a NAT rule that maps the original object to the NATed one.

3. Add Access Control rules that allow traffic to the new NATed objects.

To create a clone network object

1. In SmartConsole, right-click the object and select Clone .

The General Properties window of the new object opens.

2. Enter the Name . We recommend that you name the object <name>_valid_address.

3. Enter the NATed IP address.

4. Click OK .

Security Management R80.40 Administration Guide      |      246


Creating an Access Control Policy

To add a NAT rule to the Rule Base

1. In SmartConsole, go to Security Policies > Access Control > NAT.

2. Add a manual rule above the automatic NAT rules.

3. Configure the manual rule to translate the IP address. For example:

n Original Source - WebServer

n Translated Source - WebServer_valid_address

To add Access Control rules

1. In SmartConsole, go to Security Policies > Access Control > Policy .

2. Add rules that allow traffic to the applicable NATed objects.

These objects are the cloned objects that are called <name>_valid_address.

3. Install the policy.

Sample Deployment (Static and Hide NAT)

The goal for this sample deployment is to configure:

n Static NAT for the SMTP and the HTTP servers on the internal network. These servers can be
accessed from the Internet using public addresses.

n Hide NAT for the users on the internal network that gives them Internet access. This
network cannot be accessed from the Internet.

Item Description

1 Internal computers (Alaska_LAN 2001:db8::/64)

2 Web server (Alaska.Web 2001:db8:0:10::5 translated to 2001:db8:0:a::5)

3 Mail server (Alaska.Mail 2001:db8:0:10::6 translated to 2001:db8:0:a::6)

Security Management R80.40 Administration Guide      |      247


Creating an Access Control Policy

Item Description

4 Security Gateway (External interface 2001:db8:0:a::1)

5 External computers and servers in the Internet

To configure NAT for the network

1. Enable automatic Static NAT for the web server.

a. Double-click the Alaska.Web object and select NAT.

b. Select Add Automatic Address Translation Rules.

c. In Translation method, select Static .

d. Select Hide behind IP Address and enter 2001:db8:0:a::5.

e. Click OK .

2. Enable automatic Static NAT for the mail server.

a. Double-click the Alaska.Mail object and select NAT.

b. Select Add Automatic Address Translation Rules.

c. In Translation method, select Static .

d. Select Hide behind IP Address and enter 2001:db8:0:a::6.

e. Click OK .

3. Enable automatic Hide NAT for the internal computers.

a. Double-click the Alaska_LAN object and select NAT.

b. Select Add Automatic Address Translation Rules.

c. In Translation method, select Hide .

d. Select Hide behind Gatew ay .

4. Click OK .

5. Install the Access Control Policy.

Sample Deployment (Manual Rules for Port Translation)

The goal for this sample configuration is to let external computers access a web and mail server
in a DMZ network from one IP address. Configure Hide NAT for the DMZ network object and
create manual NAT rules for the servers.

Security Management R80.40 Administration Guide      |      248


Creating an Access Control Policy

Item Description

1 External computers and servers in the Internet

2 Security Gateway (Alaska_GW external interface 2001:db8:0:c::1)

3 DMZ network (Alaska_DMZ 2001:db8:a::/128)

4 Web server (Alaska_DMZ_Web 2001:db8:a::35:5 translated to 2001:db8:0:c::1)

5 Mail server (Alaska_DMZ_Mail 2001:db8:a::35:6 translated to 2001:db8:0:c::1)

To configure NAT for the DMZ servers

1. Enable automatic Hide NAT for the DMZ network .

a. Double-click the Alaska_DMZ object and select NAT.

b. Select Add Automatic Address Translation Rules.

c. In Translation method, select Hide .

d. Select Hide behind Gatew ay .

e. Click OK .

2. Create a manual NAT rule that translates HTTP traffic from the Security
Gateway to the web server.

a. In SmartConsole, go to Security Policies > Access Control > NAT.

b. Add a rule below the automatic rules.

c. Right-click the cell and select Add new items to configure these settings:

n Original Destination - Alaska_GW

n Original Service - HTTP

n Translated Destination - Alaska_DMZ_Web

3. Create a manual NAT rule that translates SMTP traffic from the Security

Security Management R80.40 Administration Guide      |      249


Creating an Access Control Policy

Gateway to the mail server.

a. Add a rule below the automatic rules.

b. Right-click the cell and select Add new items to configure these settings:

n Original Destination - Alaska_GW

n Original Service - SMTP

n Translated Destination - Alaska_DMZ_Web

4. Create a rule in the Firewall Rule Base that allows traffic to the servers.

a. In SmartConsole, go to Security Policies > Access Control > NAT.

b. Add a rule to the Rule Base.

c. Right-click the cell and select Add new items to configure these settings:

n Destination - Alaska_DMZ

n Service - HTTP, SMTP

n Action - Allow

5. Install the Access Control Policy.

NAT Rule Base for Manual Rules for Port Translation Sample Deployment

Origin Origin Translate


Original Translat Translat
N al al d Instal Commen
Destinati ed ed
o. Sourc Servic Destinati l On ts
on Source Services
e es on

1 Alask Alaska_ Any Original Original Original All Automati


a_DMZ DMZ c rule

2 Alask Any Any H Original Original All Automati


a_DMZ Alaska_ c rule
DMZ
(Hiding
Address)

3 Any Alaska_ http Original S Alaska_ Original Policy


GW DMZ_Web Targe
ts

4 Any Alaska_ smtp Original S Alaska_ Original Policy


GW DMZ_Mail Targe
ts

Security Management R80.40 Administration Guide      |      250


Creating an Access Control Policy

Configuring Stateful NAT64 (IPv6 to IPv4 translation)

Background:

NAT64 translation (RFC 6146) lets IPv6-only client communicate with IPv4-only server using
unicast UDP, TCP, or ICMP.

IPv6-only client is one of these:

n A host with a networking stack that implements only IPv6.

n A host with a networking stack that implements both IPv4 and IPv6 protocols, but with only
IPv6 connectivity.

n A host that runs an IPv6-only client application.

IPv4-only server is one of these:

n A host with a networking stack that implements only IPv4.

n A host with a networking stack that implements both IPv4 and IPv6 protocols, but with only
IPv4 connectivity.

n A host that runs an IPv4-only server application.

The translation of IP addresses is done by translating the packet headers according to the IP/ICMP
Translation Algorithm defined in RFC 6145. The IPv4 addresses of IPv4 hosts are translated to and
from IPv6 addresses using the algorithm defined in RFC 6052, and an IPv6 prefix assigned to the
stateful NAT64 for this specific purpose.

Note - For information about DNS64, see RFC 6147.

Properties of Stateful NAT64:

n Performs N:M translation:

l N must be greater than M

l If M=1, performs a Hide NAT behind a single IPv4 address.

l If M>1, performs a Hide NAT behind a range of IPv4 addresses.

n Gives good IPv4 address preservation (multiplexed using ports).

n Saves connection states and binding.

n There are no requirements on the assignment of IPv6 addresses to IPv6 clients. Any mode of
IPv6 address assignment is legitimate (Manual, DHCP6, SLAAC).

n It is a scalable solution.

NAT64 use case scenarios:

n [IPv6 Network] --- (Internet) --- [Security Gateway] --- [internal IPv4 Network]

Common use case for Content Providers. DNS64 is not needed.

Security Management R80.40 Administration Guide      |      251


Creating an Access Control Policy

n [internal IPv6 Network] --- [Security Gateway] --- (Internet) --- [IPv4 Network]

Common use case for Carriers, ISPs, Enterprises. DNS64 is required.

n [IPv6 Network] --- [Security Gateway] --- [IPv4 Network]

Common use case for Enterprises. DNS64 is required.

These standards are supported for NAT64:

n RFC 6144 - Framework for IPv4/IPv6 Translation

n RFC 6146 - Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to
IPv4 Servers

n RFC 6052 - IPv6 Addressing of IPv4/IPv6 Translators

n RFC 6145 - IP/ICMP Translation Algorithm

n RFC 2428 - FTP Extensions for IPv6 and NATs

n RFC 6384 - An FTP Application Layer Gateway (ALG) for IPv6-to-IPv4 Translation

These features are not supported for NAT64:

n VoIP traffic.

n HTTPS Inspection.

n SSL de-multiplexer.

n Security Gateway in HTTP Proxy mode.

n IPS protection "HTTP Header Spoofing".

Work flow for configuring NAT64 rules:

1. Prepare your Security Gateway for NAT64

2. Define the NAT64 rules.

3. Configure the additional settings for NAT64.

Preparing Security Gateway for NAT64

Note - In cluster, do these steps on each cluster member.

Security Management R80.40 Administration Guide      |      252


Creating an Access Control Policy

Procedure

Step Instructions

1 Make sure that an IPv6 address is assigned to the interface that connects to the
destination IPv4 network, and the IPv6 network prefix length is equal to, or less than
96.

Note - This can be any valid IPv6 address with the IPv6 network prefix
length equal to, or less than 96.

n In Gaia Portal:
Click Netw ork Management > Netw ork Interfaces.
n In Gaia Clish:
Run:
show interface <Name of Interface> ipv6-address

If such IPv6 address is not assigned yet, assign it now. For details, see R80.40 Gaia
Administration Guide - Chapter Network Management - Section Network Interfaces -
Section Physical Interfaces.

2 Make sure that the IPv6 routing is configured to send the traffic that is destined to
the NATed IPv6 addresses (defined in the Original Destination column in the NAT64
rule) through the interface that connects to the destination IPv4 network.

n In Gaia Portal:
Click Advanced Routing > Routing Monitor .
n In Gaia Clish:
Run:
show ipv6 route

If such route does not already exist, add it in Gaia Clish. For details, see R80.40 Gaia
Administration Guide.
Run these commands in Gaia Clish:

1. set ipv6 static-route <NATed Destination IPv6


Addresses>/<96 or less> nexthop gateway <Any IPv6 Address
from the IPv6 subnet of the Interface that connects to the
destination real IPv4 network> on
Example topology:
[IPv6 Client] --- (NATed IPv6 of IPv4 side are 1111:2222::/96) [Security Gateway]
(eth3 with IPv6 3333:4444::1) --- [IPv4 Server]
In such case, configure the IPv6 route using this command:
set ipv6 static-route 1111:2222::/96 nexthop gateway
3333:4444::10 on
2. save config

Security Management R80.40 Administration Guide      |      253


Creating an Access Control Policy

Step Instructions

3 Make sure that the number of IPv6 CoreXL FW instances is equal to the number of
IPv4 CoreXL FW instances.

a. Connect to the command line on the Security Gateway.


b. Log in to Gaia Clish, or Expert mode.
c. Show the number of IPv6 CoreXL FW instances:
fw6 ctl multik stat
d. Show the number of IPv4 CoreXL FW instances:
fw ctl multik stat
e. If the number of IPv6 CoreXL FW instances is less than the number of IPv4
CoreXL FW instances, then do these steps:
i. Run:
cpconfig

ii. Select Check Point CoreX L


iii. Select Change the number of IPv6 firew all instances
iv. Configure the number of IPv6 CoreXL FW instances to be the same as the
number of IPv4 CoreXL FW instances
v. Select Exit
vi. Reboot the Security Gateway
f. Connect to the command line on the Security Gateway.
g. Log in to Gaia Clish, or Expert mode.
h. Show the number of IPv6 CoreXL FW instances:
fw6 ctl multik stat
i. Show the number of IPv4 CoreXL FW instances:
fw ctl multik stat

Example output:
[Expert@GW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#

Security Management R80.40 Administration Guide      |      254


Creating an Access Control Policy

Defining NAT64 Rules

Define NAT64 rules as Manual NAT rules in the Access Policy. Make sure that you add access
rules that allow this NAT traffic.

Do these steps in SmartConsole to define NAT64 rules

1. Define a source IPv6 Network object.

This object represents the source IPv6 addresses, which you translate to source IPv4
addresses.

2. Define a translated destination IPv6 Network object with an IPv4-embedded IPv6 address,
or a translated destination IPv6 Host object with a static IPv6 address.

This object represents the translated destination IPv6 address, to which the IPv6 sources
connect.

3. Define a translated source IPv4 Address Range object.

This object represents the translated source IPv4 addresses, to which you translate the
original source IPv6 addresses.

4. Create a Manual NAT64 rule.

5. Install the Access Policy.

To define a source IPv6 Network object that represents the source IPv6 address,
which you translate to source IPv4 addresses

1. Click Objects menu > New Netw ork .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 section:

Do not enter anything.

6. In the IPv6 section:

a. In the Netw ork address field, enter the IPv6 address of your IPv6 network, which
you translate to source IPv4 addresses.

b. In the Prefix field, enter the prefix of your IPv6 network.

7. On the NAT page of this object:

Do not configure anything.

8. Click OK .

Security Management R80.40 Administration Guide      |      255


Creating an Access Control Policy

To define a translated destination IPv6 Network object with IPv4-embedded IPv6


address that represents the IPv6 addresses, to which the IPv6 sources connect

1. Click Objects menu > New Netw ork .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 section:

Do not enter anything.

6. In the IPv6 section:

a. In the Netw ork address field, enter the destination IPv4-embedded IPv6 address
(also called IPv4-mapped IPv6 address), to which the IPv6 sources connect.

Such IPv6 address contains (from left to right) 80 "zero" bits, followed by 16 "one"
bits, and then the 32 bits of the IPv4 address - 0:0:0:0:0:FFFF:X.Y.Z.W, where X.Y.Z.W
are the four octets of the destination IPv4 address.

For example, for IPv4 network 192.168.3.0, the IPv4-embedded IPv6 address is
0:0:0:0:0:FFFF:192.168.3.0, or 0:0:0:0:0:FFFF:C0A8:0300. For more information, see
RFC 6052.

These IPv4-embedded IPv6 addresses are published by an external DNS64 server.

b. In the Prefix field, enter the applicable IPv6 prefix.

Note - You can define IPv4-embedded IPv6 addresses only for these object types:
Address Range, Network, and Host.

7. On the NAT page of this object:

Do not configure anything.

8. Click OK .

To define a translated destination IPv6 Host object with static IPv6 address that
represents the IPv6 address, to which the IPv6 sources connect

1. Click Objects menu > New Host .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 section:

Do not enter anything.

Security Management R80.40 Administration Guide      |      256


Creating an Access Control Policy

6. In the IPv6 section:

In the Netw ork address field, enter the destination static IPv6 address, to which the
IPv6 sources connect.

7. On the NAT page of this object:

Do not configure anything.

8. Configure the applicable settings on other pages of this object.

9. Click OK .

To define a translated source IPv4 Address Range object that represents the IPv4
addresses, to which you translate the source IPv6 addresses

1. Click Objects menu > More object types > Netw ork Object > Address Range > New
Address Range .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 section:

a. In the First IP address field, enter the first IPv4 address of your IPv4 addresses
range, to which you translate the source IPv6 addresses.

b. In the Last IP address field, enter the last IPv4 address of your IPv4 addresses
range, to which you translate the source IPv6 addresses.

Notes:

n This IPv4 addresses range must not use private IPv4 addresses (see RFC 1918 and
Menu > Global properties > Non Unique IP Address Range ).

n This IPv4 addresses range must not be used on the IPv4 side of the network.

n We recommend that you define a large IPv4 addresses range for more concurrent
NAT64 connections.

6. In the IPv6 section:

Do not enter anything.

7. On the NAT page of this object:

Do not configure anything.

8. Click OK .

Security Management R80.40 Administration Guide      |      257


Creating an Access Control Policy

To create a Manual NAT64 rule

1. From the left Navigation Toolbar, click Security Policies.

2. In the top Access Control section, click NAT.

3. Right-click on the Manual Low er Rules section title, and near the New Rule , click
Above or Below .

Configure this Manual NAT64 rule:

Important - Some combinations of object types are not supported in the Original Source
and Original Destination columns. See the summary table with the supported NAT rules
at the bottom of this section.

a. In the Original Source column, add the IPv6 object for your original source IPv6
addresses.

In this rule column, NAT64 rules support only these types of objects:
n *Any

n Host with a static IPv6 address

n Address Range with IPv6 addresses

n Network with IPv6 address

b. In the Original Destination column, add a translated destination IPv6 object with
an IPv4-embedded IPv6 address.

In this rule column, NAT64 rules support only these types of objects:

n Host with a static IPv6 address

n Address Range with IPv4-embedded IPv6 addresses

n Network with an IPv4-embedded IPv6 address

c. In the Original Services column, you must leave the default Any .

d. In the Translated Source column, add the IPv4 Address Range object for your
translated source IPv4 addresses range.

In this rule column, NAT64 rules support only these types of objects:

n Host with a static IPv4 address, only if in the Original Source column you
selected a Host with a static IPv6 address

n Address Range with IPv4 addresses

Security Management R80.40 Administration Guide      |      258


Creating an Access Control Policy

e. In the Translated Source column, right-click the IPv4 Address Range object >
click NAT Method > click Stateful NAT64:

n The Translated Packet Destination column shows = Embedded IPv4


Address.

n The 64 icon shows in both the Translated Source and Translated


Destination columns.

In this rule column, NAT64 rule supports only these types of objects:

n Host with a static IPv4 address, only if in the Original Source column you
selected a Host with a static IPv6 address

n Embedded IPv4 Address

f. In the Translated Services column, you must leave the default = Original.

4. Install the Access Control Policy.

To summarize, you must configure only these Manual NAT64 rules (rule numbers are for
convenience only):

Original Original Original Translated Translated Translated


#
Source Destination Services Source Destination Services

1 *Any IPv6 *Any IPv4 IPv4 =


Host Address Host Original
object with Range object
a static object
IPv6 address

2 *Any IPv6 *Any IPv4 Embedded =


Address Range Address IPv4 Original
object with an Range Address
IPv4-embedded object
IPv6 addresses

3 *Any IPv6 *Any IPv4 Embedded =


Network Address IPv4 Original
object with an IPv4- Range Address
embedded object
IPv6 address

Security Management R80.40 Administration Guide      |      259


Creating an Access Control Policy

Original Original Original Translated Translated Translated


#
Source Destination Services Source Destination Services

4 IPv6 IPv6 *Any IPv4 IPv4 =


Host Host Host Host Original
object object with object object
with a static
a static IPv6 address
IPv6
address

5 IPv6 IPv6 *Any IPv4 Embedded =


Host Address Range Address IPv4 Original
object object with Range Address
with IPv4-embedded object
a static IPv6 addresses
IPv6
address

6 IPv6 IPv6 *Any IPv4 Embedded =


Host Network Address IPv4 Original
object object with an Range Address
with IPv4-embedded object
a static IPv6 address
IPv6
address

7 IPv6 IPv6 *Any IPv4 IPv4 =


Address Host Address Host Original
Range object with Range object
object a static object
IPv6 address

8 IPv6 IPv6 *Any IPv4 Embedded =


Address Address Range Address IPv4 Original
Range object with Range Address
object IPv4-embedded object
IPv6 addresses

9 IPv6 IPv6 *Any IPv4 Embedded =


Address Network Address IPv4 Original
Range object with an Range Address
object IPv4-embedded object
IPv6 address

Security Management R80.40 Administration Guide      |      260


Creating an Access Control Policy

Original Original Original Translated Translated Translated


#
Source Destination Services Source Destination Services

10 IPv6 IPv6 *Any IPv4 IPv4 =


Network Host Address Host Original
object object with Range object
a static object
IPv6 address

11 IPv6 IPv6 *Any IPv4 Embedded =


Network Address Range Address IPv4 Original
object object with Range Address
IPv4-embedded object
IPv6 addresses

12 IPv6 IPv6 *Any IPv4 Embedded =


Network Network Address IPv4 Original
object object with an Range Address
IPv4-embedded object
IPv6 address

Configuring the Additional Settings for NAT64

You can configure the additional settings that control the NAT64 translation mechanism. These
settings are compliant with RFC 6145.

Best Practice - We recommend that you change the default settings only if you
are familiar with the technology.

Procedure

1. Close all SmartConsole windows.

2. Connect with GuiDBedit Tool (see sk13009) to the applicable Security Management Server
or Domain Management Server.

3. In the top left section, click Table > Global Properties > properties.

4. In the top right section, click firew all_properties.

5. In the bottom section, scroll to these Field Names:


n nat64_add_UDP_checksum

n nat64_avoid_PMTUD_blackhole

Security Management R80.40 Administration Guide      |      261


Creating an Access Control Policy

n nat64_copy_type_of_service

n nat64_error_message_on_dropped_packets

6. Right-click on the applicable Field Name and click Edit .

7. Select the applicable Value (true , or false ).Click OK .

Field Name Description

nat64_add_UDP_ This setting controls whether the translator should calculate


checksum and add a valid UDP checksum value to a packet, if the packet
checksum value is zero.
This is important because, by default, an IPv4 UDP packet with a
checksum value of zero is dropped on the IPv6 side.
Default: false

nat64_avoid_ This setting controls whether to allow packet fragmentation on


PMTUD_ the IPv4 (destination) side during PMTU discovery.
blackhole
Enable this setting if some equipment combinations cause
PMTU discovery to fail.
Default: false

nat64_copy_ This setting controls whether to copy the traffic Class Field to
type_of_ the Type Of Service field, and set the Type Of Service field in
service
the translated packet to zero.
Default: true

nat64_error_ This setting controls whether to generate an audit log after a


message_on_ connection is closed.
dropped_
For each closed connection, the log shows:
packets
n Connection information (source and destination IP
address, source port, and service).
n Translated source IP address and source port.
n Start time and end time.
n If the connection was closed because the connection
expired, log shows additional information in the TCP End
Reason field.
If this field does not show in the log, the connection was
closed with a TCP RST, or with a TCP FIN, and did not
expire.
Default: true

8. Click File > Save All to save the changes.

9. Close the GuiDBedit Tool.

Security Management R80.40 Administration Guide      |      262


Creating an Access Control Policy

10. Connect with the SmartConsole to the applicable Security Management Server or Domain
Management Server.

11. Install the Access Control Policy.

Logging of NAT64 traffic

In the Security Gateway log for NAT64 connection, the source and destination IPv6 addresses
show in their original IPv6 format. To identify a NAT64 entry, look in the More section of the Log
Details window.

Field in Log Description

X late (NAT) Shows the translated source IPv4 address, to which the Security Gateway
Source IP translated the original source IPv6 address

X late (NAT ) Shows the translated destination IPv4 address, to which the Security
Destination IP Gateway translated the original destination IPv6 address

More Identifies the entry as NAT64 traffic (Nat64 enabled)

Example of NAT64 Translation Flow

Example topology

[IPv6 Client] --- (interface) [Security Gateway] (internal) --- [IPv4 Server]

Where:

Item Description

IPv6 Client IPv6 real address is 1111:1111::0100/96

Security IPv6 address is 1111:1111::1/96


Gateway
external
interface

Security IPv4 address is 10.0.0.1/24


Gateway IPv6 address is 3333:4444::1/96
internal
interface

IPv4 Server IPv4 real address is 10.0.0.100/24


IPv6 NATed address is 1111:2222::0A00:0064/96

Security Management R80.40 Administration Guide      |      263


Creating an Access Control Policy

Item Description

IPv6 NATed IPv6 address of the network on the external Security Gateway side is
network 1111:2222::/96
These IPv6 addresses are used to translate the IPv4 address of the IPv4
Server to the IPv6 address

IPv4 NATed IPv4 address of the network on the internal Security Gateway side is
network 1.1.1.0/24
These IPv4 addresses are used to translate the IPv6 address of the IPv6
Client to the IPv4 address

Traffic flow

1. IPv6 Client opens an IPv6 connection to the NATed IPv6 address of the IPv4 Server:

From the IPv6 Client's IPv6 real address 1111:1111::0100 to the IPv4 Server's NATed IPv6
address 1111:2222::0A00:0064

Where:

The "1111:2222::" part is the NATed IPv6 subnet

The "0A00:0064" part is 10.0.0.100

2. Security Gateway performs these NAT translations:

a. Translate the IPv6 Client's source address from the real IPv6 address
1111:1111::0100 to the special concatenated source IPv6 address
0064:FF9B::0101:01X

Where:

The "0064:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the
RFC)

The "0101:01XX" part is 1.1.1.X

b. Translate the IPv6 Client's source address from the special concatenated source
IPv6 address 0064:FF9B::0101:01XX to the source IPv4 address 1.1.1.X

c. Translate the IPv6 Client's NATed destination address from the IPv6 address
1111:2222::0A00:0064 to the NATed destination IPv4 address 10.0.0.100

3. IPv4 Server receives this request connection as from the source IPv4 address 1.1.1.X to
the destination IPv4 address 10.0.0.100

4. IPv4 Server replies to this connection from the source IPv4 address 10.0.0.100 to the
destination IPv4 address 1.1.1.X

5. Security Gateway performs these NAT translations:

Security Management R80.40 Administration Guide      |      264


Creating an Access Control Policy

a. Translate the IPv4 Server's source real IPv4 address 10.0.0.100 to the source NATed
IPv6 address 1111:2222::0A00:0064

b. Translate the IPv6 Client's NATed destination IPv4 address 1.1.1.X to the destination
special concatenated IPv6 address 0064:FF9B::0101:01X

Where:

The "64:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the
RFC)

The "0101:01XX" part is 1.1.1.X

c. Translate the IPv6 Client's destination special concatenated IPv6 address


0064:FF9B::0101:01XX to the destination IPv6 real address 1111:1111::0100

6. IPv6 Client receives this reply connection as from the source IPv6 address
1111:2222::0A00:0064 to the destination IPv6 address 1111:1111::0100

Summary

n Request: [IPv6 Client] ---> [Security Gateway] ---> [IPv4 Server]

Field in pack et Original IPv6 pack et NATed IPv4 pack et

Source IP 1111:1111::0100 / 96 1.1.1.X / 24

Destination IP 1111:2222::0A00:0064 / 96 10.0.0.100 / 24

n Reply: [IPv6 Client] <--- [Security Gateway] <--- [IPv4 Server]

Field in pack et Original IPv4 pack et NATed IPv6 pack et

Source IP 10.0.0.100 / 24 1111:2222::0A00:0064 / 96

Destination IP 1.1.1.X / 24 1111:1111::0100 / 96

Configuring Stateless NAT46 (IPv4 to IPv6 translation)

NAT46 rules are only supported on Security Gateways and Cluster Members R80.20 and higher.

Background:

NAT46 translation lets an IPv4 network communicate with an IPv6 network without maintaining
any session information on Security Gateway.

Properties of Stateless NAT46:

n Performs 1:1 IP address mapping.

n The system generates the translated source IPv6 address as a combination of these two

Security Management R80.40 Administration Guide      |      265


Creating an Access Control Policy

parts:

1. A user-defined Network object with an IPv6 address defined with the 96-bit prefix.

2. The source IPv4 address, which is added as a 32-bit suffix.

NAT46 use case scenarios:

n [IPv4 Network] --- (Internet) --- [Security Gateway] --- [IPv6 Network]

Common use case for Content Providers.

n [IPv4 Network] --- [Security Gateway] --- (Internet) --- [IPv6 Network]

Common use case for Enterprises.

These features are not supported for NAT46:

n VoIP traffic.

n FTP traffic.

n Any protocols that require state information between Control and Data connections.

Preparing Security Gateway for NAT46

Note - In cluster, do these steps on each cluster member.

Procedure

Step Instructions

1 Make sure that an IPv6 address is assigned to the interface that connects to the
destination IPv6 network, and the IPv6 network prefix length is equal to 96.
Note - This can be any valid IPv6 address with the IPv6 network prefix length equal
to 96.

n In Gaia Portal:
Click Netw ork Management > Netw ork Interfaces.
n In Gaia Clish:
Run: show interface <Name of Interface> ipv6-address

If such IPv6 address is not assigned yet, assign it now. For details, see R80.40 Gaia
Administration Guide - Chapter Network Management - Section Network Interfaces -
Section Physical Interfaces.

Security Management R80.40 Administration Guide      |      266


Creating an Access Control Policy

Step Instructions

2 Make sure that the routing is configured to send the traffic that is destined to the
NATed IPv4 addresses (defined in the Translated Destination column in the NAT46
rule) through the interface that connects to the destination IPv6 network.

n In Gaia Portal:
Click Advanced Routing > Routing Monitor .
n In Gaia Clish:
Run: show route

If such route does not already exist, add it in Gaia Clish. For details, see R80.40 Gaia
Administration Guide. Run these commands in Gaia Clish:
1. set static route <NATed Destination IPv4 Addresses>/<NATed
IPv4 Net Mask> nexthop gateway logical <Name of Interface
that connects to the real IPv6 Network> on
Example topology:
[IPv4 Client] --- (NATed IPv4 of IPv6 side are 1.1.1.0/24) [Security Gateway] (eth3)
--- [IPv6 Server]
In such case, configure the IPv4 route using this command:
set static route 1.1.1.0/24 nexthop gateway logical eth3 on
2. save config

Security Management R80.40 Administration Guide      |      267


Creating an Access Control Policy

Step Instructions

3 Make sure that the number of IPv6 CoreXL FW instances is equal to the number of
IPv4 CoreXL FW instances.

1. Connect to the command line on the Security Gateway.


2. Log in to Gaia Clish, or Expert mode.
3. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
4. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
5. If the number of IPv6 CoreXL FW instances is less than the number of IPv4
CoreXL FW instances, then do these steps:
a. Run:
cpconfig
b. Select Check Point CoreX L
c. Select Change the number of IPv6 firew all instances
d. Configure the number of IPv6 CoreXL FW instances to be the same as the
number of IPv4 CoreXL FW instances
e. Select Exit
f. Reboot the Security Gateway
6. Connect to the command line on the Security Gateway.
7. Log in to Gaia Clish, or Expert mode.
8. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
9. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat

Example output:
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#
[Expert@GW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#

Defining NAT46 Rules

Define NAT46 rules as Manual NAT rules in the Access Policy. Make sure that you add access
rules that allow this NAT traffic.

Security Management R80.40 Administration Guide      |      268


Creating an Access Control Policy

Do these steps in SmartConsole to define NAT46 rules

1. Define an applicable source IPv4 object (IPv4 Host, IPv4 Address Range, or IPv4
Network).

2. Define a destination IPv4 Host object.

This object represents the destination IPv4 address, to which the IPv4 sources
connect.

3. Define a translated source IPv6 Network object with an IPv6 address defined with the
96-bit prefix.

This object represents the translated source IPv6 addresses, to which you translate
the source IPv4 addresses.

4. Define a translated destination IPv6 Host object.

This object represents the translated destination IPv6 address, to which the translated
IPv4 sources connect.

5. Create a Manual NAT46 rule.

6. Install the Access Policy.

To define a source IPv4 Host object

1. Click Objects menu > New Host .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 address field, enter the source IPv4 address.

6. In the IPv6 section:

Do not enter anything

7. On the NAT page of this object:

Do not configure anything.

8. Configure the applicable settings on other pages of this object.

9. Click OK .

To define a source IPv4 Network object

1. Click Objects menu > New Netw ork .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

Security Management R80.40 Administration Guide      |      269


Creating an Access Control Policy

4. Click the General page of this object.

5. In the IPv4 section:

a. In the Netw ork address field, enter the IPv4 address of your source IPv4
network.

b. In the Net mask field, enter the net mask of your source IPv4 network.

6. In the IPv6 section:

Do not enter anything.

7. On the NAT page of this object:

Do not configure anything.

8. Click OK .

To define a source IPv4 Address Range object

1. Click Objects menu > More object types > Netw ork Object > Address Range >
New Address Range .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 section:

a. In the First IP address field, enter the first IPv4 address of your IPv4 addresses
range.

b. In the Last IP address field, enter the last IPv4 address of your IPv4 addresses
range.

6. In the IPv6 section:

Do not enter anything.

7. On the NAT page of this object:

Do not configure anything.

8. Click OK .

To define a translated destination IPv4 Host object

1. Click Objects menu > New Netw ork .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

Security Management R80.40 Administration Guide      |      270


Creating an Access Control Policy

5. In the IPv4 section:

a. In the Netw ork address field, enter the IPv4 address of your destination IPv4
network.

b. In the Net mask field, enter the net mask of your destination IPv4 network.

6. In the IPv6 section:

Do not enter anything.

7. On the NAT page of this object:

Do not configure anything.

8. Click OK .

To define a translated source IPv6 Network object with an IPv6 address defined
with the 96-bit prefix

1. Click Objects menu > New Netw ork .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 section:

Do not enter anything.

6. In the IPv6 section:

a. In the Netw ork address field, enter the translated source IPv6 address.

b. In the Prefix field, enter the number 96.

7. On the NAT page of this object:

Do not configure anything.

8. Click OK .

To define a translated destination IPv6 Host object

1. Click Objects menu > New Host .

2. In the Object Name field, enter the applicable name.

3. In the Comment field, enter the applicable text.

4. Click the General page of this object.

5. In the IPv4 section:

Do not enter anything.

Security Management R80.40 Administration Guide      |      271


Creating an Access Control Policy

6. In the IPv6 section:

In the Netw ork address field, enter the destination static IPv6 address.

7. On the NAT page of this object:

Do not configure anything.

8. Configure the applicable settings on other pages of this object.

9. Click OK .

To create a Manual NAT46 rule

1. From the left Navigation Toolbar, click Security Policies.

2. In the top Access Control section, click NAT.

3. Right-click on the Manual Low er Rules section title, and near the New Rule , click
Above or Below .

Configure this NAT46 rule:

Original Original Original Translated Translated Translated


Source Destination Services Source Destination Services

*Any IPv4 *Any IPv6 IPv6 = Original


or Host Netw ork Host
Source object object object
IPv4 with an
Host IPv6
object address
or defined
Source with
IPv4 the 96-bit
Address prefix
Range
object
or
Source
IPv4
Netw ork
object

Do these steps:

a. In the Original Source column, add the applicable IPv4 object.

In this rule column, NAT46 rules support only these types of objects:

Security Management R80.40 Administration Guide      |      272


Creating an Access Control Policy

n *Any

n Host with a static IPv4 address

n Address Range with IPv4 addresses

n Network with IPv4 address

b. In the Original Destination column, add the IPv4 Host object that represents
the destination IPv4 address, to which the IPv4 sources connect.

In this rule column, NAT46 rules support only IPv4 Host objects.

c. In the Original Services column, you must leave the default Any .

d. In the Translated Source column, add the IPv6 Netw ork object with an IPv6
address defined with the 96-bit prefix.

In this rule column, NAT64 rules support only IPv6 Network objects with an IPv6
address defined with the 96-bit prefix.

e. In the Translated Source column, right-click the IPv6 Netw ork object with the
96-bit prefix > click NAT Method > click Stateless NAT46.

The 46 icon shows in the Translated Source column.

f. In the Translated Destination column, add the IPv6 Host object represents the
translated destination IPv6 address, to which the translated IPv4 sources
connect.

In this rule column, NAT46 rule supports only an IPv6 Host objects.

g. In the Translated Services column, you must leave the default = Original.

To summarize, you must configure only these NAT46 rules (rule numbers are for
convenience only):

Original Original Original Translated Translated Translated


#
Source Destination Services Source Destination Services

1 *Any IPv4 *Any IPv6 IPv6 =


Host Network Host Original
object object object
with an
IPv6
address
defined
with
the 96-bit
prefix

Security Management R80.40 Administration Guide      |      273


Creating an Access Control Policy

Original Original Original Translated Translated Translated


#
Source Destination Services Source Destination Services

2 IPv4 IPv4 *Any IPv6 IPv6 =


Host Host Network Host Original
object object object object
with with an
a static IPv6
IPv4 address
address defined
with
the 96-bit
prefix

3 IPv4 IPv4 *Any IPv6 IPv6 =


Address Host Network Host Original
Range object object object
object with an
IPv6
address
defined
with
the 96-bit
prefix

4 IPv4 IPv4 *Any IPv6 IPv6 =


Network Host Network Host Original
object object object object
with an
IPv6
address
defined
with
the 96-bit
prefix

4. Install the Access Control Policy.

Logging of NAT46 traffic

In the Security Gateway log for NAT64 connection, the source and destination IPv6 addresses
show in their original IPv6 format. To identify a NAT46 entry, look in the More section of the
Log Details window.

Security Management R80.40 Administration Guide      |      274


Creating an Access Control Policy

Field in Log Description

X late (NAT) Shows the translated source IPv6 address, to which the Security Gateway
Source IP translated the original source IPv4 address

X late (NAT ) Shows the translated destination IPv6 address, to which the Security
Destination IP Gateway translated the original destination IPv4 address

More Identifies the entry as NAT46 traffic (Nat46 enabled)

Example of NAT46 Translation Flow


Example topology

[IPv4 Client] --- (internal) [Security Gateway] (external) --- [IPv6 Server]

Where:

Item Description

IPv4 Client IPv4 real address is 192.168.2.55


IPv6 NATed address is 2001:DB8:90::192.168.2.55/96

Security Gateway IPv4 address is 192.168.2.1/24


internal interface

Security Gateway IPv6 address is 2001:DB8:5001::1/96


external interface

IPv6 Server IPv6 real address is 2001:DB8:5001::30/96


IPv4 NATed address is 1.1.1.66/24

IPv6 NATed network IPv6 address of the network on the external Security Gateway
side is 2001:DB8:90::/96
These IPv6 addresses are used to translate the IPv4 address of
the IPv4 Client to IPv6 address

IPv4 NATed network IPv4 address of the network on the internal Security Gateway
side is 1.1.1.0/24
These IPv4 addresses are used to translate the IPv6 address of
the IPv6 Server to IPv4 address

Traffic flow

1. IPv4 Client opens an IPv4 connection to the NATed IPv4 address of the IPv6 Serve

From IPv4 address 192.168.2.55 to IPv4 address 1.1.1.66

Security Management R80.40 Administration Guide      |      275


Creating an Access Control Policy

2. Security Gateway performs these NAT translations:

a. From the source IPv4 address 192.168.2.55 to the source IPv6 address
2001:DB8:90::192.168.2.55/96

b. From the destination IPv4 address 1.1.1.66 to the destination IPv6 address
2001:DB8:5001::30

3. IPv6 Server receives this request connection as from the IPv6 address
2001:DB8:90::192.168.2.55/96 to the IPv6 address 2001:DB8:5001::30

4. IPv6 Server replies to this connection from the IPv6 address 2001:DB8:5001::30 to the IPv6
address 2001:DB8:90::192.168.2.55/96

5. Security Gateway performs these NAT translations:

a. From the source IPv6 address 2001:DB8:5001::30 to the source IPv4 address
1.1.1.66

b. From the destination IPv6 address 2001:DB8:90::192.168.2.55/96 to the destination


IPv4 address 192.168.2.55

6. IPv4 Client receives this reply connection as from the IPv4 address 1.1.1.66 to the IPv4
address 192.168.2.55

To summarize:

n Request: [IPv4 Client] ---> [Security Gateway] ---> [IPv6 Server]

Field in pack et Original IPv4 pack et NATed IPv6 pack et

Source IP 192.168.2.55 / 24 2001:DB8:90::192.168.2.55 / 96

Destination IP 1.1.1.66 / 24 2001:DB8:5001::30 / 96

n Reply: [IPv4 Client] <--- [Security Gateway] <--- [IPv6 Server]

Field in pack et Original IPv6 pack et NATed IPv4 pack et

Source IP 2001:DB8:5001::30 / 96 192.168.2.55 / 24

Destination IP 2001:DB8:90::192.168.2.55 / 96 1.1.1.66 / 24

Advanced NAT Settings


This section includes advanced NAT settings.

Deployment Configurations
This section discusses how to configure NAT in some network deployments.

Security Management R80.40 Administration Guide      |      276


Creating an Access Control Policy

Automatic and Proxy ARP

Giving a computer on the internal network an IP address from an external network using NAT
makes that computer appear on the external network. When NAT on the Security Gateway is
configured automatically, the Security Gateway replies on behalf of translated network objects to
ARP Requests that are sent from the external network for the IP address of the internal computer.

Item Description

1 Computer on the internal network with IP address 10.1.1.3

2 Security Gateway with external interface IP address 192.168.0.2 responds to ARP


Requests on behalf of translated internal objects

3 Translated IP Address 192.168.0.3 on the external network

4 External network

If you are using manual NAT rules, you must configure Proxy ARP entries to associate the
translated IP address with the MAC address of the Security Gateway interface that is on the same
network as the translated IP addresses.

See sk30197 for more information about configuring:

n Proxy ARP for IPv4 Manual NAT

n Proxy ARP for Scalable Platforms

See sk91905 for more about configuring Proxy NDP for IPv6 Manual NAT.

NAT and Anti-Spoofing

NAT is performed after Anti-Spoofing checks, which are performed only on the source IP address
of the packet. This means that spoofing protection is configured on the interfaces of the Security
Gateway in the same way as NAT.

Security Management R80.40 Administration Guide      |      277


Creating an Access Control Policy

Disabling NAT in a VPN Tunnel

When communicating within a VPN, it is normally not necessary to perform NAT. You can disable
NAT in a VPN tunnel with a single click in the VPN community object. Disabling NAT in a VPN
tunnel by defining a NAT rule slows down the performance of the VPN.

Connecting Translated Objects on Different Interfaces

The following sections describe how to allow connections in both directions between statically
translated objects (hosts, networks or address ranges) on different Security Gateway interfaces.

If NAT is defined through the network object (as opposed to using Manual NAT Rules), then you
must ensure that bidirectional NAT is enabled.

Internal Communication with Overlapping Addresses

If two internal networks have overlapping (or partially overlapping) IP addresses, Security Gateway
enables:

n Communication between the overlapping internal networks.

n Communication between the overlapping internal networks and the outside world.

n Enforcement of a different security policy for each overlapping internal network.

Network Configuration

For example, assume both Network 2A and Network 2B share the same address space
(192.168.1.0/24), therefore standard NAT cannot be used to enable communication between the
two networks. Instead, overlapping NAT must be performed on a per interface basis.

Users in Network 2A who want to communicate with users in Network 2B must use the
192.168.30.0/24 network as a destination. Users in Network 2B who want to communicate with
users in Network 2A must use the 192.168.20.0/24 network as a destination.

The Security Gateway (4) translates the IP addresses in the following way for each individual
interface:

Interface 4A

Security Management R80.40 Administration Guide      |      278


Creating an Access Control Policy

n Inbound source IP addresses are translated to the virtual network 192.168.20.0/24.

n Outbound destination IP addresses are translated to the network 192.168.1.0/24.

Interface 4B

n Inbound source IP addresses are translated to the network 192.168.30.0/24.

n Outbound destination IP addresses are translated to the network 192.168.1.0/24.

Interface 4C

Overlapping NAT is not configured for this interface. Instead, use NAT Hide in the normal way (not
on a per-interface basis) to hide source addresses behind the interface's IP address (192.168.4.1).

Communication Examples

This section describes how to enable communication between internal networks, and between an
internal network and the Internet

Communication Between Internal Network s

If user 1A, at IP address 192.168.1.10 in Network 2A, wants to connect to user 1B, at IP address
192.168.1.10 (the same IP address) in Network 2B, user 1A opens a connection to the IP address
192.168.30.10.

Communication Between Internal Networks

Source IP Destination
Step
address IP address

Interface 4A - before NAT 192.168.1.10 192.168.30.10

Interface 4A - after NAT 192.168.20.10 192.168.30.10

Security Gateway enforces the security policy for packets from


network 192.168.20.0/24 to network 192.168.30.0/24.

Interface 4B - before NAT 192.168.20.10 192.168.30.10

Interface 4B - after NAT 192.168.20.10 192.168.1.10

Communication Between an Internal Network and the Internet

If user 1A, at IP address 192.168.1.10 in network 2A, connects to IP address 192.0.2.10 on the
Internet (3).

Communication Between an Internal Network and the Internet

Security Management R80.40 Administration Guide      |      279


Creating an Access Control Policy

Source IP Destination
Step
address IP address

Interface 4A - before NAT 192.168.1.10 192.0.2.10

Interface 4A - after NAT 192.168.20.10 192.0.2.10

The Security Gateway (4) enforces the security policy for


packets from network 192.168.20.0/24 to the Internet (3).

Interface 4C - before NAT 192.168.20.10 192.0.2.10

Interface 4C - after NAT Hide 192.168.4.1 192.0.2.10

Routing Considerations

To allow routing from Network 2A to Network 2B, routing must be configured on the Security
Gateway.

These sections contain sample routing commands for Windows and Linux operating systems (for
other operating systems, use the equivalent commands).

On Windows

n route add 192.168.30.0 mask 255.255.255.0 192.168.3.2

n route add 192.168.20.0 mask 255.255.255.0 192.168.2.2

On Linux

n route add -net 192.168.30.0/24 gw 192.168.3.2

n route add -net 192.168.20.0/24 gw 192.168.2.2

Object Database Configuration

To activate the overlapping NAT feature, use GuiDBedit Tool (see sk13009), or the dbedit
command (see skI3301). In the sample network configuration, the per interface values for
interface 4A and interface 4B are set in the following way:

Sample Netw ork Configuration: Interface Configuration

Parameter Value

enable_ true
overlapping_
nat

Security Management R80.40 Administration Guide      |      280


Creating an Access Control Policy

Parameter Value

overlap_nat_ The overlapping IP addresses (before NAT). In the sample network


dst_ipaddr configuration, 192.168.1.0 for both interfaces.

overlap_nat_ The IP addresses after NAT. In the sample network configuration,


src_ipaddr 192.168.20.0 for interface 4A, and 192.168.30.0 for interface 4B.

overlap_nat_ The net mask of the overlapping IP addresses. In the sample network
netmask configuration, 255.255.255.0.

Security Management Behind NAT

The Security Management Server sometimes uses a private IP address (as listed in RFC 1918) or
some other non-routable IP address, because of the lack of public IP addresses.

NAT (Static or Hide) for the Security Management Server IP address can be configured in one click,
while still allowing connectivity with managed gateways. All gateways can be controlled from the
Security Management Server, and logs can be sent to the Security Management Server. NAT can
also be configured for a Management High Availability server and a Log Server.

Note - Security Management behind NAT is not supported for deployments where the Security
Management Server also acts as a gateway and must be addressed from outside the NATed
domain, for example, when it receives SAM commands.

In a typical Security Management Behind NAT scenario: the Security Management Server (1) is in
a network on which Network Address Translation is performed (the "NATed network"). The
Security Management Server can control Security Gateways inside the NATed network, on the
border between the NATed network and the outside world and outside the NATed network.

Item Description

1 Primary_Security_Management object with IP address 10.0.0.1. Translated address


192.168.55.1

In ordinary Hide NAT configurations, connections cannot be established from the external side
the NAT A Security Gateway. However, when using Hide NAT on the Security Management Server,
gateways can send logs to the Security Management Server.

When using the Security Management behind NAT feature, the remote gateway automatically
selects the Security Management address to be addressed and simultaneously applies NAT
considerations.

To enable NAT for the Security Management Server:

n From the NAT page of the Security Management Server object, define NAT and select Apply
for A Security Gatew ay control connections.

Security Management R80.40 Administration Guide      |      281


Creating an Access Control Policy

Non-Corresponding Gateway Addresses

Sometimes the gateway contacts the Security Management Server with an address that does not
correspond to the deployment of the remote gateway. For example:

n When the automatic selection of the gateway does not conform with the routing of the
deployment of the gateway. In this case, define the masters and loggers manually, to allow
the remote gateway to contact the Security Management Server using the required address.
When an inbound connection from a managed gateway enters the Security Gateway, port
translation is used to translate the hide address to the real IP address of the Security
Management Server.

To define masters and loggers, select Use local definitions for Log Servers and Use local
definitions for Masters and specify the correct IP addresses on the gateway.

This solution encompasses different scenarios:

n The remote gateway addresses the NATed IP when you want it to address the real IP.

n The remote gateway addresses the real IP when you want it to address the NATed IP. In this
case, specify the SIC name of the Security Management Server in the masters file.

Notes:

n Only one object can be defined with these settings, unless the second object is defined as a
Secondary Security Management Server or as a Log Server.

n Ensure that you properly define the Topology settings on all gateways. All workarounds
required for previous versions still function with no changes in their behavior.

Configuring the Security Management Server Object

To configure the Security Management Server object:

1. From the NAT page on the Primary_Security_Management object, select either Static NAT
or Hide NAT. If using Hide NAT, select Hide behind IP Address, for example,
192.168.55.1. Do not select Hide behind Gatew ay (address 0.0.0.0).

2. Select Install on Gatew ay to protect the NATed objects or network. Do not select All.

3. Select Apply for Security Gatew ay control connections.

Configuring the Security Gateway Object

To configure the Security Gateway object:

1. Open the Security Gateway Netw ork Management page

2. Create the Interface. Click Actions > New interface .

Security Management R80.40 Administration Guide      |      282


Creating an Access Control Policy

3. In the General page of the Interface window, define the IP address and the Net Mask.

4. In the Topology section, click Modify .

5. Select Override .

6. Select Netw ork defined by the interface IP and Net Mask .

IP Pool NAT

An IP Pool is a range of IP addresses (an address range, a network or a group of one of these
objects) that is routable to the gateway. IP Pool NAT ensures proper routing for encrypted
connections for the following two connection scenarios:

n Remote Access Client to MEP (Multiple Entry Point) gateways

n Gateway to MEP gateways

When a connection is opened from a Remote Access Client or a client behind a gateway, to a
server behind the MEP Gateways, the packets are routed through one of the MEP gateways.
Return packets in the connection must be routed back through the same gateway in order to
maintain the connection. To ensure that this occurs, each of the MEP gateways maintains a pool
of IP addresses that are routable to the gateway. When a connection is opened to a server, the
gateway substitutes an IP address from the IP pool for the source IP address. Reply packets from
the server return to the gateway, which restores the original source IP address and forwards the
packets to the source.

IP Pool Per Interface

You can define a separate IP address pool on one or more of the gateway interfaces instead of
defining a single pool of IP addresses for the gateway.

Defining an IP pool per interface solves routing issues that occur when the gateway has more
than two interfaces. Sometimes it is necessary that reply packets return to the gateway through
the same gateway interface. This illustration shows one of the MEP Gateways in a Remote Access
Client to MEP (Multiple Entry Point) gateway deployment.

Security Management R80.40 Administration Guide      |      283


Creating an Access Control Policy

Item Description

1 Packets from source host:


Source: Original
Destination:

2 VPN tunnel through the Internet

3 MEP Gateway

3A IP Pool 1 packets:
Source: 10.55.8.x
Destination:

3B IP Pool 2 packets:
Source: 10.55.10.x
Destination:

4 Internal network 10.8.8.0

5 Target host in internal network 10.10.10.0

If a remote client opens a connection to the internal network, reply packets from hosts inside the
internal networks are routed to the correct gateway interface through the use of static IP pool NAT
addresses.

The remote client's IP address is NATed to an address in the IP pool on one of the gateway
interfaces. The addresses in the IP pool can be routed only through that gateway interface so that
all reply packets from the target host are returned only to that interface. Therefore, it is important
that the IP NAT pools of the interfaces do not overlap.

When the packet returns to the gateway interface, the gateway restores the remote peer's source
IP address.

The routing tables on the routers that lie behind the gateway must be edited so that addresses
from a gateway IP pool are returned to the correct gateway interface.

Switching between IP Pool NAT per gateway and IP Pool NAT per interface and then installing the
security policy deletes all IP Pool allocation and all NATed connections.

NAT Priorities

IP Pool NAT can be used both for encrypted (VPN) and non-encrypted (decrypted by the gateway)
connections.

Note - To enable IP Pool NAT for clear connections through the gateway, configure INSPECT
changes in the user.def file (see sk98239). Contact Check Point Technical Support.

For non-encrypted connections, IP Pool NAT has the following advantages over Hide NAT:

Security Management R80.40 Administration Guide      |      284


Creating an Access Control Policy

n New back connections (for example, X11) can be opened to the NATed host.

n User-to-IP server mapping of protocols that allow one connection per IP can work with a
number of hosts instead of only one host.

n IPsec, GRE and IGMP protocols can be NATed using IP Pool NAT (and Static NAT). Hide NAT
works only with TCP, UDP and ICMP protocols.

Because of these advantages, you can specify that IP Pool NAT has priority over Hide NAT, if both
match the same connection. Hide NAT is only applied if the IP pool is used up.

The order of NAT priorities are:

1. Static NAT

2. IP Pool NAT

3. Hide NAT

Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than
the other NAT methods.

Reusing IP Pool Addresses For Different Destinations

IP Pool addresses can be reused for different destinations, which makes more efficient use of the
addresses in the pool. If a pool contains N addresses, then any number of clients can be assigned
an IP from the pool as long as there are no more than N clients per server.

Using IP Pool allocation per destination, two different clients can receive the same IP from the
pool as long as they communicate with different servers (connections 1 and 2). When reusing
addresses from the IP Pool, back connections are supported from the original server only
(connection 3). This means that connections back to the client can be opened only from the
specific server to which the connection was opened.

Item Description

1 Gateway with IP Pool addresses A to Z

Security Management R80.40 Administration Guide      |      285


Creating an Access Control Policy

Item Description

2 Clients.
Source: Original
Destination:

3A NATed packet from connection 3.


Source: A
Destination:

4A NATed packet from connection 4.


Source: A
Destination:

5A NATed packet from reply connection 5.


Source: Original
Destination: A

6A This server cannot open a connection with Destination A back to the client.

The default Do not reuse IP Pool NAT behavior means that each IP address in the IP Pool is used
once (connections 1 and 2 in the following illustration). In this mode, if an IP pool contains 20
addresses, up to 20 different clients can be NATed and back connections can be opened from any
source to the client (connection 3).

Item Description

1 Gateway with IP Pool addresses A to Z.

2 Clients.
Source: Original
Destination:

3A NATed packet from connection 3.


Source: A
Destination:

Security Management R80.40 Administration Guide      |      286


Creating an Access Control Policy

Item Description

4A NATed packet from connection 4.


Source: Z
Destination:

5 Connection.
Source: Original
Destination: A

Switching between the Reuse and Do not reuse modes and then installing the security policy,
deletes all IP Pool allocations and all NATed connections.

Configuring IP Pool NAT

To configure IP Pool NAT:

1. From the SmartConsole Menu , select Global Properties.

2. In the Global Properties > NAT page, select Enable IP Pool NAT and the required
tracking options.

3. In the gateway General Properties page, ensure the gateway version is specified
correctly.

4. For each gateway or gateway interface, create a network object that represents its IP pool
NAT addresses. The IP pool can be a network, group, or address range. For example, for
an address range, do the following:

a. From the Objects Bar (F11) , In the network objects tree, select New > More >
Netw ork Object > Address Range > Address Range .

The Address Range Properties window opens.

b. In the General tab, enter the first and last IP of the address range.

c. Click OK . The new address range appears in the Address Ranges branch of the
network objects tree.

5. Edit the gateway object, and select NAT > IP Pool NAT.

6. In the IP Pool NAT page, select one of the following:

a. Allocate IP Addresses from and then select the address range you created to
configure IP Pool NAT for the whole gateway, or

b. Define IP Pool NAT on Gatew ay interfaces to configure IP Pool NAT per


interface.

7. If required, select one or more of the following options:

Security Management R80.40 Administration Guide      |      287


Creating an Access Control Policy

a. Use IP Pool NAT for VPN client connections

b. Use IP Pool NAT for gatew ay to gatew ay connections

c. Prefer IP Pool NAT over Hide NAT to specify that IP Pool NAT has priority over
Hide NAT, if both match the same connection. Hide NAT is only applied if the IP
pool is used up.

8. Click Advanced.

a. Return unused addresses to IP Pool after : Addresses in the pool are reserved
for 60 minutes (default), even if the user logs off. If the user disconnects from their
ISP and then redials and reconnects, there will be two Pool NAT addresses in use
for the user until the first address from the IP Pool times out. If users regularly lose
their ISP connections, you may want to decrease the time-out to prevent the IP Pool
from being depleted.

b. Reuse IP addresses from the pool for different destinations: This is a good
option unless you need to allow back connections to be opened to clients from any
source, rather than just from the specific server to which the client originally
opened the connection.

9. Click OK .

10. Edit the routing table of each internal router so that packets with an IP address assigned
from the NAT pool are routed to the appropriate gateway or, if using IP Pools per
interface, the appropriate gateway interface.

IP Pool NAT for Clusters

IP Pools for gateway clusters are configured in two places in SmartConsole:

n In the gateway Cluster object NAT > IP Pool NAT page, select the connection scenario.

n In the Cluster member object IP Pool NAT page, define the IP Pool on the cluster member. A
separate IP pool must be configured for each cluster member. It is not possible to define a
separate IP Pool for each cluster member interface.

Site-to-Site VPN
The basis of Site-to-Site VPN is the encrypted VPN tunnel. Two Security Gateways negotiate a link
and create a VPN tunnel and each tunnel can contain more than one VPN connection. One
Security Gateway can maintain more than one VPN tunnel at the same time.

Sample Site-to-Site VPN Deployment

Item Description

A, B Security Gateways

Security Management R80.40 Administration Guide      |      288


Creating an Access Control Policy

Item Description

2 VPN tunnel

3 Internal network in VPN domain

4 Host 4

5 Host 5

In this sample VPN deployment, Host 4 and Host 5 securely send data to each other. The Security
Gateways perform IKE negotiation and create a VPN tunnel. They use the IPsec protocol to encrypt
and decrypt data that is sent between Host 4 and Host 5.

VPN Work flow

Firewalls
A&B
Host 4 sends packet Firewall A encrypts
create
to Host 5 data
VPN
tunnel

Firewall
Encrypted data is
Host 5 receives B
sent
unencrypted data decrypts
through VPN tunnel
data

VPN Communities

A VPN Domain is a collection of internal networks that use Security Gateways to send and receive
VPN traffic. Define the resources that are included in the VPN Domain for each Security Gateway.
Then join the Security Gateways into a VPN community - collection of VPN tunnels and their
attributes. Network resources of different VPN Domains can securely communicate with each
other through VPN tunnels that terminate at the Security Gateways in the VPN communities.

VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN
tunnels between each pair of Security Gateway. In a Star community, each satellite Security
Gateway has a VPN tunnel to the central Security Gateway, but not to other Security Gateways in
the community.

Mesh Topology Star Topology

Security Management R80.40 Administration Guide      |      289


Creating an Access Control Policy

Item Description

1 Security Gateway

2 Satellite Security Gateways

3 Central Security Gateway

Sample Star Deployment

This section explains how to configure a VPN star community. This deployment lets the satellite
Security Gateways connect to the internal network of the central Security Gateway. The internal
network object is named: Internal-netw ork .

To create a new VPN Star Community:

1. In SmartConsole, go to the Security Policies page.

2. In the Access Tools section, click VPN Communities.

3. Click New and select Star Community .

The New Star Community window opens.

4. Enter the name for the community.

5. From the navigation tree, select Encryption .

6. Configure the VPN encryption methods and algorithms for the VPN community.

7. Click OK .

To configure star VPN for the Security Gateways

For each Security Gateway in the VPN community, follow these configuration steps.

1. In SmartConsole, go to the Gatew ays & Servers page and double-click the Security
Gateway object.

The gateway properties window opens.

2. In the Netw ork Security section of the General Properties page, select IPsec VPN .

3. From the navigation tree, go to Netw ork Management > VPN Domain .

Security Management R80.40 Administration Guide      |      290


Creating an Access Control Policy

n For the central Security Gateway, click Manually defined and select the Internal-
netw ork object

n For a satellite Security Gateway, select All IP addresses

4. From the navigation tree, click IPsec VPN .

5. Configure the Security Gateway as a member of a VPN star community.

a. In the This Security Gatew ay participates in the follow ing VPN Communities
section, click Add.

The Add this Gatew ay to Community window opens.

b. Select the VPN Community.

c. Click OK .

6. Click OK .

After you create a community and configure Security Gateways, add those Security Gateways to
the community as a center or as a satellite gateway.

To add a Security Gateway to a new star community

1. In SmartConsole, go to the Security Policies page.

2. In the Access Tools section, click VPN Communities.

3. Select the new star community and click Edit .

The Star Community window opens.

4. In the Gatew ays page, add Security Gateways to the community:

n Center Gatew ays - Click Add and select center gateways. Select Mesh center
gatew ays, if necessary.

n Satellite Gatew ays - Click Add and select satellite gateways.

5. Click OK .

Security Management R80.40 Administration Guide      |      291


Creating an Access Control Policy

Sample Combination VPN Community

Item Description

1 London Security Gateway

2 New York Security Gateway

3 London - New York Mesh community

4 London company partner (external network)

5 London Star community

6 New York company partner (external network)

7 New York Star community

This deployment is composed of a Mesh community for London and New York Security Gateways
that share internal networks. The Security Gateways for external networks of company partners
do not have access to the London and New York internal networks. However, the Star VPN
communities let the company partners access the internal networks of the sites that they work
with.

Allowing VPN Connections

To allow VPN connections between Security Gateways in specific VPN communities, add Access
Control rules that accept such connections.

To allow all VPN traffic to hosts and clients on the internal networks of a specific VPN community,
select these options in the Encrypted Traffic section of the properties configuration window for
that VPN Community:

Security Management R80.40 Administration Guide      |      292


Creating an Access Control Policy

n For a meshed community: Accept all encrypted traffic

n For a Star Community: Accept all encrypted traffic on Both center and satellite
gatew ays, or Accept all encrypted traffic on Satellite gatew ays only .

Sample VPN Access Control Rules

This table shows sample VPN rules for an Access Control Rule Base. (The Action , Track and Time
columns are not shown. Action is set to Allow , Track is set to Log, and Time is set to Any .)

No. Name Source Destination VPN Service Install On

1 - Any NEGATED Member BranchOffices Any BranchOffices


Gateways LondonOffices LondonOffices

2 Site-to-site Any Any All_GwToGw FTP- Policy Targets


VPN port
HTTP
HTTPS
SMTP

3 Remote Any Any RemoteAccess HTTP Policy Targets


access HTTPS
IMAP

1. Automatic rule that SmartConsole adds to the top of the Implied Rules when the Accept All
Encrypted Traffic configuration option is selected for the BranchOffices VPN
community and the LondonOffices VPN community. This rule is installed on all the
Security Gateways in these communities. It allows all VPN traffic to hosts and clients on the
internal networks of these communities. Traffic that is sent to the Security Gateways in
these VPN communities is dropped.

Note - This automatic rule can apply to more than one VPN community.

2. Site-to-site VPN - Connections between hosts in the VPN Domains of all Site-to-Site VPN
communities are allowed. These are the only protocols that are allowed: FTP, HTTP, HTTPS
and SMTP.

3. Remote access - Connections between hosts in the VPN Domains of Remote Access VPN
community are allowed. These are the only protocols that are allowed: HTTP, HTTPS, and
IMAP.

To Learn More About Site-to-Site VPN

To learn more about site-to-Site VPN, see the R80.40 Site to Site VPN Administration Guide.

Security Management R80.40 Administration Guide      |      293


Creating an Access Control Policy

Remote Access VPN


If employees remotely access sensitive information from different locations and devices, system
administrators must make sure that this access does not become a security vulnerability. Check
Point's Remote Access VPN solutions let you create a VPN tunnel between a remote user and the
internal network. The Mobile Access Software Blade extends the functionality of Remote Access
solutions to include many clients and deployments.

VPN Connectivity Modes

When securely connecting remote clients with the internal resources, organizations face
connectivity challenges, such as these:

n The IP addresses of a remote access client might be unknown

n The remote access client can be connected to a LAN with internal IP addresses (such as, at
hotels)

n It is necessary for the remote client to use protocols that are not supported

The Check Point IPsec VPN Software Blade provides these VPN connectivity modes to help
organizations resolve those challenges:

n Office Mode

Remote users can be assigned the same or non-routable IP addresses from the local ISP.
Office Mode solves these routing problems and encapsulates the IP packets with an
available IP address from the internal network. Remote users can send traffic as if they are
in the office and avoid VPN routing problems.

n Visitor Mode

Remote users can be restricted to using only HTTP and HTTPS protocols. Visitor Mode lets
these users tunnel all protocols through regular TCP connections on port 443.

Sample Remote Access VPN Work flow

Here is an example of a Remote Access VPN workflow:

1. Use SmartConsole to enable Remote Access VPN on the Security Gateway.

2. Add the remote user information to the Security Management Server:

n Create and configure an LDAP Account Unit

n Enter the information in the SmartConsole user database

Optional - Configure the gateway for remote user authentication (optional).

3. Define the gateway Access Control and encryption rules.

4. Create the group objects to use in the gateway rules:

Security Management R80.40 Administration Guide      |      294


Creating an Access Control Policy

n LDAP Group object - for an LDAP Account Unit

n User Group object - for users configured in the SmartConsole user database

5. Create and configure the encryption settings for the VPN community object in Global
Properties > Remote Access > VPN - Authentication and Encryption .

6. Add Access Control rules to the Access Control Rule Base to allow VPN traffic to the internal
networks.

Enable remote access VPN

Configure LDAP LDAP SmartConsole


Manage Users? Configure users
Account Unit

Configure user Configure user


authentication authentication

Create LDAP user Create user


Create VPN Community
group object group object

Configure rules for VPN access in


Access Control Rule Base

Install policy

Configuring the Security Gateway for a Remote Access Community

Make sure that the VPN Software Blade is enabled before you configure the Remote Access
community.

To configure the Security Gateway for Remote Access

1. In SmartConsole, click Gatew ays & Servers and double-click the Security Gateway.

Security Management R80.40 Administration Guide      |      295


Creating an Access Control Policy

The gateway window opens and shows the General Properties page.

2. From the navigation tree, click IPsec VPN .

The page shows the VPN communities that the Security Gateway is participating.

3. To add the Security Gateway to a Remote Access community:

a. Click Add.

b. Select the community.

c. Click OK .

4. From the navigation tree, click Netw ork Management > VPN Domain .

5. Configure the VPN Domain.

To configure the settings for Visitor Mode.

1. From the navigation tree, click VPN Clients > Office Mode .

2. Configure the settings for Office Mode.

Note - Office Mode support is mandatory on the Security Gateway side.

3. Click OK .

4. Publish the SmartConsole session.

To learn more about Remote Access VPN, see the R80.40 Remote Access VPN Administration
Guide.

Mobile Access to the Network


Check Point Mobile Access lets remote users easily and securely use the Internet to connect to
internal networks. Remote users start a standard HTTPS request to the Mobile Access Security
Gateway, and authenticate with one or more secure authentication methods.

The Mobile Access Portal lets mobile and remote workers connect easily and securely to critical
resources over the internet. Check Point Mobile Apps enable secure encrypted communication
from unmanaged smartphones and tablets to your corporate resources. Access can include
internal apps, email, calendar, and contacts.

To include access to Mobile Access applications in the Rule Base, include the Mobile Application
in the Services & Applications column.

To give access to resources through specified remote access clients, create Access Roles for the
clients and include them in the Source column of a rule.

Security Management R80.40 Administration Guide      |      296


Creating an Access Control Policy

Check Point Mobile Access Solutions


Check Point Mobile Access has a range of flexible clients and features that let users access
internal resources from remote locations. All these solutions include these features:

n Enterprise-grade, secure connectivity to corporate resources

n Strong user authentication

n Granular access control

For more information about the newest versions of Mobile Access solutions and clients, go to
sk67820.

Client-Based vs. Clientless


Check Point remote access solutions use IPsec and SSL encryption protocols to create secure
connections. All Check Point clients can work through NAT devices, hotspots, and proxies in
situations with complex topologies, such as airports or hotels. These are the types of installations
for remote access solutions:

n Client-based - Client application installed on endpoint computers and devices. The client
supplies access to most types of corporate resources according to the access privileges of
the user.

n Clientless - Users connect through a web browser and use HTTPS connections. Clientless
solutions usually supply access to web-based corporate resources.

n On demand client - Users connect through a web browser and a client is installed when
necessary. The client supplies access to most types of corporate resources according to the
access privileges of the user.

Mobile Access Clients


n Capsule Workspace - An app that creates a secure container on the mobile device to give
users access to internal websites, file shares, and Exchange servers.

n Capsule Connect - A full L3 tunnel app that gives users network access to all mobile
applications.

n Check Point Mobile for Windows - A Windows IPsec VPN client that supplies secure IPsec
VPN connectivity and authentication.

Mobile Access Web Portal


The Mobile Access Portal is a clientless SSL VPN solution that supplies secure access to web-
based resources. After users authenticate to the portal, they can access Mobile Access
applications such as Outlook Web App and a corporate wiki.

Security Management R80.40 Administration Guide      |      297


Creating an Access Control Policy

SSL Network Extender


SSL Network Extender is an on-demand SSL VPN client and is installed on the computer or mobile
device from an Internet browser. It supplies secure access to internal network resources.

Configuring Mobile Access to Network Resources


Sample Mobile Access Workflow
This is a high-level workflow to configure remote access to Mobile Access applications and
resources.

1. Use SmartConsole to enable the Mobile Access Software Blade on the gateway.

2. Follow the steps in the Mobile Access Configuration wizard to configure these settings:

a. Select mobile clients.

b. Define the Mobile Access portal.

c. Define applications, for example Outlook Web App.

d. Connect to the AD server for user information.

3. Select the policy type:

n The default is to use the Legacy Policy, configured in the Mobile Access tab in
SmartConsole.

n To include Mobile Access in the Unified Access Control Policy , select this in
Gatew ay Properties > Mobile Access.

4. Add rules to the Policy:

n For Legacy Policy: Add rules in SmartConsole. Select Security Policies > Shared
Policies> Mobile Access > Open Mobile Access Policy in SmartConsole

n For Unified Access Control Policy: Add rules in SmartConsole > Security Policies
Access Control Policy .

5. Configure the authentication settings in Gatew ay Properties > Mobile Access >
Authentication .

6. Install the Access Control Policy on the gateway.

Users can access mobile applications through the configured Mobile Access portal with the
defined authentication method.

7. Optional: Give secure access to users through the Capsule Workspace app with certificate
authentication.

Security Management R80.40 Administration Guide      |      298


Creating an Access Control Policy

a. In the gateway Mobile Access > Authentication , click Settings, and select Require
client certificate .

b. Use the Certificate Creation and Distribution Wizard (in the Security Policies view >
Client Certificates > New ).

c. Users download the Capsule Workspace app.

d. Users open the Capsule Workspace app and enter the Mobile Access Site Name and
necessary authentication, such as user name and password.

Select the policy Update the


Enable Mobile Configure settings in
type and add rules Authentication
Access Mobile Access wizard
to policy settings

Users can access Users download app, Generate a Install the


internal open it, and enter certificate for the Access Control
resources settings clients Policy

Sample Mobile Access Deployment


This is a sample deployment of a Mobile Access Security Gateway with an AD and Exchange server
in the internal network.

Item Description

1 Mobile devices

2 Mobile Access tunnels

3 Internet (external networks)

Security Management R80.40 Administration Guide      |      299


Creating an Access Control Policy

Item Description

4 Mobile Access Security Gateway

5 Internal network resources, AD and Exchange servers

In this sample Mobile Access deployment, a mobile device uses a Mobile Access tunnel to connect
to the internal network. The Mobile Access Security Gateway decrypts the packets and
authenticates the user. The connection is allowed and the mobile device connects to the internal
network resources.

Using the Mobile Access Configuration Wizard


This procedure describes how to enable and configure the Mobile Access Software Blade on a
Security Gateway with the Configuration wizard. For this sample configuration, the AD user group
Mobile Access contains all the users that are allowed to connect to the internal network. The
deployment is based on the Sample Mobile Access Deployment. (see "Sample Mobile Access
Deployment" on the previous page).

This configuration lets these clients connect to internal resources:

n Android and iOS mobile devices

n Windows and Mac computers

n Internet browsers can open a SSL Network Extender connection to the internal network

To configure Mobile Access:

1. In SmartConsole, go to Gatew ays & Servers and double-click the gateway object.

The General Properties window opens.

2. In the General Properties > Netw ork Security section, select Mobile Access.

The Mobile Access page of the Mobile Access Configuration Wizard opens.

3. Configure the Security Gateway to allow connections from the Internet and mobile devices.
Select these options:

n Web

n Mobile Devices - Select the required options.

n Desktops/Laptops -Select the required options.

4. Click Next .

The Web Portal page opens.

5. Enter the primary URL for the Mobile Access portal. The default is https://<gw_

Security Management R80.40 Administration Guide      |      300


Creating an Access Control Policy

IPv4>/sslvpn

6. Click Next .

The Applications page opens.

7. Configure the applications to show:

a. In Web Applications, make sure Demo w eb application (World Clock) is selected.

b. In Mail/Calendar/Contacts, enter the domain for the Exchange server and select:

n Mobile Mail (including push mail notifications)

n ActiveSync Applications

n Outlook Web App

The Mobile Access portal shows links to the Demo web and Outlook Web App
applications. The client on the mobile device shows links to the other applications.

8. Click Next .

The Active Directory page opens.

9. Select the AD domain and enter the user name and password.

10. Click Connect .

The Security Gateway makes sure that it can connect to the AD server.

11. Click Next .

The Users page opens.

Click Add and then select the group Mobile Access.

12. Click Next and then click Finish .

The Mobile Access Configuration Wizard closes.

13. Click OK .

The Gatew ay Properties window closes.

Allowing Mobile Connections


The Mobile Access Configuration Wizard enables and configures the Mobile Access Software
Blade. It is necessary to add Firewall rules to allow connections from the VPN clients on the
computers and devices. Create a Host Node object for the Exchange server, all of the other objects
are predefined.

Security Management R80.40 Administration Guide      |      301


Creating an Access Control Policy

Install
Name Source Destination VPN Service Action Track
On

Mobile Any ExchngSrvr RemoteAccess HTTP Accept Mobile Log


Access HTTPS Access
Users MSExchange GW

All connections from the RemoteAccess VPN community to the Exchange server are allowed.
These are the only protocols that are allowed: HTTP, HTTPS, and MS Exchange. This rule is
installed on Security Gateway in the MobileAccessGW group.

Defining Access to Applications


Use the Security Policies page in SmartConsole to define rules that let users access Mobile
Access applications. The applications that are selected in the Configuration Wizard are
automatically added to this page. You can also create and edit the rules that include these
SmartConsole objects:

n Users and user groups

n Mobile Access applications

n Mobile Access Security Gateways

Activating Single Sign-On


Enable the SSO (Single Sign-On) feature to let users authenticate one time for applications that
they use during Mobile Access sessions. The credentials that users enter to log in to the Mobile
Access portal can be re-used automatically to authenticate to different Mobile Access
applications. SSO user credentials are securely stored on the Mobile Access Security Gateway for
that session and are used again if users log in from different remote devices. After the session is
completed, the credentials are stored in a database file.

By default, SSO is enabled on new Mobile Access applications that use HTTP. Most Web
applications authenticate users with specified Web forms. You can configure SSO for an
application to use the authentication credentials from the Mobile Access portal. It is not
necessary for users to log in again to each application.

To configure SSO

1. In SmartConsole, go to Security Policies > Shared Policies > Mobile Access.

2. Click Open Mobile Access Policy in SmartDashboard.

3. In the Mobile Access tab, select Additional Settings > Single Sign-On .

The Single Sign-On page opens.

4. Select an application and click Edit .

Security Management R80.40 Administration Guide      |      302


Creating an Access Control Policy

The application properties window opens and shows the Single Sign On page.

For Web form applications

1. In the Application Single Sign-On Method section, select Advanced and click Edit .

The Advanced window opens.

2. Select This application reuses the portal credentials. Users are not prompted.

3. Click OK .

4. Select This application uses a Web form to accept credentials from users.

5. Click OK .

6. Install the policy.

Connecting to a Citrix Server


Citrix Services

The Mobile Access Software Blade integrates the Firewall Citrix clients and services. It is not
necessary to use STA (Secure Ticketing Authority) servers in a Mobile Access Security Gateways
deployment because Mobile Access uses its own STA engine. You can also use Mobile Access in a
deployment with STA and CSG (Citrix Secure Gateway) servers.

The Mobile Access server certificate must use a FQDN (Fully Qualified Domain Name) that is
issued to the FQDN of the Mobile Access Security Gateway.

Sample Deployment with Citrix Server


This is a sample deployment of a Mobile Access Security Gateway and a Citrix web server in the
DMZ. The Citrix XenApp server is connected to the internal network.

Security Management R80.40 Administration Guide      |      303


Creating an Access Control Policy

Item Description

1 Mobile devices

2 Mobile Access tunnels

3 Internet (external networks)

4 Security Gateway for the internal network

5 Mobile Access Security Gateway in the DMZ

6 Citrix web interface

7 Internal network resources

8 Citrix XenApp (MetaFrame) server

Configuring Citrix Services for Mobile Access


This procedure describes how to configure Mobile Access to let remote users connect to Citrix
applications. The deployment is based on the Sample Deployment with Citrix Server (see "Sample
Deployment with Citrix Server" on the previous page).

To configure Citrix services:

1. In SmartConsole, go to Manage & Settings > Blades.

2. In the Mobile Access, click Configure in SmartDashboard.

3. In the Mobile Access tab, click Applications > Citrix Services.

4. Click New .

The General Properties page of the Citrix Service window opens.

5. Enter the Name for the Citrix server object.

6. From the navigation tree, click Web Interface .

7. Create a new object for the Citrix web interface server, in Servers, click Manage > New >
Host .

The Host Node window opens.

8. Enter the settings for the Citrix web interface server.

9. Click OK .

10. In Services, select one or more of these services that the Citrix web interface server

Security Management R80.40 Administration Guide      |      304


Creating an Access Control Policy

supports:

n HTTP

n HTTPS

11. From the navigation tree, click Link in Portal.

12. Configure the settings for the link to the Citrix services in the Mobile Access portal:

n Link text - The text that is shown for the Citrix link

n URL - The URL for the directory or subdirectory of the Citrix application

n Tooltip - Text that is shown when the user pauses the mouse pointer above the Citrix
link

13. From the navigation tree, select Additional Settings > Single Sign On .

14. Enable Single Sign On for Citrix services, select these options:

n Turn on single Sign On for this application

n Prompt users for their credentials, and store them for future use

15. Click OK .

The Citrix server object is added to Defined Citrix Services.

16. From the Mobile Access navigation tree, select Policy .

17. Add the Citrix services object to the applicable rules.

a. Right-click on the Applications cell of a rule and select Add Applications.

b. Select the Citrix services object.

18. Install the policy.

Compliance Check
The Mobile Access Software Blade lets you use the Endpoint Security on Demand feature to create
compliance policies and add more security to the network. Mobile devices and computers are
scanned one time to make sure that they are compliant before they can connect to the network.

The compliance scanner is installed on mobile devices and computers with ActiveX (for Internet
Explorer on Windows) or Java. The scan starts when the Internet browser tries to open the Mobile
Access Portal.

Compliance Policy Rules


The compliance policy is composed of different types of rules. You can configure the security and
compliance settings for each rule or use the default settings.

These are the rules for a compliance policy:

Security Management R80.40 Administration Guide      |      305


Creating an Access Control Policy

n Windows security - Microsoft Windows hotfixes, patches and Service Packs.

n Anti-Spyware Anti-protection - Anti-Spyware software.

n Anti-Virus protection - Anti-Virus software version and virus signature files.

n Firewall - Personal firewall software.

n Spyware scan - Action that is done for different types of spyware.

n Custom - Compliance rules for your organization, for example: applications, files, and
registry keys.

n OR group - A group of the above rules. An endpoint computer is compliant if it meets one of
the rules in the group.

Creating a Compliance Policy


By default, Endpoint Security on Demand only allows endpoint computers that are compliant with
the compliance policy log in to the Mobile Access portal.

To create a compliance policy:

1. In SmartConsole, go to Manage & Settings > Blades.

2. In the Mobile Access section, click Configure in SmartDashboard.

1. In the Mobile Access tab, select Endpoint Security on Demand > Endpoint Compliance .

2. Click Edit policies.

The Policies window opens.

3. Click New Policy .

The Policies > New Policy window opens.

4. Enter the Name and Description for the policy.

5. Click Add.

The Add Enforcement Rules window opens.

6. Select rules for the policy.

You can also create new rules - click New Rule , and configure the rule settings.

7. Click OK .

The Policies > New Policy window shows the rules for the policy.

8. Select Bypass spyw are scan if necessary.

Security Management R80.40 Administration Guide      |      306


Creating an Access Control Policy

When selected, the scan for endpoint computers that are compliant with the Anti-Virus or
Anti-Spyware settings is changed. These computers do not scan for spyware when they
connect to a Mobile Access Security Gateway.

9. Click OK .

The Policies window opens.

10. Click OK .

Configuring Compliance Settings for a Security Gateway


The Firewall on a Mobile Access Security Gateway only allows access to endpoint computers that
are compliant with the compliance policy.

This procedure shows how to configure the Laptop Computer policy for a Security Gateway (see
"Compliance Policy Rules" on page 305).

To configure the compliance settings:

1. In SmartConsole, go to Manage & Settings > Blades.

2. In the Mobile Access section, click Configure in SmartDashboard.

1. In the Mobile Access tab, select Endpoint Security on Demand > Endpoint Compliance .

2. Select the Security and click Edit .

The Endpoint Compliance page of the Security Gateway properties window opens.

3. Select Scan endpoint machine w hen user connects.

4. Select Threshold policy and from the drop-down menu select Laptop Computer .

5. Click OK .

6. Install the policy on the Mobile Access Security Gateway.

Secure Work space

Secure Workspace is a security solution that allows remote users to connect to enterprise network
resources safely and securely. The Secure Workspace virtual workspace provides a secure
environment on endpoint computers that is segregated from the "real" workspace. Users can only
send data from this secure environment through the Mobile Access portal. Secure Workspace
users can only access permitted applications, files, and other resources from the virtual
workspace.

Secure Workspace creates an encrypted folder on the computer called My Secured Documents
and can be accessed from the virtual desktop. This folder contains temporary user files. When the
session terminates, Secure Workspace deletes this folder and all other session data.

For more about configuring Secure Workspace and Mobile Access VPN, see the R80.40 Mobile
Access Administration Guide.

Security Management R80.40 Administration Guide      |      307


Creating an Access Control Policy

To enable Secure Work space on a Mobile Access Security Gateway

1. In SmartConsole, go to Manage & Settings > Blades.

2. In the Mobile Access section, click Configure in SmartDashboard.

Legacy SmartDashboard opens.

3. In the Mobile Access tab, click Endpoint Security on Demand > Secure Workspace .

4. Select the Security Gateway and click Edit .

The Check Point Secure Workspace page of the Security Gateway properties window
opens.

5. Select This gatew ay supports access to applications from w ithin Check Point
Secure Workspace .

6. Click OK and then install the policy.

Secure Work space


Secure Workspace is a security solution that allows remote users to connect to enterprise network
resources safely and securely. The Secure Workspace virtual workspace provides a secure
environment on endpoint computers that is segregated from the "real" workspace. Users can only
send data from this secure environment through the Mobile Access portal. Secure Workspace
users can only access permitted applications, files, and other resources from the virtual
workspace.

Secure Workspace creates an encrypted folder on the computer called My Secured Documents
and can be accessed from the virtual desktop. This folder contains temporary user files. When the
session terminates, Secure Workspace deletes this folder and all other session data.

For more about configuring Secure Workspace and Mobile Access VPN, see the R80.40 Mobile
Access Administration Guide.

To enable Secure Work space on a Mobile Access Security Gateway

1. In SmartConsole, go to Manage & Settings > Blades.

2. In the Mobile Access section, click Configure in SmartDashboard.

Legacy SmartDashboard opens.

3. In the Mobile Access tab, click Endpoint Security on Demand > Secure Workspace .

4. Select the Security Gateway and click Edit .

The Check Point Secure Workspace page of the Security Gateway properties window
opens.

5. Select This gatew ay supports access to applications from w ithin Check Point Secure

Security Management R80.40 Administration Guide      |      308


Creating an Access Control Policy

Workspace .

6. Click OK and then install the policy.

To Learn More About Mobile Access


To learn more about Mobile Access VPN, see the R80.40 Mobile Access Administration Guide.

Security Management R80.40 Administration Guide      |      309


Creating an Access Control Policy

Creating a New Threat Prevention


Policy
To learn about configuring a Threat Prevention Policy, see the R80.40 Threat Prevention
Administration Guide.

Security Management R80.40 Administration Guide      |      310


HTTPS Inspection

HTTPS Inspection
HTTPS Internet traffic uses the TLS (Transport Layer Security) protocol and is encrypted to give
data privacy and integrity. However, HTTPS traffic has a possible security risk and can hide illegal
user activity and malicious traffic. Security Gateways cannot inspect HTTPS traffic because it is
encrypted. You can enable the HTTPS Inspection feature to let the Security Gateways create new
TLS connections with the external site or server. The Security Gateways are then able to decrypt
and inspect HTTPS traffic that uses the new TLS connections.

There are two types of HTTPS Inspection:

n Outbound HTTPS Inspection - To protect against malicious traffic that is sent from an
internal client to an external site or server.

n Inbound HTTPS Inspection - To protect internal servers from malicious requests that
arrive from the Internet or an external network.

The Security Gateway uses certificates and becomes an intermediary between the client
computer and the secure web site. All data is kept private in HTTPS Inspection logs. Only
administrators with HTTPS Inspection permissions can see all the fields in such a log.

Inspecting HTTPS Pack ets


Outbound Connections
Outbound connections are HTTPS connections that arrive from an internal client and connect to
the Internet. The Security Gateway compares the HTTPS request to the rules in the HTTPS
Inspection Rule Base. If the request does not match any rule, the packet is not HTTPS inspected
and not logged.

If the request matches an HTTPS Inspection rule, the Security Gateway validates the certificate
from the server (on the Internet). The Security Gateway validates the certificate using the Online
Certificate Status Protocol (OCSP) standard. OCSP is faster and uses much less memory than CRL
Validation, which is used for certificate validation in releases lower than R80.10. For a new HTTPS
connection to the server, the Security Gateway creates and uses a new certificate. There are two
HTTPS connections, one to the internal client and one to the external server. It can then decrypt
and inspect the packets according to the Security Policy. The packets are encrypted again and
sent to the destination.

Security Management R80.40 Administration Guide      |      311


HTTPS Inspection

Outbound connection flow

Connection is not
HTTPS inspected

No

HTTPS Yes Firewall validates


Firewall inspects request Matches a rule?
request certificate

Firewall inspects decrypted Decrypts the Creates new certificate


connection and then encrypts it connection for client and server

Inbound Connections
Inbound connections are HTTPS connections that arrive from an external client and connect to a
server in the DMZ or the internal network. The Security Gateway compares the HTTPS request to
the rules in the HTTPS Inspection Rule Base. If the request does not match any rule, the packet is
not HTTPS inspected and not logged.

If the request matches an HTTPS Inspection rule, the Security Gateway uses the certificate for the
internal server to create an HTTPS connection with the external client. The Security Gateway
creates a new HTTPS connection with the internal server. Since the Security Gateway has a secure
connection with the external client, it can decrypt the HTTPS traffic. The decrypted traffic is
inspected according to the Security Policy.

Inbound connection flow

Connection is not
HTTPS inspected

No

HTTPS Firewall inspects Yes Uses server certificate and


Matches a rule?
request request connects to the client

Security Management R80.40 Administration Guide      |      312


HTTPS Inspection

Firewall inspects Decrypts the Creates a new connection to


decrypted connection connection server

Configuring Gateways to inspect outbound


and inbound HTTPS
This section gives an example of how to configure a Gateway to inspect outbound and inbound
HTTPS traffic.

Work flow overview

Step Description

1 Enable HTTPS Inspection on the Security Gateway.

2 Configure the Security Gateway to use the certificate.

n Outbound Inspection - Generate a new certificate for the Security


Gateway
n Inbound Inspection - Import the certificate for the internal server

3 Configure the HTTPS Inspection Rule Base.

4 Install the Access Control Policy.

Enabling HTTPS Inspection


You must enable HTTPS Inspection on each Security Gateway.

To enable HTTPS Inspection on a Security Gateway

Step Description

1 From the SmartConsole Gatew ays & Servers view, edit the Security Gateway object.

2 Click HTTPS Inspection > Step 3.

3 Select Enable HTTPS Inspection .

Security Management R80.40 Administration Guide      |      313


HTTPS Inspection

The first time you enable HTTPS Inspection on one of the Security Gateways, you must create an
outbound CA certificate for HTTPS Inspection or import a CA certificate already deployed in your
organization. This outbound certificate is used by all Security Gateways managed on the Security
Management Server.

Creating an Outbound CA Certificate


The outbound CA certificate is saved with a CER file extension and uses a password to encrypt the
private key of the file. The Security Gateways use this password to sign certificates for the sites
accessed. You must keep the password because it is also used by other Security Management
Servers that import the CA certificate to decrypt the file.

After you create an outbound CA certificate, you must export it so it can be distributed to clients.
If you do not deploy the generated outbound CA certificate on clients, users will receive TLS error
messages in their browsers when connecting to HTTPS sites. You can configure a troubleshooting
option that logs such connections.

After you create the outbound CA certificate, a certificate object named Outbound Certificate is
created. Use this object in rules that inspect outbound HTTPS traffic in the HTTPS Inspection Rule
Base.

To create an outbound CA certificate

Step Description

1 In SmartConsole Gatew ays & Servers view, right-click the Security Gateway object
and select Edit .
The Gatew ay Properties window opens.

2 In the navigation tree, select HTTPS Inspection .

3 In Step 1 of the HTTPS Inspection page, click Create .


The Create window opens.

4 Enter the necessary information:

n Issued by (DN) - Enter the domain name of your organization.


n Private key passw ord - Enter the password that is used to encrypt the private
key of the CA certificate.
n Retype private key passw ord - Retype the password.
n Valid from - Select the date range for which the CA certificate is valid.

5 Click OK .

6 Export and deploy the CA certificate, (see "Exporting and Deploying the Generated CA"
on page 316).

Security Management R80.40 Administration Guide      |      314


HTTPS Inspection

Importing an Outbound CA Certificate


You can import a CA certificate that is already deployed in your organization or import a CA
certificate created on one Security Management Server to another Security Management Server.

Best Practice - Use private CA Certificates.

For each Security Management Server that has Security Gateways enabled with HTTPS Inspection,
you must:

n Import the CA certificate.

n Enter the password the Security Management Server uses to decrypt the CA certificate file
and sign the certificates for users. Use this password only when you import the certificate
to a new Security Management Server.

To import a CA certificate

Step Description

1 If the CA certificate was created on another Security Management Server, export the
certificate from the Security Management Server, on which it was created (see
"Exporting a Certificate from the Security Management Server" on the next page).

2 In the SmartConsole Gatew ays & Servers view, right-click the Security Gateway
object and select Edit .
The Gatew ay Properties window opens.

3 In the navigation tree, select HTTPS Inspection .

4 In Step 1 of the HTTPS Inspection page, click Import .


The Import Outbound Certificate window opens.

5 Browse to the certificate file.

6 Enter the private key passw ord.

7 Click OK .

8 If the CA certificate was created on another Security Management Server, deploy it to


clients (see "Exporting and Deploying the Generated CA" on the next page).

Security Management R80.40 Administration Guide      |      315


HTTPS Inspection

Exporting a Certificate from the Security Management


Server
If you use more than one Security Management Server in your organization, you must first export
the CA certificate with the export_https_cert CLI command from the Security Management
Server on which it was created before you can import it to other Security Management Servers.

Command syntax
export_https_cert [-local] | [-s server] [-f certificate file name
under FWDIR/tmp][-help]

To export the CA certificate

On the Security Management Server, run this command:

$FWDIR/bin/export_https_cert -local -f [certificate file name under


FWDIR/tmp]
Example
$FWDIR/bin/export_https_cert -local -f mycompany.cer

Exporting and Deploying the Generated CA


To prevent users from getting warnings about the generated CA certificates that HTTPS Inspection
uses, install the generated CA certificate used by HTTPS Inspection as a trusted CA. You can
distribute the CA with different distribution mechanisms such as Windows GPO. This adds the
generated CA to the trusted root certificates repository on client computers.

When users run standard updates, the generated CA will be in the CA list and they will not
receive browser certificate warnings.

To distribute a certificate with a GPO

Step Description

1 From the HTTPS Inspection window of the Security Gateway, click


Export certificate .

2 Save the CA certificate file.

3 Use the Group Policy Management Console to add the certificate to


the Trusted Root Certification Authorities certificate store, (see
"Deploying Certificates by Using Group Policy" on the next page).

Security Management R80.40 Administration Guide      |      316


HTTPS Inspection

Step Description

4 Push the Policy to the client computers in the organization.


Note - Make sure that the CA certificate is pushed to the client
computer organizational unit.

5 Test the distribution by browsing to an HTTPS site from one of the


clients. Also, verify that the CA certificate shows the name you entered
for the CA certificate that you created in the Issued by field.

Deploying Certificates by Using Group Policy


You can use this procedure to deploy a certificate to multiple client machines with Active
Directory Domain Services and a Group Policy Object (GPO). A GPO can contain multiple
configuration options, and is applied to all computers in the scope of the GPO.

Membership in the local Administrators group, or equivalent, is necessary to complete this


procedure.

To deploy a certificate using Group Policy

Step Description

1 On the Microsoft Windows Server, open the Group Policy


Management Console .

2 Find an existing GPO or create a new GPO to contain the certificate


settings. Make sure the GPO is associated with the domain, site, or
organization unit whose users you want affected by the policy.

3 Right-click the GPO and select Edit .


The Group Policy Management Editor opens and shows the
contents of the policy object.

4 Open Computer Configuration > Policies > Window s Settings >


Security Settings > Public Key Policies > Trusted Publishers.

5 Click Action > Import .

6 Do the instructions in the Certificate Import Wizard to find and


import the certificate you exported from SmartConsole.

7 In the navigation pane, click Trusted Root Certification Authorities


and repeat steps 5-6 to install a copy of the certificate to that store.

Security Management R80.40 Administration Guide      |      317


HTTPS Inspection

Configuring Inbound HTTPS Inspection


Configure the Security Gateway for inbound HTTPS Inspection.

To enable inbound HTTPS traffic inspection

Step Description

1 From the SmartConsole Gatew ays & Servers view, edit the Security Gateway object.

2 Click HTTPS Inspection > Step 3.

3 Select Enable HTTPS Inspection .

4 Import server certificates for servers behind the organization Security Gateway.

5 Define an HTTPS Inspection policy:

n Create rules
n Add a sever certificate to the Certificate column of each rule.

The first time you enable HTTPS Inspection on one of the Security Gateways, you must create an
outbound CA certificate for HTTPS Inspection or import a CA certificate already deployed in your
organization. This outbound certificate is used by all Security Gateways managed on the Security
Management Server.

Assigning a Server Certificate for Inbound HTTPS Inspection


Add the server certificates to the Security Gateway. This creates a server certificate object.

When a client from outside the organization initiates an HTTPS connection to an internal server,
the Security Gateway intercepts the traffic. The Security Gateway inspects the inbound traffic and
creates a new HTTPS connection from the gateway to the internal server. To allow HTTPS
Inspection, the Security Gateway must use the original server certificate and private key. The
Security Gateway uses this certificate and the private key for TLS connections to the internal
servers.

After you import a server certificate (with a CER file extension) to the Security Gateway, add the
object to the HTTPS Inspection Policy.

Do this procedure for all servers that receive connection requests from clients outside of the
organization.

Security Management R80.40 Administration Guide      |      318


HTTPS Inspection

To add a server certificate for inbound HTTPS Inspection

Step Description

1 In SmartConsole, go to Security Policies > HTTPS Inspection > HTTPS


Tools > Additional Settings.

2 Click Open HTTPS Inspection Policy In SmartDashboard.


SmartDashboard opens.

3 Click Server Certificates.

4 Click Add.
The Import Inbound Certificate window opens.

5 Enter a Certificate name and a Description (optional).

6 Browse to the certificate file.

7 Enter the Private key passw ord. Enter the same password that was
used to protect the private key of the certificate on the server.

8 Click OK .

The Successful Import window opens the first time you import a server certificate. It shows you
where to add the object in the HTTPS Inspection Rule Base. Click Don't show this again if you do
not want to see the window each time you import a server certificate and Close .

HTTPS Inspection Policy


The HTTPS Inspection rules define how the Security Gateways inspect HTTPS traffic. The HTTPS
Inspection rules can use the URL Filtering categories to identify traffic for different websites and
applications. For example, to protect the privacy of your users, you can use a rule to ignore HTTPS
traffic to banks and financial institutions.

The HTTPS Inspection rules are applied to all the Software Blades that have HTTPS Inspection
enabled. These are the Software Blades that support HTTPS Inspection:

n Access Control: Application Control, URL Filtering


l Application Control

l URL Filtering

l Content Awareness

n Threat Prevention

l IPS

Security Management R80.40 Administration Guide      |      319


HTTPS Inspection

l Anti-Virus

l Anti-Bot

l Threat Emulation

n Data Loss Prevention

Starting from R80.40, the HTTPS Inspection policy is in SmartConsole > the Security Policies view
> HTTPS Inspection . Starting from R80.40 you can create different HTTPS Inspection layers per
different policy packages. When you create a new policy package, you can use the pre-defined
HTTPS Inspection layer, or customize the HTTPS Inspection layer to fit your security needs.

You can share an HTTPS Inspection layer across multiple policy packages.

Fields

These are the fields that manage the rules for the HTTPS Inspection Security Policy.

Field Description

No. Rule number in the HTTPS Inspection Rule Base.

Name Name that the system administrator gives this rule.

Source Network object that defines where the traffic starts.

Destination Network object that defines the destination of the traffic.

Services The network services that are inspected or bypassed.


By default, the services HTTPS on port 443 and HTTP_and_HTTPS proxy on
port 8080 are inspected. You can add or delete services from the list.

Site Categories for applications or web sites that are inspected or bypassed.
Category

Action Action that is done when HTTPS traffic matches the rule. The traffic is
inspected or ignored (Bypass).

Track Tracking and logging action that is done when traffic matches the rule.

Install On Network objects that will enforce the HTTPS Inspection Policy. You can only
select Security Gateways that have HTTPS Inspection enabled (by default, the
gateways which appear in the Install On column have HTTPS inspection
enabled).

Security Management R80.40 Administration Guide      |      320


HTTPS Inspection

Field Description

Certificate The certificate that is used for this rule.

n Inbound HTTPS Inspection - Select the certificate that the internal server
uses. You can create server certificates from the SmartDashboard >
HTTPS Inspection > Server Certificates > Add.
n Outbound HTTPS Inspection - Select the Outbound Certificate object
that you are using for the computers in the network. When there is a
match to a rule, the Security Gateway uses the selected server
certificate to communicate with the source client.

Comment An optional field that lets you summarize the rule.

Configuring HTTPS Inspection Rules


Create different HTTPS Inspection rules for outbound and inbound traffic.

The outbound rules use the certificate that was generated for the Security Gateway.

The inbound rules use a different certificate for each internal server.

You can also create bypass rules for traffic that is sensitive and should not be inspected. Make
sure that the bypass rules are at the top of the HTTPS Inspection Rule Base.

After creating the rules, install the Access Control Policy.

Sample HTTPS Inspection Rule Base

This table shows a sample HTTPS Inspection Rule Base for a typical policy (The Track and
Install On columns are not shown. Track is set to Log and Install On is set to HTTPS policy
targets.)

Site
N Sour Destinatio Servic Actio Blad
Name Catego Certificate
o ce n es n e
ry

1 Inbound Any WebCalen HTTPS Any Inspe Any WebCalendarSer


traffic dar ct ver CA
Server

2 Financia Any Internet HTTPS Financi Bypas Any Outbound CA


l sites HTTP_ al s
HTTP Service
S_ s
proxy

Security Management R80.40 Administration Guide      |      321


HTTPS Inspection

Site
N Sour Destinatio Servic Actio Blad
Name Catego Certificate
o ce n es n e
ry

3 Outbou Any Internet HTTPS Any Inspe Any Outbound CA


nd HTTP_ ct
traffic HTTP
S_
proxy

1. Inbound traffic - Inspects HTTPS traffic to the network object WebCalendarServer. This
rule uses the WebCalendarServer certificate.

2. Financial sites - This is a bypass rule that does not inspect HTTPS traffic to websites that
are defined in the Financial Services category.

3. Outbound traffic - Inspects HTTPS traffic to the Internet. This rule uses the Outbound
CA certificate.

Bypassing HTTPS Inspection for Software Update


Services
Check Point dynamically updates a list of approved domain names of services from which content
is always allowed. This option makes sure that Check Point updates or other 3rd party software
updates are not blocked. For example, updates from Microsoft, Java, and Adobe.

To bypass HTTPS Inspection for software updates

Step Description

1 In SmartConsole, go to Security Policies > HTTPS Inspection > HTTPS Tools >
Additional Settings > Open HTTPS Inspection Policy in
SmartDashboard.

2 In SmartDashboard, click the HTTPS Inspection tab.

3 Click HTTPS Validation .

4 Go to Whitelisting and select Bypass HTTPS Inspection of traffic to w ell


know n softw are update services (list is dynamically updated) . This
option is selected by default.

5 Click list to see the list of approved domain names.

Security Management R80.40 Administration Guide      |      322


HTTPS Inspection

Managing Certificates by Gateway


The Gatew ays pane in the HTTPS Inspection tab in SmartDashboard lists the gateways with
HTTPS Inspection enabled.

In the CA Certificate section, in the lower part of the Gateways pane, you can Renew the
certificate validity date range if necessary and Export it for distribution to the organization client
machines.

If the Security Management Server which manages the selected Security Gateway does not have a
generated CA certificate installed on it, you can add it with Import certificate from file .

n You can import a CA certificate already deployed in your organization.

n You can import a CA certificate from another Security Management Server. Before you can
import it, you must first export it from the Security Management Server on which it was
created (see "Exporting and Deploying the Generated CA" on page 316).

Adding Trusted CAs for Outbound HTTPS Inspection


When a client initiates an HTTPS connection to a website server, the Security Gateway intercepts
the connection. The Security Gateway inspects the traffic and creates a new HTTPS connection
from the Security Gateway to the designated server.

When the Security Gateway establishes a secure connection (a TLS tunnel) to the designated
website, it must validate the site server certificate.

HTTPS Inspection comes with a preconfigured list of trusted CAs. This list is updated by Check
Point when necessary and is automatically downloaded to the Security Gateway. After you install
the update, make sure to install the policy. You can select to disable the automatic update option
and manually update the Trusted CA list.

If the Security Gateway receives a non-trusted server certificate from a site, by default the user
gets a self-signed certificate and not the generated certificate. A page notifies the user that there
is a problem with the website security certificate, but lets the user continue to the website.

You can change the default setting to block untrusted server certificates.

Security Management R80.40 Administration Guide      |      323


HTTPS Inspection

Saving a CA Certificate
You can save a selected certificate in the trusted CAs list to the local file system.

To export a CA certificate

Step Description

1 In SmartDashboard, go to the HTTPS Inspection tab > Trusted CAs.

2 Click Actions > Export to file .

3 Browse to a location, enter a file name and click Save .


A *.cer file is created.

HTTPS Validation
In the HTTPS Validation page of SmartDashboard you can set options for

n Fail mode

n HTTPS site categorization mode

n Server validation

n Certificate blacklisting

n Whitelisting

n Troubleshooting

To learn more about these options, see the Help. Click the ? symbol in the HTTPS Validation
page.

Showing HTTPS Inspection Logs


The predefined log query for HTTPS Inspection shows all HTTPS traffic that matched the HTTPS
Inspection policy, and was configured to be logged.

To see HTTPS Inspection Logs

Step Description

1 In the SmartConsole Logs & Monitor view, go to the Logs tab, and
click Queries.

2 Select the HTTPS Inspection query.

Security Management R80.40 Administration Guide      |      324


HTTPS Inspection

The Logs tab includes an HTTP Inspection Action field. The field value can be inspect or bypass.
If HTTPS Inspection was not done on the traffic, this field does not show in the log.

SNI support for Site Categorization


Starting from R80.30, a new functionality allows the categorization of HTTPS sites before the
HTTPS Inspection begins, and prevents connectivity failure if the inspection does not succeed.

SNI is an extension to the TLS protocol, which indicates the hostname at the start of the TLS
handshaking process.

The categorization is performed by examining the SNI field in the client hello message at the
beginning of the TLS handshaking process. To make sure that you reached the right site, the SNI
is verified against the Subject Alternative Name of the host, which appears in the certificate.

After the identity of the host is known and verified, the site is categorized, and it is determined
whether the connection should be inspected or not.

SNI support is enabled by default.

Security Management R80.40 Administration Guide      |      325


Client Certificates for Smartphones and Tablets

Client Certificates for


Smartphones and Tablets
To allow your users to access their resources using their handheld devices, make sure they can
authenticate to the Gateway with client certificates.

In many organizations, the daily task of assigning and maintaining client certificates is done by a
different department than the one that maintains the Security Gateways. The computer help
desk, for example. You can create an administrator that is allowed to use SmartConsole to create
client certificates, while restricting other permissions (see "Giving Permissions for Client
Certificates" on page 330).

To configure client certificates, open SmartConsole and go to Security Policies > Access Control
> Access Tools > Client Certificates.

To configure the Mobile Access policy, go to Manage & Settings > Blades > Mobile Access >
Configure in SmartDashboard. The Client Certificates page in SmartConsole is a shortcut to
the SmartDashboard Mobile Access tab, Client Certificates page.

Managing Client Certificates


Check Point Mobile Apps for mobile devices can use certificate-only authentication or two-factor
authentication with client certificates and username/password. The certificate is signed by the
internal CA of the Security Management Server that manages the Mobile Access Security Gateway.

Manage client certificates in Security Policies > Access Control > Access Tools > Client
Certificates..

The page has two panes.

n In the Client Certificates pane:

l Create, edit, and revoke client certificates.

l See all certificates, their status, expiration date and enrollment key. By default, only
the first 50 results show in the certificate list. Click Show more to see more results.

l Search for specified certificates.

l Send certificate information to users.

n In the Email Templates for Certificate Distribution pane:

l Create and edit email templates for client certificate distribution.

l Preview email templates.

Security Management R80.40 Administration Guide      |      326


Client Certificates for Smartphones and Tablets

Creating Client Certificates


Note - If you use LDAP or AD, creation of client certificates does not change the LDAP or AD
server. If you get an error message regarding LDAP/AD write access, ignore it and close the
window to continue.

To create and distribute certificates with the client certificate wizard

1. In SmartConsole, select Security Policies > Access Control > Access Tools > Client
Certificates.

2. In the Client Certificates pane, click New .

The Certificate Creation and Distribution wizard opens.

3. In the Certificate Distribution page, select how to distribute the enrollment keys to
users. You can select one or both options.

a. Send an email containing the enrollment keys using the selected email
template -Each user gets an email, based on the template you choose, that
contains an enrollment key.

n Template - Select the email template that is used.

n Site - Select the gateway that users connect to.

n Mail Server - Select the mail server that sends the emails.

You can click Edit to view and change its details.

b. Generate a file that contains all of the enrollment keys - Generate a file for
your records that contains a list of all users and their enrollment keys.

4. Optional: To change the expiration date of the enrollment key, edit the number of days
in Users must enroll w ithin x days.

5. Optional: Add a comment that will show next to the certificate in the certificate list on
the Client Certificates page.

6. Click Next .

The Users page opens.

7. Click Add to add the users or groups that require certificates.

n Type text in the search field to search for a user or group.

n Select a type of group to narrow your search.

8. When all included users or groups show in the list, click Generate to create the
certificates and send the emails.

9. If more than 10 certificates are being generated, click Yes to confirm that you want to

Security Management R80.40 Administration Guide      |      327


Client Certificates for Smartphones and Tablets

continue.

A progress window shows. If errors occur, an error report opens.

10. Click Finish .

11. Click Save .

12. From SmartConsole, install the Policy.

Revok ing Certificates


If the status of a certificate is Pending Enrollment, after you revoke it, the certificate does not
show in the Client Certificate list.

To revok e one or more certificates

1. Select the certificate or certificates from the Client Certificate list.

2. Click Revoke .

3. Click OK .

After you revoke a certificate, it does not show in the Client Certificate list.

Creating Templates for Certificate


Distribution
To create or edit an email template

1. In SmartConsole, select Security Policies > Access Control > Access Tools > Client
Certificates.

2. To create a new template: In the Email Templates for Certificate Distribution pane,
select New .

To edit a template: In the Email Templates for Certificate Distribution pane, double-
click a template.

The Email Template opens.

3. Enter a Name for the template.

4. Optional: Enter a Comment . Comments show in the Mail Template list on the Client
Certificates page.

5. Optional: Click Languages to change the language of the email.

6. Enter a Subject for the email. Click Insert Field to add a predefined field, such as a

Security Management R80.40 Administration Guide      |      328


Client Certificates for Smartphones and Tablets

Username.

7. In the message body add and format text. Click Insert Field to add a predefined field,
such as Username, Registration Key, or Expiration Date.

8. Click inside the E-mail Template body.

9. Click Insert Link and select the type of link to add (link or QR code).

n Site and Certificate Creation

For users who already have a Check Point app installed.

When users scan the QR code or go to the link, it creates the site and registers
the certificate.

Select the client type that will connect to the site- Select one client type that
users will have installed:

l Capsule Workspace - An app that creates a secure container on the


mobile device to give users access to internal websites, file shares, and
Exchange servers.

l Capsule Connect/VPN - A full Layer 3 tunnel app that gives users network
access to all mobile applications.

n Download Application

Direct users to download a Check Point App for their mobile devices.

Select the client device operating system:

l iOS

l Android

Select the client type that will connect to the site- Select one client type that
users will have installed:

l Capsule Workspace - An app that creates a secure container on the


mobile device to give users access to internal websites, file shares, and
Exchange servers.

l Capsule Connect/VPN - A full Layer 3 tunnel app that gives users network
access to all mobile applications.

n Custom URL

Lets you configure your own URL.

For each link type, you can select which elements are added to the mail
template

Security Management R80.40 Administration Guide      |      329


Client Certificates for Smartphones and Tablets

n Link URL - Enter the full link address.

n QR Code - When enabled, users scan the code with their mobile devices.

n HTML Link - When enabled, users tap the link on their mobile devices.

You can select both QR Code and HTML Link to include both in the email.

n Display Text - Enter the text for the link title.

10. Click OK .

11. Optional: Click Preview in Brow ser to see a preview of how the email will look.

12. Click OK .

13. Publish the changes

Cloning a Template
Clone an email template to create a template that is similar to one that already exists.

To create a clone of an email template

1. Select a template from the template list in the Client Certificates page.

2. Click Clone .

3. A new copy of the selected template opens for you to edit.

Giving Permissions for Client Certificates


You can create an administrator that is allowed to use SmartConsole to create client certificates,
and restrict other permissions.

To mak e an administrator for client certificates

1. Define an administrator.

2. Create a customized profile for the administrator, with permission to handle client
certificates. Configure this in the Others page of the Administrator Profile. Restrict other
permissions.

Security Management R80.40 Administration Guide      |      330


Preferences and Management Settings

Preferences and Management


Settings
Database Revisions
The Security Management architecture has built-in revisions. Each publish operation creates a
new revision which contains only the changes from the previous revisions.

Benefits of the revision architecture:

n Safe recovery from a crisis, restore a Domain to a good known revision (see Notes below).

n Fast policy verification, based on the difference between installed versions

n More efficient Management High Availability.

Important - Before using the revision feature consider these limitations:

n Reverting a to previous revision is an irreversible operation, newer


revisions than the target revision are lost.
n Changes apply to objects only and not to the file system.
n Tasks, SIC and Licenses are not reverted.
n The revert action disconnects all other connected users and discards all
of their private sessions.

Best Practices:

1. It is recommended to update the IPS and Application Control signatures


and install the policy after the revert. Install policy if changes to log
destinations are applied.
2. If you need a full environment restore to a certain point in time, use
Restore Backup. All work done after the backup is lost. To learn more,
see the: R80.40 Gaia Administration Guide
3. We recommend to purge irrelevant revisions. Accumulating too many
revisions can create a heavy load on the server, which may cause disk and
performance issues.

Note - Revision is not supported in these scenarios:

n The Endpoint Security Management Server is enabled.


n VSX configuration or related networks differ between the source and
target revisions.
n A new Domain Management Server or a Check Point object was created or
deleted after the target revision date.
n The corresponding revision of the Global Domain, or the IPS or Application
Control components was purged.

Security Management R80.40 Administration Guide      |      331


Preferences and Management Settings

To see saved database versions:

In SmartConsole , go to Manage & Settings > Sessions > Revisions.

To see the changes made during a specific revision:

1. Go to Manage & Settings > Sessions > Revisions, and select a revision.

The bottom pane shows the audit logs of the changes made in the revision.

2. Optional: Click View .

A separate read-only SmartConsole session opens.

To revert to an earlier revision

1. Go to Manage & Settings > Sessions > Revisions, and select a revision.

2. In Actions, click Revert to this Revision .

The Revert to Revision wizard opens.

To delete all versions of the database that are older than the selected version:

1. Go to Manage & Settings > Sessions > Revisions, and select a revision.

2. In Actions, click Purge .

3. In the confirmation window that opens, click Yes.

Important - Purge is irreversible. When you purge, that revision and older
revisions are deleted.

Use Case - Managing a Crisis Using Database Revisions


A network problem occurs after downloading a Threat Prevention update and installing it on
gateways.

Solution

1. From Security Policies > Threat Prevention > Threat Tools > Updates, in the IPS section,
select an update that is known to be good.

2. Click Sw itch to Version .

3. Install the Threat Prevention Policy.

The Gateway gets that version of the IPS protections. Other network objects and policies do not
change.

Security Management R80.40 Administration Guide      |      332


Preferences and Management Settings

Setting IP Address Versions of the


Environment
Many objects and rules use IP addresses. Configure the version that your environment uses to
see only relevant options.

To set IP address version

1. Click Manage & Settings.

2. Click Preferences.

3. Select the IP address version that your environment uses: IPv4, IPv6, or IPv4 and IPv6.

4. Select how you want to see subnets: Mask Length or Subnet Mask .

Restoring Window Defaults


Some windows in the SmartConsole offer administrators the option to not see the window again.
You can undo this selection, and restore all windows to show again.

This option is available only if administrators selected do not show in a window.

To restore windows from "do not show"

1. Click Manage & Settings.

2. Click Preferences.

3. In the User Preferences area, click Restore All Messages.

Configuring the Login Window


Administrators in your environment use SmartConsole daily. Customize the Login window, to set
the environment to comply with your organization's culture.

To customize the Login window

1. Click Manage & Settings.

2. Click Preferences > Login Message .

The Login Message window opens.

3. Select Show custom message during login .

4. In Customize Message , enter a Header and Message for administrators to see.

Security Management R80.40 Administration Guide      |      333


Preferences and Management Settings

The default suggestion is:


Warning
This system is for authorized use only

5. If you want the message to have a warning icon, in Customize Layout , select Add
w arning sign .

6. If you want the Login window to show your organization's logo, in Customize Layout ,
select Add logo and then Brow se to an image file.

Testing New SmartConsole Features


You can influence Check Point product development by selecting and testing one or more of the
new features listed here.

To test a new SmartConsole feature

1. Click Manage & Settings.

2. Click Preferences.

3. In the Check Point Lab area, select the feature you want to test:

n Enable Session pane - Review all changes before you publish

Sync with User Center


You can add information regarding your environment to User Center, such as gateway name,
version, and active blades. Check Point uses this additional information for better inventory
management, pro-active support, and more efficient ticket resolution.

To learn more, see sk94064.

To sync with User Center

1. In SmartConsole, click Manage & Settings.

2. Click Sync w ith User Center

3. Select Synchronize information once a day .

Inspection Settings
You can configure inspection settings for the Firewall:

Security Management R80.40 Administration Guide      |      334


Preferences and Management Settings

n Deep packet inspection settings

n Protocol parsing inspection settings

n VoIP packet inspection settings

The Security Management Server comes with two preconfigured inspection profiles for the
Firewall:

n Default Inspection

n Recommended Inspection

When you configure a Security Gateway, the Default Inspection profile is enabled for it. You can
also assign the Recommended Inspection profile to the Security Gateway, or to create a custom
profile and assign it to the Security Gateway.

To activate the Inspection Settings, install the Access Control Policy.

Note - In SmartDashboard R77.30 and lower, Inspection Settings are


configured as IPS Protections.

Configuring Inspection Settings


To configure Inspection Settings

1. In SmartConsole, go to the Manage & Settings > Blades view.

2. In the General section, click Inspection Settings.

The Inspection Settings window opens.

You can:

n Edit inspection settings.

n Edit user-defined Inspection Settings profiles. You cannot change the Default
Inspection profile and the Recommended Inspection profile.

n Assign Inspection Settings profiles to Security Gateways.

n Configure exceptions to settings.

To edit a setting

1. In the Inspection Settings > General view, select a setting.

2. Click Edit .

3. In the window that opens, select a profile, and click Edit .

The settings window opens.

4. Select the Main Action:

Security Management R80.40 Administration Guide      |      335


Preferences and Management Settings

n Default Action - preconfigured action

n Override w ith Action - from the drop-down menu, select an action with which to
override the default - Accept , Drop, Inactive (the setting is not activated)

5. Configure the Logging Settings

Select Capture Packets, if you want to be able to examine packets that were blocked in
Drop rules.

6. Click OK .

7. Click Close .

For advanced configuration of SYN attacks, see sk120476.

To view settings for a certain profile

1. In the Inspection Settings > General view, click View > Show Profiles.

2. In the window that opens, select Specific Inspection settings profiles.

3. Select profiles.

4. Click OK .

Only settings for the selected profiles are shown.

You can add, edit, clone, or delete custom Inspection Settings profiles.

To edit a custom Inspection Settings profile

1. In the Inspection Settings > Profiles view, select a profile.

2. Click Delete , to remove it, or click Edit to change the profile name, associated color, or
tag.

3. If you edited the profile attributes, Click OK to save the changes.

To add a new Inspection Settings profile

1. In the Profiles view, click New .

2. In the New Profile window that opens, edit the profile attributes:

3. Click OK .

To assign an Inspection Settings profile to a Security Gateway

1. In the Inspection Settings > Gatew ays view, select a gateway, and click Edit .

2. In the window that opens, select an Inspection Settings profile.

3. Click OK .

Security Management R80.40 Administration Guide      |      336


Preferences and Management Settings

To configure exceptions to inspection settings

1. In the Inspection Settings > Exceptions view, click New to add a new exception, or
select an exception and click Edit to modify an existing one.

The Exception Rule window opens.

2. Configure the exception settings:

n Apply To - select the Profile to which to apply the exception

n Protection - select the setting

n Source - select the source Netw ork Object , or select IP Address and enter a
source IP address

n Destination - select the destination Service Object

n Service - select Port/Range , TCP or UDP, and enter a destination port number or
a range of port numbers

n Install On - select a gateway on which to install the exception

3. Click OK .

To enforce the changes, install the Access Control Policy.

SmartTask s
Management SmartTasks let you configure automatic actions according to different triggers in the
system. A SmartTask is a combination of trigger and action.

n Triggers are events – currently defined in terms of existing management operations, such
as install policy or publish

n Actions are automatic responses that take place after a trigger is fired, such as running a
script, posting a web request or sending email.

Available Triggers
n Before Publish - Fired when an administrator publishes a session. The SmartTask passes
the sessions meta-data (publishing administrator, domain information and session name) to
the action. If the local Management API server is available, the session changes about to be
published are formatted as a response to the "show changes" API.

n After Publish - Fired after an administrator successfully publishes a session. The


SmartTask passes the same information to the action as the Before Publish trigger.

n After Install Policy - Fired after a policy has been installed. The SmartTask passes to the
action information related to the policy installation task, such as the package installed, the
administrator who initiated the installation and the task's result.

Security Management R80.40 Administration Guide      |      337


Preferences and Management Settings

Available Actions
n Run Script - Runs a pre-defined Repository Script. The script gets the trigger's data as the
first parameter. The trigger's data is passed as Base64 encoded JSON data, which can be
decoded to implement custom business logic.

For SmartTasks configured to run with "Before" operation triggers, the repository script can
signal whether to abort or continue the operation by printing a JSON object with the "result"
and optional "message" fields and then exit with code 0. If the value of the "result" field is
"failure" the operation aborts.

For SmartTasks configured to run with other triggers, exit code 0 is treated as success. Any
other exit code is treated as failure.

Note - By default, Repository Scripts run on the local Security Management Server although
this can be customized using the Web API.

n Web Request - Executes an HTTPS POST web request to the configured URL. The trigger's
data is passed as JSON data to the request's payload.

Notes:

l The configured URL must start with HTTPS and the target web server capable of
handling such requests.

l For web servers with self-signed SSL certificates, establish trust by specifying the
certificate's fingerprint. You can get the fingerprint by clicking Get Fingerprint in the
SmartTask editor or by viewing the certificate in a web browser.

For SmartTasks configured to run with "Before" operation triggers, the repository script can
signal whether to abort or continue the operation by responding with JSON object "result"
and optional "message" fields and a status of 200 OK. If the value of the "result" field is
"failure" the operation aborts.

For SmartTasks configured to run with other triggers, a 200 OK return code is treated as
success. Any other exit code is treated as failure.

Configuring SmartTask Properties


1. Enter a unique name for the SmartTask - The name property is required and case sensitive.

2. Switch the SmartTask ON or OFF using the toggle button.

3. Optional - Enter a description for the SmartTask.

4. Select a trigger for the SmartTask.

5. Select an action that will happen once the trigger is fired.

6. Custom Data – You can add additional information to the JSON data sent with the trigger

Security Management R80.40 Administration Guide      |      338


Preferences and Management Settings

information by adding a JSON object to the Custom Data field. The JSON custom data is
concatenated to the trigger's payload and passed to the action.

7. Optional - Add tags for the SmartTask object.

SmartTask Advanced Properties


The available advanced options depend on the action selected on the General tab.

Send Web Request


n Time-out – Number of seconds before the request times out and the request aborted.

n If the HTTPS request times out - Treat the time-out as an error and abort the event or
continue normally.

n X -chkp-shared-secret – Enter a shared secret that can be used by the target web server
to identify the Security Management Server. The value is sent as part of the request in the
X-chkp-shared-secret header in the out-going web request.

Run script
n Time-out – Number of seconds before the request times out and the request aborted.

n If the script fails to run or times-out – Treat time-out (or execution failure) as an error
and abort the event or continue normally.

Example

Use Case:

A company policy dictates that the publish operation must be used with a service request
number as a prefix to the session name before saving any changes to the database, so the
administrators can see what the rationale for changing the security policy was.

Procedure:

Add the Validate Session Name Prefix to the Scripts Repository .

1. Save the script in the repository.

Instructions

a. Select Gatew ays & Servers > Scripts > Scripts Repository > New ( )

b. Give the script a name.

c. In the Content text box, paste the script code below.

d. Click OK to save the script in the repository.

Security Management R80.40 Administration Guide      |      339


Preferences and Management Settings

Script code
#!/bin/bash
JQ=${CPDIR}/jq/jq
data=`echo $1 | base64 --decode -i`

# Extracting the required session name prefix for the session name based on the input JSON
sessionNamePrefix=`echo $data | $JQ -r .\"custom-data\".\"session-name-prefix\"`

# If there's no input session name prefix, publish is allowed


if [[ $sessionNamePrefix = "null" ]] || [[ -z "$sessionNamePrefix" ]]; then
printf '{"result":"success"}\n'
exit 0
fi

# Extracting the actual session name


sessionName=`echo $data | $JQ -r .session.\"session-name\"`

# Abort the publish if the session doesn't contain a name at all


if [[ $sessionName = "null" ]]; then
m1="Corporate Policy requires you to use a service request number for the session's name
prefix."
m2="For example: ${sessionNamePrefix}######"
m3="Session name is missing. Please change your session's name to meet the requirements
and try to publish again."
printf '{"result":"failure","message":"%s %s %s"}\n' "$m1" "$m2" "$m3"
exit 0
fi

# Abort the publish if the session name doesn't match the expected prefix
if [[ ! $sessionName == $sessionNamePrefix* ]]; then
m1="Corporate Policy requires you to use a ticket number as the session's name."
m2="For example: ${sessionNamePrefix}###### "
m2=${m2//\"/\\\"}
m3="Please change your session's name to meet the requirements and publish again."
printf '{"result":"failure","message":"%s %s %s"}\n' "$m1" "$m2" "$m3"
exit 0
else
# Session name matches the expected prefix, publish is allowed
printf '{"result":"success"}\n'
exit 0
fi

2. Create a SmartTask to run the session validation script.

Instructions

a. Go to Manage & Settings > Tasks > SmartTasks > New ( ).

b. Give the new SmartTask a name (you can call it "Validate Session Name
Before Publish")

c. In the Trigger and Action section, select from the drop down menu:

Before Publish and Run Script .

d. In the Select script from repository drop down, select the script saved in Step
1.

Security Management R80.40 Administration Guide      |      340


Preferences and Management Settings

e. In the Custom Data field, enter this string:

{"session-name-prefix": "CR"}

Note - The variable "session-name-prefix" correlates to the


variable used at the beginning of the script in Step 1. If these
are not identical, this script cannot work and the process fails.

3. Publish the SmartConsole session.

4. Add a network object.

5. Publish the changes using the required prefix.

Security Management R80.40 Administration Guide      |      341


Preferences and Management Settings

Note - If you publish the session without using the prefix, the process fails.

Security Management R80.40 Administration Guide      |      342


Management High Availability

Management High Availability


Overview of Management High Availability
High Availability is redundancy and database backup for management servers. Synchronized
servers have the same policies, rules, user definitions, network objects, and system configuration
settings.

Management High Availability uses the built-in revisions technology and allows the High
Availability procedure to synchronize only the changes done since the last synchronization. This
provides:

n Real-time updates between management peers.

n Minimal effect on the management server resources.

The first management server installed is the primary. If the primary Security Management Server
fails, or is off line for maintenance, the administrator can initiate a changeover, so that the
secondary server takes over.

Notes:

n High Availability (and Load Sharing) for Security Gateways is covered in the R80.40 ClusterXL
Administration Guide.

n For Endpoint Security environments, see the R80.40 Endpoint Security Server Administration
Guide.

The High Availability Environment


A Management High Availability environment includes:

n One Active Security Management Server

n One or more Standby Security Management Server

For full redundancy, the active management server at intervals synchronizes its database with the
secondary server or servers.

Active vs. Standby

In a standard High Availability configuration there is one Active server at a time. The
administrator uses the Active server manage the High Availability configuration. The Active server
automatically synchronizes the standby server(s) at regular intervals. You can open a Standby
server only in Read Only mode. If the Active server fails, you can initiate a changeover to make a
Standby server become the Active server. If communication with the Active server fails, there may
be more than one Active server. This is called Collision Mode.

Security Management R80.40 Administration Guide      |      343


Management High Availability

Primary Server vs. Secondary Server

The sequence in which you install management servers defines them as Primary or Secondary.
The first management server installed becomes the Primary active server. When you install more
Security Management Servers, you define them as Secondary. Secondary servers are Standby
servers by default.

Important notes about backing up and restoring in Management High


Availability environment :

n To back up and restore a consistent environment, make sure to collect


and restore the backups and snapshots from all servers in the High
Availability environment at the same time.
n Make sure other administrators do not make changes in SmartConsole
until the backup operation is completed.

For more information:

n About Gaia Backup and Gaia Snapshot, see the R80.40 Gaia Administration
Guide.
n About the "migrate export" and "migrate import" commands, see
the R80.40 CLI Reference Guide.
n About the "mds_backup" and "mds_restore" commands, see the
R80.40 CLI Reference Guide.
n About Virtual Machine Snapshots, see the vendor documentation.

Configuring a Secondary Security


Management Server in SmartConsole
Procedure

In the SmartConsole connected to the Primary server, create a network object to show the
Secondary Security Management Server. After you publish the SmartConsole session,
synchronization starts between the Primary and Secondary Security Management Servers.

To configure the Secondary Security Management Server in SmartConsole:

1. Connect with SmartConsole to the Primary Security Management Server.

2. In Object Categories, clickNew > More > Netw ork Object > Gatew ays and Servers >
Check Point Host .

3. On the General Properties page, enter a unique name and IP address for the server.

4. In the Softw are Blades section, select the Management tab.

5. Select Netw ork Policy Management .

Security Management R80.40 Administration Guide      |      344


Management High Availability

This automatically selects the Secondary Server , Logging and Status, and
Provisioning.

6. Create SIC trust between the Primary Security Management Server and the Secondary
Security Management Server:

a. Click Communication .

b. Enter the SIC Activation Key of the Security Management Server.

c. Click Initialize .

d. Click Close .

7. Click OK .

8. Click Publish to save these session changes to the database.

The initialization and synchronization between the two Security Management Servers
start.

9. Monitor these tasks in the Task List, in the SmartConsole System Information area. Wait
for the Task List to show that a full sync has completed.

10. Open the High Availability Status window and make sure there is one Active server, and
one Standby.

Synchronizing Active and Standby Servers


At intervals, the Active Security Management Server synchronizes with the Standby Security
Management Server(s), and when you publish the session. Sessions that are not published are
not synchronized.

Monitoring High Availability

The High Availability Status window shows the status of each Security Management Server in
the High Availability configuration.

To see the server status in your High Availability environment:

1. Connect with SmartConsole to the Primary or Secondary Security Management Server.

2. On the Menu , click High Availability .

The High Availability Status window opens.

For the Security Management Server and its peer(s) in the Management High Availability
configuration, the High Availability Status window shows:

n A Warning or Error message - The message shows if there is a problem between the High
Availability peers.

Security Management R80.40 Administration Guide      |      345


Management High Availability

n Connected To - The Security Management Server, to SmartConsole is connected. Also,


the High Availability mode of the Security Management Server (Active or Standby), and
the synchronization status and actions of the Security Management Server.

n Peers - The other Security Management Servers the current Security Management
Server detects. Also, the High Availability mode of each Security Management Server
(Active or Standby), and the synchronization status and actions of each Security
Management Server.

Monitoring Synchronization Status and Actions

Status messages can be general, meaning that they apply to the full system, or they can apply
to a specified active or standby server. General messages show in the yellow overview banner.

General Status messages in


Description
overview banner

The database of the primary Security Management Server is


identical with the database of the secondary.

Some servers could A communication issue prevents synchronization, or some


not be synchronized other synchronization issue exists.

The active and standby servers are not communicating.

Communication Problem Some services are down or cannot be reached.

Collision or HA More than one management server configured as active.


conflict Two active servers cannot sync with each other.

When connected to a specified Active management server:

Status
Peer Status Additional Information
window area:

Connected Active SmartConsole is connected to the active


to: management server.

Peers Standby The peer is in standby. The message can also


show:

n Sync problem, last time sync


n Synchronized successfully. Last sync time:
<time>
n No communication

Security Management R80.40 Administration Guide      |      346


Management High Availability

Status
Peer Status Additional Information
window area:

Not communicating,
last sync time

Active A state of collision exists between two servers


both defined as active.

When connected to a specified Standby management server:

Status window
Peer Status Description
area:

Connected to: Standby Also shows: last sync time.

Peers Active The peer is in standby. The message can also


show:

n No communication, last sync time


n OK., last sync time: <time>
n Sync problem, last sync time (in any
direction)

Standby or Can also show: no communication.


Unknown

Changeover Between Active and Standby


Changeover between the primary (active) and secondary (standby) management server is not
automatic. If the Active fails or it is necessary to change the Active to a Standby, you must do this
manually. When the management server becomes Standby it becomes Read Only, and gets all
changes from the new Active server.

Overview of Management High Availability


High Availability is redundancy and database backup for management servers. Synchronized
servers have the same policies, rules, user definitions, network objects, and system configuration
settings.

Management High Availability uses the built-in revisions technology and allows the High
Availability procedure to synchronize only the changes done since the last synchronization. This
provides:

Security Management R80.40 Administration Guide      |      347


Management High Availability

n Real-time updates between management peers.

n Minimal effect on the management server resources.

The first management server installed is the primary. If the primary Security Management Server
fails, or is off line for maintenance, the administrator can initiate a changeover, so that the
secondary server takes over.

Notes:

n For High Availability (and Load Sharing) environments for Security


Gateways, see the R80.40 ClusterXL Administration Guide.
n For High Availability environments for Endpoint Security, see the R80.40
Endpoint Security Server Administration Guide.

The High Availability Environment


A Management High Availability environment includes:

n One Active Security Management Server

n One or more Standby Security Management Server

For full redundancy, the active management server at intervals synchronizes its database with the
secondary server or servers.

Active vs. Standby

In a standard High Availability configuration there is one Active server at a time. The
administrator uses the Active server manage the High Availability configuration. The Active server
automatically synchronizes the standby server(s) at regular intervals. You can open a Standby
server only in Read Only mode. If the Active server fails, you can initiate a changeover to make a
Standby server become the Active server. If communication with the Active server fails, there may
be more than one Active server. This is called Collision Mode.

Primary Server vs. Secondary Server

The sequence in which you install management servers defines them as Primary or Secondary.
The first management server installed becomes the Primary active server. When you install more
Security Management Servers, you define them as Secondary. Secondary servers are Standby
servers by default.

Security Management R80.40 Administration Guide      |      348


Management High Availability

Important notes about backing up and restoring in Management High


Availability environment :

n To back up and restore a consistent environment, make sure to collect


and restore the backups and snapshots from all servers in the High
Availability environment at the same time.
n Make sure other administrators do not make changes in SmartConsole
until the backup operation is completed.

For more information:

n About Gaia Backup and Gaia Snapshot, see the R80.40 Gaia Administration
Guide.
n About the "migrate export" and "migrate import" commands, see
the R80.40 CLI Reference Guide.
n About the "mds_backup" and "mds_restore" commands, see the
R80.40 CLI Reference Guide.
n About Virtual Machine Snapshots, see the vendor documentation.

Configuring a Secondary Security


Management Server in SmartConsole
How to configure a Secondary Security Management Server in SmartConsole.

In the SmartConsole connected to the Primary Security Management Server, create a Check Point
Host object for the Secondary Security Management Server. After you publish the SmartConsole
session, synchronization starts between the Primary and Secondary Security Management
Servers.

To configure the Secondary Security Management Server in SmartConsole:

1. Connect with SmartConsole to the Primary Security Management Server.

2. In Object Categories, click New > More > Netw ork Object > Gatew ays and Servers >
Check Point Host .

3. On the General Properties page, enter a unique name and IP address for the Secondary
Security Management Server.

4. In the Softw are Blades section, select the Management tab.

5. Select Netw ork Policy Management .

This automatically selects the Secondary Server , Logging and Status, and Provisioning.

6. Create SIC trust between the Secondary Security Management Server and the Primary:

Security Management R80.40 Administration Guide      |      349


Management High Availability

a. Click Communication .

b. Enter the SIC Activation Key of the secondary server.

c. Click Initialize .

d. Click Close .

7. Click OK .

8. Publish the SmartConsole session to save these session changes to the database.

The initialization and synchronization between the Security Management Servers start.

9. Monitor these tasks in the Task List, in the SmartConsole System Information area. Wait for
the Task List to show that a full sync has completed.

10. Open the High Availability Status window and make sure there is one Active Security
Management Server, and one Standby Security Management Server.

Synchronizing Active and Standby Servers


At intervals, the Active server synchronizes with the standby server or servers, and when you
publish the SmartConsole session. Sessions that are not published are not synchronized.

Monitoring High Availability


The High Availability Status window shows the status of each Security Management Server in
the High Availability configuration.

To see the server status in your High Availability environment:

1. Open SmartConsole and connect to a primary or secondary server.

2. On the Menu , click High Availability .

The High Availability Status window opens.

For the management server and its peer or peers in the High Availability configuration, the High
Availability Status window shows:

n A Warning or Error message - The message shows if there is a problem between the High
Availability peers.

n Connected To - The server that SmartConsole is connected to. Also, the High Availability
mode of the server (Active or Standby), and the synchronization status and actions of the
server.

n Peers - The servers that the connected server sees. Also, the High Availability mode of each
server (Active or Standby), and the synchronization status and actions of each server.

Security Management R80.40 Administration Guide      |      350


Management High Availability

Monitoring Synchronization Status and Actions


Status messages can be general, meaning that they apply to the full system, or they can apply to a
specified active or standby server. General messages show in the yellow overview banner.

General Status messages


Description
in overview banner

The database of the primary Security Management Server is


identical with the database of the secondary.

Some servers could not be A communication issue prevents synchronization, or some other
synchronized synchronization issue exists.

The active and standby servers are not communicating.

Communication Problem Some services are down or cannot be reached.

Collision or HA conflict More than one management server configured as active. Two
active servers cannot sync with each other.

When connected to a specified active management server:

Status
Peer Status Additional Information
window area:

Connected Active SmartConsole is connected to the active


to: management server.

Peers Standby The peer is in standby. The message can also


show:

n Sync problem, last time sync


n Synchronized successfully. Last sync time:
<time>
n No communication

Not communicating, last


sync time

Active A state of collision exists between two servers


both defined as active.

When connected to a specified standby management server:

Security Management R80.40 Administration Guide      |      351


Management High Availability

Status window
Peer Status Description
area:

Connected to: Standby Also shows: last sync time.

Peers Active The peer is on standby. The message can also


show:

n No communication, last sync time


n OK., last sync time: <time>
n Sync problem, last sync time (in any
direction)

Standby or Can also show: no communication.


Unknown

Changeover Between Active and Standby


Changeover between the primary (active) and secondary (standby) management server is not
automatic. If the Active fails or it is necessary to change the Active to a Standby, you must do this
manually. When the management server becomes Standby it becomes Read Only, and gets all
changes from the new Active server.

Changing a Server to Active or Standby


The Active server synchronizes with the Standby server or servers at intervals, and when you
publish the session. Sessions that are not published are not synchronized.

When the administrator initiates changeover, all public data is synchronized from the new Active
to the new Standby server after the Standby becomes Active. Data from the new Active overrides
the data on the new Standby. Unpublished changes are not synchronized.

Best Practice - We recommend that you publish the SmartConsole session


before initiating a changeover to the Standby Security Management Server.

To Interchange the Active and Standby

1. Connect with SmartConsole to the Standby Security Management Server.

2. Click the Menu button and select High Availability .

The High Availability Status window opens.

3. Use the Action buttons to change the Standby server to Active.

This changes the previous Active server to Standby.

Security Management R80.40 Administration Guide      |      352


Management High Availability

Work ing in Collision Mode


You can make more than one server Active. You may need to do that if there is no connectivity to
the primary. When you change the Standby to Active, it becomes Active without telling the current
Active server to become Standby. This is known as collision mode. You can later change one of the
Active servers to Standby, and return to the standard configuration.

When in collision mode, the Active servers do not sync even if they have network connectivity.
When you change one of them to Standby, sync starts and overwrites the data on the Standby
server with the remaining Active data.

High Availability Troubleshooting


These error messages show in the High Availability Status window when synchronization fails:

Not Communicating
Solution:

1. Check connectivity between the servers.

2. Test SIC.

Collision or HA Conflict
More than one management server is configured as active.

Solution:

1. From the main SmartConsole menu, select Management High Availability .

The High Availability Status window opens.

2. Use the Actions button to set one of the active servers to standby.

Warning - When this server becomes the Standby, all its data is overwritten by the active
server.

Sync Error
Solution:

Do a manual sync.

Environments with Endpoint Security


Environments that include Endpoint Security require additional steps and information.

For details, see High Availability in the R80.40 Endpoint Security Server Administration Guide.

Security Management R80.40 Administration Guide      |      353


Management High Availability

High Availability Disaster Recovery


If the primary management server becomes permanently unavailable:

n Create a new Primary server with the IP address of the original Primary server (see "Creating
a New Primary Management Server" below ).

Note - This is not supported for environments with Endpoint Security.

n Promote the Secondary Management Server to Primary and create new licenses.

Important - Check Point product licenses are linked to IP addresses. At


the end of the disaster recovery you must make sure that licenses are
correctly assigned to your servers.

Creating a New Primary Management Server


1. Change the Secondary Management Server from Standby to Active.

2. Promote the Secondary Management Server to be Primary. Follow the procedure of


promoting a Secondary Management Server (See "Promoting a Secondary Management Server
to Primary" on the next page - no need to remove instances of the old Primary Management
object and install database).

3. Install the new Secondary Management Server with the IP of the old Primary Management
Server.

4. Reset SIC and connect with SIC to the new Secondary Management Server.

To set the old Primary Management Server as the new Primary Management Server

1. Change the new Secondary Management Server from Standby to Active.

2. Promote the new Secondary Management Server to be the Primary Management Server.
Follow the procedure of promoting a Secondary Management Server (See "Promoting a
Secondary Management Server to Primary" on the next page - no need to remove instances of
the old Primary Management object and install database).

3. Create the Secondary Management Server on the old Secondary Management Server with
the original IP of the old Secondary Management Server.

4. Reset SIC and connect with SIC to the Secondary Management Server.

Security Management R80.40 Administration Guide      |      354


Management High Availability

Promoting a Secondary Management Server to


Primary
The first management server installed is the Primary Server and all servers installed afterwards
are Secondary servers. The Primary server acts as the synchronization master. When the Primary
server is down, secondary servers cannot synchronize their databases until a Secondary is
promoted to Primary and the initial syncs completes.

Note This is the disaster recovery method supported for High Availability
environments with Endpoint Security.

To promote a Secondary Management Server to become the Primary Management Server

Before you start - make sure that the primary server is offline.

1. Set the Secondary server to Active.

2. On the Secondary Management Server that you will promote, run:

#$FWDIR/bin/promote_util
#cpstop

3. Remove the $FWDIR/conf/mgha* files. They contain information about the current
Secondary settings. These files will be recreated when you start the Check Point services.

4. Make sure you have a mgmtha license on the newly promoted server.

Note - All licenses must have the IP address of the promoted Security
Management Server.

5. Run cpstart on the promoted server.

6. Open SmartConsole, and:

a. Remove all instances of the old Primary Management object. To see all of the
instances, right-click the object and select Where Used.

Note - When you remove the old Primary Management Server, all
previous licenses are revoked.

b. Install database.

Security Management R80.40 Administration Guide      |      355


Network Security for IoT Devices

Network Security for IoT Devices


Introduction
The complexity of using IoT devices in the modern work environment such as hospitals,
industries, and smart-buildings has, at cost, exposed them to ill-natured and harmful cyber
attacks. Malicious cyber invasions into IoT devices have caused considerable financial loss to a
number of enterprises. In addition to monetary loss and physical damage, these attacks can lead
to data breaches, data tampering, ransomware, and even denial of service.

Common IoT devices susceptible to attack:

Smart Buildings/Offices Healthcare Industry

HVAC HVAC HVAC

Printers, copiers, fax Printers, copiers, fax Printers, copiers, fax


machines machines machines

Elevators Elevators Elevators

Surveillance Cameras Surveillance Cameras Surveillance Cameras

Unhardened kiosk connected Unhardened kiosk connected Unhardened kiosk connected


to a LAN to a LAN to a LAN

Access control points Access control points Access control points

Programmable logic Programmable logic Programmable logic


controllers (PLCs) controllers (PLCs) controllers (PLCs)

Thermostats Thermostats Thermostats

Lighting Lighting Lighting

Residential smart meters MRI machines --

Fire alarms Fire alarms Fire alarms

N/A Ultrasound machines --

-- C-arms --

-- Infusion pumps --

Security Management R80.40 Administration Guide      |      356


Network Security for IoT Devices

Smart Buildings/Offices Healthcare Industry

-- Blood glucose meter --

-- Patient monitor --

What makes IoT devices so vulnerable :

n Outdated software, legacy OS, or no OS


n Basic Micro Controllers
n No Security-by-Design
n Lack of device management
n Shadow Devices
n Operational Limitations

Check Point's Infinity for IoT provides comprehensive network security for enterprise IT and IoT
devices, smart building devices, industrial IoT, and connected medical equipment in these ways:

1. Prevent malicious intents and unauthorized access to IoT devices by analyzing multiple
threat indicators from various resources.

2. Prevent infected devices from compromising other network elements.

3. Minimize the attack surface through internal network segmentation.

4. Provide deep insight information per IoT device.

5. Uses 3rd party discovery engine for IoT assets discovery.

6. Create separated IoT policy layer, using the discovered IoT device's attributes.

Prerequisites
n Check Point certified IoT Discovery Service installed on the network with a connection to the
Management Server.

n Discovery Service
l Industrial / Enterprise:

o Armis
o Claroty
o Indegy
o Ordr
o SAM
o SCADAfence

l Medical:

o Medigate
o CyberMDX
o Cynerio

n Identity Awareness Web API must be activated on the enforcing gateway (the configuration

Security Management R80.40 Administration Guide      |      357


Network Security for IoT Devices

is done automatically).

n Gateway version R80 and above

Notes:

n There is no support for Multi-Domain Security Management servers.


n Support for Small and Medium Business gateways is planned for 2020.

Network Overview
Check Point's Infinity for IoT delivers comprehensive IoT cyber-security by applying granular IoT-
based policies. Check Point's IoT protection solution mobilizes hospitals, industries, smart
buildings and offices to reduce and even eliminate IoT attacks.

n Identify and analyze IoT devices and traffic

n Deploy IoT policy enforcement points

n Identify and block IoT malicious intents

Network Diagram

Configuring the IoT Controller


Before Check Point Infinity for IoT can protect IoT devices from malicious attacks, you need to
configure the IoT Discovery Service. The IoT Discovery Service is a 3rd party source that provides
the necessary device attributes for each IoT device to the firewall.

Security Management R80.40 Administration Guide      |      358


Network Security for IoT Devices

To define the IoT Discovery Service

Step Description

1 Go to SmartConsole > Objects > New > More > IoT Discovery Service.
The New IoT Discovery Service window opens.

2
To configure the General tab:

a. Enter the Hostname , Port , and Pre-shared Key . The pre-shared key must be
provided from the certified IoT discovery service, and used for authorizing and
authenticating the IoT discovery service.
b. Click OK.
The Certificate Trust window opens. Before verifying, check that the
certificate is valid, and that the IoT discovery service is the certified owner.

Infinity for IoT utilizes the Identity Awareness API. For easy activation, select the
gateways where IoT enforcement will be done.

To configure the Gatew ays tab:

n Select the enforcing gateway for IoT traffic.

To configure the Policies tab:

a. Select the Policy to be applied on the IoT layer .


b. Click OK .

3 Publish the SmartConsole session.

4 Install Policy.

Configuring a new IoT controller generates a new Threat Prevention profile, and creates a new
rule in the Threat Prevention policy.

Adding IoT Assets to the Policy


After setting up the IoT policy, you can add IoT assets to the policy manually. The policy is divided
into three categories:

User-Defined - Used by administrators.


Auto-Generated - Rules generated from network traffic and IoT network patterns.
Cleanup - A set of rules for detected anomalies.

Security Management R80.40 Administration Guide      |      359


Network Security for IoT Devices

To define an IoT Access Rule

Step Description

1 From Security Policies > Access Control, select the IoT Layer.

2 Click User-Defined Section, and then click the plus sign.

3 In the Source and/or Destination field, click the plus sign > Add new item....
The Add new item window opens.

4 Select Import > IoT Controllers, and then choose the IoT asset to be add to the
rule.

Infinity for IoT Logs:


Using Check Point's IoT Security Manager, security teams can see detailed IoT device information
such as the manufacture's name, model, serial number, and its location. With a thorough log they
gain a clearer, contextual understanding about the device's behavior and forensics for event
investigation.

Example 1: Log Search by IoT Asset Information

Advanced log search using the enriched log data to simplify log filtering.

Example 2: Extended Log Data

IoT log data contains enriched information that helps identify the IoT assets in the log.

Security Management R80.40 Administration Guide      |      360


Network Security for IoT Devices

Security Management R80.40 Administration Guide      |      361


The ICA Management Tool

The ICA Management Tool


The ICA Management Tool lets you:

n Manage certificates

n Run searches

n Recreate CRLs

n Configure the ICA

n Remove expired certificates

Note - The ICA Management Tool supports TLS.

Check Point ICA is fully compliant with X.509 standards for both certificates and CRLs. See the
related X.509 and PKI documentation, and RFC 2459 for more information.

For more information, see:

n sk30501: Setting up the ICA Management Tool

n sk102837: Best Practices - ICA Management Tool configuration

n sk39915: Invoking the ICA Management Tool

Using the ICA Management Tool


Use the ICA management tool for user certificate operations only, such as certificate creation. Do
not use the ICA management tool to change SIC certificates or VPN certificates. Change SIC and
VPN certificates in SmartConsole.

To use the ICA management tool, you must first enable it on the Security Management Server.

Enabling and Connecting to the ICA


Management Tool
The ICA Management Tool is disabled by default.

To enable the ICA Management tool

Run this command on the Security Management Server:

cpca_client [-d] set_mgmt_tool on|off [-p <ca_port>] [-a|-u


"administrator|user DN" ... ]

Security Management R80.40 Administration Guide      |      362


The ICA Management Tool

The command options are:

Option Description

on Starts the ICA Management Tool (by opening port 18265)

off Stops the ICA Management Tool (by closing port 18265)

-p Changes the port used to connect to the CA (if the default port is not
being used)

-a Sets the DNs of the administrators that will be allowed to use the ICA
"administrator Management Tool
DN" ...

-u "user DN" Sets the DNs of users allowed to use the ICA Management Tool. An option
... intended for administrators with limited privileges.

Note - If cpca_client is run without -a or -u parameters, the list of the


allowed users and administrators remains unchanged.

To Connect to the ICA Management Tool

1. Add the administrator's certificate to the browser's certificate repository.

2. Open the ICA Management tool from the browser using this address:
https://<Management_Host_Name>:18265

Authenticate when requested.

The ICA Management Tool GUI


Item Description

1 Menu Pane
Shows a list of operations

2 Operations Pane
Manage certificates. The window divides into Search attributes configuration and
Bulk operation configuration .
Create Certificates.
Configure the CA . Contains configuration parameters You can also view the CA's time,
name, and the version and build number of the Security Management Server.
Manage CRLs. Download, publish, and recreate CRLs.

Security Management R80.40 Administration Guide      |      363


The ICA Management Tool

Item Description

3 Search Results Pane . The results of the applied operation show in this pane. This
window consists of a table with a list of certificates and certificate attributes.

Connect to the ICA Management tool using a browser and HTTPS connection.

User Certificate Management


Internally managed User Certificates can be initialized, revoked or have their registrations
removed using the ICA Management Tool. User Certificates of users managed on an LDAP server
can only be managed using the ICA Management Tool.

This table shows User Certificate attributes that can be configured using the ICA Management
Tool

Attributes Default Configurable Comments

validity 2 years yes

key size 2048 bits yes Can be set to 4096 bits

DN of User certificates managed CN=user name, no This DN is appended to


by the internal database OU=users the DN of the ICA

DN of User certificates managed yes Depends on LDAP


on an LDAP server branch

KeyUsage 5 yes Digital signature and


Key encipherment

ExtendedKeyUsage 0 (no yes


KeyUsage)

Modifying the Key Size for User Certificates


If the user completes the registration from the Remote Access machine, the key size can be
configured in the Advanced Configuration page in SmartConsole.

To configure the k ey size

1. From the Menu , select Global Properties.

2. Go to Advanced, and in the Advanced Configuration section, click configure .

The Advanced Configuration window opens.

Security Management R80.40 Administration Guide      |      364


The ICA Management Tool

3. Go to the Certificates and PKI properties page.

4. Set the new key size for this property: user_certs_key_size.

5. Click OK .

You can also change the key size using the GuiDBedit Tool (see sk13009). Change the key size as it
is listed in users_certs_key_size Global Property. The new value is downloaded when
you update the site.

Performing Multiple Simultaneous


Operations
The ICA Management Tool can do multiple operations at the same time. For example:

n Run an LDAP query for the details of all the organization's employees

n Create a file out of this data, and then use this file to:

l Start (initialize) the creation of certificates for all employees

l Send a notification about the new certificates to each of those employees

These operations can be done simultaneously:

n Start (initialize) user certificates

n Revoke user certificates

n Send mail to users

n Remove expired certificates

n Remove certificates for which the registration procedure was not completed

ICA Administrators with Reduced Privileges


The ICA Management Tool supports administrators with limited privileges. These administrators
cannot execute multiple concurrent operations, and their privileges include only these:

n Basic searches

n Initialization of certificates for new users

Operations with Certificates


Management of SIC Certificates
SIC certificates are managed using SmartConsole.

Security Management R80.40 Administration Guide      |      365


The ICA Management Tool

Management of Gateway VPN Certificates


VPN certificates are managed in the VPN page of the corresponding network object. These
certificates are issued automatically when the IPSec VPN blade is defined for the Check Point
gateway or host. This definition is specified in the General Properties window of the
corresponding network object.

If a VPN certificate is revoked, a new one is issued automatically.

Management of User Certificates in SmartConsole


The user certificates of users that are managed on the internal database are managed in
SmartConsole.

For more information, see User Certificates in the R80.40 Remote Access VPN Administration Guide.

Notifying Users about Certificate Initialization


The ICA Management Tool can be configured to send a notification to users about certificate
initialization.

To send mail notifications:

1. In the Menu pane, click Configure the CA .

2. In the Management Tool Mail Attributes area, configure:

n The mail server

n The mail "From" address

n An optional "To" address, which can be used if the users' address is not know

The administrator can use this address to get the certificates on the user's behalf and
forward them later.

3. Click Apply .

Retrieving the ICA Certificate


For trust purposes, some gateways and remote clients, such as peer gateways that are not
managed by the Security Management Server or clients using Clientless VPN, must retrieve the
ICA certificate.

To retrieve the ICA Certificate

1. Open a browser and enter the applicable URL.

Use this format:

Security Management R80.40 Administration Guide      |      366


The ICA Management Tool

http://<Management Server IP address>:18264

The Certificate Services window opens.

2. Use the links to download the CA certificate to your computer or (in Windows) install the CA
certification path.

Searching for a Certificate


There are two search options:

n A basic search that includes only the user name, type, status and the serial number

n An advanced search that includes all the search fields (can only be performed by
administrators with unlimited privileges)

To do a certificate search:

In the Manage Certificates page, enter the search parameters, and click Search .

Basic Search Parameters


n User Name - Username string (by default, this field is empty)

n Type - a drop-down list with these options:

l Any (default)

l SIC

l Gateway

l InternalUser or LDAPuser

n Status - Drop-down list with these options:

l Any (default)

l Pending

l Valid

l Revoked

l Expired

l Renewed (superseded)

n Serial Number - Serial number of the requested certificate (by default, this field is empty)

Advanced Search Attributes


In addition to the parameters of the basic search, specify these parameters:

Security Management R80.40 Administration Guide      |      367


The ICA Management Tool

n Sub DN - DN substring (by default, this field is empty)

n Valid From - Date, from which the certificate is valid, in the format dd-mmm-yyyy
[hh:mm:ss] (for example 15-Jan-2003) (by default, this field is empty)

n Valid To - Date until which the certificate is valid, in the format dd-mmm-yyyy [hh:mm:ss]
(for example 14-Jan-2003 15:39:26) (by default, this field is empty)

n CRL Distribution Point - Drop-down list with these options:

l Any (default)

l No CRL Distribution Point (for certificates issued before the management upgrade - old
CRL mode certificates)

The list also shows all available CRL numbers.

The Search Results


The results of a search show in the Search Results pane. This pane consists of a table with a list
of searched certificate attributes such as:

n (SN) Serial Number - The SN of the certificate

n User Name (CN) - The string between the first equals sign ("=") and the next comma (",")

n DN

n Status - One of these: Pending, Valid, Revoked, Expired,Renewed (superseded)

n The date from which certificates are valid until the date they expire

Note - The status bar shows search statistics after each search.

Viewing and Saving Certificate Details


You can view or save the certificate details that show in the search results.

To view and save certificate details

Click on the DN link in the Search Results pane.

n If the status is pending, the certificate information together with the registration key shows,
and a log entry is created and shows in SmartConsole > Logs & Monitor > Logs.

n If the certificate was already created, you can save it on a disk or open directly (if the
operating system recognizes the file extension)

Security Management R80.40 Administration Guide      |      368


The ICA Management Tool

Removing and Revok ing Certificates and Sending Email


Notifications
1. In the Menu pane, click Manage Certificates.

2. Search for a Certificate with set attributes (see "Searching for a Certificate" on page 367).

The results show in the Search Results pane.

3. Select the certificates, as needed, and click one of these options:

n Revoke Selected - revokes the selected certificates and removes pending certificates
from the CA's database

n Remove Selected - removes the selected certificates from the CA's database and
from the CR

Note - You can only remove expired or pending certificates.

n Mail to Selected - sends mail for all selected pending certificate

The mail includes the authorization codes. Messages to users that do not have an
email defined are sent to a default address. For more information, see "Notifying Users
about Certificate Initialization" on page 366.

Submitting a Certificate Request to the CA


There are three ways to submit certificate requests to the CA:

n Initiate - A registration key is created on the CA and used once by a user to create a
certificate

n Generate -A certificate file is created and associated with a password which must be
entered when the certificate is accessed

n PKCS#10 - When the CA receives a PKCS#10 request, the certificate is created and delivered
to the requester

To initiate a certificate

1. In the Menu pane, select Create Certificates > Initiate .

2. Enter a User Name or Full DN , or click Advanced and fill in the form:

n Certificate Expiration Date - Select a date or enter the date in the format dd-
mmm-yyyy [hh:mm:ss] (the default value is two years from the date of creation)

n Registration Key Expiration Date - Select a date or enter the date in the format
dd-mmm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)

3. Click Go.

Security Management R80.40 Administration Guide      |      369


The ICA Management Tool

A registration key is created and show in the Results pane.

If necessary, click Send mail to user to email the registration key. The number of
characters in the email is limited to 1900.

4. The certificate becomes usable after entering the correct registration key.

To generate a certificate

1. In the Menu pane, select Create Certificates > Generate .

2. Enter a User Name or Full DN , or click Advanced and fill in the form:

n Certificate Expiration Date - Select a date or enter the date in the format dd-mm-
yyyy [hh:mm:ss] (the default value is two years from the date of creation)

n Registration Key Expiration Date - Select a date or enter the date in the format
dd-mm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)

3. Enter a password.

4. Click Go.

5. Save the P12 file, and supply it to the user.

To create a PKCS#10 certificate

1. In the Menu pane, select Create Certificates > PKCS#10.

2. Paste into the space the encrypted base-64 buffer text provided.

You can also click on Brow se for a file to insert (IE only) to import the request file.

3. Click Create and save the created certificate.

4. Supply the certificate to the requester.

Initializing Multiple Certificates Simultaneously


You can initialize a batch of certificates at the same time.

To initialize several certificates simultaneously

1. Create a file with the list of DNs to initialize.

Note - There are two ways to create this file - through an LDAP query
or a non-LDAP query.

2. In the Menu pain, go to Create Certificates > Advanced.

3. Browse to the file you created.

Security Management R80.40 Administration Guide      |      370


The ICA Management Tool

n To send registration keys to the users, select Send registration keys via email

n To receive a file that lists the initialized DNs with their registration keys, select
Save results to file

This file can later be used in a script.

4. Click Initiate from file .

Files created through LDAP Queries

The file initiated by the LDAP search has this format:

n Each line after a blank line or the first line in the file represents one DN to be initialized

n If the line starts with "mail=", the string continues with the mail of the use

If no email is given, the email address will be taken from the ICA's "Management Tool
Mail To Address" attribute.

n If there is a line with the not_after attribute, then the value at the next line is the
Certificate Expiration Date.

The date is given in seconds from now.

n If there is a line with the is otp_validity attribute, then the value at the next line is
the Registration Key Expiration Date.

The date is given in seconds from now.

Here is an example of an LDAP Search output:

not_after
86400
otp_validity
3600
uid=user_1,ou=People,o=intranet,dc=company,dc=com
[email protected]
<blank_line>
...
uid=...

For more information, see "Managing User Accounts" on page 55.

Files created through a Simple Non-LDAP Query

It is possible to create a simple (non-LDAP) query by configuring the DN + email in a file using
this format:

<email address> space <DN>


... blank line as a separator ...
<email address> space <DN>

Security Management R80.40 Administration Guide      |      371


The ICA Management Tool

CRL
CRL Management
By default, the CRL is valid for one week. This value can be configured. New CRLs are issued:

n When approximately 60% of the CRL validity period has passed

n Immediately following the revocation of a certificate

It is possible to recreate a specified CRL using the ICA Management Tool. The utility acts as a
recovery mechanism in the event that the CRL is deleted or corrupted. An administrator can
download a DER encoded version of the CRL using the ICA Management Tool.

CRL Modes

The ICA can issue multiple CRLs. Multiple CRLs prevent one CRL from becoming larger than 10K. If
the CRL exceeds 10K, IKE negotiations can fail when trying to open VPN tunnels.

Multiple CRLs are created by attributing each certificate issued to a specified CRL. If revoked, the
serial number of the certificate shows in the specified CRL.

The CRL Distribution Point (CRLDP) extension of the certificate contains the URL of the specified
CRL. This ensures that the correct CRL is retrieved when the certificate is validated.

CRL Operations
You can download, update, or recreate CRLs through the ICA management tool.

To do operations with CRLs

1. In the Menu pane, select Manage CRLs.

2. From the drop-down box, select one or more CRLs.

3. Select an action:

n Click Dow nload to download the CRL.

n Publish the SmartConsole session to renew the CRL after changes have been made to
the CRL database.

This operation is done at an interval set by the CRL Duration attribute.

n Click Recreate to recreate the CRL.

Security Management R80.40 Administration Guide      |      372


The ICA Management Tool

CA Procedures
CA Cleanup
To clean up the CA, you must remove the expired certificates. Before you do that, make sure that
the time set on the Security Management Server is correct.

To remove the expired certificates:

In the Menu pane, select Manage CRLs > Clean the CA's Database and CRLs from expired
certificates.

Configuring the CA

To configure the CA

1. In the Menu pane, select Configure the CA .

2. Edit the"CA Data Types and Attributes" below as necessary.

3. In the Operations pane, select an operation:

n Apply - Save and enter the CA configuration settings.

If the values are valid, the configured settings become immediately effective. All non-
valid strings are changed to the default values.

n Cancel - Reset all values to the values in the last saved configuration.

n Restore Default - Revert the CA to its default configuration settings.

Entering the string Default in one of the attributes will also reset it to the default
after you click Configure . Values that are valid will be changed as requested, and
others will change to default values.

CA Data Types and Attributes


The CA data types are:

n Time - displayed in the format: <number> days <number> seconds, for example: CRL
Duration: 7 days 0 seconds

You can enter the values in the format in which they are displayed (<number> days
<number> seconds) or as a number of seconds.

n Integer - a regular integer, for example: SIC Key Size: 2048

n Boolean - the values can be true or false (not case sensitive), for example: Enable
renewal: true

Security Management R80.40 Administration Guide      |      373


The ICA Management Tool

n String - an alphanumeric string, for example: Management Tool DN prefix:


cn=tests

These are the CA attributes, in alphabetical order:

Attribute Comment Values Default

Authorization The number of characters of the authorization min-6 6


Code Length codes. max-12

CRL Duration The period of time for which the CRL is valid. min-5 1 week
minutes
max-1
year

Enable For User certificates. This is a Boolean value true or true


Renew al setting which stipulates whether to enable false
renewal or not.

Grace Period The amount of time the old certificate will min-0 1 week
Before remain in Renewed (superseded) state. max-5
Revocation years

Grace Period The amount of time between sequential checks min-10 1 day
Check Period of the Renewed (superseded) list in order to minutes
revoke those whose duration has passed. max-1
week

IKE The amount of time an IKE certificate will be min-10 5 years


Certificate valid. minutes
Validity max-20
Period years

IKE Certificate purposes for describing the type of means no


Certificate the extended key usage for IKE certificates. KeyUsage
Extended Key Refer to RFC 2459.
Usage

IKE Certificate purposes for describing the Digital


Certificate certificate operations. Refer to RFC 2459. signature and
Key usage Key
encipherment

Management Determines the DN prefix of a DN that will be possible CN=


Tool DN created when entering a user name. values
prefix CN=
UID=

Security Management R80.40 Administration Guide      |      374


The ICA Management Tool

Attribute Comment Values Default

Management Determines the DN suffix of a DN that will be ou=users


Tool DN suffix created when entering a user name.

Management For security reasons the mail sending button true or false
Tool Hide Mail after displaying a single certificate can be false
Button hidden.

Management The SMTP server that will be used in order to -


Tool Mail send registration code mails. It has no default
Server and must be configured in order for the mail
sending option to work.

Management The amount of time a registration code is valid min-10 2 weeks


Tool when initiated using the Management Tool. minutes
Registration max-2
Key Validity months
Period

Management The amount of time that a user certificate is min-one 2 years


Tool User valid when initiated using the Management week
Certificate Tool. max-20
Validity years
Period

Management When sending mails this is the email address -


Tool Mail that will appear in the from field. A report of
From Address the mail delivery status will be sent to this
address.

Management The email subject field. -


Tool Mail
Subject

Management The text that appears in the body of the Registration


Tool Mail Text message. 3 variables can be used in addition to Key: $REG_
Format the text: $REG_KEY (user's registration key); KEY
$EXPIRE (expiration time); $USER (user's DN). Expiration:
$EXPIRE

Management When the send mail option is used, the emails -


Tool Mail To to users that have no email address defined will
address be sent to this address.

Security Management R80.40 Administration Guide      |      375


The ICA Management Tool

Attribute Comment Values Default

Max The maximum capacity of a CRL in the new CRL min-3 400
Certificates mode. max-
Per 400
Distribution
Point

New CRL A Boolean value describing the CRL mode. 0 for old true
Mode CRL
mode
1 for
new
mode

Number of The number of certificates that will be displayed min-1 approx 700
certificates in each page of the search window. max-
per search approx
page 700

Number of The number of digits of certificate serial min-5 5


Digits for numbers. max-10
Serial
Number

Revoke This flag determines whether to revoke an old true or true


renew ed certificate after it has been renewed. The reason false
certificates for not revoking this is to prevent the CRL from
growing each time a certificate is renewed.
If the certificate is not revoked the user may
have two valid certificates.

SIC Key Size The key size in bits of keys used in SIC. possible 2048
values:
1024
2048
4096

SIC Certificate purposes for describing the Digital


Certificate certificate operations. Refer to RFC 2459. signature and
Key usage Key
encipherment

Security Management R80.40 Administration Guide      |      376


The ICA Management Tool

Attribute Comment Values Default

SIC The amount of time a SIC certificate will be valid. min-10 5 years
Certificate minutes
Validity max-20
Period years

User Certificate purposes for describing the type of means no


Certificate the extended key usage for User certificates. KeyUsage
Extended Key Refer to RFC 2459.
Usage

User The key size in bits of the user's certificates. Possible 2048
Certificate values:
Key Size 1024
2048
4096

User Certificate purposes for describing the Digital


Certificate certificate operations. Refer to RFC 2459 signature and
Key usage Key
encipherment

Certificate Longevity and Statuses


Certificates issued by the ICA have a defined validity period. When period ends, the certificate
expires.

SIC certificates, VPN certificates for Security Gateways and User certificates can be created in one
step in SmartConsole. User certificates can also be created in two steps using SmartConsole or
the ICA Management Tool. The two steps are:

n Initialization - during this step a registration code is created for the user. When this is done,
the certificate status is pending

n Registration - when the user completes the registration procedure in the remote client.
After entering the registration code the certificate becomes valid.

The advantages are:

Enhanced security

n The private key is created and stored on the user's machine

n The certificate issued by the ICA is downloaded securely to the client.

Pre-issuance automatic and administrator-initiated certificate removal

Security Management R80.40 Administration Guide      |      377


The ICA Management Tool

If a user does not complete the registration procedure in a given period (two weeks by default),
the registration code is automatically removed. An administrator can remove the registration key
before the user completes the registration procedure. After that, the administrator can revoke the
user certificate.

Explicit or Automatic Renewal of User certificates ensuring continuous User connectivity

A user certificate of type PKCS12 can be renewed explicitly by the user. A PKCS12 certificate can
also be set to renew automatically when it is about to expire. This renewal operation ensures that
the user can continuously connect to the organization's network. The administrator can choose
when to set the automatic revoke old user certificates.

One more advantage is:

Automatic renewal of SIC certificates ensuring continuous SIC connectivity

SIC certificates are renewed automatically after 75% of the validity time of the certificate has
passed. If, for example, the SIC certificate is valid for five years. After 3.75 years, a new certificate
is created and downloaded automatically to the SIC entity. This automatic renewal ensures that
the SIC connectivity of the gateway is continuous. The administrator can revoke the old certificate
automatically or after a set period of time. By default, the old certificate is revoked one week after
certificate renewal.

Security Management R80.40 Administration Guide      |      378


Command Line Reference

Command Line Reference


See the R80.40 CLI Reference Guide.

Below is a limited list of applicable commands.

Security Management R80.40 Administration Guide      |      379


Syntax Legend

Syntax Legend
Whenever possible, this guide lists commands, parameters and options in the alphabetical order.

This guide uses this convention in the Command Line Interface (CLI) syntax:

Character Description

TAB Shows the available nested subcommands:


main command
→ nested subcommand 1
→ → nested subsubcommand 1-1
→ → nested subsubcommand 1-2
→ nested subcommand 2
Example:
cpwd_admin
config
-a <options>
-d <options>
-p
-r
del <options>

Meaning, you can run only one of these commands:

n This command:
cpwd_admin config -a <options>
n Or this command:
cpwd_admin config -d <options>
n Or this command:
cpwd_admin config -p
n Or this command:
cpwd_admin config -r
n Or this command:
cpwd_admin del <options>

Curly brackets or Enclose a list of available commands or parameters, separated by the


braces vertical bar |.
{} User can enter only one of the available commands or parameters.

Angle brackets Enclose a variable.


<> User must explicitly specify a supported value.

Security Management R80.40 Administration Guide      |      380


Syntax Legend

Character Description

Square brackets or Enclose an optional command or parameter, which user can also
brackets enter.
[]

Security Management R80.40 Administration Guide      |      381


contract_util

contract_util
Description

Works with the Check Point Service Contracts.

For more information about Service Contract files, see sk33089: What is a Service Contract File?

Syntax

contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify

Parameters

Parameter Description

check Checks whether the Security Gateway is eligible for an upgrade.


<options>
See "contract_util check" on page 384.

cpmacro Overwrites the current cp.macro file with the specified cp.macro file.
<options>
See "contract_util cpmacro" on page 385.

download Downloads all associated Check Point Service Contracts from the User Center,
<options> or from a local file.
See "contract_util download" on page 386.

mgmt Delivers the Service Contract information from the Management Server to the
managed Security Gateways.
See "contract_util mgmt" on page 388.

print Shows all the installed licenses and whether the Service Contract covers these
<options> license, which entitles them for upgrade or not.
See "contract_util print" on page 389.

summary Shows post-installation summary.


<options>
See "contract_util summary" on page 390.

Security Management R80.40 Administration Guide      |      382


contract_util

Parameter Description

update Updates Check Point Service Contracts from your User Center account.
<options>
See "contract_util update" on page 391.

verify Checks whether the Security Gateway is eligible for an upgrade.


This command also interprets the return values and shows a meaningful
message.
See "contract_util verify" on page 392.

Security Management R80.40 Administration Guide      |      383


contract_util check

contract_util check

Description

Checks whether the Security Gateway is eligible for an upgrade.

For more information about Service Contract files, see sk33089: What is a Service Contract File?

Syntax

contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade

Parameters

Parameter Description

{-h | - Shows the applicable built-in usage.


help}

hfa Checks whether the Security Gateway is eligible for an upgrade to a higher
Hotfix Accumulator.

maj_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Major version.

min_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Minor version.

upgrade Checks whether the Security Gateway is eligible for an upgrade.

Security Management R80.40 Administration Guide      |      384


contract_util cpmacro

contract_util cpmacro

Description

Overwrites the current cp.macro file with the specified cp.macro file, if the specified is newer
than the current file.

For more information about the cp.macro file, see sk96217: What is a cp.macro file?

Syntax

contract_util cpmacro /<path_to>/cp.macro

This command shows one of these messages:

Message Description

CntrctUtils_Write_ The contract_util cpmacro command failed:


cp_macro returned
-1 n Failed to create a temporary file.
n Failed to write to a temporary file.
n Failed to replace the current file.

CntrctUtils_Write_ The contract_util cpmacro command was able to overwrite


cp_macro returned the current file with the specified file, because the specified file is
0
newer.

CntrctUtils_Write_ The contract_util cpmacro command did not overwrite the


cp_macro returned current file, because it is newer than the specified file.
1

Security Management R80.40 Administration Guide      |      385


contract_util download

contract_util download

Description

Downloads all associated Check Point Service Contracts from User Center, or from a local file.

For more information about Service Contract files, see sk33089: What is a Service Contract File?

Syntax

contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service
Contract File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}]
<Username> <Password> [<Proxy Server> [<Proxy Username>:<Proxy
Password>]]

Security Management R80.40 Administration Guide      |      386


contract_util download

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-i Interactive mode - prompts the user for the User Center


credentials and proxy server settings.

local Specifies to download the Service Contract from the local file.
This is equivalent to the cplic contract put command.

uc Specifies to download the Service Contract from the User


Center.

hfa Downloads the information about a Hotfix Accumulator.

maj_upgrade Downloads the information about a Major version.

min_upgrade Downloads the information about a Minor version.

upgrade Downloads the information about an upgrade.

<Username> Your User Center account e-mail address.

<Password> Your User Center account password.

<Proxy Server> [<Proxy Specifies that the connection to the User Center goes through
Username>:<Proxy the proxy server.
Password>]
n <Proxy Server> - IP address of resolvable hostname
of the proxy server
n <Proxy Username> - Username for the proxy server.
n <Proxy Password> - Password for the proxy server.

Note - If you do not specify the proxy server explicitly, the


command uses the proxy server configured in the
management database.

<Service Contract Path to and the name of the Service Contract file.
File> First, you must download the Service Contract file from your
User Center account.

Security Management R80.40 Administration Guide      |      387


contract_util mgmt

contract_util mgmt

Description

Delivers the Service Contract information from the Management Server to the managed Security
Gateways.

For more information about Service Contract files, see sk33089: What is a Service Contract File?

Syntax

contract_util mgmt

Security Management R80.40 Administration Guide      |      388


contract_util print

contract_util print

Description

Shows all the installed licenses and whether the Service Contract covers these license, which
entitles them for upgrade or not.

This command can show which licenses are not recognized by the Service Contract file.

For more information about Service Contract files, see sk33089: What is a Service Contract File?

Syntax

contract_util [-d] print


{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Shows a formatted table header and more information.

hfa Shows the information about Hotfix Accumulator.

maj_upgrade Shows the information about Major version.

min_upgrade Shows the information about Minor version.

upgrade Shows the information about an upgrade.

Security Management R80.40 Administration Guide      |      389


contract_util summary

contract_util summary

Description

Shows post-installation summary and whether this Check Point computer is eligible for upgrades.

Syntax

contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade

Parameters

Parameter Description

hfa Shows the information about Hotfix Accumulator.

maj_upgrade Shows the information about Major version.

min_upgrade Shows the information about Minor version.

upgrade Shows the information about an upgrade.

Security Management R80.40 Administration Guide      |      390


contract_util update

contract_util update

Description

Updates the Check Point Service Contracts from your User Center account.

For more information about Service Contract files, see sk33089: What is a Service Contract File?

Syntax

contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]

Parameters

Parameter Description

update Updates Check Point Service Contracts (attached to pre-installed


licenses) from your User Center account.

-proxy <Proxy Specifies that the connection to the User Center goes through the
Server>:<Proxy Port> proxy server:

n <Proxy Server> - IP address of resolvable hostname of


the proxy server.
n <Proxy Port> - The applicable port on the proxy server.
Note - If you do not specify the proxy explicitly, the
command uses the proxy configured in the management
database.

-ca_path <Path to Specifies the path to the Certificate Authority Bundle file (ca-
ca-bundle.crt File> bundle.crt).

Note - If you do not specify the path explicitly, the


command uses the default path.

Security Management R80.40 Administration Guide      |      391


contract_util verify

contract_util verify

Description

Checks whether the Security Gateway is eligible for an upgrade.

This command is the same as the "contract_util check" on page 384 command, but it also interprets
the return values and shows a meaningful message.

For more information about Service Contract files, see sk33089: What is a Service Contract File?

Syntax

contract_util verify

Security Management R80.40 Administration Guide      |      392


cp_conf

cp_conf
Description

Configures or reconfigures a Check Point product installation.

Note - The available options for each Check Point computer depend on the
configuration and installed products.

Syntax on a Management Server

cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>

Parameters

Parameter Description

-h Shows the entire built-in usage.

admin Configures Check Point system administrators for the Security Management
<options> Server.
See "cp_conf admin" on page 395.

auto Shows and configures the automatic start of Check Point products during
<options> boot.
See "cp_conf auto" on page 398.

ca n Configures the Certificate Authority's (CA) Fully Qualified Domain Name


<options> (FQDN).
n Initializes the Internal Certificate Authority (ICA).

See "cp_conf ca" on page 399.

client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 400.

Security Management R80.40 Administration Guide      |      393


cp_conf

Parameter Description

finger Shows the ICA's Fingerprint.


<options>
See "cp_conf finger" on page 404.

lic Manages Check Point licenses.


<options>
See "cp_conf lic" on page 405.

snmp Do not use these outdated commands.


<options>
To configure SNMP, see the R80.40 Gaia Administration Guide - Chapter System
Management - Section SNMP.

Security Management R80.40 Administration Guide      |      394


cp_conf admin

cp_conf admin

Description

Configures Check Point system administrators for the Security Management Server.

Notes:

n Multi-Domain Server does not support this command.


n Only one administrator can be defined in the "cpconfig" on page 439
menu.
To define additional administrators, use SmartConsole.
n This command corresponds to the option Administrator in the "cpconfig"
on page 439 menu.

Syntax

cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get

Security Management R80.40 Administration Guide      |      395


cp_conf admin

Parameters

Parameter Description

-h Shows the applicable built-in usage.

add [<UserName> Adds a Check Point system administrator:


<Password> {a | w | r}]
n <UserName> - Specifies the administrator's
username
n <Password> - Specifies the administrator's
password
n a - Assigns all permissions - read settings, write
settings, and manage administrators
n w - Assigns permissions to read and write settings
only (cannot manage administrators)
n r - Assigns permissions to only read settings

add -gaia [{a | w | r}] Adds the Gaia administrator user admin:

n a - Assigns all permissions - read settings, write


settings, and manage administrators
n w - Assigns permissions to read and write settings
only (cannot manage administrators)
n r - Assigns permissions to only read settings

del <UserName1> Deletes the specified system administrators.


<UserName2> ...

get Shows the list of the configured system administrators.

get -gaia Shows the management permissions assigned to the Gaia


administrator user admin.

Security Management R80.40 Administration Guide      |      396


cp_conf admin

Example 1 - Adding a Check Point system administrator

[Expert@MGMT:0]# cp_conf admin add


Administrator name: admin
Administrator admin already exists.
Do you want to change Administrator's Permissions (y/n) [n] ? y

Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w

Administrator admin was modified successfully and has


Read/Write Permission for SmartUpdate
Read/Write Permission for Monitoring
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin get

The following Administrators


are defined for this Security Management Server:

admin (Read/Write Permission for all products; )


[Expert@MGMT:0]#

Example 2 - Adding the Gaia administrator user

[Expert@MGMT:0]# cp_conf admin add -gaia


Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
Administrator admin was added successfully and has
Read/Write Permission for SmartUpdate
Read/Write Permission for Monitoring
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin get -gaia

The following Administrators


are defined for this Security Management Server:

admin (Read/Write Permission for all products; ) - Gaia admin


[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin add -gaia a


Administrator admin already exists.

Administrator admin was modified successfully and has


Read/Write Permission for all products with Permission to Manage Administrators
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin add -gaia w


Administrator admin already exists.

Administrator admin was modified successfully and has


Read/Write Permission for all products without Permission to Manage Administrators
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin add -gaia r


Administrator admin already exists.

Administrator admin was modified successfully and has


Read Only Permission for all products
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      397


cp_conf auto

cp_conf auto

Description

Shows and controls which of Check Point products start automatically during boot.

Note - This command corresponds to the option Automatic start of Check


Point Products in the "cpconfig" on page 439 menu.

Syntax

cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all

Parameters

Parameter Description

-h Shows the applicable built-in usage.

{enable | disable} Controls whether the installed Check Point products


<Product1> <Product2> ... start automatically during boot.
This command is for Check Point use only.

get all Shows which of these Check Point products start


automatically during boot:

n Check Point Security Gateway


n QoS (former FloodGate-1)
n SmartEvent Suite

Example from a Security Management Server

[Expert@MGMT:0]# cp_conf auto get all


Check Point Security Gateway is not installed

QoS is not installed

The SmartEvent Suite will start automatically at boot time.

[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      398


cp_conf ca

cp_conf ca

Description

n Initializes the Internal Certificate Authority (ICA).

n Configures the Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).

Note - On a Security Management Server, this command corresponds to the


option Certificate Authority in the "cpconfig" on page 439 menu.

Syntax

cp_conf ca
-h
fqdn <FQDN Name>
init

Parameters

Parameter Description

-h Shows the applicable built-in usage.

fqdn <FQDN Configures the Certificate Authority's (CA) Fully Qualified Domain Name
Name> (FQDN).
<FQDN Name> is the text string hostname.domainname

init Initializes the Internal Certificate Authority (ICA).

Example

[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#

[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#

[Expert@MyMGMT:0]# cp_conf ca fqdn MyMGMT.checkpoint.com


Trying to contact Certificate Authority. It might take a while...
Certificate was created successfully
MyMGMT.checkpoint.com was successfully set to the Internal CA
[Expert@MyMGMT:0]#

Security Management R80.40 Administration Guide      |      399


cp_conf client

cp_conf client

Description

Configures the GUI clients that are allowed to connect with SmartConsoles to the Security
Management Server.

Notes:

n Multi-Domain Server does not support this command.


n This command corresponds to the option GUI Clients in the "cpconfig" on
page 439 menu.

Syntax

cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get

Security Management R80.40 Administration Guide      |      400


cp_conf client

Parameters

Parameter Description

-h Shows the built-in usage.

<GUI Client> <GUI Client> can be one of these:

n One IPv4 address (for example, 192.168.10.20),


or
one IPv6 address (for example,
3731:54:65fe:2::a7)
n One hostname (for example, MyComputer)
n "Any" - To denote all IPv4 and IPv6 addresses
without restriction
n A range of IPv4 addresses (for example,
192.168.10.0/255.255.255.0), or
a range of IPv6 addresses (for example,
2001::1/128)
n IPv4 address wildcard (for example,
192.168.10.*)

add <GUI Client> Adds a GUI client.

createlist <GUI Client 1> Deletes the current allowed GUI clients and creates a
<GUI Client 2> ... new list of allowed GUI clients.

del <GUI Client 1> <GUI Deletes the specified the GUI clients.
Client 2> ...

get Shows the allowed GUI clients.

Security Management R80.40 Administration Guide      |      401


cp_conf client

Examples

Example 1 - Configure one IPv4 address


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.15


172.20.168.15 was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


172.20.168.15
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del 172.20.168.15


172.20.168.15 was deleted successfully
[Expert@MGMT:0]#

Example 2 - Configure one hostname


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add MySmartConsoleHost


MySmartConsoleHost was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


MySmartConsoleHost
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del MySmartConsoleHost


MySmartConsoleHost was deleted successfully
[Expert@MGMT:0]#

Example 3 - Configure "Any"


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add "Any"


Any was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


Any
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del "Any"


Any was deleted successfully
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      402


cp_conf client

Example 4 - Configure a range of IPv4 addresses


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.0/255.255.255.0


172.20.168.0/255.255.255.0 was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


172.20.168.0/255.255.255.0
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del 172.20.168.0/255.255.255.0


172.20.168.0/255.255.255.0 was deleted successfully
[Expert@MGMT:0]#

Example 5 - Configure IPv4 address wildcard


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.*


172.20.168.* was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


172.20.168.*
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del 172.20.168.*


172.20.168.* was deleted successfully
[Expert@MGMT:0]#

Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.0/255.255.255.0


172.20.168.0/255.255.255.0 was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


172.20.168.0/255.255.255.0
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client createlist 192.168.40.0/255.255.255.0 172.30.40.55


New list was created successfully
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


192.168.40.0/255.255.255.0
172.30.40.55
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client createlist "Any"


New list was created successfully
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


Any
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      403


cp_conf finger

cp_conf finger

Description

Shows the Internal Certificate Authority's Fingerprint.

This fingerprint is a text string derived from the ICA certificate on the Security Management
Server, Multi-Domain Server, or Domain Management Server.

This fingerprint verifies the identity of the Security Management Server, Multi-Domain Server, or
Domain Management Server when you connect to it with SmartConsole.

Note - This command corresponds to the option Certificate's Fingerprint in


the "cpconfig" on page 439 menu.

Syntax

cp_conf finger
-h
get

Parameters

Parameter Description

-h Shows the applicable built-in usage.

get Shows the ICA's Fingerprint.

Example

[Expert@MGMT:0]# cp_conf finger get


EDNA COCO MOLE ATOM ASH MOT SAGE NINE ILL TINT HI CUBE
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      404


cp_conf lic

cp_conf lic

Description

Shows, adds and deletes Check Point licenses.

Note - This command corresponds to the option Licenses and contracts in


the "cpconfig" on page 439 menu.

Syntax

cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]

Security Management R80.40 Administration Guide      |      405


cp_conf lic

Parameters

Parameter Description

-h Shows the applicable built-in usage.

add -f <Full Path to License Adds a license from the specified Check Point license
File> file.
You get this license file in the Check Point User
Center.
This is the same command as the "cplic db_add" on
page 450.

add -m <Host> <Date> Adds the license manually.


<Signature Key>
You get these license details in the Check Point User
<SKU/Features>
Center.
This is the same command as the "cplic db_add" on
page 450.

del <Signature Key> Delete the license based on its signature.


This is the same command as the "cplic del" on
page 455.

get [-x] Shows the local installed licenses.


If you specify the "-x" parameter, output also shows
the signature key for every installed license.
This is the same command as the "cplic print" on
page 459.

Example 1 - Adding the license from the file

[Expert@HostName:0]# cp_conf lic add -f ~/License.lic


License was installed successfully.
[Expert@HostName:0]#

[Expert@HostName:0]# cp_conf lic get


Host Expiration Signature Features
192.168.3.28 25Aug2019 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      406


cp_conf lic

Example 2 - Adding the license manually

[Expert@MyHostName:0]# cp_conf lic add -m MyHostName 25Aug2019 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-


XXX
License was successfully installed
[Expert@MyHostName:0]#

[Expert@MyHostName:0]# cp_conf lic get


Host Expiration Signature Features
192.168.3.28 25Aug2019 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX
[Expert@MyHostName:0]#

Security Management R80.40 Administration Guide      |      407


cp_log_export

cp_log_export
Description

Exports Check Point logs over syslog.

For more information, see sk122323 and R80.40 Logging and Monitoring Administration Guide.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

cp_log_export

cp_log_export <command-name> help

Parameters

Parameter Description

No Parameters Shows the built-in general help.

<command-name> help Shows the built help for the specified internal command.

Security Management R80.40 Administration Guide      |      408


cp_log_export

Internal Commands

Name Description

add Deploy a new Check Point Log Exporter.

delete Remove an exporter.

reexport Reset the current position and reexport all logs per the configuration.

restart Restart an exporter process.

set Update an existing exporter's configuration.

show Print an exporter's current configuration.

start Start an exporter process.

status Show an exporter's overview status.

stop Stop an exporter process.

Security Management R80.40 Administration Guide      |      409


cp_log_export

Internal Command Arguments

Required
for
Required " show" , Required
Required Required
for " status" , for
for " add" for " set"
Name Description " delete" " start" , " reexpor
comman comman
comman " stop" , t"
d d
d " restart" command
comman
d

apply-now Applying any Optional Optional Mandator N/A Mandator


change that y y
was done
immediately.

ca-cert Full path to Optional Optional N/A N/A N/A


the CA
certificate
file *.pem.
Applicable
only when
the value of
the
"
encrypted"
argument is
"true".

client- Full path to Optional Optional N/A N/A N/A


cert the client
certificate
*.p12.
Applicable
only when
the value of
the
"
encrypted"
argument is
"true".

Security Management R80.40 Administration Guide      |      410


cp_log_export

Required
for
Required " show" , Required
Required Required
for " status" , for
for " add" for " set"
Name Description " delete" " start" , " reexpor
comman comman
comman " stop" , t"
d d
d " restart" command
comman
d

client- The Optional Optional N/A N/A N/A


secret challenge
phrase used
to create the
client
certificate
*.p12.
Applicable
only when
the value of
the
"
encrypted"
argument is
"true".

domain- The name or Mandator Mandator Mandator Optional. Mandator


server IP address of y y y By y
the default,
applicable applies to
Domain all.
Management
Server.

enabled Optional Optional N/A N/A N/A

encrypted Use TSL (SSL) Optional Optional N/A N/A N/A


encryption to
export the
logs.

Security Management R80.40 Administration Guide      |      411


cp_log_export

Required
for
Required " show" , Required
Required Required
for " status" , for
for " add" for " set"
Name Description " delete" " start" , " reexpor
comman comman
comman " stop" , t"
d d
d " restart" command
comman
d

export- Add a field Optional Optional N/A N/A N/A


attachmen to the
t-link
exported log
that
represents a
link to
SmartView
that sows
the log card
and
automaticall
y opens the
attachment.

export- Add a field Optional Optional N/A N/A N/A


link to the
exported log
that
represents a
link to
SmartView
that shows
the log card.

export- Make the Optional Optional N/A N/A N/A


link-ip links to
SmartView
use a custom
IP address
(for example,
for a Log
Server
behind NAT).

Security Management R80.40 Administration Guide      |      412


cp_log_export

Required
for
Required " show" , Required
Required Required
for " status" , for
for " add" for " set"
Name Description " delete" " start" , " reexpor
comman comman
comman " stop" , t"
d d
d " restart" command
comman
d

format The format, Optional Optional N/A N/A N/A


in which the
logs are
exported.

name Unique Mandator Mandator Mandator Optional. Mandator


name of the y y y By y
exporter default,
configuratio applies to
n. all.

protocol Transport Mandator Optional N/A N/A N/A


protocol to y
use.

target- The port on Mandator Optional N/A N/A N/A


port the target y
server, to
which you
export the
logs.

target- The IP Mandator Optional N/A N/A N/A


server address of y
the target
server, to
which you
export the
logs.

Security Management R80.40 Administration Guide      |      413


cpca_client

cpca_client
Description

Execute operations on the Internal Certificate Authority (ICA).

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_mgmt_tool <options>
set_sign_hash <options>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then
redirect the output to a file, or use the script
command to save the entire CLI session.

create_cert <options> Issues a SIC certificate for the Security Management Server or
Domain Management Server.
See "cpca_client create_cert" on page 416.

double_sign <options> Creates a second signature for a certificate.


See "cpca_client double_sign" on page 418.

Security Management R80.40 Administration Guide      |      414


cpca_client

Parameter Description

get_crldp <options> Shows how to access a CRL file from a CRL Distribution Point.
See "cpca_client get_crldp" on page 420.

get_pubkey <options> Saves the encoding of the public key of the ICA's certificate to a
file.
See "cpca_client get_pubkey" on page 421.

init_certs <options> Imports a list of DNs for users and creates a file with
registration keys for each user.
See "cpca_client init_certs" on page 422.

lscert <options> Shows all certificates issued by the ICA.


See "cpca_client lscert" on page 423.

revoke_cert <options> Revokes a certificate issued by the ICA.


See "cpca_client revoke_cert" on page 426.

revoke_non_exist_cert Revokes a non-existent certificate issued by the ICA.


<options>
See "cpca_client revoke_non_exist_cert" on page 429.

search <options> Searches for certificates in the ICA.


See "cpca_client search" on page 430.

set_mgmt_tool Controls the ICA Management Tool.


<options>
See "cpca_client set_mgmt_tool" on page 433.

set_sign_hash Sets the hash algorithm that the CA uses to sign the file hash.
<options>
See "cpca_client set_sign_hash" on page 436.

Security Management R80.40 Administration Guide      |      415


cpca_client create_cert

cpca_client create_cert

Description

Issues a SIC certificate for the Security Management Server or Domain Management Server.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] create_cert [-p <CA port number>] -n "CN=<Common


Name>" -f <Full Path to PKCS12 file> [-w <Password>] [-k {SIC | USER |
IKE | ADMIN_PKG}] [-c "<Comment for Certificate>"]

Security Management R80.40 Administration Guide      |      416


cpca_client create_cert

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the
entire CLI session.

-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.

-n "CN=<Common Sets the CN to the specified <Common Name>.


Name>"

-f <Full Path Specifies the PKCS12 file, which stores the certificate and keys.
to PKCS12 file>

-w <Password> Optional. Specifies the certificate password.

-k {SIC | USER Optional. Specifies the certificate kind.


| IKE | ADMIN_
PKG}

-c "<Comment Optional. Specifies the certificate comment (must enclose in double


for quotes).
Certificate>"

Example

[Expert@MGMT:0]# cpca_client create_cert -n "cn=cp_mgmt" -f $CPDIR/conf/sic_cert.p12

Security Management R80.40 Administration Guide      |      417


cpca_client double_sign

cpca_client double_sign

Description

Creates a second signature for a certificate.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] double_sign [-p <CA port number>] -i <Certificate


File in PEM format> [-o <Full Path to Output File>]

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the
entire CLI session.

-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.

-i <Certificate Imports the specified certificate (only in PEM format).


File in PEM
format>

-o <Full Path Optional. Saves the certificate into the specified file.
to Output File>

Security Management R80.40 Administration Guide      |      418


cpca_client double_sign

Example

[Expert@MGMT:0]# cpca_client double_sign -i certificate.pem

Requesting Double Signature for the following Certificate:


refCount: 1
Subject: [email protected],CN=http://www.example.com/,OU=ValiCert Class 2 Policy Validation
Authority,O=exampleO\, Inc.,L=ExampleL Validation Network

Double Sign of Cert:


======================
(
: (
:dn ("[email protected],CN=http://www.example.com/,OU=exampleOU Class 2 Policy
Validation Authority,O=exampleO\, Inc.,L=exampleL Validation Network")
:doubleSignCert (52016390... ... ...ebb67e96)
:return_code (0)
)
)

[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      419


cpca_client get_crldp

cpca_client get_crldp

Description

Shows how to access a CRL file from a CRL Distribution Point.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] get_crldp [-p <CA port number>]

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.

-p <CA Optional. Specifies the TCP port on the Security Management Server or Domain
port Management Server, which is used to connect to the Certificate Authority.
number>
The default TCP port number is 18209.

Example

[Expert@MGMT:0]# cpca_client get_crldp


192.168.3.51
[Expert@MGMT:0]

Security Management R80.40 Administration Guide      |      420


cpca_client get_pubkey

cpca_client get_pubk ey

Description

Saves the encoding of the public key of the ICA's certificate to a file.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] get_pubkey [-p <CA port number>] <Full Path to Output
File>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.

<Full Path Saves the encoding of the public key of the ICA's certificate to the specified
to Output file.
File>

Example

[Expert@MGMT:0]# cpca_client get_pubkey /tmp/key.txt[Expert@MGMT:0]#


[Expert@MGMT:0]# cat /tmp/key.txt
3082010a... ... ...f98b8910
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      421


cpca_client init_certs

cpca_client init_certs

Description

Imports a list of Distinguished Names (DN) for users and creates a file with registration keys for
each user.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] init_certs [-p <CA port number>] -i <Full Path to


Input File> -o <Full Path to Output File>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.

-i <Full Path Imports the specified file.


to Input Make sure to use the full path.
File>
Make sure that there is an empty line between each DN in the specified
file.
Example:
...CN=test1,OU=users...
&lt;Empty Line&gt;
...CN=test2,OU=users...

-o <Full Path Saves the registration keys to the specified file.


to Output This command saves the error messages in the <Name of Output
File>
File>.failures file in the same directory.

Security Management R80.40 Administration Guide      |      422


cpca_client lscert

cpca_client lscert

Description

Shows all certificates issued by the ICA.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] lscert [-dn <SubString>] [-stat {Pending | Valid |


Revoked | Expired | Renewed}] [-kind {SIC | IKE | User | LDAP}] [-ser
<Certificate Serial Number>] [-dp <Certificate Distribution Point>]

Security Management R80.40 Administration Guide      |      423


cpca_client lscert

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then
redirect the output to a file, or use the script
command to save the entire CLI session.

-dn <SubString> Optional. Filters the search results to those with a DN


that matches the specified <SubString>.
This command does not support multiple values.

-stat {Pending | Valid | Optional. Filters the search results to those with
Revoked | Expired | certificate status that matches the specified status.
Renewed}
This command does not support multiple values.

-kind {SIC | IKE | User | Optional. Filters the search results to those with
LDAP} certificate kind that matches the specified kind.
This command does not support multiple values.

-ser <Certificate Serial Optional. Filters the search results to those with
Number> certificate serial number that matches the specified
serial number.
This command does not support multiple values.

-dp <Certificate Optional. Filters the search results to the specified


Distribution Point> Certificate Distribution Point (CDP).
This command does not support multiple values.

Security Management R80.40 Administration Guide      |      424


cpca_client lscert

Example

[Expert@MGMT:0]# cpca_client lscert -stat Revoked


Operation succeeded. rc=0.
5 certs found.

Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023

Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023

Subject = CN=VSX1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Revoked Kind = IKE Serial = 82434 DP = 2
Not_Before: Mon May 14 19:15:05 2018 Not_After: Sun May 14 19:15:05 2023
[Expert@MGMT:0]#

[Expert@MGMT:0]# cpca_client lscert -kind IKE


Operation succeeded. rc=0.
3 certs found.

Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023

Subject = CN=VSX_Cluster VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Valid Kind = IKE Serial = 64655 DP = 1
Not_Before: Mon Apr 9 19:36:31 2018 Not_After: Sun Apr 9 19:36:31 2023

Subject = CN=VSX1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Revoked Kind = IKE Serial = 82434 DP = 2
Not_Before: Mon May 14 19:15:05 2018 Not_After: Sun May 14 19:15:05 2023
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      425


cpca_client revoke_cert

cpca_client revok e_cert

Description

Revokes a certificate issued by the ICA.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] revoke_cert [-p <CA port number>] -n "CN=<Common


Name>" -s <Certificate Serial Number>

Security Management R80.40 Administration Guide      |      426


cpca_client revoke_cert

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.

-n Specifies the certificate CN.


"CN=<Common
To get the CN, run the "cpca_client lscert" on page 423 command and
Name>"
examine the text that you see between the "Subject =" and the
",O=...".
Example
From this output:
Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023

you get this syntax:


-n "CN=VS1 VPN Certificate

Note - You can use the parameter '-n' only, or together with the
parameter "-s".

-s Specifies the certificate serial number.


<Certificate
To see the serial number, run the "cpca_client lscert" on page 423
Serial
command.
Number>
Note - You can use the parameter "-s" only, or together with
the parameter "-n".

Security Management R80.40 Administration Guide      |      427


cpca_client revoke_cert

Example 1 - Revok ing a certificate specified by its CN

[Expert@MGMT:0]# cpca_client lscert


Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023
[Expert@MGMT:0]#
[Expert@MGMT:0]# cpca_client -d revoke_cert -n "CN=VS1 VPN Certificate"
Certificate was revoked successfully
[Expert@MGMT:0]#

Example 2 - Revok ing a certificate specified by its serial number.

[Expert@MGMT:0]# cpca_client lscert


Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023
[Expert@MGMT:0]#
[Expert@MGMT:0]# cpca_client -d revoke_cert -s 27214
Certificate was revoked successfully
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      428


cpca_client revoke_non_exist_cert

cpca_client revok e_non_exist_cert

Description

Revokes a non-existent certificate issued by the ICA.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] revoke_non_exist_cert -i <Full Path to Input File>

Parameters

Parame
Description
ter

-d Runs the cpca_client command under debug.

-i Specifies the file that contains the list of the certificate to revoke.
<Full
You must create this file in the same format as the "cpca_client lscert" on page 423
Path
command prints its output.
to
Input Example
File>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7
19:40:12 2023
&lt;Empty Line&gt;
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri Apr 7
19:40:13 2023

Note - This command saves the error messages in the <Name of Input
File>.failures file.

Security Management R80.40 Administration Guide      |      429


cpca_client search

cpca_client search

Description

Searches for certificates in the ICA.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] search <String> [-where {dn | comment | serial |


device_type | device_id | device_name}] [-kind {SIC | IKE | User |
LDAP}] [-stat {Pending | Valid | Revoked | Expired | Renewed}] [-max
<Maximal Number of Results>] [-showfp {y | n}]

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command
itself.
Best Practice - If you use this
parameter, then redirect the
output to a file, or use the
script command to save the
entire CLI session.

<String> Specifies the text to search in the


certificates.
You can enter only one text string that
does not contain spaces.

Security Management R80.40 Administration Guide      |      430


cpca_client search

Parameter Description

-where {dn | comment | serial | Optional. Specifies the certificate's field, in


device_type | device_id | device_ which to search for the string:
name}
n dn - Certificate DN
n comment - Certificate comment
n serial - Certificate serial number
n device_type - Device type
n device_id - Device ID
n device_name - Device Name

The default is to search in all fields.

-kind {SIC | IKE | User | LDAP} Optional. Specifies the certificate kind to
search.
You can enter multiple values in this
format:
-kind <Kind1> <Kind2> <Kind3>
The default is to search for all kinds.

-stat {Pending | Valid | Revoked | Optional. Specifies the certificate status to


Expired | Renewed} search.
You can enter multiple values in this
format:
-stat <Status1> <Status2>
<Status3>
The default is to search for all statuses.

-max <Maximal Number of Results> Optional. Specifies the maximal number of


results to show.

n Range: 1 and greater


n Default: 200

-showfp {y | n} Optional. Specifies whether to show the


certificate's fingerprint and thumbprint:

n y - Shows the fingerprint and


thumbprint (this is the default)
n n - Does not show the fingerprint
and thumbprint

Example 1

[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP -stat Pending Valid Renewed

Security Management R80.40 Administration Guide      |      431


cpca_client search

Example 2

[Expert@MGMT:0]# cpca_client search 192.168.3.51 -where dnOperation succeeded. rc=0.


1 certs found.

Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#

Example 3

[Expert@MGMT:0]# cpca_client search 192.168.3.51 -where dn -showfp nOperation succeeded. rc=0.


1 certs found.

Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      432


cpca_client set_mgmt_tool

cpca_client set_mgmt_tool

Description

Controls the ICA Management Tool.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

See:

n sk30501: Setting up the ICA Management Tool

n sk39915: Invoking the ICA Management Tool

n sk102837: Best Practices - ICA Management Tool configuration

Syntax

cpca_client [-d] set_mgmt_tool {on | off | add | remove | clean |


print} [-p <CA port number>] {[-a <Administrator DN>] | [-u <User DN>]
| [-c <Custom User DN>]}

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

on Starts the ICA Management Tool.

off Stops the ICA Management Tool.

add Adds the specified administrator, user, or custom user that is permitted to
use the ICA Management Tool.

remove Removes the specified administrator, user, or custom user that is


permitted to use the ICA Management Tool.

Security Management R80.40 Administration Guide      |      433


cpca_client set_mgmt_tool

Parameter Description

clean Removes all administrators, users, or custom users that are permitted to
use the ICA Management Tool.

print Shows the configured administrators, users, or custom users that are
permitted to use the ICA Management Tool.

-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18265.

-a < Optional. Specifies the DN of the administrator that is permitted to use the
Administrator ICA Management Tool.
DN>
Must specify the full DN as appears in SmartConsole
Procedure

1. Open Object Explorer > Users


2. Open the Administrator object or a User object properties
3. Click the Certificates pane
4. Select the certificate and click the pencil icon
5. Click View certificate details
6. In the Certificate Info window, click the Details tab
7. Click the Subject field
8. Concatenate all fields

Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"

Security Management R80.40 Administration Guide      |      434


cpca_client set_mgmt_tool

Parameter Description

-u <User DN> Optional. Specifies the DN of the user that is permitted to use the ICA
Management Tool.
Must specify the full DN as appears in SmartConsole:
Procedure

1. Open Object Explorer > Users


2. Open the Administrator object or a User object properties
3. Click the Certificates pane
4. Select the certificate and click the pencil icon
5. Click View certificate details
6. In the Certificate Info window, click the Details tab
7. Click the Subject field
8. Concatenate all fields

Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"

-c <Custom Optional. Specifies the DN for the custom user that is permitted to use the
User DN> ICA Management Tool.
Must specify the full DN as appears in SmartConsole.
Procedure

1. Open Object Explorer > Users


2. Open the Administrator object or a User object properties
3. Click the Certificates pane
4. Select the certificate and click the pencil icon
5. Click View certificate details
6. In the Certificate Info window, click the Details tab
7. Click the Subject field
8. Concatenate all fields

Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"

Note - If you run the "cpca_client set_mgmt_tool" command without the


parameter "-a" or "-u", the list of the permitted administrators and users is
not changed. The previously defined permitted administrators and users can
start and stop the ICA Management Tool.

Security Management R80.40 Administration Guide      |      435


cpca_client set_sign_hash

cpca_client set_sign_hash

Description

Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_client [-d] set_sign_hash {sha1 | sha256 | sha384 | sha512}

Important - After this change, you must restart the Check Point services with
these commands:

n On Security Management Server, run:


1. cpstop
2. cpstart
n On a Multi-Domain Server, run:
1. mdsstop_customer <Name or IP Address of Domain
Management Server>
2. mdsstart_customer <Name or IP Address of Domain
Management Server>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter,
then redirect the output to a file, or use the
script command to save the entire CLI
session.

{sha1 | sha256 | sha384 | The hash algorithms that the CA uses to sign the file
sha512} hash.
The default algorithm is SHA-256.

Security Management R80.40 Administration Guide      |      436


cpca_client set_sign_hash

Example

[Expert@MGMT:0]# cpca_client set_sign_hash sha256


You have selected the signature hash function SHA-256
WARNING: This hash algorithm is not supported in Check Point gateways prior to R71.
WARNING: It is also not supported on older clients and SG80 R71.

Are you sure? (y/n)


y
Internal CA signature hash changed successfully.
Note that the signature on the Internal CA certificate has not changed, but this has no security
implications.
[Expert@MGMT:0]#
[Expert@MGMT:0]# cpstop ; cpstart

Security Management R80.40 Administration Guide      |      437


cpca_create

cpca_create
Description

Creates new Check Point Internal Certificate Authority database.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

cpca_create [-d] -dn <CA DN>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then
redirect the output to a file, or use the script
command to save the entire CLI session.

-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).

Security Management R80.40 Administration Guide      |      438


cpconfig

cpconfig
Description

This command starts the Check Point Configuration Tool.

This tool lets you configure specific settings for the installed Check Point products.

Syntax

cpconfig

Note - On a Multi-Domain Server, run the "mdsconfig" command.

Security Management R80.40 Administration Guide      |      439


cpconfig

Menu Options

Note - The options shown depend on the configuration and installed products.

Menu Option Description

Licenses and Manages Check Point licenses and contracts on this server.
contracts

Administrator Configures Check Point system administrators for this server.

GUI Clients Configures the GUI clients that can use SmartConsole to connect to
this server.

SNMP Extension Obsolete. Do not use this option anymore.


To configure SNMP, see the R80.40 Gaia Administration Guide -
Chapter System Management - Section SNMP.

Random Pool Configures the RSA keys, to be used by Gaia Operating System.

Certificate Authority Initializes the Internal Certificate Authority (ICA) and configures the
Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).

Certificate's Shows the ICA's Fingerprint.


Fingerprint This fingerprint is a text string derived from the server's ICA
certificate.
This fingerprint verifies the identity of the server when you connect to
it with SmartConsole.

Automatic start of Shows and controls which of the installed Check Point products start
Check Point automatically during boot.
Products

Exit Exits from the Check Point Configuration Tool.

Security Management R80.40 Administration Guide      |      440


cpconfig

Example - Menu on a Security Management Server

[Expert@MyMGMT:0]# cpconfig
This program will let you re-configure
your Check Point Security Management Server configuration.

Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products

(9) Exit

Enter your choice (1-9) :

Security Management R80.40 Administration Guide      |      441


cpinfo

cpinfo
Description

A utility that collects diagnostics data on your Check Point computer at the time of execution.

It is mandatory to collect these data when you contact Check Point Support about an issue on
your Check Point computer.

For more information, see sk92739.

Security Management R80.40 Administration Guide      |      442


cplic

cplic
Description

The cplic command lets you manage Check Point licenses.

You can run this command in Gaia Clish or in the Expert mode.

License Management is divided into three types of commands:

Licensing
Applies To Description
Commands

Local licensing Management You execute these commands locally on the Check
commands Servers, Point computers.
Security Gateways
and Cluster
Members

Remote Management You execute these commands on the Security


licensing Servers only Management Server or Domain Management Server.
commands These changes affect the managed Security
Gateways and Cluster Members.

License Management You execute these commands on the Security


Repository Servers only Management Server or Domain Management Server.
commands These changes affect the licenses stored in the local
license repository.

Syntax for Local Licensing on a Management Server itself

cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>

Security Management R80.40 Administration Guide      |      443


cplic

Syntax for Remote Licensing on managed Security Gateways and Cluster Members

cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>

Syntax for License Database Operations on a Management Server

cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

{-h | -help} Shows the applicable built-in usage.

check Confirms that the license includes the feature on the local Security
<options> Gateway or Management Server.
See "cplic check" on page 446.

contract Manages (deletes and installs) the Check Point Service Contract on the
<options> local Check Point computer.
See "cplic contract" on page 448.

db_add Applies only to a Management Server.


<options> Adds licenses to the license repository on the Management Server.
See "cplic db_add" on page 450.

Security Management R80.40 Administration Guide      |      444


cplic

Parameter Description

db_print Applies only to a Management Server.


<options> Shows the details of Check Point licenses stored in the license repository
on the Management Server.
See "cplic db_print" on page 452.

db_rm Applies only to a Management Server.


<options> Removes a license from the license repository on the Management
Server.
See "cplic db_rm" on page 454.

del <options> Deletes a Check Point license on a host, including unwanted evaluation,
expired, and other licenses.
See "cplic del" on page 455.

del <Object Detaches a Central license from a remote managed Security Gateway or
Name> Cluster Member.
<options>
See "cplic del <object name>" on page 456.

get <options> Applies only to a Management Server.


Retrieves all licenses from managed Security Gateways and Cluster
Members into the license repository on the Management Server.
See "cplic get" on page 457.

print Prints details of the installed Check Point licenses on the local Check
<options> Point computer.
See "cplic print" on page 459.

put <options> Installs and attaches licenses on a Check Point computer.


See "cplic put" on page 461.

put <Object Attaches one or more Central or Local licenses to a remote managed
Name> Security Gateways and Cluster Members.
<options>
See "cplic put <object name>" on page 463.

upgrade Applies only to a Management Server.


<options> Upgrades licenses in the license repository with licenses in the specified
license file.
See "cplic upgrade" on page 466.

Security Management R80.40 Administration Guide      |      445


cplic check

cplic check

Description

Confirms that the license includes the feature on the local Security Gateway or Management
Server. See sk66245.

Syntax

cplic check {-h | -help}

cplic [-d] check [-p <Product>] [-v <Version>] [{-c | -count}] [-t
<Date>] [{-r | -routers}] [{-S | -SRusers}] <Feature>

Parameters

Parameter Description

{-h | - Shows the applicable built-in usage.


help}

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.

-p Product, for which license information is requested.


<Product> Some examples of products:

n fw1 - FireWall-1 infrastructure on Security Gateway / Cluster Member (all


blades), or Management Server (all blades)
n mgmt - Multi-Domain Server infrastructure
n services - Entitlement for various services
n cvpn - Mobile Access
n etm - QoS (FloodGate-1)
n eps - Endpoint Software Blades on Management Server

-v Product version, for which license information is requested.


<Version>

{-c | - Outputs the number of licenses connected to this feature.


count}

Security Management R80.40 Administration Guide      |      446


cplic check

Parameter Description

-t <Date> Checks license status on future date.


Use the format ddmmyyyy .
A feature can be valid on a given date on one license, but invalid on another.

{-r | - Checks how many routers are allowed.


routers} The <Feature> option is not needed.

{-S | - Checks how many SecuRemote users are allowed.


SRusers}

<Feature> Feature, for which license information is requested.

Example from a Management Server

[Expert@MGMT]# cplic print -p


Host Expiration Primitive-Features
W.X.Y.Z 24Mar2016 ::CK-XXXXXXXXXXXX fw1:6.0:swb fw1:6.0:comp fw1:6.0:compunlimited fw1:6.0:cluster-1 fw1:6.0:cpxmgmt_qos_u_sites
fw1:6.0:sprounl fw1:6.0:nxunlimit fw1:6.0:swp evnt:6.0:smrt_evnt fw1:6.0:fwc fw1:6.0:ca fw1:6.0:rtmui fw1:6.0:sstui fw1:6.0:fwlv
fw1:6.0:cmd evnt:6.0:alzd5 evnt:6.0:alzc1 evnt:6.0:alzs1 fw1:6.0:sstui fw1:6.0:fwlv fw1:6.0:sme10 etm:6.0:rtm_u fw1:6.0:cep1
fw1:6.0:rt fw1:6.0:cemid fw1:6.0:web_sec_u fw1:6.0:workflow fw1:6.0:ram1 fw1:6.0:routers fw1:6.0:supmgmt fw1:6.0:supunlimit
fw1:6.0:prov fw1:6.0:atlas-unlimit fw1:6.0:filter fw1:6.0:ui psmp:6.0:psmsunlimited fw1:6.0:vpe_unlimit fw1:6.0:cluster-u
fw1:6.0:remote1 fw1:6.0:aes fw1:6.0:strong fw1:6.0:rdp fw1:6.0:des fw1:6.0:isakmp fw1:6.0:dbvr_unlimit fw1:6.0:cmpmgmt
fw1:6.0:rtmmgmt fw1:6.0:fgmgmt fw1:6.0:blades fw1:6.0:cpipv6 fw1:6.0:mgmtha fw1:6.0:remote
[Expert@MGMT]#

Example from a Management Server in High Availability

[Expert@MGMT]# cplic check -p fw1 -v 6.0 -c mgmtha


cplic check 'mgmtha': 1 licenses
[Expert@MGMT]#

Security Management R80.40 Administration Guide      |      447


cplic contract

cplic contract

Description

Deletes the Check Point Service Contract on the local Check Point computer.

Installs the Check Point Service Contract on the local Check Point computer.

Note

n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable
Management Server - either with the "cplic get" on page 457 command, or
in SmartUpdate.

Syntax

cplic contract -h

cplic [-d] contract


del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>

Security Management R80.40 Administration Guide      |      448


cplic contract

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

del Deletes the Service Contract from the $CPDIR/conf/cp.contract file


on the local Check Point computer.

put Merges the Service Contract to the $CPDIR/conf/cp.contract file


on the local Check Point computer.

<Service ID of the Service Contract.


Contract ID>

{-o | - Specifies to overwrite the current Service Contract.


overwrite}

<Service Path to and the name of the Service Contract file.


Contract File>
First, you must download the Service Contract file from your Check Point
User Center account.

Security Management R80.40 Administration Guide      |      449


cplic db_add

cplic db_add

Description

Adds licenses to the license repository on the Management Server.

When you add Local licenses to the license repository, Management Server automatically attaches
them to the managed Security Gateway / Cluster Member with the matching IP address.

When you add Central licenses, you must manually attach them.

Note - You get the license details in the Check Point User Center.

Syntax

cplic db_add {-h | -help}

cplic [-d] db_add -l <License File> [<Host>] [<Expiration Date>]


[<Signature>] [<SKU/Features>]

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

-l <License Name of the file that contains the license.


File>

<Host> Hostname or IP address of the Security Management Server / Domain


Management Server.

<Expiration The license expiration date.


Date>

<Signature> The license signature string.


For example: aa6uwknDc-CE6CRtjhv-zipoVWSnm-z98N7Ck3m
Case sensitive. Hyphens are optional.

Security Management R80.40 Administration Guide      |      450


cplic db_add

Parameter Description

< The SKU of the license summarizes the features included in the license.
SKU/Features> For example, CPSUITE-EVAL-3DES-vNG

Example

If the file 192.0.2.11.lic contains one or more licenses, the command "cplic db_add -l
192.0.2.11.lic" produces output similar to:

[Expert@MGMT]# cplic db_add -l 192.0.2.11.lic


Adding license to database ...
Operation Done
[Expert@MGMT]#

Security Management R80.40 Administration Guide      |      451


cplic db_print

cplic db_print

Description

Shows the details of Check Point licenses stored in the license repository on the Management
Server.

Syntax

cplic db_print {-h | -help}

cplic [-d] db_print {<Object Name> | -all} [{-n | -noheader}] [-x] [{-
t | -type}] [{-a | -attached}]

Parameters

Parameter Description

{-h | - Shows the applicable built-in usage.


help}

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI session.

<Object Prints only the licenses attached to <Object Name>.


Name> <Object Name> is the name of the Security Gateway / Cluster Member
object as defined in SmartConsole.

-all Prints all the licenses in the license repository.

{-n | - Prints licenses with no header.


noheader}

-x Prints licenses with their signatures.

{-t | - Prints licenses with their type: Central or Local.


type}

{-a | - Shows to which object the license is attached.


attached} Useful, if the parameter "-all" is specified.

Security Management R80.40 Administration Guide      |      452


cplic db_print

Example

[Expert@MGMT:0]# cplic db_print -all


Retrieving license information from database ...

The following licenses appear in the database:


===============================================
Host Expiration Features
192.168.3.28 25Aug2019 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX CK-XXXXXXXXXXXX
[Expert@MGMT:0]#

[Expert@MGMT:0]# cplic db_print -all -x -a


Retrieving license information from database ...

The following licenses appear in the database:


===============================================
Host Expiration Features
192.168.3.28 25Aug2019 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX CK-XXXXXXXXXXXX MGMT
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      453


cplic db_rm

cplic db_rm

Description

Removes a license from the license repository on the Management Server.

After you remove the license from the repository, it can no longer use it.

Warning - You can run this command ONLY after you detach the license with
the "cplic del" on page 455 command.

Syntax

cplic db_rm {-h | -help}

cplic [-d] db_rm <Signature>

Parameters

Parameter Description

{-h | - Shows the applicable built-in usage.


help}

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.

<Signature> The signature string within the license.


To see the license signature string, run the "cplic print" on page 459
command.

Example

[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn

Security Management R80.40 Administration Guide      |      454


cplic del

cplic del

Description

Deletes a Check Point license on a host, including unwanted evaluation, expired, and other
licenses.

This command can delete a license on both local computer, and on remote managed computers.

Syntax

cplic del {-h | -help}

cplic [-d] del [-F <Output File>] <Signature> <Object Name>

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

-F <Output Saves the command output to the specified file.


File>

<Signature> The signature string within the license.


To see the license signature string, run the "cplic print" on page 459
command.

<Object Name> The name of the Security Gateway / Cluster Member object as defined in
SmartConsole.

Security Management R80.40 Administration Guide      |      455


cplic del <object name>

cplic del <object name>

Description

Detaches a Central license from a remote managed Security Gateway or Cluster Member.

When you run this command, it automatically updates the license repository.

The Central license remains in the license repository as an unattached license.

Syntax

cplic del {-h | -help}

cplic [-d] del <Object Name> [-F <Output File>] [-ip <Dynamic IP
Address>] <Signature>

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect
the output to a file, or use the script command to save
the entire CLI session.

<Object Name> The name of the Security Gateway / Cluster Member object as
defined in SmartConsole.

-F <Output File> Saves the command output to the specified file.

-ip <Dynamic IP Deletes the license on the DAIP Security Gateway with the specified
Address> IP address.
Note - If this parameter is used, then object name must be a DAIP
Security Gateway.

<Signature> The signature string within the license.


To see the license signature string, run the "cplic print" on page 459
command.

Security Management R80.40 Administration Guide      |      456


cplic get

cplic get

Description

Retrieves all licenses from managed Security Gateways and Cluster Members into the license
repository on the Management Server.

This command helps synchronize the license repository with the managed Security Gateways and
Cluster Members.

When you run this command, it updates the license repository with all local changes.

Syntax

cplic get {-h | -help}

cplic [-d] get


-all
<IP Address>
<Host Name>

Parameters

Parameter Description

{-h | - Shows the applicable built-in usage.


help}

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.

-all Retrieves licenses from all Security Gateways and Cluster Members in the
managed network.

<IP The IP address of the Security Gateway / Cluster Member, from which licenses are
Address> to be retrieved.

<Host The name of the Security Gateway / Cluster Member object as defined in
Name> SmartConsole, from which licenses are to be retrieved.

Security Management R80.40 Administration Guide      |      457


cplic get

Example

If the Security Gateway with the object name MyGW contains four Local licenses, and the license
repository contains two other Local licenses, the command "cplic get MyGW" produces output
similar to this:

[Expert@MGMT:0]# cplic get MyGW


Get retrieved 4 licenses.
Get removed 2 licenses.
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      458


cplic print

cplic print

Description

Prints details of the installed Check Point licenses on the local Check Point computer.

Note - On a Security Gateway / Cluster Member, this command prints all


installed licenses (both Local and Central).

Syntax

cplic print {-h | -help}

cplic [-d] print[{-n | -noheader}] [-x] [{-t | -type}] [-F <Output


File>] [{-p | -preatures}] [-D]

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter,
then redirect the output to a file, or use the
script command to save the entire CLI
session.

{-n | -noheader} Prints licenses with no header.

-x Prints licenses with their signature.

{-t | -type] Prints licenses showing their type: Central or Local.

-F <Output File> Saves the command output to the specified file.

{-p | -preatures} Prints licenses resolved to primitive features.

-D On a Multi-Domain Server, prints only Domain licenses.

Security Management R80.40 Administration Guide      |      459


cplic print

Example 1

[Expert@HostName:0]# cplic print


Host Expiration Features
192.168.3.28 25Aug2019 CPMP-XXX CK-XXXXXXXXXXXX
[Expert@HostName:0]#

Example 2

[Expert@HostName:0]# cplic print -x


Host Expiration Signature Features
192.168.3.28 25Aug2019 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX CK-XXXXXXXXXXXX
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      460


cplic put

cplic put

Description

Installs one or more Local licenses on a Check Point computer.

Note - You get the license details in the Check Point User Center.

Syntax

cplic put {-h | -help}

cplic [-d] put [{-o | -overwrite}] [{-c | -check-only}] [{-s | -


select}] [-F <Output File>] [{-P | -Pre-boot}] [{-k | -kernel-only}] -
l <License File> [<Host>] [<Expiration Date>] [<Signature>]
[<SKU/Features>]

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.

{-o | - On a Security Gateway / Cluster Member, this command erases only the
overwrite} local licenses, but not central licenses that are installed remotely.

{-c | - Verifies the license. Checks if the IP of the license matches the Check Point
check-only} computer and if the signature is valid.

{-s | - Selects only the local license whose IP address matches the IP address of
select} the Check Point computer.

-F <Output Saves the command output to the specified file.


File>

{-P | -Pre- Use this option after you have upgraded and before you reboot the Check
boot} Point computer.
Use of this option will prevent certain error messages.

Security Management R80.40 Administration Guide      |      461


cplic put

Parameter Description

{-K | - Pushes the current valid licenses to the kernel.


kernel-only} For use by Check Point Support only.

-l <License Name of the file that contains the license.


File>

<Host> Hostname or IP address of the Security Gateway / Cluster Member for a local
license.
Hostname or IP address of the Security Management Server / Domain
Management Server for a central license.

<Expiration The license expiration date.


Date>

<Signature> The signature string within the license.


Case sensitive. The hyphens are optional.

< The SKU of the license summarizes the features included in the license.
SKU/Features For example: CPSUITE-EVAL-3DES-vNG
>

Copy and paste the parameters from the license received from the User Center:

Parameter Description

host The IP address of the external interface (in quad-dot notation).


The last part cannot be 0 or 255.

expiration date The license expiration date. It can be never.

signature The license signature string.


Case sensitive. The hyphens are optional.

SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab

Example

[Expert@HostName:0]# cplic put -l License.lic


Host Expiration SKU
192.168.2.3 14Jan2016 CPSB-SWB CPSB-ADNC-M CK0123456789ab
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      462


cplic put <object name>

cplic put <object name>

Description

Attaches one or more Central or Local licenses to a remote managed Security Gateways and
Cluster Members.

When you run this command, it automatically updates the license repository.

Note

n You get the license details in the Check Point User


Center.
n You can attach more than one license.

Syntax

cplic put {-h | -help}

cplic [-d] put <Object Name> [-ip<Dynamic IP Address> ] [-F <Output


File>] -l <License File> [<Host>] [<Expiration Date>] [<Signature>]
[<SKU/Feature>]

Security Management R80.40 Administration Guide      |      463


cplic put <object name>

Parameters

Parameter Description

{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the
entire CLI session.

<Object Name> The name of the Security Gateway / Cluster Member object, as defined
in SmartConsole.

-ip <Dynamic IP Installs the license on the Security Gateway with the specified IP
Address> address.
This parameter is used to install a license on a Security Gateway with
dynamically assigned IP address (DAIP).

Note - If you use this parameter, then the object name must
be that of a DAIP Security Gateway.

-F <Output Saves the command output to the specified file.


File>

-l <License Installs the licenses from the <License file>.


File>

<Host> Hostname or IP address of the Security Management Server / Domain


Management Server.

<Expiration The license expiration date.


Date>

<Signature> The license signature string.


Case sensitive. The hyphens are optional.

<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG

Security Management R80.40 Administration Guide      |      464


cplic put <object name>

Copy and paste the parameters from the license received from the User Center:

Parameter Description

host The IP address of the external interface (in quad-dot notation).


The last part cannot be 0 or 255.

expiration date The license expiration date. It can be never.

signature The license signature string.


Case sensitive. The hyphens are optional.

SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab

Security Management R80.40 Administration Guide      |      465


cplic upgrade

cplic upgrade

Description

Upgrades licenses in the license repository with licenses in the specified license file.

Note - You get this license file in the Check Point User Center.

Syntax

cplic upgrade {-h | -help}

cplic [-d] upgrade -l <Input File>

Parameters

Parameter Description

{-h | - Shows the applicable built-in usage.


help}

-l Upgrades the licenses in the license repository and Check Point Security
<Input Gateways / Cluster Members to match the licenses in the specified file.
File>

Example

This example explains the procedure to upgrade the licenses in the license repository.

There are two Software Blade licenses in the input file:

n One license does not match any license on a remote managed Security Gateway.

n The other license matches an NGX-version license on a managed Security Gateway that has
to be upgraded.

Workflow in this example:

1. Upgrade the Security Management Server to the latest version.

Ensure that there is connectivity between the Security Management Server and the Security
Gateways with the previous product versions.

2. Import all licenses into the license repository.

You can also do this after you upgrade the products on the remote Security Gateways.

3. Run this command:

Security Management R80.40 Administration Guide      |      466


cplic upgrade

cplic get -all

Example:

[Expert@MyMGMT]# cplic get -all


Getting licenses from all modules ...
MyGW:
Retrieved 1 licenses

4. To see all the licenses in the repository, run this command:

cplic db_print -all -a

Example:

[Expert@MyMGMT]# cplic db_print -all -a


Retrieving license information from database ...

The following licenses appear in the database:


==================================================
Host Expiration Features
192.0.2.11 Never CPFW-FIG-25-53 CK49C3A3CC7121 MyGW1
192.0.2.11 26Nov2017 CPSB-SWB CPSB-ADNC-M CK0123456789ab MyGW2

5. In the Check Point User Center, view the licenses for the products that were upgraded from
version NGX to a Software Blades license.

You can also create new upgraded licenses.

6. Download a file containing the upgraded licenses.

Only download licenses for the products that were upgraded from version NGX to Software
Blades.

7. If you did not import the version NGX licenses into the repository, import the version NGX
licenses now.

Use this command:

cplic get -all

8. Run the license upgrade command:

cplic upgrade -l <Input File>

n The licenses in the downloaded license file and in the license repository are
compared.

n If the certificate keys and features match, the old licenses in the repository and in the
remote Security Gateways are updated with the new licenses.

n A report of the results of the license upgrade is printed.

Security Management R80.40 Administration Guide      |      467


cppkg

cppk g
Description

Manages the SmartUpdate software packages repository on the Security Management Server.

Important - Installing software packages with the SmartUpdate is not


supported for Security Gateways running on Gaia OS.

Syntax

cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the MDS (run mdsenv).

Security Management R80.40 Administration Guide      |      468


cppkg

Parameters

Parameter Description

add <options> Adds a SmartUpdate software package to the repository.


See "cppkg add" on page 470.

{del | delete} Deletes a SmartUpdate software package from the repository.


<options>
See "ppkg delete" on page 471.

get Updates the list of the SmartUpdate software packages in the


repository.
See "cppkg get" on page 473.

getroot Shows the path to the root directory of the repository (the value of the
environment variable $SUROOT).
See "cppkg getroot" on page 474.

print Prints the list of SmartUpdate software packages in the repository.


See "cppkg print" on page 475.

setroot Configures the path to the root directory of the repository.


<options>
See "cppkg setroot" on page 476.

Security Management R80.40 Administration Guide      |      469


cppkg add

cppk g add

Description

Adds a SmartUpdate software package to the SmartUpdate software packages repository.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the MDS (run the mdsenv command).
n This command does not overwrite existing packages. To overwrite an
existing package, you must first delete the existing package.
n You get the SmartUpdate software packages from the Check Point
Support Center.

Syntax

cppkg add <Full Path to Package | DVD Drive [Product]>

Parameters

Parameter Description

<Full Path to Specifies the full local path on the computer to the SmartUpdate
Package> software package.

DVD Drive [Product] Specifies the DVD root path.


Example: /mnt/CPR80

Example - Adding R77.20 HFA_75 (R77.20.75) firmware pack age for 1100 Appliances

[Expert@MGMT:0]# cppkg print


Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------
[Expert@MGMT:0]#

[Expert@MGMT:0]# cppkg add /var/log/CP1100_6.0_4_0_-.tgz


Adding package to the repository
Getting the package type...
Extracting the package files...
Copying package to the repository...
Package was successfully added to the repository
[Expert@MGMT:0]#

[Expert@MGMT:0]# cppkg print


Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------
Check Point CP1100 R77.20 Gaia Embedded R77.20
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      470


ppkg delete

ppk g delete

Description

Deletes SmartUpdate software packages from the SmartUpdate software packages repository.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the MDS (run the mdsenv command).

Syntax

cppkg del ["<Vendor>" "<Product>" "<Major Version>" "<OS>" "<Minor


Version>"]

cppkg delete ["<Vendor>" "<Product>" "<Major Version>" "<OS>" "<Minor


Version>"]

Parameters

Parameter Description

del | When you do not specify optional parameters, the command runs in the
delete interactive mode. The command shows the menu with applicable options.

"< Specifies the package vendor. Enclose in double-quotes.


Vendor>"

"< Specifies the product name. Enclose in double-quotes.


Product
>"

"<Major Specifies the package Major Version. Enclose in double-quotes.


Version
>"

"<OS>" Specifies the package OS. Enclose in double-quotes.

"<Minor Specifies the package Minor Version. Enclose in double-quotes.


Version
>"

Notes:

n To see the values for the optional parameters, run the "cppkg print" on
page 475 command.
n You must specify all optional parameters, or no parameters.

Security Management R80.40 Administration Guide      |      471


ppkg delete

Example 1 - Interactive mode

[Expert@MGMT:0]# cppkg delete

Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20

(e) Exit

Enter your choice : 1

You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y

Package was successfully removed from the repository


[Expert@MGMT:0]#

Example 2 - Manually deleting the specified pack age

Expert@MGMT:0]# cppkg print


Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------
Check Point CP1100 R77.20 Gaia Embedded R77.20
[Expert@MGMT:0]#

[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      472


cppkg get

cppk g get

Description

Updates the list of the SmartUpdate software packages in the SmartUpdate software packages
repository based on the real content of the repository.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the MDS (run the mdsenv command).

Syntax

cppkg get

Example

[Expert@MGMT:0]# cppkg get


Update successfully completed
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      473


cppkg getroot

cppk g getroot

Description

Shows the path to the root directory of the SmartUpdate software packages repository (the value
of the environment variable $SUROOT)

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the MDS (run the mdsenv command).

Syntax

cppkg getroot

Example

[Expert@MGMT:0]# cppkg getroot


[cppkg 7119 4128339728]@MGMT[29 May 19:16:06] Current repository root is set to : /var/log/cpupgrade/suroot
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      474


cppkg print

cppk g print

Description

Prints the list of SmartUpdate software packages in the SmartUpdate software packages
repository.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the MDS (run the mdsenv command).

Syntax

cppkg print

Example - R77.20 HFA_75 (R77.20.75) firmware pack age for 1100 Appliances

[Expert@MGMT:0]# cppkg print


Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------
Check Point CP1100 R77.20 Gaia Embedded R77.20
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      475


cppkg setroot

cppk g setroot

Description

Configures the path to the root directory of the SmartUpdate software packages repository.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the MDS (run the mdsenv command).
n The default path is: /var/log/cpupgrade/suroot
n When changing repository root directory:
l This command copies the software packages from the old
repository to the new repository. A package in the new location is
overwritten by a package from the old location, if the packages have
the same name.
l This command updates the value of the environment variable
$SUROOT in the Check Point Profile shell scripts
($CPDIR/tmp/.CPprofile.sh and
$CPDIR/tmp/.CPprofile.csh).

Syntax

cppkg setroot <Full Path to Repository Root Directory>

Example

[Expert@MGMT:0]# cppkg setroot /var/log/my_directory

Repository root is set to : /var/log/cpupgrade/suroot

Note : When changing repository root directory :

1. Old repository content will be copied into the new repository


2. A package in the new location will be overwritten by a package in the old
location, if the packages have the same name

Change the current repository root ? [y/n] : y

The new repository directory does not exist. Create it ? [y/n] : y

Repository root was set to : /var/log/my_directory

Notice : To complete the setting of your directory, reboot the machine!


[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      476


cpprod_util

cpprod_util
Description

This utility lets you work with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:

n Shows which Check Point products and features are enabled on this Check Point computer.

n Enables and disables Check Point products and features on this Check Point computer.

Syntax

cpprod_util CPPROD_GetValue "<Product>" "<Parameter>" {0|1}

cpprod_util CPPROD_SetValue "<Product>" "<Parameter>" {1|4} "<Value>"


{0|1}

cpprod_util -dump

Security Management R80.40 Administration Guide      |      477


cpprod_util

Parameters

Parameter Description

CPPROD_ Gets the configuration status of the specified product or feature:


GetValue
n 0 - Disabled
n 1 - Enabled

CPPROD_ Sets the configuration for the specified product or feature.


SetValue
Important - Do not run these commands unless explicitly instructed
by Check Point Support or R&D to do so.

"< Specifies the product or feature.


Product>"

"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"

"<Value>" Specifies the value of the configuration parameter for the specified product or
feature:

n One of these integers: 0, 1, 4


n A string

dump Creates a dump file of Check Point Registry ($CPDIR/registry/HKLM_


registry.data) in the current working directory. The name of the output file
is RegDump.

Security Management R80.40 Administration Guide      |      478


cpprod_util

Notes

n On a Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

n If you run the cpprod_util command without parameters, it prints:

l The list of all available products and features (for example, "FwIsFirewallMgmt",
"FwIsLogServer", "FwIsStandAlone")

l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")

l The type of the returned output ("status-output", or "no-output")

n To redirect the output of the cpprod_util command, you need to redirect the stderr to
stdout:

cpprod_util <options> > <output file> 2>&1

Example:

cpprod_util > /tmp/output_of_cpprod_util.txt 2>&1

Examples

Example - Showing a list of all installed Check Point Products Pack ages on a
Management Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      479


cpprod_util

Example - Check ing if this Check Point computer is configured as a Management


Server
[Expert@MGMT:0]# cpprod_util FwIsFirewallMgmt
1
[Expert@MGMT:0]#

Example - Check ing if this Check Point computer is configured as a Standalone


[Expert@MGMT:0]# cpprod_util FwIsStandAlone
0
[Expert@MGMT:0]#

Example - Check ing if this Management Server is configured as a Primary in High


Availability
[Expert@MGMT:0]# cpprod_util FwIsPrimary
1
[Expert@MGMT:0]#

Example - Check ing if this Management Server is configured as Active in High


Availability
[Expert@MGMT:0]# cpprod_util FwIsActiveManagement
1
[Expert@MGMT:0]#

Example - Check ing if this Management Server is configured as Back up in High


Availability
[Expert@MGMT:0]# cpprod_util FwIsSMCBackup
1
[Expert@MGMT:0]#

Example - Check ing if this Check Point computer is configured as a dedicated Log
Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#

Example - Check ing if on this Management Server the SmartProvisioning blade is


enabled
[Expert@MGMT:0]# cpprod_util FwIsAtlasManagement
1
[Expert@MGMT:0]#

Example - Check ing if on this Management Server the SmartEvent Server blade is
enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      480


cpprod_util

Example - Check ing if on this Management Server the SmartEvent Correlation


Unit blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#

Example - Check ing if on this Management Server the Endpoint Policy


Management blade is enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#

Example - Check ing if this Management Server is configured as Endpoint Policy


Server
[Expert@MGMT:0]# cpprod_util UepmIsPolicyServer
0
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      481


cprid

cprid
Description

Manages the Check Point Remote Installation Daemon (cprid).

This daemon is used for remote upgrade and installation of Check Point products on the
managed Security Gateways.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run these commands in the context
of the MDS (run mdsenv).

Commands

Syntax Description

cpridstart Starts the Check Point Remote Installation Daemon (cprid).

cpridstop Stops the Check Point Remote Installation Daemon (cprid).

run_cprid_ Stops and then starts the Check Point Remote Installation Daemon
restart (cprid).

Security Management R80.40 Administration Guide      |      482


cprinstall

cprinstall
Description

Performs installation of Check Point product packages and associated operations on remote
managed Security Gateways.

Important - Installing software packages with this command is not supported


for Security Gateways that run on Gaia OS.

Notes:

n This command requires a license for SmartUpdate.


n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n On the remote Security Gateways these are required:
l SIC Trust must be established between the Security Management
Server and the Security Gateway.
l The cpd daemon must run.
l The cprid daemon must run.

Syntax

cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>

Security Management R80.40 Administration Guide      |      483


cprinstall

Parameters

Parameter Description

boot Reboots the managed Security Gateway.


<options>
See "cprinstall boot" on page 486.

cprestart Runs the cprestart command on the managed Security Gateway.


<options>
See "cprinstall cprestart" on page 487.

cpstart Runs the cpstart command on the managed Security Gateway.


<options>
See "cprinstall cpstart" on page 488.

cpstop Runs the cpstop command on the managed Security Gateway.


<options>
See "cprinstall cpstop" on page 489.

delete Deletes a snapshot (backup) file on the managed Security Gateway.


<options>
See "cprinstall delete" on page 490.

get n Gets details of the products and the operating system installed on the
<options> managed Security Gateway.
n Updates the management database on the Security Management
Server.

See "cprinstall get" on page 491.

install Installs Check Point products on the managed Security Gateway.


<options>
See "cprinstall install" on page 492.

revert Restores the managed Security Gateway that runs on SecurePlatform OS from
<options> a snapshot saved on that Security Gateway.
See "cprinstall revert" on page 495.

show Displays all snapshot (backup) files on the managed Security Gateway that
<options> runs on SecurePlatform OS.
See "cprinstall show" on page 496.

snapshot Creates a snapshot on the managed Security Gateway that runs on


<options> SecurePlatform OS and saves it on that Security Gateway.
See "cprinstall snapshot" on page 497.

transfer Transfers a software package from the repository to the managed Security
<options> Gateway without installing the package.
See "cprinstall transfer" on page 498.

Security Management R80.40 Administration Guide      |      484


cprinstall

Parameter Description

uninstall Uninstalls Check Point products on the managed Security Gateway.


<options>
See "cprinstall uninstall" on page 500.

verify Confirms these operations were successful:


<options>
n If a specific product can be installed on the managed Security Gateway.
n That the operating system and currently installed products the
managed Security Gateway are appropriate for the software package.
n That there is enough disk space to install the product the managed
Security Gateway.
n That there is a CPRID connection with the managed Security Gateway.

See "cprinstall verify" on page 502.

Security Management R80.40 Administration Guide      |      485


cprinstall boot

cprinstall boot

Description

Reboots the managed Security Gateway.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

cprinstall boot <Object Name>

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example

[Expert@MGMT]# cprinstall boot MyGW

Security Management R80.40 Administration Guide      |      486


cprinstall cprestart

cprinstall cprestart

Description

Runs the cprestart command on the managed Security Gateway.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n All Check Point products on the managed Security Gateway must be of the
same version.

Syntax

cprinstall cprestart <Object Name>

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example

[Expert@MGMT:0]# cprinstall cprestart MyGW

Security Management R80.40 Administration Guide      |      487


cprinstall cpstart

cprinstall cpstart

Description

Runs the cpstart command on the managed Security Gateway.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n All Check Point products on the managed Security Gateway must be of the
same version.

Syntax

cprinstall cpstart <Object Name>

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example

[Expert@MGMT]# cprinstall cpstart MyGW

Security Management R80.40 Administration Guide      |      488


cprinstall cpstop

cprinstall cpstop

Description

Runs the cpstop command on the managed Security Gateway.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n All Check Point products on the managed Security Gateway must be of the
same version.

Syntax

cprinstall cpstop {-proc | -nopolicy} <Object Name>

Parameters

Parameter Description

-proc Kills the Check Point daemons and Security Servers, while it maintains the active
Security Policy running in the Check Point kernel.
Rules with generic Allow , Drop or Reject action based on services, continue to
work.

- Kills the Check Point daemons and Security Servers and unloads the Security
nopolicy Policy from the Check Point kernel.

<Object The name of the Security Gateway object as configured in SmartConsole.


Name>

Example

[Expert@MGMT]# cprinstall cpstop -proc MyGW

Security Management R80.40 Administration Guide      |      489


cprinstall delete

cprinstall delete

Description

Deletes a snapshot (backup) file on the managed Security Gateway that runs on SecurePlatform
OS.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

cprinstall delete <Object Name> <Snapshot File>

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in SmartConsole.

<Snapshot File> Specifies the name of the snapshot (backup) on SecurePlatform OS.

Example

[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017

Security Management R80.40 Administration Guide      |      490


cprinstall get

cprinstall get

Description

n Gets details of the products and the operating system installed on the managed Security
Gateway.

n Updates the management database on the Security Management Server.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

cprinstall get <Object Name>

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example:

[Expert@MGMT]# cprinstall get MyGW


Checking cprid connection...
Verified
Operation completed successfully
Updating machine information...
Update successfully completed
'Get Gateway Data' completed successfully
Operating system Major Version Minor Version
------------------------------------------------------------------------
SecurePlatform R75.20 R75.20

Vendor Product Major Version Minor Version


------------------------------------------------------------------------
Check Point VPN-1 Power/UTM R75.20 R75.20
Check Point SecurePlatform R75.20 R75.20
Check Point SmartPortal R75.20 R75.20
[Expert@MGMT]#

Security Management R80.40 Administration Guide      |      491


cprinstall install

cprinstall install

Description

Installs Check Point products on the managed Security Gateway.

Important - Installing software packages with this command is not supported


for Security Gateways that run Gaia OS.

Notes:

n Before transferring the software package, this command runs the


"cprinstall verify" on page 502 command.
n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n To see the values for the package attributes, run the "cppkg print" on
page 475 command.

Syntax

cprinstall install [-boot] [-backup] [-skip_transfer] <Object Name>


"<Vendor>" "<Product>" "<Major Version>" "<Minor Version>"

Security Management R80.40 Administration Guide      |      492


cprinstall install

Parameters

Parameter Description

-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is
canceled in certain scenarios.

-backup Creates a snapshot on the managed Security Gateway before installing the
package.
Note - Only on Security Gateways that runs on SecurePlatform OS.

-skip_ Skip the transfer of the package.


transfer

<Object The name of the Security Gateway object as configured in SmartConsole.


Name>

"<Vendor>" Specifies the package vendor. Enclose in double-quotes.


Example:

n checkpoint
n Check Point

"<Product>" Specifies the product name. Enclose in double-quotes.


Examples:

n SVNfoundation
n firewall
n floodgate
n CP1100
n VPN-1 Power/UTM
n SmartPortal

"<Major Specifies the package Major Version. Enclose in double-quotes.


Version>"

"<Minor Specifies the package Minor Version. Enclose in double-quotes.


Version>"

Security Management R80.40 Administration Guide      |      493


cprinstall install

Example

[Expert@MGMT]# cprinstall install -boot MyGW "checkpoint" "firewall" "R75" "R75.20"

Installing firewall R75.20 on MyGW...


Info : Testing Check Point Gateway
Info : Test completed successfully.
Info : Transferring Package to Check Point Gateway
Info : Extracting package on Check Point Gateway
Info : Installing package on Check Point Gateway
Info : Product was successfully applied.
Info : Rebooting the Check Point Gateway
Info : Checking boot status
Info : Reboot completed successfully.
Info : Checking Check Point Gateway
Info : Operation completed successfully.
[Expert@MGMT]#

Security Management R80.40 Administration Guide      |      494


cprinstall revert

cprinstall revert

Description

Restores the managed Security Gateway that runs on SecurePlatform OS from a snapshot saved
on that Security Gateway.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

cprinstall revert <Object Name> <Snapshot File>

Parameters

Parameter Description

<Object The name of the Security Gateway object as configured in SmartConsole.


Name>

<Snapshot Name of the SecurePlatform snapshot file.


File>
To see the names of the saved snapshot files, run the "cprinstall show" on
page 496 command.

Security Management R80.40 Administration Guide      |      495


cprinstall show

cprinstall show

Description

Displays all snapshot (backup) files on the managed Security Gateway that runs on
SecurePlatform OS.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

cprinstall show <Object Name>

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example

[Expert@MGMT]# cprinstall show GW1


SU_backup.tzg
[Expert@MGMT]#

Security Management R80.40 Administration Guide      |      496


cprinstall snapshot

cprinstall snapshot

Description

Creates a snapshot on the managed Security Gateway that runs on SecurePlatform OS and saves
it on that Security Gateway.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

cprinstall snapshot <Object Name> <Snapshot File>

Parameters

Parameter Description

<Object The name of the Security Gateway object as configured in SmartConsole.


Name>

<Snapshot Name of the SecurePlatform snapshot file.


File>
To see the names of the saved snapshot files, run the "cprinstall show" on
page 496 command.

Security Management R80.40 Administration Guide      |      497


cprinstall transfer

cprinstall transfer

Description

Transfers a software package from the repository to the managed Security Gateway without
installing the package.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n To see the values for the package attributes, run the "cppkg print" on
page 475 command.

Syntax

cprinstall transfer <Object Name> "<Vendor>" "<Product>" "<Major


Version>" "<Minor Version>"

Security Management R80.40 Administration Guide      |      498


cprinstall transfer

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in


SmartConsole.

"<Vendor>" Specifies the package vendor. Enclose in double-quotes.


Example:

n checkpoint
n Check Point

"<Product>" Specifies the product name. Enclose in double-quotes.


Examples:

n SVNfoundation
n firewall
n floodgate
n CP1100

"<Major Specifies the package major version. Enclose in double-quotes.


Version>"

"<Minor Specifies the package minor version. Enclose in double-quotes.


Version>"

Security Management R80.40 Administration Guide      |      499


cprinstall uninstall

cprinstall uninstall

Description

Uninstalls Check Point products on the managed Security Gateway.

Important - Uninstalling software packages with this command is not


supported for Security Gateways running on Gaia OS.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n Before uninstalling product packages, this command runs the "cprinstall
verify" on page 502 command.
n After uninstalling a product package, you must run the "cprinstall get" on
page 491 command.
n To see the values for the package attributes, run the "cppkg print" on
page 475 command.

Syntax

cprinstall uninstall [-boot] <Object Name> "<Vendor>" "<Product>"


"<Major Version>" "<Minor Version>"

Security Management R80.40 Administration Guide      |      500


cprinstall uninstall

Parameters

Parameter Description

-boot Reboots the managed Security Gateway after uninstalling the package.
Note - Reboot is canceled in certain scenarios.

<Object Name> The name of the Security Gateway object as configured in


SmartConsole.

"<Vendor>" Specifies the package vendor. Enclose in double-quotes.


Example:

n checkpoint
n Check Point

"<Product>" Specifies the product name. Enclose in double-quotes.


Examples:

n SVNfoundation
n firewall
n floodgate
n CP1100

"<Major Specifies the package major version. Enclose in double-quotes.


Version>"

"<Minor Specifies the package minor version. Enclose in double-quotes.


Version>"

Example

[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"


Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get

Security Management R80.40 Administration Guide      |      501


cprinstall verify

cprinstall verify

Description

Confirms these operations were successful:

n If a specific product can be installed on the managed Security Gateway.

n That the operating system and currently installed products the managed Security Gateway
are appropriate for the software package.

n That there is enough disk space to install the product the managed Security Gateway.

n That there is a CPRID connection with the managed Security Gateway.

Notes:

n You must run this command from the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n To see the values for the package attributes, run the "cppkg print" on
page 475 command.

Syntax

cprinstall verify <Object Name> "<Vendor>" "<Product>" "<Major


Version>" ["<Minor Version>"]

Security Management R80.40 Administration Guide      |      502


cprinstall verify

Parameters

Parameter Description

<Object Name> The name of the Security Gateway object as configured in


SmartConsole.

"<Vendor>" Specifies the package vendor. Enclose in double-quotes.


Example:

n checkpoint
n Check Point

"<Product>" Specifies the product name. Enclose in double-quotes.


Examples:

n SVNfoundation
n firewall
n floodgate
n CP1100
n VPN-1 Power/UTM
n SmartPortal

"<Major Specifies the package major version. Enclose in double-quotes.


Version>"

"<Minor Specifies the package minor version. Enclose in double-quotes.


Version>" This parameter is optional.

Example 1 - Verification succeeds

[Expert@MGMT]# cprinstall verify MyGW "checkpoint" "SVNfoundation" "R75.20"


Verifying installation of SVNfoundation R75.20 on MyGW...
Info : Testing Check Point Gateway.
Info : Test completed successfully.
Info : Installation Verified, The product can be installed.

Example 2 - Verification fails

[Expert@MGMT]# cprinstall verify MyGW "checkpoint" "SVNfoundation" "R75.20"


Verifying installation of SVNfoundation R75.20 on MyGW...
Info : Testing Check Point Gateway
Info : SVN Foundation R70 is already installed on 192.0.2.134
Operation Success. Product cannot be installed, did not pass dependency check.

Security Management R80.40 Administration Guide      |      503


cpstart

cpstart
Description

Manually starts all Check Point processes and applications.

Notes:

n For the cprid daemon, use the "cprid" on page 482


command.
n For manually starting specific Check Point processes, see
sk97638.

Syntax

cpstart

Security Management R80.40 Administration Guide      |      504


cpstat

cpstat
Description

Displays the status and statistics information of Check Point applications.

Syntax

cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o
<Polling Interval> [-c <Count>] [-e <Period>]] <Application Flag>

Note - You can write the parameters in the syntax in any order.

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI session.

The output shows the SNMP queries and SNMP responses for the applicable
SNMP OIDs.

-h <Host> Optional.
When you run this command on a Management Server, this parameter
specifies the managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object name.
The default is localhost.
Note - On a Multi-Domain Server, you must run this command in
the context of the applicable Domain Management Server:mdsenv
<IP Address or Name of Domain Management Server>.

-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.

-s Optional.
<SICname> Secure Internal Communication (SIC) name of the Application Monitoring
(AMON) server.

Security Management R80.40 Administration Guide      |      505


cpstat

Parameter Description

-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor in
the <Application Flag>. To see all flavors, run the cpstat command
without any parameters.

-o <Polling Optional.
Interval> Specifies the polling interval (in seconds) - how frequently the command
collects and shows the information.
Examples:

n 0 - The command shows the results only once and the stops (this is the
default value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the loop.
n N - The command shows the results every N seconds in the loop.

Use this parameter together with the "-c <Count>" parameter and the "-e
<Period>" parameter.
Example:
cpstat os -f perf -o 2

-c <Count> Optional.
Specifies how many times the command runs and shows the results before it
stops.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
Examples:

n 0 - The command shows the results repeatedly every <Polling


Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling
Interval> and then stops.

Example:
cpstat os -f perf -o 2 -c 2

Security Management R80.40 Administration Guide      |      506


cpstat

Parameter Description

-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the
statistics.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
You can use this parameter together with the "-c <Count>" parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60

< Mandatory.
Application See the table below with flavors for the application flags.
Flag>

These flavors are available for the application flags

Note - The available flags depend on the enabled Software Blades. Some flags
are supported only by a Security Gateway, and some flags are supported only
by a Management Server.

Feature or
Software Flag Flavors
Blade

List of enabled blades fw, ips, av, urlf, vpn, cvpn, aspm, dlp,
Software appi, anti_bot, default, content_
awareness, threat-emulation, default
Blades

Operating os default, ifconfig, routing, routing6,


System memory, old_memory, cpu, disk, perf,
multi_cpu, multi_disk, raidInfo, sensors,
power_supply, hw_info, all, average_cpu,
average_memory, statistics, updates,
licensing, connectivity, vsx

Firewall fw default, interfaces, policy, perf, hmem,


kmem, inspect, cookies, chains, fragments,
totals, totals64, ufp, http, ftp, telnet,
rlogin, smtp, pop3, sync, log_connection,
all

HTTPS https_ default, hsm_status, all


Inspection inspection

Security Management R80.40 Administration Guide      |      507


cpstat

Feature or
Software Flag Flavors
Blade

Identity identityServer default, authentication, logins, ldap,


Awareness components, adquery, idc, muh

Application appi default, subscription_status, update_


Control status, RAD_status, top_last_hour, top_
last_day, top_last_week, top_last_month

URL Filtering urlf default, subscription_status, update_


status, RAD_status, top_last_hour, top_
last_day, top_last_week, top_last_month

IPS ips default, statistics, all

Anti-Virus ci default

Threat antimalware default, scanned_hosts, scanned_mails,


Prevention subscription_status, update_status, ab_
prm_contracts, av_prm_contracts, ab_prm_
contracts, av_prm_contracts

Threat threat- default, general_statuses, update_status,


Emulation emulation scanned_files, malware_detected, scanned_
on_cloud, malware_on_cloud, average_
process_time, emulated_file_size, queue_
size, peak_size, file_type_stat_file_
scanned, file_type_stat_malware_detected,
file_type_stat_cloud_scanned, file_type_
stat_cloud_malware_scanned, file_type_
stat_filter_by_analysis, file_type_stat_
cache_hit_rate, file_type_stat_error_
count, file_type_stat_no_resource_count,
contract, downloads_information_current,
downloading_file_information, queue_table,
history_te_incidents, history_te_comp_
hosts

Threat scrub default, subscription_status, threat_


Extraction extraction_statistics

Mobile Access cvpn cvpnd, sysinfo, products, overall

VSX vsx default, stat, traffic, conns, cpu, all,


memory, cpu_usage_per_core

Security Management R80.40 Administration Guide      |      508


cpstat

Feature or
Software Flag Flavors
Blade

IPsec VPN vpn default, product, IKE, ipsec, traffic,


compression, accelerator, nic, statistics,
watermarks, all

Data Loss dlp default, dlp, exchange_agents, fingerprint


Prevention

Content ctnt default


Awareness

QoS fg all

High ha default, all


Availability

Policy Server polsrv default, all


for Remote
Access VPN
clients

Desktop Policy dtps default, all


Server for
Remote
Access VPN
clients

LTE / GX gx default, contxt_create_info, contxt_


delete_info, contxt_update_info, contxt_
path_mng_info, GXSA_GPDU_info, contxt_
initiate_info, gtpv2_create_info, gtpv2_
delete_info, gtpv2_update_info, gtpv2_
path_mng_info, gtpv2_cmd_info, all

Management mg default, log_server, indexer


Server

Certificate ca default, crl, cert, user, all


Authority

SmartEvent cpsemd default

SmartEvent cpsead default


Correlation
Unit

Security Management R80.40 Administration Guide      |      509


cpstat

Feature or
Software Flag Flavors
Blade

Log Server ls default

CloudGuard vsec default


Controller

SmartReporter svr default

Provisioning PA default
Agent

Thresholds thresholds default, active_thresholds, destinations,


configured error
with the
threshold_
config
command

Historical persistency product, TableConfig, SourceConfig


status values

Examples

Example - CPU utilization
[Expert@HostName:0]# cpstat -f cpu os
CPU User Time (%): 1
CPU System Time (%): 0
CPU Idle Time (%): 99
CPU Usage (%): 1
CPU Queue Length: -
CPU Interrupts/Sec: 172
CPUs Number: 8

[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      510


cpstat

Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60

Total Virtual Memory (Bytes): 12417720320


Active Virtual Memory (Bytes): 3741331456
Total Real Memory (Bytes): 8231063552
Active Real Memory (Bytes): 3741331456
Free Real Memory (Bytes): 4489732096
Memory Swaps/Sec: -
Memory To Disk Transfers/Sec: -
CPU User Time (%): 0
CPU System Time (%): 0
CPU Idle Time (%): 100
CPU Usage (%): 0
CPU Queue Length: -
CPU Interrupts/Sec: 135
CPUs Number: 8
Disk Servicing Read\Write Requests Time: -
Disk Requests Queue: -
Disk Free Space (%): 61
Disk Total Free Space (Bytes): 12659716096
Disk Available Free Space (Bytes): 11606188032
Disk Total Space (Bytes): 20477751296

Total Virtual Memory (Bytes): 12417720320


Active Virtual Memory (Bytes): 3741556736
Total Real Memory (Bytes): 8231063552
Active Real Memory (Bytes): 3741556736
Free Real Memory (Bytes): 4489506816
Memory Swaps/Sec: -
Memory To Disk Transfers/Sec: -
CPU User Time (%): 3
CPU System Time (%): 0
CPU Idle Time (%): 97
CPU Usage (%): 3
CPU Queue Length: -
CPU Interrupts/Sec: 140
CPUs Number: 8
Disk Servicing Read\Write Requests Time: -
Disk Requests Queue: -
Disk Free Space (%): 61
Disk Total Free Space (Bytes): 12659716096
Disk Available Free Space (Bytes): 11606188032
Disk Total Space (Bytes): 20477751296

[Expert@HostName:0]#

Example - List of current connected sessions on a Management Server


[Expert@MGMT:0]# cpstat -f default mg

Product Name: Check Point Security Management Server


Major version: 6
Minor version: 0
Build number: 994000031
Is started: 1
Active status: active
Status: OK

Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------

[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      511


cpstop

cpstop
Description

Manually stops all Check Point processes and applications.

Notes:

n For the cprid daemon, use the "cprid" on page 482


command.
n For manually stopping specific Check Point processes, see
sk97638.

Syntax

cpstop

Security Management R80.40 Administration Guide      |      512


cpview

cpview
Overview of CPView

Description

CPView is a text based built-in utility on a Check Point computer.

CPView Utility shows statistical data that contain both general system information (CPU, Memory,
Disk space) and information for different Software Blades (only on Security Gateway).

The CPView continuously updates the data in easy to access views.

On Security Gateway, you can use this statistical data to monitor the performance.

For more information, see sk101878.

Syntax

cpview --help

CPView User Interface


The CPView user interface has three sections:

Section Description

Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.

Navigation This menu bar is interactive. Move between menus with the arrow keys and
mouse.
A menu can have sub-menus and they show under the menu bar.

View This view shows the statistics collected in that view.


These statistics update at the refresh rate.

Security Management R80.40 Administration Guide      |      513


cpview

Using CPView
Use these keys to navigate the CPView:

Key Description

Arrow Moves between menus and views. Scrolls in a view.


keys

Home Returns to the Overview view.

Enter Changes to the View Mode .


On a menu with sub-menus, the Enter key moves you to the lowest level sub-
menu.

Esc Returns to the Menu Mode .

Q Quits CPView.

Use these keys to change CPView interface options:

Key Description

R Opens a window where you can change the refresh rate.


The default refresh rate is 2 seconds.

W Changes between wide and normal display modes.


In wide mode, CPView fits the screen horizontally.

S Manually sets the number of rows or columns.

M Switches on/off the mouse.

P Pauses and resumes the collection of statistics.

Use these keys to save statistics, show help, and refresh statistics:

Key Description

C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the capture>

H Shows a tooltip with CPView options.

Space bar Immediately refreshes the statistics.

Security Management R80.40 Administration Guide      |      514


cpwd_admin

cpwd_admin
Description

The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes such
as Check Point daemons on the local computer, and attempts to restart them if they fail.

Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.

The list of monitored processes depends on the installed and configured Check Point products
and Software Blades.

The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log
file.

The cpwd_admin utility shows the status of the monitored processes, and configures the Check
Point WatchDog.

There are two types of Check Point WatchDog monitoring

Monitoring Description

Passive WatchDog restarts the process only when the process terminates abnormally.
In the output of the cpwd_admin list command, the MON column shows N for
passively monitored processes.

Active WatchDog checks the process status every predefined interval.


WatchDog makes sure the process is alive, as well as properly functioning (not
stuck on deadlocks, frozen, and so on).
In the output of the cpwd_admin list command, the MON column shows Y for
actively monitored processes.
The list of actively monitored processes is predefined by Check Point. Users
cannot change or configure it.

Security Management R80.40 Administration Guide      |      515


cpwd_admin

Syntax

cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor

Parameters

Parameter Description

config Configures the Check Point WatchDog.


<options>
See "cpwd_admin config" on page 518.

del Temporarily deletes a monitored process from the WatchDog database of


<options> monitored processes.
See "cpwd_admin del" on page 521.

detach Temporarily detaches a monitored process from the WatchDog monitoring.


<options>
See "cpwd_admin detach" on page 522.

exist Checks whether the WatchDog process cpwd is alive.


See "cpwd_admin exist" on page 523.

flist Saves the status of all monitored processes to a $CPDIR/tmp/cpwd_list_


<options> <Epoch Timestamp>.lst file.
See "cpwd_admin flist" on page 524.

getpid Shows the PID of a monitored process.


<options>
See "cpwd_admin getpid" on page 526.

Security Management R80.40 Administration Guide      |      516


cpwd_admin

Parameter Description

kill Terminates the WatchDog process cpwd.


<options>
See "cpwd_admin kill" on page 527.

Important - Do not run this command unless explicitly instructed


by Check Point Support or R&D to do so.

list Prints the status of all monitored processes on the screen.


See "cpwd_admin list" on page 528.

monitor_ Prints the status of actively monitored processes on the screen.


list
See "cpwd_admin monitor_list" on page 530.

start Starts a process as monitored by the WatchDog.


<options>
See "cpwd_admin start" on page 531.

start_ Starts the active WatchDog monitoring - WatchDog monitors the predefined
monitor processes actively.
See "cpwd_admin start_monitor" on page 533.

stop Stops a monitored process.


<options>
See "cpwd_admin stop" on page 534.

stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes only
monitor passively.
See "cpwd_admin stop_monitor" on page 536.

Security Management R80.40 Administration Guide      |      517


cpwd_admin config

cpwd_admin config

Description

Configures the Check Point WatchDog.

Important - After changing the WatchDog configuration parameters, you must


restart the WatchDog process with the cpstop and cpstart commands (which
restart all Check Point processes).

Syntax

cpwd_admin config
-h
-a <options>
-d <options
-p
-r

Parameters

Parameter Description

-h Shows built-in usage.

-a <Configuration_Parameter_1>=<Value_1> Adds the WatchDog configuration


<Configuration_Parameter_2>=<Value_2> parameters.
... <Configuration_Parameter_N>=<Value_
N> Note - Spaces are not
allowed between the name
of the configuration
parameter, the equal sign,
and the value.

-d <Configuration_Parameter_1> Deletes the WatchDog configuration


<Configuration_Parameter_2> ... parameters that user added with the
<Configuration_Parameter_N>
"cpwd_admin config -a"
command.

-p Shows the WatchDog configuration


parameters that user added with the
"cpwd_admin config -a"
command.

-r Restores the default WatchDog


configuration.

Security Management R80.40 Administration Guide      |      518


cpwd_admin config

These are the available configuration parameters and the accepted values:

Configuration Accepted
Description
Parameter Values

no_limit n Range: - If rerun_mode=1, specifies the maximal number of times


1, 0, >0 the WatchDog tries to restart a process.
n Default:
n -1 - Always tries to restart
5
n 0 - Never tries to restart
n >0 - Tries this number of times

num_of_ n Range: Configures the maximal number of processes managed by


procs 30 - the WatchDog.
2000
n Default:
2000

rerun_mode n 0 Configures whether the WatchDog restarts processes after


n 1 they fail:
(default)
n 0 - Does not restart a failed process. Monitor and log
only.
n 1 - Restarts a failed process (this is the default).

reset_ n Range: Configures the time (in seconds) the WatchDog waits after
startups >0 the process starts and before the WatchDog resets the
n Default: process's startup_counter to 0.
3600 To see the process's startup counter, in the output of the
cpwd_admin list command, refer to the #START column.

sleep_mode n 0 Configures how the WatchDog restarts the process:


n 1
n 0 - Ignores timeout and restarts the process
(default)
immediately
n 1 - Waits for the duration of sleep_timeout

sleep_ n Range: If rerun_mode=1, specifies how much time (in seconds)


timeout 0 - 3600 passes from a process failure until WatchDog tries to restart
n Default: it.
60

stop_ n Range: Configures the time (in seconds) the WatchDog waits for a
timeout >0 process stop command to complete.
n Default:
60

Security Management R80.40 Administration Guide      |      519


cpwd_admin config

Configuration Accepted
Description
Parameter Values

zero_ n Range: After failing no_limit times to restart a process, the


timeout >0 WatchDog waits zero_timeout seconds before it tries
n Default: again.
7200 The value of the zero_timeout must be greater than the
value of the timeout.

The WatchDog saves the user defined configuration parameters in the


$CPDIR/registry/HKLM_registry.data file in the ": (Wd_Config" section:

("CheckPoint Repository Set"


: (SOFTWARE
: (CheckPoint
: (CPshared
:CurrentVersion (6.0)
: (6.0
... ...
: (reserved
... ...
: (Wd
: (Wd_Config
:Configuration_Parameter_1 ("[4]Value_1")
:Configuration_Parameter_2 ("[4]Value_2")
)
)
... ...

Example

[Expert@HostName:0]# cpwd_admin config -p


cpWatchDog doesn't have configuration parameters
[Expert@HostName:0]#
[Expert@HostName:0]# cpwd_admin config -a sleep_timeout=120 no_limit=12
[Expert@HostName:0]#
[Expert@HostName:0]# cpwd_admin config -p
cpWatchDog Configuration parameters are:
sleep_timeout : 120
no_limit : 12
[Expert@HostName:0]#
[Expert@HostName:0]# cpstop ; cpstart
[Expert@HostName:0]#

[Expert@HostName:0]# cpwd_admin config -r


cpWatchDog doesn't have configuration parameters
[Expert@HostName:0]#
[Expert@HostName:0]# cpstop ; cpstart
[Expert@HostName:0]#
[Expert@HostName:0]# cpwd_admin config -p
cpWatchDog doesn't have configuration parameters
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      520


cpwd_admin del

cpwd_admin del

Description

Temporarily deletes a monitored process from the WatchDog database of monitored processes.

Notes:

n WatchDog stops monitoring the detached process, but the process stays
alive.
n The "cpwd_admin list" on page 528 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or
with the "cpstart" on page 504 command.

Syntax on a Management Server

cpwd_admin del -name <Application Name>

Parameters

Parameter Description

< Name of the monitored Check Point process as you see in the output of the
Application "cpwd_admin list" on page 528 command in the leftmost column APP.
Name>
Examples:

n FWM
n FWD
n CPD
n CPM

Example

[Expert@HostName:0]# cpwd_admin del -name FWD


cpwd_admin:
successful Del operation
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      521


cpwd_admin detach

cpwd_admin detach

Description

Temporarily detaches a monitored process from the WatchDog monitoring.

Notes:

n WatchDog stops monitoring the detached process, but the process stays
alive.
n The "cpwd_admin list" on page 528 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or
with the "cpstart" on page 504 command.

Syntax on a Management Server

cpwd_admin detach -name <Application Name>

Parameters

Parameter Description

< Name of the monitored Check Point process as you see in the output of the
Application "cpwd_admin list" on page 528 command in the leftmost column APP.
Name>
Examples:

n FWM
n FWD
n CPD
n CPM

Example

[Expert@HostName:0]# cpwd_admin detach-name FWD


cpwd_admin:
successful Detach operation
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      522


cpwd_admin exist

cpwd_admin exist

Description

Checks whether the WatchDog process cpwd is alive.

Syntax

cpwd_admin exist

Example

[Expert@HostName:0]# cpwd_admin exist


cpwd_admin: cpWatchDog is running
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      523


cpwd_admin flist

cpwd_admin flist

Description

Prints the status of all WatchDog monitored processes on the screen.

Syntax on a Management Server

cpwd_admin list [-full]

Parameters

Parameter Description

-full Shows the verbose output.

Output

Column Description

APP Shows the WatchDog name of the monitored process.

PID Shows the PID of the monitored process.

STAT Shows the status of the monitored process:

n E - executing
n T - terminated

#START Shows how many times the WatchDog started the monitored process.

START_ Shows the time when the WatchDog started the monitored process for the last
TIME time.

SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 518).

MON Shows how the WatchDog monitors this process (see the explanation for the
"cpwd_admin" on page 515):

n Y - Active monitoring
n N - Passive monitoring

COMMAND Shows the command the WatchDog run to start this process.

Security Management R80.40 Administration Guide      |      524


cpwd_admin flist

Example

[Expert@HostName:0]# cpwd_admin flist


/opt/CPshrd-R80.40/tmp/cpwd_list_1564617600.lst
[Expert@HostName:0]#
[Expert@HostName:0]# date --date="@1564617600"
Thu Aug 1 03:00:00 IDT 2019
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      525


cpwd_admin getpid

cpwd_admin getpid

Description

Shows the PID of a WatchDog monitored process.

Syntax for a Management Server

cpwd_admin getpid -name <Application Name>

Parameters

Parameter Description

< Name of the monitored Check Point process as you see in the output of the
Application "cpwd_admin list" on page 528 command in the leftmost column APP.
Name>
Examples:

n FWM
n FWD
n CPD
n CPM

Example

[Expert@HostName:0]# cpwd_admin getpid -name FWD


5640
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      526


cpwd_admin kill

cpwd_admin k ill

Description

Terminates the WatchDog process cpwd.

Important - Do not run this command unless explicitly instructed by Check


Point Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with
the "cpstop" on page 512 and "cpstart" on page 504 commands.

Syntax

cpwd_admin kill

Security Management R80.40 Administration Guide      |      527


cpwd_admin list

cpwd_admin list

Description

Prints the status of all WatchDog monitored processes on the screen.

Syntax on a Management Server

cpwd_admin list [-full]

Parameters

Parameter Description

-full Shows the verbose output.

Output

Column Description

APP Shows the WatchDog name of the monitored process.

PID Shows the PID of the monitored process.

STAT Shows the status of the monitored process:

n E - executing
n T - terminated

#START Shows how many times the WatchDog started the monitored process.

START_ Shows the time when the WatchDog started the monitored process for the last
TIME time.

SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 518).

MON Shows how the WatchDog monitors this process (see the explanation for the
"cpwd_admin" on page 515):

n Y - Active monitoring
n N - Passive monitoring

COMMAND Shows the command the WatchDog run to start this process.

Security Management R80.40 Administration Guide      |      528


cpwd_admin list

Examples

Example - Default output on a Management Server


[Expert@HostName:0]# cpwd_admin list
APP PID STAT #START START_TIME MON COMMAND
CPVIEWD 19738 E 1 [17:50:44] 31/5/2019 N cpviewd
HISTORYD 0 T 0 [17:54:44] 31/5/2019 N cpview_historyd
CPD 19730 E 1 [17:54:45] 31/5/2019 Y cpd
SOLR 19935 E 1 [17:50:55] 31/5/2019 N java_solr /opt/CPrt-R80.40/conf/jetty.xml
RFL 19951 E 1 [17:50:55] 31/5/2019 N LogCore
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2019 N SmartView
INDEXER 20032 E 1 [17:50:55] 31/5/2019 N /opt/CPrt-R80.40/log_indexer/log_indexer
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2019 N /opt/CPSmartLog-R80.40/smartlog_server
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2019 N cp3dlogd
EPM 20251 E 1 [17:50:56] 31/5/2019 N startEngine
DASERVICE 20404 E 1 [17:50:59] 31/5/2019 N DAService_script
[Expert@HostName:0]#

Example - Verbose output on a Management Server


[Expert@HostName:0]# cpwd_admin list -full
APP PID STAT #START START_TIME SLP/LIMIT MON
--------------------------------------------------------------------------------
CPVIEWD 19738 E 1 [17:50:44] 31/5/2019 60/5 N
PATH = /opt/CPshrd-R80.40/bin/cpviewd
COMMAND = cpviewd
--------------------------------------------------------------------------------
HISTORYD 0 T 0 [17:54:44] 31/5/2019 60/5 N
PATH = /opt/CPshrd-R80.40/bin/cpview_historyd
COMMAND = cpview_historyd
--------------------------------------------------------------------------------
CPD 19730 E 1 [17:54:45] 31/5/2019 60/5 Y
PATH = /opt/CPshrd-R80.40/bin/cpd
COMMAND = cpd
--------------------------------------------------------------------------------
SOLR 19935 E 1 [17:50:55] 31/5/2019 60/5 N
PATH = /opt/CPrt-R80.40/bin/java_solr
COMMAND = java_solr /opt/CPrt-R80.40/conf/jetty.xml
--------------------------------------------------------------------------------
RFL 19951 E 1 [17:50:55] 31/5/2019 60/5 N
PATH = /opt/CPrt-R80.40/bin/LogCore
COMMAND = LogCore
--------------------------------------------------------------------------------
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2019 60/5 N
PATH = /opt/CPrt-R80.40/bin/SmartView
COMMAND = SmartView
--------------------------------------------------------------------------------
INDEXER 20032 E 1 [17:50:55] 31/5/2019 60/5 N
PATH = /opt/CPrt-R80.40/log_indexer/log_indexer
COMMAND = /opt/CPrt-R80.40/log_indexer/log_indexer
--------------------------------------------------------------------------------
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2019 60/5 N
PATH = /opt/CPSmartLog-R80.40/smartlog_server
COMMAND = /opt/CPSmartLog-R80.40/smartlog_server
ENV = LANG=C
--------------------------------------------------------------------------------
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2019 60/5 N
PATH = /opt/CPuepm-R80.40/bin/cp3dlogd
COMMAND = cp3dlogd
--------------------------------------------------------------------------------
EPM 20251 E 1 [17:50:56] 31/5/2019 60/5 N
PATH = /opt/CPuepm-R80.40/bin/startEngine
COMMAND = startEngine
--------------------------------------------------------------------------------
DASERVICE 20404 E 1 [17:50:59] 31/5/2019 60/5 N
PATH = /opt/CPda/bin/DAService_script
COMMAND = DAService_script
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      529


cpwd_admin monitor_list

cpwd_admin monitor_list

Description

Prints the status of actively monitored processes on the screen.

See the explanation about the active monitoring in "cpwd_admin" on page 515.

Syntax

cpwd_admin monitor_list

Example

[Expert@HostName:0]# cpwd_admin monitor_list


cpwd_admin:
APP FILE_NAME NO_MSG_TIMES LAST_MSG_TIME
CPD CPD_5420_4714.mntr 0/10 [19:00:33] 31/5/2019
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      530


cpwd_admin start

cpwd_admin start

Description

Starts a process as monitored by the WatchDog.

Syntax on a Management Server

cpwd_admin start -name <Application Name> -path "<Full Path to


Executable>" -command "<Command Syntax>" [-env {inherit | <Env_
Var>=<Value>] [-slp_timeout <Timeout>] [-retry_limit {<Limit> | u}]

Parameters

Parameter Description

-name <Application Name, under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:

n FWM
n FWD
n CPD
n CPM

-path "<Full Path The full path (with or without Check Point environment variables) to
to Executable>" the executable including the executable name.
Must enclose in double-quotes.
Examples:

n For FWM: "$FWDIR/bin/fwm"


n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd"
n For CPM: "/opt/CPsuite-
R80.40/fw1/scripts/cpm.sh"
n For SICTUNNEL: "/opt/CPshrd-R80.40/bin/cptnl"

Security Management R80.40 Administration Guide      |      531


cpwd_admin start

Parameter Description

-command "<Command The command and its arguments to run.


Syntax>" Must enclose in double-quotes.
Examples:

n For FWM: "fwm"


n For FWM on Multi-Domain Server: "fwm mds"
n For FWD: "fwd"
n For CPD: "cpd"
n For CPM: "/opt/CPsuite-R80.40/fw1/scripts/cpm.sh
-s"
n For SICTUNNEL: "/opt/CPshrd-R80.40/bin/cptnl -c
"/opt/CPuepm-R80.40/engine/conf/cptnl_
srv.conf""

-env {inherit | Configures whether to inherit the environment variables from the
<Env_Var>=<Value>} shell.

n inherit - Inherits all the environment variables (WatchDog


supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable

-slp_timeout Configures the specified value of the "sleep_timeout"


<Timeout> configuration parameter.
See "cpwd_admin config" on page 518.

-retry_limit Configures the value of the "retry_limit" configuration


{<Limit> | u} parameter.
See "cpwd_admin config" on page 518.

n <Limit> - Tries to restart the process the specified number


of times
n u - Tries to restart the process unlimited number of times

Example

For the list of process and the applicable syntax, see sk97638.

Security Management R80.40 Administration Guide      |      532


cpwd_admin start_monitor

cpwd_admin start_monitor

Description

Starts the active WatchDog monitoring. WatchDog monitors the predefined processes actively.

See the explanation for the "cpwd_admin" on page 515 command.

Syntax

cpwd_admin start_monitor

Example

[Expert@HostName:0]# cpwd_admin start_monitor


cpwd_admin:
CPWD has started to perform active monitoring on Check Point services/processes
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      533


cpwd_admin stop

cpwd_admin stop

Description

Stops a WatchDog monitored process.

Important - This change does not survive reboot.

Syntax on a Management Server

cpwd_admin stop -name <Application Name> [-path "<Full Path to


Executable>" -command "<Command Syntax>" [-env {inherit | <Env_
Var>=<Value>]

Parameters

Parameter Description

-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:

n FWM
n FWD
n CPD
n CPM

-path "<Full Path The full path (with or without Check Point environment variables)
to Executable>" to the executable including the executable name.
Must enclose in double-quotes.
Examples:

n For FWM: "$FWDIR/bin/fwm"


n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"

-command "<Command The command and its arguments to run.


Syntax>" Must enclose in double-quotes.
Examples:

n For FWM: "fw kill fwm"


n For FWD: "fw kill fwd"
n For CPD: "cpd_admin stop"

Security Management R80.40 Administration Guide      |      534


cpwd_admin stop

Parameter Description

-env {inherit | Configures whether to inherit the environment variables from the
<Env_Var>=<Value>} shell.

n inherit - Inherits all the environment variables (WatchDog


supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable

Example

For the list of process and the applicable syntax, see sk97638.

Security Management R80.40 Administration Guide      |      535


cpwd_admin stop_monitor

cpwd_admin stop_monitor

Description

Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.

See the explanation for the "cpwd_admin" on page 515 command.

Syntax

cpwd_admin stop_monitor

Example

[Expert@HostName:0]# cpwd_admin stop_monitor


cpwd_admin:
CPWD has stopped performing active monitoring on Check Point services/processes
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      536


dbedit

dbedit
Description

Edits the management database - the $FWDIR/conf/objects_5_0.C file - on the Security


Management Server or Domain Management Server. See skI3301.

Important - Do NOT run this command, unless explicitly instructed by Check


Point Support or R&D to do so. Otherwise, you can corrupt settings in the
management database.

Syntax

dbedit -help

dbedit [-globallock] [{-local | -s <Management_Server>}] [{-u


<Username> | -c <Certificate>}] [-p <Password>] [-f <File_Name>
[ignore_script_failure] [-continue_updating]] [-r "<Open_Reason_
Text>"] [-d <Database_Name>] [-listen] [-readonly] [-session]

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Parameters

Parameter Description

-help Prints the general help.

-globallock When you work with the dbedit utility, it partially locks the management
database. If a user configures objects in SmartConsole at the same time, it
causes problems in the management database.
This option does not let SmartConsole, or a dbedit user to make changes in
the management database.
When you specify this option, the dbedit commands run on a copy of the
management database. After you make the changes with the dbedit
commands and run the savedb command, the dbedit utility saves and
commits your changes to the actual management database.

-local Connects to the localhost (127.0.0.1) without using username/password.


If you do not specify this parameter, the dbedit utility asks how to connect.

Security Management R80.40 Administration Guide      |      537


dbedit

Parameter Description

-s < Specifies the Security Management Server - by IP address or HostName.


Management_ If you do not specify this parameter, the dbedit utility asks how to connect.
Server>

-u Specifies the username, with which the dbedit utility connects to the Security
<Username> Management Server.
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.

-c < Specifies the user's certificate file, with which the dbedit utility connects to
Certificate the Security Management Server.
>
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.

-p Specifies the user's password, with which the dbedit utility connects to the
<Password> Security Management Server.
Mandatory parameter when you specify the "-s <Management_Server>"
and "-u <Username>" parameters.

-f <File_ Specifies the file that contains the applicable dbedit internal commands (see
Name> the section "dbedit Internal Commands" below):

n create <object_type> <object_name>


n modify <table_name> <object_name> <field_name>
<value>
n update <table_name> <object_name>
n delete <table_name> <object_name>
n print <table_name> <object_name>
n quit

Note - Each command is limited to 4096 characters.

ignore_ Continues to execute the dbedit internal commands in the file and ignores
script_ errors.
failure
You can use it when you specify the "-f <File_Name>" parameter.

-continue_ Continues to update the modified objects, even if the operation fails for some
updating of the objects (ignores the errors and runs the update_all command at the
end of the script).
You can use it when you specify the "-f <File_Name>" parameter.

-r "<Open_ Specifies the reason for opening the database in read-write mode (default
Reason_ mode).
Text>"

Security Management R80.40 Administration Guide      |      538


dbedit

Parameter Description

-d Specifies the name of the database, to which the dbedit utility should connect
<Database_ (for example, mdsdb).
Name>

-listen The dbedit utility "listens" for changes (use this mode for advanced
troubleshooting with the assistance of Check Point Support).
The dbedit utility prints its internal messages when a change occurs in the
management database.

-readonly Specifies to open the management database in read-only mode.

-session Session Connectivity.

dbedit Internal Commands

Note - To see the available tables, class names (object types), attributes and
values, connect to Management Server with GuiDBedit Tool.

Command Description, Syntax, Examples

-h Description:
Prints the general help.
Syntax:
dbedit> -h

-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q

dbedit> quit [-update_all | -noupdate]

Examples:

n Exit the utility and commit the remaining modified objects (interactive
mode):
dbedit> quit
n Exit the utility and update all the remaining modified objects:
dbedit> quit -update_all
n Exit the utility and discard all modifications:
dbedit> quit -no_update

Security Management R80.40 Administration Guide      |      539


dbedit

Command Description, Syntax, Examples

update Description:
Saves the specified object in the specified table (for example, "network_
objects", "services", "users").
Syntax:
dbedit> update <table_name> <object_name>

Example:
Save the object My_Service in the table services:
dbedit> update services My_Service

update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all

_print_set Description:
Prints the specified object from the specified table (for example, "network_
objects", "services", "users") as it appears in the
$FWDIR/conf/objects_5_0.C file (sets of attributes).
Syntax:
dbedit> _print_set <table_name> <object_name>

Example:
Print the object My_Obj from the table network_objects:
dbedit> print network_objects My_Obj

print Description:
Prints the list of attributes of the specified object from the specified table (for
example, "network_objects", "properties", "services", "users").
Syntax:
dbedit> print <table_name> <object_name>

Examples:

n Print the object My_Obj from the table network_objects (in "Network
Objects"):
dbedit> print network_objects my_obj
n Print the object firewall_properties from the table properties (in "Global
Properties"):
dbedit> print properties firewall_properties

Security Management R80.40 Administration Guide      |      540


dbedit

Command Description, Syntax, Examples

printxml Description:
Prints in XML format the list of attributes of the specified object from the
specified table (for example, "network_objects", "properties",
"services", "users").
You can export the settings from a Management Server to an XML file that
you can use later with external automation systems.
Syntax:
dbedit> printxml <table_name> [<object_name>]

Examples:

n Print the object My_Obj from the table network_objects:


dbedit> printxml network_objects my_obj
n Print the object firewall_properties from the table properties (in "Global
Properties"):
dbedit> printxml properties firewall_properties

printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as
"chkpf_uid ({...})").
Syntax:
dbedit> printbyuid {object_id}

Example:
Print the attributes of the object with the specified UID:
dbedit> printbyuid {D3833F1D-0A58-AA42-865F-
39BFE3C126F1}

Security Management R80.40 Administration Guide      |      541


dbedit

Command Description, Syntax, Examples

query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value - query
is separated by a comma after "query <table_name>" (spaces are not
allowed between the <attribute> and '<value>').
Syntax:
dbedit> query <table_name> [ , <attribute>='<value>' ]

Examples:

n Print all objects in the table users:


dbedit> query users
n Print all objects in the table network_objects that are defined as
Management Servers:
dbedit> query network_objects, management='true'
n Print all objects in the table services with the name ssh:
command_sdbedit> query services, name='ssh'
n Print all objects in the table services with the port 22:
dbedit> query services, port='22'
n Print all objects with the IP address 10.10.10.10:
dbedit> query network_objects, ipaddr='10.10.10.10'

whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant
information about each such place.
Syntax:
dbedit> whereused <table_name> <object_name>

Example:
Check where the object My_Obj is used:
dbedit> whereused network_objects My_Obj

Security Management R80.40 Administration Guide      |      542


dbedit

Command Description, Syntax, Examples

create Description:
Creates an object of specified type (with its default values) in the database.
Restrictions apply to the object's name:

n Object names can have a maximum of 100 characters.


n Objects names can contain only ASCII letters, numbers, and dashes.
n Reserved words will be blocked by the Management Server (refer to
sk40179).

Syntax:
dbedit> create <object_type> <object_name>

Example:
Create the service object My_Service of the type tcp_service (with its default
values):
dbedit> create tcp_service my_service

delete Description:
Deletes an object from the specified table.
Syntax:
dbedit> delete <table_name> <object_name>

Example:
Delete the service object My_Service from the table services:
dbedit> delete services my_service

Security Management R80.40 Administration Guide      |      543


dbedit

Command Description, Syntax, Examples

modify Description:
Modifies the value of specified attribute in the specified object in the
specified table (for example, "network_objects", "services", "users") in
the management database.
Syntax:
dbedit> modify <table_name> <object_name> <field_name>
<value>

Examples:

n Modify the color to red in the object My_Service in the table services:
dbedit> modify services My_Service color red
n Add a comment to the object MyObj:
dbedit> modify network_objects MyObj comments
"Created by fwadmin with dbedit"
n Set the value of the global property ike_use_largest_possible_subnets in
the table properties to false:
dbedit> modify properties firewall_properties ike_
use_largest_possible_subnets false
n Create a new interface on the Security Gateway My_FW and modify its
attributes - set the IP address / Mask and enable Anti-Spoofing on
interface with "Element Index"=3 (check the attributes of the object My_
FW in GuiDBedit Tool):
dbedit> addelement network_objects My_FW interfaces
interface
dbedit> modify network_objects My_FW
interfaces:3:officialname NAME_OF_INTERFACE
dbedit> modify network_objects My_FW
interfaces:3:ipaddr IP_ADDRESS
dbedit> modify network_objects My_FW
interfaces:3:netmask NETWORK_MASK
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:access specific
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:allowed network_
objects:group_name
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:perform_anti_
spoofing true
dbedit> modify network_objects MyObj FieldA LINKSYS
n In the Owned Object MyObj change the value of FieldB to NewVal:
dbedit> modify network_objects MyObj FieldA:FieldB
NewVal

Security Management R80.40 Administration Guide      |      544


dbedit

Command Description, Syntax, Examples

n In the Linked Object MyObj change the value of FieldA from B to C :


dbedit> modify network_objects MyObj FieldA B:C

lock Description:
Locks the specified object (by administrator) in the specified table (for
example, "network_objects", "services", "users") from being modified
by other users.
For example, if you connect from a remote computer to this Management
Server with admin1 and lock an object, you are be able to connect with
admin2, but are not able to modify the locked object, until admin1 releases
the lock.
Syntax:
dbedit> lock <table_name> <object_name>

Example:
Lock the object My_Service_Obj in the table services in the database:
dbedit> lock services My_Service_Obj

addelement Description:
Adds a specified multiple field / container (with specified value) to a specified
object in specified table.
Syntax:
dbedit> addelement <table_name> <object_name> <field_
name> <value>

Examples:

n Add the element BranchObjectClass with the value Organization to a


multiple field Read in the object My_Obj in the table ldap:
dbedit> addelement ldap My_Obj
Read:BranchObjectClass Organization
n Add the service MyService to the group of services MyServicesGroup in
the table services:
dbedit> addelement services MyServicesGroup ''
services:MyService
n Add the network MyNetwork to the group of networks MyNetworksGroup
in the table network_objects:
dbedit> addelement network_objects MyNetworksGroup
'' network_objects:MyNetwork

Security Management R80.40 Administration Guide      |      545


dbedit

Command Description, Syntax, Examples

rmelement Description:
Removes a specified multiple field / container (with specified value) from a
specified object in specified table.
Syntax:
dbedit> rmelement <table_name> <object_name> <field_
name> <value>

Examples:

n Remove the service MyService from the group of services


MyServicesGroup from the table services:
dbedit> rmelement services MyServicesGroup ''
services:MyService
n Remove the network MyNetwork from the group of networks
MyNetworksGroup from the table network_objects:
dbedit> rmelement network_objects MyNetworksGroup
'' network_objects:MyNetwork
n Remove the element BranchObjectClass with the value Organization
from the multiple field Read in the object My_Obj in the table ldap:
dbedit> rmelement ldap my_obj
Read:BranchObjectClass Organization

rename Description:
Renames the specified object in specified table.
Syntax:
dbedit> rename <table_name> <object_name> <new_object_
name>

Example:
Rename the network object london to chicago in the table network_objects:
dbedit> rename network_objects london chicago

Security Management R80.40 Administration Guide      |      546


dbedit

Command Description, Syntax, Examples

rmbyindex Description:
Removes an element from a container by element's index.
Syntax:
dbedit> rmbyindex <table_name> <object_name> <field_
name> <index_number>

Example:
Remove the element backup_log_servers from the container log_servers by
element index 1 in the table network_objects:
dbedit> rmbyindex network_objects g log_servers:backup_
log_servers 1

add_owned_ Description:
remove_name Adds an owned object (and removes its name) to a specified owned object
field (or container).
Syntax:
dbedit> add_owned_remove_name <table_name> <object_
name> <field_name> <value>

Example:
Add the owned object My_Gateway (and remove its name) to the owned object
field (or container) my_external_products:
dbedit> add_owned_remove_name network_objects My_
Gateway additional_products owned:my_external_products

is_delete_ Description:
allowed Checks if the specified object can be deleted from the specified table (object
cannot be deleted if it is used by other objects).
Syntax:
dbedit> is_delete_allowed <table_name> <object_name>

Example:
dbedit> is_delete_allowed network_objects MyObj

Check if the object MyObj can be deleted from the table network_objects:

Security Management R80.40 Administration Guide      |      547


dbedit

Command Description, Syntax, Examples

set_pass Description:
Sets specified password for specified user.
Notes:

n The password must contain at least 4 characters and no more than 50


characters.
n This command cannot change the administrator's password.

Syntax:
dbedit> set_pass <Username> <Password>

Example:
Set the password 1234 for the user abcd:
dbedit> set_pass abcd 1234

savedb Description:
Saves the database. You can run this command only when the database is
locked globally (when you start the dbedit utility with the "dbedit -
globallock" command).
Syntax:
dbedit> savedb

savesession Description:
Saves the session. You can run this command only when you start the dbedit
utility in session mode (with the "dbedit -session" command).
Syntax:
dbedit> savesession

Security Management R80.40 Administration Guide      |      548


fw

fw
Description

n Performs various operations on Security or Audit log files.

n Kills the specified Check Point processes.

n Manages the Suspicious Activity Monitoring (SAM) rules.

n Manages the Suspicious Activity Policy editor.

Syntax

fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.

fetchlogs Fetches the specified Check Point log files - Security ($FWDIR/log/*.log*) or
<options> Audit ($FWDIR/log/*.adtlog*), from the specified Check Point computer.
See "fw fetchlogs" on page 551.

hastat Shows information about Check Point computers in High Availability


<options> configuration and their states.
See "fw hastat" on page 554.

Security Management R80.40 Administration Guide      |      549


fw

Parameter Description

kill Kills the specified Check Point process.


<options>
See "fw kill" on page 555.

log Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or
<options> Audit ($FWDIR/log/*.adtlog).
See "fw log" on page 556.

logswitch Switches the current active Check Point log file - Security
<options> ($FWDIR/log/fw.log) or Audit ($FWDIR/log/fw.adtlog).
See "fw logswitch" on page 565.

lslogs Shows a list of Check Point log files - Security ($FWDIR/log/*.log*) or Audit
<options> ($FWDIR/log/*.adtlog*), located on the local computer or a remote
computer.
See "fw lslogs" on page 569.

mergefiles Merges several Check Point log files - Security ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog), into a single log file.
See "fw mergefiles" on page 572.

repairlog Rebuilds pointer files for Check Point log files - Security ($FWDIR/log/*.log)
<options> or Audit ($FWDIR/log/*.adtlog).
See "fw repairlog" on page 575.

sam Manages the Suspicious Activity Monitoring (SAM) rules.


<options>
See "fw sam" on page 576.

sam_policy Manages the Suspicious Activity Policy editor that lets you work with these type
<options> of rules:
or
samp n Suspicious Activity Monitoring (SAM) rules.
<options> n Rate Limiting rules.

See "fw sam_policy" on page 585.

Security Management R80.40 Administration Guide      |      550


fw fetchlogs

fw fetchlogs

Description

Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.

Syntax

fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>

Security Management R80.40 Administration Guide      |      551


fw fetchlogs

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.

-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log
Notes:
File N>
n If you do not specify the log file name explicitly, the command transfers all
Security log files ($FWDIR/log/*.log*) and all Audit log files
($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for example,
2017-0?-*.log).
If you enter a wildcard, you must enclose it in double quotes or single
quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.

<Target> Specifies the remote Check Point computer, with which this local Check Point
computer has established SIC trust.

n If you run this command on a Security Management Server or Domain


Management Server, then <Target> is the applicable object's name or
main IP address of the Check Point Computer as configured in
SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.

Security Management R80.40 Administration Guide      |      552


fw fetchlogs

Notes:

n This command moves the specified log files from the $FWDIR/log/ directory on the
specified Check Point computer. Meaning, it deletes the specified log files on the specified
Check Point computer after it copies them successfully.

n This command moves the specified log files to the $FWDIR/log/ directory on the local
Check Point computer, on which you run this command.

n This command cannot fetch the active log files $FWDIR/log/fw.log or


$FWDIR/log/fw.adtlog.

To fetch these active log files:

1. Perform log switch on the applicable Check Point computer:

fw logswitch [-audit] [-h <IP Address or Hostname>]

2. Fetch the rotated log file from the applicable Check Point computer:

fw fetchlogs -f <Log File Name> <IP Address or Hostname>

n This command renames the log files it fetched from the specified Check Point computer.
The new log file name is the concatenation of the Check Point computer's name (as
configured in SmartConsole), two underscore (_) characters, and the original log file name
(for example: MyGW__2019-06-01_000000.log).

Example - Fetching log files from a Management Server

[Expert@HostName:0]# fw lslogs MyGW


Size Log file name
23KB 2019-05-16_000000.log
9KB 2019-05-17_000000.log
11KB 2019-05-18_000000.log
5796KB 2019-06-01_000000.log
4610KB fw.log
[Expert@HostName:0]#

[Expert@HostName:0]# fw fetchlogs -f 2019-06-01_000000 MyGW


File fetching in process. It may take some time...
File MyGW__2019-06-01_000000.log was fetched successfully
[Expert@HostName:0]#

[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#

[Expert@HostName:0]# fw lslogs MyGW


Size Log file name
23KB 2019-05-16_000000.log
9KB 2019-05-17_000000.log
11KB 2019-05-18_000000.log
4610KB fw.log
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      553


fw hastat

fw hastat

Description

Shows information about Check Point computers in High Availability configuration and their
states.

Note - This command is outdated. On Management Servers, run the "cpstat" on


page 505 command.

Syntax

fw hastat [<Target1>] [<Target2>] ... [<TargetN>]

Parameters

Parameter Description

<Target1> Specifies the Check Point computers to query.


<Target2> ... If you run this command on the Management Server, you can enter the
<TargetN> applicable IP address, or the resolvable HostName of the managed Security
Gateway or Cluster Member.
If you do not specify the target, the command queries the local computer.

Example - Querying the cluster members from the Management Server

[Expert@MGMT:0]# fw hastat 192.168.3.52


HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@MGMT:0]#

[Expert@MGMT:0]# fw hastat 192.168.3.53


HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.53 2 stand-by OK
[Expert@MGMT:0]#

[Expert@MGMT:0]# fw hastat 192.168.3.52 192.168.3.53


HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
192.168.3.53 2 stand-by OK
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      554


fw kill

fw k ill

Description

Kills the specified Check Point processes.

Important - Make sure the killed process is restarted, or restart it manually.


See sk97638.

Syntax

fw [-d] kill [-t <Signal Number>] <Name of Process>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the
entire CLI session.

-t <Signal Specifies which signal to send to the Check Point process.


Number> For the list of available signals and their numbers, run the kill -l
command.
For information about the signals, see the manual pages for the kill
and signal.
If you do not specify the signal explicitly, the command sends Signal 15
(SIGTERM).
Note - Processes can ignore some signals.

<Name of Specifies the name of the Check Point process to kill.


Process> To see the names of the processes, run the ps auxwf command.

Example

fw kill fwd

Security Management R80.40 Administration Guide      |      555


fw log

fw log

Description

Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).

Syntax

fw log {-h | -help}

fw [-d] log [-a] [-b "<Start Timestamp>" "<End Timestamp>"] [-c


<Action>] [{-f | -t}] [-g] [-H] [-h <Origin>] [-i] [-k {<Alert Name> |
all}] [-l] [-m {initial | semi | raw}] [-n] [-o] [-p] [-q] [-S] [-s
"<Start Timestamp>"] [-e "<End Timestamp>"] [-u <Unification Scheme
File>] [-w] [-x <Start Entry Number>] [-y <End Entry Number>] [-z] [-
#] [<Log File>]

Parameters

Parameter Description

{-h | -help} Shows the built-in usage.


Note - The built-in usage does not show some of the parameters
described in this table.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

-a Shows only Account log entries.

-b "<Start Shows only entries that were logged between the specified start and end
Timestamp>" times.
"<End
Timestamp>" n The <Start Timestamp> and <End Timestamp> may be a date,
a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End Timestamp> in
single or double quotes (-b 'XX' 'YY", or -b "XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-e"
parameters.
n See the date and time format below.

Security Management R80.40 Administration Guide      |      556


fw log

Parameter Description

-c <Action> Shows only events with the specified action. One of these:

n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl

Notes:

n The fw log command always shows the Control (ctl) actions.


n For login action, use the authcrypt.

-e "<End Shows only entries that were logged before the specified time.
Timestamp>"
Notes:

n The <End Timestamp> may be a date, a time, or both.


n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b"
parameter.
n See the date and time format below.

-f This parameter:

1. Shows the saved entries that match the specified conditions.


2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.

Note - Applies only to the active log file $FWDIR/log/fw.log or


$FWDIR/log/fw.adtlog

-g Does not show delimiters.


The default behavior is:

n Show a colon (:) after a field name


n Show a semi-colon (;) after a field value

Security Management R80.40 Administration Guide      |      557


fw log

Parameter Description

-H Shows the High Level Log key.

-h <Origin> Shows only logs that were generated by the Security Gateway with the
specified IP address or object name (as configured in SmartConsole).

-i Shows log UID.

-k {<Alert Shows entries that match a specific alert type:


Name> | all}
n <Alert Name> - Show only entries that match a specific alert
type:
l alert

l mail

l snmp_trap

l spoof

l user_alert

l user_auth

n all - Show entries that match all alert types (this is the default).

-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries, and
then specify the time for each log entry.

-m Specifies the log unification mode:

n initial - Complete unification of log entries. The command


shows one unified log entry for each ID. This is the default.
If you also specify the -f parameter, then the output does not
show any updates, but shows only entries that relate to the start of
new connections. To shows updates, use the semi parameter.
n semi - Step-by-step unification of log entries. For each log entry,
the output shows an entry that unifies this entry with all previously
encountered entries with the same ID.
n raw - No log unification. The output shows all log entries.

-n Does not perform DNS resolution of the IP addresses in the log file (this
is the default behavior).
This significantly speeds up the log processing.

-o Shows detailed log chains - shows all the log segments in the log entry.

-p Does not perform resolution of the port numbers in the log file (this is
the default behavior).
This significantly speeds up the log processing.

Security Management R80.40 Administration Guide      |      558


fw log

Parameter Description

-q Shows the names of log header fields.

-S Shows the Sequence Number.

-s "<Start Shows only entries that were logged after the specified time.
Timestamp>"
Notes:

n The <Start Timestamp> may be a date, a time, or both.


n If the date is omitted, then the command assumed the current
date.
n Enclose the <Start Timestamp> in single or double quotes (-s
'...', or -s "...").
n You cannot use the "-s" parameter together with the "-b"
parameter.
n See the date and time format below.

-t This parameter:

1. Does not show the saved entries that match the specified
conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.

Note - Applies only to the active log file $FWDIR/log/fw.log or


$FWDIR/log/fw.adtlog

-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File>
$FWDIR/conf/log_unification_scheme.C

-w Shows the flags of each log entry (different bits used to specify the
"nature" of the log - for example, control, audit, accounting,
complementary, and so on).

-x <Start Shows only entries from the specified log entry number and below,
Entry Number> counting from the beginning of the log file.

-y <End Entry Shows only entries until the specified log entry number, counting from
Number> the beginning of the log file.

-z In case of an error (for example, wrong field value), continues to show log
entries.
The default behavior is to stop.

Security Management R80.40 Administration Guide      |      559


fw log

Parameter Description

-# Show confidential logs in clear text.

<Log File> Specifies the log file to read.


If you do not specify the log file explicitly, the command opens the
$FWDIR/log/fw.log log file.
You can specify a switched log file.

Date and Time format

Part of timestamp Format Example

Date only MMM DD, YYYY June 11, 2018

Time only HH:MM:SS 14:20:00


Note - In this case, the command assumes the
current date.

Date and Time MMM DD, YYYY June 11, 2018


HH:MM:SS 14:20:00

Output

Each output line consists of a single log entry, whose fields appear in this format:

Note - The fields that show depends on the connection type.

HeaderDateHour ContentVersion HighLevelLogKey Uuid SequenceNum Flags


Action Origin IfDir InterfaceName LogId ...

This table describes some of the fields.

Field Header Description Example

HeaderDateHour Date and Time 12Jun2018 12:56:42

ContentVersion Version 5

HighLevelLogKey High Level Log Key <max_null>, or empty

Uuid Log UUID (0x5b1f99cb,0x0,0x3403a8c0,0xc0000000)

SequenceNum Log Sequence 1


Number

Security Management R80.40 Administration Guide      |      560


fw log

Field Header Description Example

Flags Internal flags that 428292


specify the
"nature" of the log
- for example,
control, audit,
accounting,
complementary,
and so on

Action Action performed n accept


on this connection n dropreject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl

Origin Object name of MyGW


the Security
Gateway that
generated this log

IfDir Traffic direction n <


through interface: n >

n <-
Outbound
(sent by a
Security
Gateway)
n > - Inbound
(received by
a Security
Gateway)

Security Management R80.40 Administration Guide      |      561


fw log

Field Header Description Example

InterfaceName Name of the n eth0


Security Gateway n daemon
interface, on n N/A
which this traffic
was logged
If a Security
Gateway
performed some
internal action (for
example, log
switch), then the
log entry shows
daemon

LogId Log ID 0

Alert Alert Type n alert


n mail
n snmp_trap
n spoof
n user_alert
n user_auth

OriginSicName SIC name of the CN=MyGW,O=MyDomain_


Security Gateway Server.checkpoint.com.s6t98x
that generated
this log

inzone Inbound Security Local


Zone

outzone Outbound Security External


Zone

service_id Name of the ftp


service used to
inspect this
connection

src Object name or IP MyHost


address of the
connection's
source computer

Security Management R80.40 Administration Guide      |      562


fw log

Field Header Description Example

dst Object name or IP MyFTPServer


address of the
connection's
destination
computer

proto Name of the tcp


connection's
protocol

sport_svc Source port of the 64933


connection

ProductName Name of the Check n VPN-1 & FireWall-1


Point product that n Application Control
generated this log n FloodGate-1

ProductFamily Name of the Check Network


Point product
family that
generated this log

Examples

Example 1 - Show all log entries with both the date and the time for each log
entry
fw log -l

Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_
name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;

12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;

... ... ...

[Expert@MyGW:0]#

Security Management R80.40 Administration Guide      |      563


fw log

Example 3 - Show all log entries between the specified timestamps


[Expert@MyGW:0]# fw log -l -b "June 12, 2018 12:33:00" 'June 12, 2018 12:34:00'
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_
name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;

12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;

12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity:
2; status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#

Example 4 - Show all log entries with action "drop"


[Expert@MyGW:0]# fw log -l -c drop
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#

Example 5 - Show all log entries with action "drop", show all field headers, and
show log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292;
Action: drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName:
CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst:
MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-
9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_
match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END;
ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#

Example 6 - Show only log entries from 0 to 10 (counting from the beginning of
the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#

Security Management R80.40 Administration Guide      |      564


fw logswitch

fw logswitch

Description

Switches the current active log file:

1. Closes the current active log file

2. Renames the current active log file

3. Creates a new active log file with the default name

Notes:

n By default, this command switches the active Security log file -


$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog

Syntax

fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.

-audit Specifies to switch the active Audit log file ($FWDIR/log/fw.adtlog).


You can use this parameter only on a Management Server.

-h Specifies the remote computer, on which to switch the log.


<Target>
Notes:

n The local and the remote computers must have established SIC trust.
n The remote computer can be a Security Gateway, a Log Server, or a
Security Management Server in High Availability deployment.
n You can specify the remote managed computer by its main IP address or
Object Name as configured in SmartConsole.

Security Management R80.40 Administration Guide      |      565


fw logswitch

Parameter Description

<Name of Specifies the name of the switched log file.


Switched
Notes:
Log>
n If you do not specify this parameter, then a default name is:
<YYYY-MM-DD_HHMMSS>.log
<YYYY-MM-DD_HHMMSS>.adtlog
For example, 2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
switch log file is:
<Specified_Log_Name>.log
<Specified_Log_Name>.adtlog
n The log switch operation fails if the specified name for the switched log
matches the name of an existing log file.
n The maximal length of the specified name of the switched log file is 230
characters.

+ Specifies to copy the active log from the remote computer to the local
computer.
Notes:

n If you specify the name of the switched log file, you must write it
immediately after this + (plus) parameter.
n The command copies the active log from the remote computer and saves
it in the $FWDIR/log/ directory on the local computer.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command copies the log file from the remote computer, it
compresses the file.

Security Management R80.40 Administration Guide      |      566


fw logswitch

Parameter Description

- Specifies to transfer the active log from the remote computer to the local
computer.
Notes:

n The command saves the copied active log file in the $FWDIR/log/
directory on the local computer and then deletes the switched log file on
the remote computer.
n If you specify the name of the switched log file, you must write it
immediately after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 551 command.

Compression

When this command transfers the log files from the remote computer, it compresses the file with
the gzip command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77
method. The compression ratio varies with the content of the log file and is difficult to predict.
Binary data are not compressed. Text data, such as user names and URLs, are compressed.

Example - Switching the active Security log on a Security Management Server or


Security Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#

Example - Switching the active Audit log on a Security Management Server


[Expert@MGMT:0]# fw logswitch -audit
Log file has been switched to: 2018-06-13_185711.adtlog
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      567


fw logswitch

Example - Switching the active Security log on a managed Security Gateway and
copying the switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#

[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#

Security Management R80.40 Administration Guide      |      568


fw lslogs

fw lslogs

Description

Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) residing on the local computer or a remote computer.

Syntax

fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ...
[-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime | etime}]
[<Target>]

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.

-f <Name Specifies the name of the log file to show. Need to specify name only.
of Log
Notes:
File>
n If the log file name is not specified explicitly, the command shows all
Security log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-0?-*).
If you enter a wildcard, you must enclose it in double quotes or single
quotes.
n You can specify multiple log files in one command. You must use the "-
f" parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2> ... -f
<Name of Log File N>

-e Shows an extended file list. It includes the following information for each log
file:

n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name

-r Reverses the sort order (descending order).

Security Management R80.40 Administration Guide      |      569


fw lslogs

Parameter Description

-s {name | Specifies the sort order of the log files using one of the following sort options:
size |
stime | n name - The file name
etime} n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed

<Target> Specifies the remote Check Point computer, with which this local Check Point
computer has established SIC trust.

n If you run this command on a Security Management Server or Domain


Management Server, then <Target> is the applicable object's name or
main IP address of the Check Point Computer as configured in
SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured
in SmartConsole.

Example 1 - Default output

[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#

Example 2 - Showing all log files

[Expert@HostName:0]# fw lslogs -f "*"


Size Log file name
9KB fw.adtlog
9KB fw.log
9KB 2019-05-29_000000.adtlog
9KB 2019-05-29_000000.log
9KB 2019-05-20_000000.adtlog
9KB 2019-05-20_000000.log
[Expert@HostName:0]#

Example 3 - Showing only log files specified by the patterns

[Expert@HostName:0]# fw lslogs -f "2019-06-14*" -f '2019-06-15*'


Size Log file name
9KB 2019-06-14_000000.adtlog
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.adtlog
11KB 2019-06-15_000000.log
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      570


fw lslogs

Example 4 - Showing only log files specified by the patterns and their extended information

[Expert@HostName:0]# fw lslogs -f "2019-06-14*" -f '2019-06-15*'


Size Log file name
9KB 2019-06-14_000000.adtlog
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.adtlog
11KB 2019-06-15_000000.log
[Expert@HostName:0]#

Example 5 - Showing only log files specified by the patterns, sorting by name in reverse order

[Expert@HostName:0]# fw lslogs -f "2019-06-14*" -f '2019-06-15*' -e -s name -r


Size Creation Time Closing Time Log file name
11KB 14Jun2018 0:00:00 15Jun2018 0:00:00 2019-06-15_000000.log
11KB 14Jun2018 0:00:00 15Jun2018 0:00:00 2019-06-15_000000.adtlog
9KB 13Jun2018 18:23:59 14Jun2018 0:00:00 2019-06-14_000000.log
9KB 13Jun2018 0:00:00 14Jun2018 0:00:00 2019-06-14_000000.adtlog
[Expert@HostName:0]#

Example 6 - Showing only log files specified by the patterns, from a managed Security Gateway
with main IP address 192.168.3.53

[Expert@MGMT:0]# fw lslogs -f "2019-06-14*" -f '2019-06-15*' 192.168.3.53


Size Log file name
11KB 2019-06-15_000000.adtlog
11KB 2019-06-15_000000.log
9KB 2019-06-14_000000.log
9KB 2019-06-14_000000.adtlog
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      571


fw mergefiles

fw mergefiles

Description

Merges several Security log files ($FWDIR/log/*.log) into a single log file.

Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.

Important:

n Do not merge the active Security file $FWDIR/log/fw.log with other


Security switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw
logswitch" on page 565 command) and only then merge it with other
Security switched log files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other
Audit switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw
logswitch" on page 565 command) and only then merge it with other Audit
switched log files.
n This command unifies logs entries with the same Unique-ID (UID). If you
rotate the current active log file before all the segments of a specific log
arrive, this command merges the records with the same Unique ID from
two different files, into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates
a list of merged files, where the size of each merged file size is not more
than 2GB.
The user receives this warning:
Warning: The size of the files you have chosen to
merge is greater than 2GB. The merge will produce
two or more files.
The names of merged files are:
l <Name of Merged Log File>.log

l <Name of Merged Log File>_1.log


l <Name of Merged Log File>_2.log
l ... ...
l <Name of Merged Log File>_N.log

Syntax

fw [-d] mergefiles {-h | -help}

fw [-d] mergefiles [-r] [-s] [-t <Time Conversion File>] <Name of Log
File 1> <Name of Log File 2> ... <Name of Log File N> <Name of Merged
Log File>

Security Management R80.40 Administration Guide      |      572


fw mergefiles

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then
redirect the output to a file, or use the script
command to save the entire CLI session.

{-h | -help} Shows the built-in usage.

-r Removes duplicate entries.

-s Sorts the merged file by the Time field in log records.

-t <Time Conversion Specifies a full path and name of a file that instructs this
File> command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
<IP Address of Log Server #1> <Signed Date
Time #1 in Seconds>
<IP Address of Log Server #2> <Signed Date
Time #2 in Seconds>
... ...

Notes

n You must specify the absolute path and the


file name.
n The name of the time conversion file cannot
exceed 230 characters.

<Name of Log File 1> ... Specifies the log files to merge.
<Name of Log File N>
Notes:

n You must specify the absolute path and the


name of the input log files.
n The name of the input log file cannot exceed
230 characters.

Security Management R80.40 Administration Guide      |      573


fw mergefiles

Parameter Description

<Name of Merged Log Specifies the output merged log file.


File>
Notes:

n The name of the merged log file cannot


exceed 230 characters.
n If a file with the specified name already
exists, the command stops and asks you to
remove the existing file, or to specify another
name.
n The size of the merged log file cannot
exceed 2 GB. In such scenario, the command
creates several merged log files, each not
exceeding the size limit.

Example - Merging Security log files

[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      574


fw repairlog

fw repairlog

Description

Check Point Security log file ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog)
are databases, with special pointer files.

If these log pointer files become corrupted (which causes the inability to read the log file), this
command can rebuild them.

Log File Type Log File Location Log Pointer Files

Security log $FWDIR/log/*.log *.logptr


*.logaccount_ptr
*.loginitial_ptr
*.logLuuidDB

Audit log $FWDIR/log/*.adtlog *.adtlogptr


*.adtlogaccount_ptr
*.adtloginitial_ptr
*.adtlogLuuidDB

Syntax

fw [-d] repairlog [-u] <Name of Log File>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter,
then redirect the output to a file, or use the
script command to save the entire CLI
session.

-u Specifies to rebuild the unification chains in the log file.

<Name of Log File> The name of the log file to repair.

Example - Repairing the Audit log file

fw repairlog -u 2019-06-17_000000.adtlog

Security Management R80.40 Administration Guide      |      575


fw sam

fw sam

Description

Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block
connections to and from IP addresses without the need to change or reinstall the Security Policy.
For more information, see sk112061.

You can create the Suspicious Activity Rules in two ways:

n In SmartConsole from Monitoring Results

n In CLI with the fw sam command

Notes:

n VSX Gateways and VSX Cluster Members do not support Suspicious


Activity Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" on page 585 and "sam_alert" on page 678
commands.
See the fw sam_policy and sam_alert commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - Set an expiration that gives you time to
investigate, but does not affect performance. Keep only the SAM
rules that you need. If you confirm that an activity is risky, edit
the Security Policy, educate users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are
stored in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches
100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>

<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table
sam_requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security
Gateway in the kernel table sam_blocked_ips.

Security Management R80.40 Administration Guide      |      576


fw sam

Note - To configure SAM Server settings for a Security Gateway or Cluster:

1. Connect with SmartConsole to the applicable Security Management


Server or Domain Management Server.
2. From the left navigation panel, click Gateways & Servers.
3. Open the Security Gateway or Cluster object.
4. From the left tree, click Other > SAM .
5. Configure the settings.
6. Click OK .
7. Install the Access Control Policy on this Security Gateway or Cluster
object.

Syntax

n To add or cancel a SAM rule according to criteria:

fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e
<key=val>]+ [-r] -{n|i|I|j|J} <Criteria>

n To delete all SAM rules:

fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D

n To monitor all SAM rules:

fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all

n To monitor SAM rules according to criteria:

fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.

Security Management R80.40 Administration Guide      |      577


fw sam

Parameter Description

-v Enables verbose mode.


In this mode, the command writes one message to stderr for each Security
Gateway, on which the command is enforced. These messages show whether
the command was successful or not.

-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of the
Server> Security Gateway that enforces the command.
The default is localhost.

-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected that
Name of the SAM server has this SIC name, otherwise the connection fails.
SAM
Server> Notes:

n If you do not explicitly specify the SIC name, the connection


continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC
API Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command to
show the SIC name for the applicable Virtual System.

Security Management R80.40 Administration Guide      |      578


fw sam

Parameter Description

-f Specifies the Security Gateway, on which to enforce the action.


<Security <Security Gateway> can be one of these:
Gateway>
n All - Default. Specifies to enforce the action on all managed Security
Gateways, where SAM Server runs.
You can use this syntax only on Security Management Server or Domain
Management Server.
n localhost - Specifies to enforce the action on this local Check Point
computer (on which the fw sam command is executed).
You can use this syntax only on Security Gateway or StandAlone.
n Gateways - Specifies to enforce the action on all objects defined as
Security Gateways, on which SAM Server runs.
You can use this syntax only on Security Management Server or Domain
Management Server.
n Name of Security Gateway object - Specifies to enforce the action on this
specific Security Gateway object.
You can use this syntax only on Security Management Server or Domain
Management Server.
n Name of Group object - Specifies to enforce the action on all specific
Security Gateways in this Group object.

Notes:

n You can use this syntax only on Security Management Server or


Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.

-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:

n To "uninhibit" the inhibited connections, run the fw sam


command with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.

-C Cancels the fw sam command to inhibit connections with the specified


parameters.
Notes:

n These connections are no longer inhibited (no longer rejected


or dropped).
n The command parameters must match the parameters in the
original fw sam command, except for the -t <Timeout>
parameter.

Security Management R80.40 Administration Guide      |      579


fw sam

Parameter Description

-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout> The default is forever, or until you cancel the fw sam command.

-l <Log Specifies the type of the log for enforced action:


Type>
n nolog - Does not generate Log / Alert at all
n short_noalert - Generates a Log
n short_alert - Generates an Alert
n long_noalert - Generates a Log
n long_alert - Generates an Alert (this is the default)

-e Specifies rule information based on the keys and the provided values.
<key=val>+ Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):

n name - Security rule name


n comment - Security rule comment
n originator - Security rule originator's username

-r Specifies not to resolve IP addresses.

-n Specifies to generate a "Notify" long-format log entry.


Notes:

n This parameter generates an alert when connections that


match the specified services or IP addresses pass through the
Security Gateway.
n This action does not inhibit / close connections.

-i Inhibits (drops or rejects) new connections with the specified parameters.


Notes:

n Each inhibited connection is logged according to the log type.


n Matching connections are rejected.

-I Inhibits (drops or rejects) new connections with the specified parameters, and
closes all existing connections with the specified parameters.
Notes:

n Matching connections are rejected.


n Each inhibited connection is logged according to the log type.

Security Management R80.40 Administration Guide      |      580


fw sam

Parameter Description

-j Inhibits (drops or rejects) new connections with the specified parameters.


Notes:

n Matching connections are dropped.


n Each inhibited connection is logged according to the log type.

-J Inhibits new connections with the specified parameters, and closes all existing
connections with the specified parameters.
Notes:

n Matching connections are dropped.


n Each inhibited connection is logged according to the log type.

-b Bypasses new connections with the specified parameters.

-q Quarantines new connections with the specified parameters.

-M Monitors the active SAM requests with the specified actions and criteria.

all Gets all active SAM requests. This is used for monitoring purposes only.

<Criteria> Criteria are used to match connections.


The criteria and are composed of various combinations of the following
parameters:

n Source IP Address
n Source Netmask
n Destination IP Address
n Destination Netmask
n Port (see IANA Service Name and Port Number Registry)
n Protocol Number (see IANA Protocol Numbers)

Security Management R80.40 Administration Guide      |      581


fw sam

Parameter Description

Possible combinations are (see the explanations below this table):

n src <IP>
n dst <IP>
n any <IP>
n subsrc <IP> <Netmask>
n subdst <IP> <Netmask>
n subany <IP> <Netmask>
n srv <Src IP> <Dest IP> <Port> <Protocol>
n subsrv <Src IP> <Src Netmask> <Dest IP> <Dest Netmask>
<Port> <Protocol>
n subsrvs <Src IP> <Src Netmask> <Dest IP> <Port>
<Protocol>
n subsrvd <Src IP> <Dest IP> <Dest Netmask> <Port>
<Protocol>
n dstsrv <Dest IP> <Port> <Protocol>
n subdstsrv <Dest IP> <Dest Netmask> <Port> <Protocol>
n srcpr <IP> <Protocol>
n dstpr <IP> <Protocol>
n subsrcpr <IP> <Netmask> <Protocol>
n subdstpr <IP> <Netmask> <Protocol>
n generic <key=val>

Explanation for the <Criteria> syntax

Parameter Description

src <IP> Matches the Source IP address of the connection.

dst <IP> Matches the Destination IP address of the


connection.

any <IP> Matches either the Source IP address or the


Destination IP address of the connection.

subsrc <IP> <Netmask> Matches the Source IP address of the connections


according to the netmask.

subdst <IP> <Netmask> Matches the Destination IP address of the


connections according to the netmask.

subany <IP> <Netmask> Matches either the Source IP address or Destination


IP address of connections according to the netmask.

Security Management R80.40 Administration Guide      |      582


fw sam

Parameter Description

srv <Src IP> <Dest IP> <Port> Matches the specific Source IP address, Destination
<Protocol> IP address, Service (port number) and Protocol.

subsrv <Src IP> <Netmask> Matches the specific Source IP address, Destination
<Dest IP> <Netmask> <Port> IP address, Service (port number) and Protocol.
<Protocol>
Source and Destination IP addresses are assigned
according to the netmask.

subsrvs <Src IP> <Src Matches the specific Source IP address, source
Netmask> <Dest IP> <Port> netmask, destination netmask, Service (port number)
<Protocol>
and Protocol.

subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination IP,
<Dest Netmask> <Port> destination netmask, Service (port number) and
<Protocol>
Protocol.

dstsrv <Dest IP> <Service> Matches specific Destination IP address, Service (port
<Protocol> number) and Protocol.

subdstsrv <Dest IP> <Netmask> Matches specific Destination IP address, Service (port
<Port> <Protocol> number) and Protocol.
Destination IP address is assigned according to the
netmask.

srcpr <IP> <Protocol> Matches the Source IP address and protocol.

dstpr <IP> <Protocol> Matches the Destination IP address and protocol.

subsrcpr <IP> <Netmask> Matches the Source IP address and protocol of


<Protocol> connections.
Source IP address is assigned according to the
netmask.

subdstpr <IP> <Netmask> Matches the Destination IP address and protocol of


<Protocol> connections.
Destination IP address is assigned according to the
netmask.

Security Management R80.40 Administration Guide      |      583


fw sam

Parameter Description

generic <key=val>+ Matches the GTP connections based on the specified


keys and provided values.
Multiple keys are separated by the plus sign (+).
Available keys are:

n service=gtp
n imsi
n msisdn
n apn
n tunl_dst
n tunl_dport
n tunl_proto

Security Management R80.40 Administration Guide      |      584


fw sam_policy

fw sam_policy

Description

Manages the Suspicious Activity Policy editor that lets you work with these types of rules:

n Suspicious Activity Monitoring (SAM) rules.

See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.

n Rate Limiting rules.

See sk112454: How to configure Rate Limiting rules for DoS Mitigation.

Also, see these commands:

n "fw sam" on page 576

n "sam_alert" on page 678

Notes:

n You can run these commands interchangeably: 'fw sam_policy' and


'fw samp'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_
policy.mng.

Important:

n Configuration you make with these commands, survives reboot.


n VSX Gateways and VSX Cluster Members do not support Suspicious
Activity Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the
Cluster Members.

Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does
not affect performance. Keep only the SAM Policy rules that you need. If you
confirm that an activity is risky, edit the Security Policy, educate users, or
otherwise handle the risk.

Security Management R80.40 Administration Guide      |      585


fw sam_policy

Syntax for IPv4

fw [-d] sam_policy
add <options>
batch
del <options>
get <options>

fw [-d] samp
add <options>
batch
del <options>
get <options>

Syntax for IPv6

fw6 [-d] sam_policy


add <options>
batch
del <options>
get <options>

fw6 [-d] samp


add <options>
batch
del <options>
get <options>

Security Management R80.40 Administration Guide      |      586


fw sam_policy

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter,
then redirect the output to a file, or use the
script command to save the entire CLI
session.

add <options> Adds one Rate Limiting rule one at a time.


See "fw sam_policy add" on page 588.

batch Adds or deletes many Rate Limiting rules at a time.


See "fw sam_policy batch" on page 601.

del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 603.

get <options> Shows all the configured Rate Limiting rules.


See "fw sam_policy get" on page 606.

Security Management R80.40 Administration Guide      |      587


fw sam_policy add

fw sam_policy add

Description

The 'fw sam_policy add' and 'fw6 sam_policy add' commands let you:

n Add one Suspicious Activity Monitoring (SAM) rule at a time.

n Add one Rate Limiting rule at a time.

Notes:

n You can run these commands interchangeably: 'fw sam_policy add'


and 'fw samp add'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_
policy.mng.

Important:

n Configuration you make with these commands, survives reboot.


n VSX Gateways and VSX Cluster Members do not support Suspicious
Activity Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the
Cluster Members.

Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does
not affect performance. Keep only the SAM Policy rules that you need. If you
confirm that an activity is risky, edit the Security Policy, educate users, or
otherwise handle the risk.

Syntax to configure a Suspicious Activity Monitoring (SAM) rule for IPv4

fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>

Security Management R80.40 Administration Guide      |      588


fw sam_policy add

Syntax to configure a Suspicious Activity Monitoring (SAM) rule for IPv6

fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>

Syntax to configure a Rate Limiting rule for IPv4

fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments>

Syntax to configure a Rate Limiting rule for IPv6

fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.

-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.

-a {d | n Mandatory.
| b} Specifies the rule action if the traffic matches the rule conditions:

n d - Drop the connection.


n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against the
policy rules.
Note - Rules with action set to Bypass cannot have a log or limit
specification. Bypassed packets and connections do not count towards
overall number of packets and connection for limit enforcement of type
ratio.

Security Management R80.40 Administration Guide      |      589


fw sam_policy add

Parameter Description

-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that matches:

n -r - Generate a regular log


n -a - Generate an alert log

-t Optional.
<Timeout> Specifies the time period (in seconds), during which the rule will be enforced.
Default timeout is indefinite.

-f Optional.
<Target> Specifies the target Security Gateways, on which to enforce the Rate Limiting
rule.
<Target> can be one of these:

n all - This is the default option. Specifies that the rule should be
enforced on all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the rule
should be enforced only on this Security Gateway or Cluster object (the
object name must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be enforced on
all Security Gateways that are members of this Group object (the object
name must be as defined in the SmartConsole).

-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:

n You must enclose this string in double quotes.


n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write
a backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\ \\"

-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:

n You must enclose this string in double quotes.


n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write
a backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"

Security Management R80.40 Administration Guide      |      590


fw sam_policy add

Parameter Description

-o "<Rule Optional.
Originator Specifies the name of the originator for this rule.
>"
Notes:

n You must enclose this string in double quotes.


n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write
a backslash (\) character. Example:
"Created\ by\ John\ Doe"

-z Optional.
"<Zone>" Specifies the name of the Security Zone for this rule.
Notes:

n You must enclose this string in double quotes.


n The length of this string is limited to 128 characters.

ip <IP Mandatory (use this ip parameter, or the quota parameter).


Filter
Configures the Suspicious Activity Monitoring (SAM) rule.
Arguments>
Specifies the IP Filter Arguments for the SAM rule (you must use at least one of
these options):
[-C] [-s <Source IP>] [-m <Source Mask>] [-d
<Destination IP>] [-M <Destination Mask>] [-p <Port>] [-
r <Protocol>]
See the explanations below.

Security Management R80.40 Administration Guide      |      591


fw sam_policy add

Parameter Description

quota Mandatory (use this quota parameter, or the ip parameter).


<Quota
Configures the Rate Limiting rule.
Filter
Specifies the Quota Filter Arguments for the Rate Limiting rule (see the
Arguments>
explanations below):

n [flush true]
n [source-negated {true | false}] source <Source>
n [destination-negated {true | false}] destination
<Destination>
n [service-negated {true | false}] service <Protocol and
Port numbers>
n [<Limit1 Name> <Limit1 Value>] [<Limit2 Name> <Limit2
Value>] ...[<LimitN Name> <LimitN Value>]
n [track <Track>]

Important:

n The Quota rules are not applied immediately to the Security


Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from
the SAM policy database immediately, add "flush true" in
the fw samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general),
when a rule's limit is violated, the Security Gateway also drops
all packets that match the rule.
The Security Gateway computes new connection rates on a per-
second basis.
At the start of the 1-second timer, the Security Gateway allows
all packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too
many new connections, then the Security Gateway blocks all
remaining packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are reset,
and the process starts over - the Security Gateway allows
packets to pass again up to the point, where the rule’s limit is
violated.

Security Management R80.40 Administration Guide      |      592


fw sam_policy add

Explanation for the IP Filte r A rgu me n ts syntax for Suspicious Activity Monitoring (SAM) rules

Argument Description

-C Specifies that open connections should be closed.

-s <Source IP> Specifies the Source IP address.

-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format -
x.y.z.w).

-d <Destination Specifies the Destination IP address.


IP>

-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).

-p <Port> Specifies the port number (see IANA Service Name and Port Number
Registry).

-r <Protocol> Specifies the protocol number (see IANA Protocol Numbers).

Security Management R80.40 Administration Guide      |      593


fw sam_policy add

Explanation for the Qu ota Filte r A rgu me n ts syntax for Rate Limiting rules

Argument Description

flush true Specifies to compile and load the quota rule to the
SecureXL immediately.

[source-negated {true | Specifies the source type and its value:


false}] source <Source>
n any
The rule is applied to packets sent from all
sources.
n range:<IP Address>
or
range:<IP Address Start>-<IP
Address End>
The rule is applied to packets sent from:
l Specified IPv4 addresses (x.y.z.w)

l Specified IPv6 addresses

(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32

l IPv6 address with Prefix from 0 to 128

n cc:<Country Code>
The rule matches the country code to the
source IP addresses assigned to this country,
based on the Geo IP database.
The two-letter codes are defined in ISO 3166-1
alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that
are assigned to this organization, based on the
Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.

Notes:

n Default is: source-negated false


n The source-negated true processes all
source types, except the specified type.

Security Management R80.40 Administration Guide      |      594


fw sam_policy add

Argument Description

[destination-negated {true | Specifies the destination type and its value:


false}] destination
<Destination> n any
The rule is applied to packets sent to all
destinations.
n range:<IP Address>
or
range:<IP Address Start>-<IP
Address End>
The rule is applied to packets sent to:
l Specified IPv4 addresses (x.y.z.w)

l Specified IPv6 addresses

(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32

l IPv6 address with Prefix from 0 to 128

n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO 3166-1
alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses
that are assigned to this organization, based
on the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.

Notes:

n Default is: destination-negated false


n The destination-negated true will
process all destination types except the
specified type

Security Management R80.40 Administration Guide      |      595


fw sam_policy add

Argument Description

[service-negated {true | Specifies the Protocol number (see IANA Protocol


false}] service <Protocol and Numbers) and Port number (see IANA Service Name
Port numbers>
and Port Number Registry):
n <Protocol>
IP protocol number in the range 1-255
n <Protocol Start>-<Protocol End>
Range of IP protocol numbers
n <Protocol>/<Port>
IP protocol number in the range 1-255 and
TCP/UDP port number in the range 1-65535
n <Protocol>/<Port Start>-<Port End>
IP protocol number and range of TCP/UDP port
numbers from 1 to 65535

Notes:

n Default is: service-negated false


n The service-negated true will process all
traffic except the traffic with the specified
protocols and ports

Security Management R80.40 Administration Guide      |      596


fw sam_policy add

Argument Description

[<Limit 1 Name> <Limit 1 Specifies quota limits and their values.


Value>] [<Limit 2 Name>
Note - Separate multiple quota limits with spaces.
<Limit 2 Value>] ... [<Limit
N Name> <Limit N Value>] n concurrent-conns <Value>
Specifies the maximal number of concurrent
active connections that match this rule.
n concurrent-conns-ratio <Value>
Specifies the maximal ratio of the concurrent-
conns value to the total number of active
connections through the Security Gateway,
expressed in parts per 65536 (formula: N /
65536).
n pkt-rate <Value>
Specifies the maximum number of packets per
second that match this rule.
n pkt-rate-ratio <Value>
Specifies the maximal ratio of the pkt-rate
value to the rate of all connections through the
Security Gateway, expressed in parts per 65536
(formula: N / 65536).
n byte-rate <Value>
Specifies the maximal total number of bytes
per second in packets that match this rule.
n byte-rate-ratio <Value>
Specifies the maximal ratio of the byte-rate
value to the bytes per second rate of all
connections through the Security Gateway,
expressed in parts per 65536 (formula: N /
65536).
n new-conn-rate <Value>
Specifies the maximal number of connections
per second that match the rule.
n new-conn-rate-ratio <Value>
Specifies the maximal ratio of the new-conn-
rate value to the rate of all connections per
second through the Security Gateway,
expressed in parts per 65536 (formula: N /
65536).

Security Management R80.40 Administration Guide      |      597


fw sam_policy add

Argument Description

[track <Track>] Specifies the tracking option:

n source
Counts connections, packets, and bytes for
specific source IP address, and not
cumulatively for this rule.
n source-service
Counts connections, packets, and bytes for
specific source IP address, and for specific IP
protocol and destination port, and not
cumulatively for this rule.

Examples

Example 1 - Rate Limiting rule with a range


fw sam_policy add -a d -l r -t 3600 quota service any source range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true

Explanations:

n This rule drops packets for all connections (-a d) that exceed the quota set by this rule,
including packets for existing connections.

n This rule logs packets (-l r) that exceed the quota set by this rule.

n This rule will expire in 3600 seconds (-t 3600).

n This rule limits the rate of creation of new connections to 5 connections per second
(new-conn-rate 5) for any traffic (service any) from the source IP addresses in the
range 172.16.7.11 - 172.16.7.13 (source range:172.16.7.11-172.16.7.13).

Note - The limit of the total number of log entries per second is configured with the
fwaccel dos config set -n <rate> command.

n This rule will be compiled and loaded on the SecureXL, together with other rules in the
Suspicious Activity Monitoring (SAM) policy database immediately, because this rule
includes the "flush true" parameter.

Security Management R80.40 Administration Guide      |      598


fw sam_policy add

Example 2 - Rate Limiting rule with a service specification


fw sam_policy add -a n -l r quota service 1,50-51,6/443,17/53 service-negated true source cc:QQ byte-rate 0

Explanations:

n This rule logs and lets through all packets (-a n) that exceed the quota set by this rule.

n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.

n This rule applies to all packets except (service-negated true) the packets with IP
protocol number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-
51,6/443,17/53).

n This rule applies to all packets from source IP addresses that are assigned to the country
with specified country code (cc:QQ).

n This rule does not let any traffic through (byte-rate 0) except the packets with IP
protocol number 1, 50-51, 6 port 443 and 17 port 53.

n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.

Example 3 - Rate Limiting rule with ASN


fw sam_policy -a d quota source asn:AS64500,cidr:[::FFFF:C0A8:1100]/120 service any pkt-rate 0

Explanations:

n This rule drops (-a d) all packets that match this rule.

n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.

n This rule applies to packets from the Autonomous System number 64500
(asn:AS64500).

n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120 (cidr:
[::FFFF:C0A8:1100]/120).

n This rule applies to all traffic (service any).

n This rule does not let any traffic through (pkt-rate 0).

n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.

Example 4 - Rate Limiting rule with whitelist


fw sam_policy add -a b quota source range:172.16.8.17-172.16.9.121 service 6/80

Explanations:

Security Management R80.40 Administration Guide      |      599


fw sam_policy add

n This rule bypasses (-a b) all packets that match this rule.

Note - The Access Control Policy and other types of security policy rules still apply.

n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.

n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).

n This rule applies to packets sent to TCP port 80 (service 6/80).

n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.

Example 5 - Rate Limiting rule with track ing


fw sam_policy add -a d quota service any source-negated true source cc:QQ concurrent-conns-ratio 655 track source

Explanations:

n This rule drops (-a d) all packets that match this rule.

n This rule does not log any packets (the -l r parameter is not specified).

n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.

n This rule applies to all traffic (service any).

n This rule applies to all sources except (source-negated true) the source IP addresses
that are assigned to the country with specified country code (cc:QQ).

n This rule limits the maximal number of concurrent active connections to 655/65536=~1%
(concurrent-conns-ratio 655) for any traffic (service any) except (service-
negated true) the connections from the source IP addresses that are assigned to the
country with specified country code (cc:QQ).

n This rule counts connections, packets, and bytes for traffic only from sources that match
this rule, and not cumulatively for this rule.

n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.

Security Management R80.40 Administration Guide      |      600


fw sam_policy batch

fw sam_policy batch

Description

The 'fw sam_policy batch' and 'fw6 sam_policy batch' commands let you:

n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.

n Add and delete many Rate Limiting rules at a time.

Notes:

n You can run these commands interchangeably: 'fw sam_policy batch'


and 'fw samp batch'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_
policy.mng.

Important:

n Configuration you make with these commands, survives reboot.


n VSX Gateways and VSX Cluster Members do not support Suspicious
Activity Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all of the
Cluster Members.

Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does
not affect performance. Keep only the SAM Policy rules that you need. If you
confirm that an activity is risky, edit the Security Policy, educate users, or
otherwise handle the risk.

Procedure

1. Start the batch mode

n For IPv4, run:

fw sam_policy batch << EOF

Security Management R80.40 Administration Guide      |      601


fw sam_policy batch

n For IPv6, run:

fw6 sam_policy batch << EOF

2. Enter the applicable commands

n Enter one "add" or "del" command on each line, on as many lines as necessary.

Start each line with only "add" or "del" parameter (not with "fw samp").

n Use the same set of parameters and values as described in these commands:

l "fw sam_policy add" on page 588

l "fw sam_policy del" on page 603

n Terminate each line with a Return (ASCII 10 - Line Feed) character (press Enter).

3. End the batch mode

Type EOF and press Enter.

Example of a Rate Limiting rule for IPv4

[Expert@HostName]# fw samp batch <<EOF

add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source
range:172.16.7.13-172.16.7.13 new-conn-rate 5

del <501f6ef0,00000000,cb38a8c0,0a0afffe>

add -a b quota source range:172.16.8.17-172.16.9.121 service 6/80

EOF
[Expert@HostName]#

Security Management R80.40 Administration Guide      |      602


fw sam_policy del

fw sam_policy del

Description

The 'fw sam_policy del' and 'fw6 sam_policy del' commands let you:

n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.

n Delete one configured Rate Limiting rule at a time.

Notes:

n You can run these commands interchangeably: 'fw sam_policy del'


and 'fw samp del'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_
policy.mng.

Important:

n Configuration you make with these commands, survives reboot.


n VSX Gateways and VSX Cluster Members do not support Suspicious
Activity Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the
Cluster Members.

Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does
not affect performance. Keep only the SAM Policy rules that you need. If you
confirm that an activity is risky, edit the Security Policy, educate users, or
otherwise handle the risk.

Syntax for IPv4

fw [-d] sam_policy del '<Rule UID>'

Syntax for IPv6

fw6 [-d] sam_policy del '<Rule UID>'

Security Management R80.40 Administration Guide      |      603


fw sam_policy del

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this
parameter, then redirect the output to
a file, or use the script command to
save the entire CLI session.

'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:

n The quote marks and angle


brackets ('<...>') are
mandatory.
n To see the Rule UID, run the "fw
sam_policy del" on the previous
page command.

Procedure

1. List all the existing rules in the Suspicious Activity Monitoring policy
database

List all the existing rules in the Suspicious Activity Monitoring policy database.

n For IPv4, run:

fw sam_policy get

n For IPv6, run:

fw6 sam_policy get

The rules show in this format:

operation=add uid=<Value1,Value2,Value3,Value4> target=...


timeout=... action=... log= ... name= ... comment=...
originator= ... src_ip_addr=... req_tpe=...

Example for IPv4:

Security Management R80.40 Administration Guide      |      604


fw sam_policy del

operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\
Doe src_ip_addr=1.1.1.1 req_tpe=ip

2. Delete a rule from the list by its UID

n For IPv4, run:

fw [-d] sam_policy del '<Rule UID>'

n For IPv6, run:

fw6 [-d] sam_policy del '<Rule UID>'

Example for IPv4:

fw samp del '<5ac3965f,00000000,3403a8c0,0000264a>'

3. Add the flush-only rule

n For IPv4, run:

fw samp add -t 2 quota flush true

n For IPv6, run:

fw6 samp add -t 2 quota flush true

Explanation:

The fw samp del and fw6 samp del commands only remove a rule from the
persistent database. The Security Gateway continues to enforce the deleted rule until the
next time you compiled and load a policy. To force the rule deletion immediately, you
must enter a flush-only add rule right after the fw samp del and fw6 samp del
command. This flush-only add rule immediately deletes the rule you specified in the
previous step, and times out in 2 seconds.

Best Practice - Specify a short timeout period for the flush-only rules.
This prevents accumulation of rules that are obsolete in the database.

Security Management R80.40 Administration Guide      |      605


fw sam_policy get

fw sam_policy get

Description

The 'fw sam_policy get' and 'fw6 sam_policy get' commands let you:

n Show all the configured Suspicious Activity Monitoring (SAM) rules.

n Show all the configured Rate Limiting rules.

Notes:

n You can run these commands interchangeably: 'fw sam_policy get'


and 'fw samp get'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_
policy.mng.

Important:

n Configuration you make with these commands, survives reboot.


n VSX Gateways and VSX Cluster Members do not support Suspicious
Activity Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the
Cluster Members.

Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does
not affect performance. Keep only the SAM Policy rules that you need. If you
confirm that an activity is risky, edit the Security Policy, educate users, or
otherwise handle the risk.

Syntax for IPv4

fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+
{-v '<Value>'}] [-n]]

Syntax for IPv6

fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type>
[+{-v '<Value>'}] [-n]]

Security Management R80.40 Administration Guide      |      606


fw sam_policy get

Parameters

Note - All these parameters are optional.

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.

-l Controls how to print the rules:

n In the default format (without "-l"), the output shows each rule on a
separate line.
n In the list format (with "-l"), the output shows each parameter of a
rule on a separate line.
n See "fw sam_policy add" on page 588.

-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.

-k '<Key>' Prints the rules with the specified predicate key.


The quote marks are mandatory.

-t <Type> Prints the rules with the specified predicate type.


For Rate Limiting rules, you must always use "-t in".

+{-v Prints the rules with the specified predicate values.


'<Value>'} The quote marks are mandatory.

-n Negates the condition specified by these predicate parameters:

n -k
n -t
n +-v

Examples

Example 1 - Output in the default format


[Expert@HostName:0]# fw samp get

operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a> target=all timeout=300 action=notify log=log


name=Test\ Rule comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\ Doe src_ip_addr=1.1.1.1
req_tpe=ip

Security Management R80.40 Administration Guide      |      607


fw sam_policy get

Example 2 - Output in the list format


[Expert@HostName:0]# fw samp get -l

uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip

Example 3 - Printing a rule by its Rule UID


[Expert@HostName:0]# fw samp get -u '<5ac3965f,00000000,3403a8c0,0000264a>'
0
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a> target=all timeout=300 action=notify log=log
name=Test\ Rule comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\ Doe src_ip_addr=1.1.1.1
req_tpe=ip

Security Management R80.40 Administration Guide      |      608


fw sam_policy get

Example 4 - Printing rules that match the specified filters


[Expert@HostName:0]# fw samp get
no corresponding SAM policy requests
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp add -a d -l r -t 3600 quota service any source range:172.16.7.11-
172.16.7.13 new-conn-rate 5 flush true
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp add -a n -l r quota service 1,50-51,6/443,17/53 service-negated true source
cc:QQ byte-rate 0
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp add -a b quota source range:172.16.8.17-172.16.9.121 service 6/80
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp add -a d quota service any source-negated true source cc:QQ concurrent-
conns-ratio 655 track source
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get
operation=add uid=<5bab3acf,00000000,3503a8c0,00003ddc> target=all timeout=indefinite action=drop
service=any source-negated=true source=cc:QQ concurrent-conns-ratio=655 track=source req_type=quota
operation=add uid=<5bab3ac6,00000000,3503a8c0,00003dbf> target=all timeout=3586 action=drop log=log
service=any source=range:172.16.7.11-172.16.7.13 new-conn-rate=5 flush=true req_type=quota
operation=add uid=<5bab3acc,00000000,3503a8c0,00003dd7> target=all timeout=indefinite action=bypass
source=range:172.16.8.17-172.16.9.121 service=6/80 req_type=quota
operation=add uid=<5bab3ac9,00000000,3503a8c0,00003dd5> target=all timeout=indefinite action=notify
log=log service=1,50-51,6/443,17/53 service-negated=true source=cc:QQ byte-rate=0 req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k 'service' -t in -v '6/80'
operation=add uid=<5bab3acc,00000000,3503a8c0,00003dd7> target=all timeout=indefinite action=bypass
source=range:172.16.8.17-172.16.9.121 service=6/80 req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k 'service-negated' -t in -v 'true'
operation=add uid=<5bab3ac9,00000000,3503a8c0,00003dd5> target=all timeout=indefinite action=notify
log=log service=1,50-51,6/443,17/53 service-negated=true source=cc:QQ byte-rate=0 req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k 'source' -t in -v 'cc:QQ'
operation=add uid=<5bab3acf,00000000,3503a8c0,00003ddc> target=all timeout=indefinite action=drop
service=any source-negated=true source=cc:QQ concurrent-conns-ratio=655 track=source req_type=quota
operation=add uid=<5bab3ac9,00000000,3503a8c0,00003dd5> target=all timeout=indefinite action=notify
log=log service=1,50-51,6/443,17/53 service-negated=true source=cc:QQ byte-rate=0 req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k source -t in -v 'cc:QQ' -n
operation=add uid=<5bab3ac6,00000000,3503a8c0,00003dbf> target=all timeout=3291 action=drop log=log
service=any source=range:172.16.7.11-172.16.7.13 new-conn-rate=5 flush=true req_type=quota
operation=add uid=<5bab3acc,00000000,3503a8c0,00003dd7> target=all timeout=indefinite action=bypass
source=range:172.16.8.17-172.16.9.121 service=6/80 req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k 'source-negated' -t in -v 'true'
operation=add uid=<5baa94e0,00000000,860318ac,00003016> target=all timeout=indefinite action=drop
service=any source-negated=true source=cc:QQ concurrent-conns-ratio=655 track=source req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k 'byte-rate' -t in -v '0'
operation=add uid=<5baa9431,00000000,860318ac,00002efd> target=all timeout=indefinite action=notify
log=log service=1,50-51,6/443,17/53 service-negated=true source=cc:QQ byte-rate=0 req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k 'flush' -t in -v 'true'
operation=add uid=<5baa9422,00000000,860318ac,00002eea> target=all timeout=2841 action=drop log=log
service=any source=range:172.16.7.11-172.16.7.13 new-conn-rate=5 flush=true req_type=quota
[Expert@HostName:0]#
[Expert@HostName:0]# fw samp get -k 'concurrent-conns-ratio' -t in -v '655'
operation=add uid=<5baa94e0,00000000,860318ac,00003016> target=all timeout=indefinite action=drop
service=any source-negated=true source=cc:QQ concurrent-conns-ratio=655 track=source req_type=quota
[Expert@HostName:0]#

Security Management R80.40 Administration Guide      |      609


fwm

fwm
Description

Performs various management operations and shows various management information.

Notes:

n For debug instructions, see the description of the fwm process in sk97638.
n On a Multi-Domain Server, you must run these commands in the context
of the applicable Domain Management Server.

Syntax

fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

dbload Downloads the user database and network objects information to the
<options> specified targets
See "fwm dbload" on page 613.

Security Management R80.40 Administration Guide      |      610


fwm

Parameter Description

exportcert Export a SIC certificate of the specified object to file.


<options>
See "fwm exportcert" on page 615.

fetchfile Fetches a specified OPSEC configuration file from the specified source
<options> computer.
See "fwm fetchfile" on page 616.

fingerprint Shows the Check Point fingerprint.


<options>
See "fwm fingerprint" on page 618.

getpcap Fetches the IPS packet capture data from the specified Security Gateway.
<options>
See "fwm getpcap" on page 620.

ikecrypt Encrypts a secret with a key.


<options>
See "fwm ikecrypt" on page 622.

load <options> This command is obsolete for R80 and above.


Use the "mgmt_cli" on page 666 command to load a policy to a managed
Security Gateway.
See "fwm load" on page 623.

logexport Exports a Security log file ($FWDIR/log/*.log) or Audit log file


<options> ($FWDIR/log/*.adtlog) to an ASCII file.
See "fwm logexport" on page 624.

mds <options> Shows information and performs various operations on Multi-Domain


Server.
See "fwm mds" on page 629.

printcert Shows a SIC certificate's details.


<options>
See "fwm printcert" on page 631.

sic_reset Resets SIC on the Management Server.


See "fwm sic_reset" on page 636.

snmp_trap Sends an SNMP Trap to the specified host.


<options>
See "fwm snmp_trap" on page 637.

unload Unloads the policy from the specified managed Security Gateways.
<options>
See "fwm unload" on page 640.

ver <options> Shows the Check Point version of the Management Server.
See "fwm ver" on page 644.

Security Management R80.40 Administration Guide      |      611


fwm

Parameter Description

verify This command is obsolete for R80 and above.


<options>
Use the "mgmt_cli" on page 666 command to verify a policy.
See "fwm verify" on page 645.

Security Management R80.40 Administration Guide      |      612


fwm dbload

fwm dbload

Description

Downloads the user database and network objects information to the specified Security
Gateways.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] dbload


-a
-c <Configuration File>
<GW1> <GW2> ... <GWN>

Security Management R80.40 Administration Guide      |      613


fwm dbload

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.
For complete debug instructions, see the description of the fwm process
in sk97638.

-a Executes commands on all targets specified in the default system


configuration file - $FWDIR/conf/sys.conf.
Note - You must manually create this file.

-c Specifies the OPSEC configuration file to use.


<Configuration Note - You must manually create this file.
File>

<GW1> <GW2> Executes commands on the specified Security Gateways.


... <GWN>
Notes:

n Enter the main IP address or Name of the Security


Gateway object as configured in SmartConsole.
n If you do not explicitly specify the Security Gateway, the
database is downloaded to localhost.

Security Management R80.40 Administration Guide      |      614


fwm exportcert

fwm exportcert

Description

Export a SIC certificate of the specified managed object to a file.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file
<Output File> [-withroot] [-pem]

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.
For complete debug instructions, see the description of the fwm process
in sk97638.

<Name of Specifies the name of the managed object, whose certificate you wish to
Object> export.

<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish to
export.

<Output File> Specifies the name of the output file.

-withroot Exports the certificate's root in addition to the certificate's content.

-pem Save the exported information in a text file.


Default is to save in a binary file.

Security Management R80.40 Administration Guide      |      615


fwm fetchfile

fwm fetchfile

Description

Fetches a specified OPSEC configuration file from the specified source computer.

This command supports only the fwopsec.conf or fwopsec.v4x files.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] fetchfile -r <File> [-d <Local Path>] <Source>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.

-r <File> Specifies the relative fw1 directory.


This command supports only these files:

n conf/fwopsec.conf
n conf/fwopsec.v4x

-d <Local Specifies the local directory to save the fetched file.


Path>

<Source> Specifies the managed remote source computer, from which to fetch the
file.

Note - The local and the remote source computers must have
established SIC trust.

Security Management R80.40 Administration Guide      |      616


fwm fetchfile

Example

[Expert@MGMT:0]# fwm fetchfile -r "conf/fwopsec.conf" -d /tmp 192.168.3.52


Fetching conf/fwopsec.conf from 192.168.3.52...
Done
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      617


fwm fingerprint

fwm fingerprint

Description

Shows the Check Point fingerprint.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] fingerprint [-d]


<IP address of Target> <SSL Port>
localhost <SSL Port>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the
entire CLI session.
The debug options are:

n fwm -d
Runs the complete debug of all fwm actions.
For complete debug instructions, see the description of the
fwm process in sk97638.
n fingerprint -d
Runs the debug only for the fingerprint actions.

<IP address of Specifies the IP address of a remote managed computer.


Target>

<SSL Port> Specifies the SSL port number.


The default is 443.

Security Management R80.40 Administration Guide      |      618


fwm fingerprint

Example 1 - Showing the fingerprint on the local Management Server

[Expert@MGMT:0]# fwm fingerprint localhost 443


#DN OID.1.2.840.113549.1.9.2=An optional company name,Email=Email Address,CN=192.168.3.51,L=Locality Name
(eg\, city)
#FINGER 11:A6:F7:1F:B9:F5:15:BC:F9:7B:5F:DC:28:FC:33:C5
##
[Expert@MGMT:0]#

Example 2 - Showing the fingerprint from a managed Security Gateway

[Expert@MGMT:0]# fwm fingerprint 192.168.3.52 443


#DN OID.1.2.840.113549.1.9.2=An optional company name,Email=Email Address,CN=192.168.3.52,L=Locality Name
(eg\, city)
#FINGER 5C:8E:4D:B9:B4:3A:58:F3:79:18:F1:70:99:8B:5F:2B
##
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      619


fwm getpcap

fwm getpcap

Description

Fetches the IPS packet capture data from the specified Security Gateway.

This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory.

This command does not work with other Software Blades, such as Anti-Bot and Anti-Virus that
store packet captures in the $FWDIR/log/blob/ directory on the Security Gateway.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] getpcap -g <Security Gateway> -u '{<Capture UID>}' -p <Local


Path>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
For complete debug instructions, see the description of the fwm process in
sk97638.

-g <Security Specifies the main IP address or Name of Security Gateway object as


Gateway> configured in SmartConsole.

-u ' Specifies the Unique ID of the packet capture file.


{<Capture To see the Unique ID of the packet capture file, open the applicable log file
UID>}'
in SmartConsole > Logs & Monitor > Logs.

-p <Local Specifies the local path to save the specified packet capture file.
Path> If you do not specify the local directory explicitly, the command saves the
packet capture file in the current working directory.

Security Management R80.40 Administration Guide      |      620


fwm getpcap

Example

[Expert@MGMT:0]# fwm getpcap -g 192.168.162.1 -u '{0x4d79dc02,0x10000,0x220da8c0,0x1ffff}' /var/log/


[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      621


fwm ikecrypt

fwm ik ecrypt

Description

Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must then
be stored in the LDAP database.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] ikecrypt <Key> <Password>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.

For complete debug instructions, see the description of the fwm process in
sk97638.

<Key> Specifies the IKE Key as defined in the LDAP Account Unit properties window on
the Encryption tab.

< Specifies the password for the Endpoint VPN Client user.
Password
>

Example

[Expert@MGMT:0]# fwm ikecrypt MySecretKey MyPassword


OUQJHiNHCj6HJGH8ntnKQ7tg
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      622


fwm load

fwm load

Description

Loads a policy on a managed Security Gateway.

Important - This command is obsolete for R80 and above. Use the "mgmt_cli"
on page 666 command to load a policy on a managed Security Gateway.

Security Management R80.40 Administration Guide      |      623


fwm logexport

fwm logexport

Description

Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog) to an


ASCII file.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm logexport -h

fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>] [-i
<Input File>] [-o <Output File>] [{-f | -e}] [-x <Start Entry Number>]
[-y <End Entry Number>] [-z] [-n] [-p] [-a] [-u <Unification Scheme
File>] [-m {initial | semi | raw}]

Parameters

Parameter Description

-h Shows the built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI session.

For complete debug instructions, see the description of the fwm process in
sk97638.

-d Specifies the output delimiter between fields of log entries:


<Delimiter>
| -s n -d <Delimiter> - Uses the specified delimiter.
n -s - Uses the ASCII character #255 (non-breaking space) as the
delimiter.

Note - If you do not specify the delimiter explicitly, the default is a semicolon
(;).

Security Management R80.40 Administration Guide      |      624


fwm logexport

Parameter Description

-t <Table Specifies the output delimiter inside table field.


Delimiter> Table field would look like:
ROWx:COL0,ROWx:COL1,ROWx:COL2, and so on
Note - If you do not specify the table delimiter explicitly, the default is a
comma (,).

-i <Input Specifies the name of the input log file.


File>
Notes:

n This command supports only Security log file ($FWDIR/log/*.log)


and Audit log file ($FWDIR/log/*.adtlog)
n If you do not specify the input log file explicitly, the command processes
the active Security log file $FWDIR/log/fw.log

-o <Output Specifies the name of the output file.


File>
Note - If you do not specify the output log file explicitly, the command prints
its output on the screen.

-f After reaching the end of the currently opened log file, specifies to continue
to monitor the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog

-e After reaching the end of the currently opened log file, continue to monitor
the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog

-x <Start Starts exporting the log entries from the specified log entry number and
Entry below, counting from the beginning of the log file.
Number>

-y <End Starts exporting the log entries until the specified log entry number, counting
Entry from the beginning of the log file.
Number>

-z In case of an error (for example, wrong field value), specifies to continue the
export of log entries.
The default behavior is to stop.

-n Specifies not to perform DNS resolution of the IP addresses in the log file (this
is the default behavior).
This significantly speeds up the log processing.

Security Management R80.40 Administration Guide      |      625


fwm logexport

Parameter Description

-p Specifies to not to perform resolution of the port numbers in the log file (this
is the default behavior).
This significantly speeds up the log processing.

-a Exports only Account log entries.

-u < Specifies the path and name of the log unification scheme file.
Unification The default log unification scheme file is:
Scheme
$FWDIR/conf/log_unification_scheme.C
File>

-m {initial Specifies the log unification mode:


| semi |
raw} n initial - Complete unification of log entries. The command exports
one unified log entry for each ID. This is the default.
If you also specify the "-f" parameter, then the output does not export
any updates, but exports only entries that relate to the start of new
connections. To export updates as well, use the "semi" parameter.
n semi - Step-by-step unification of log entries. For each log entry,
exports entry that unifies this entry with all previously encountered
entries with the same ID.
n raw - No log unification. Exports all log entries.

Security Management R80.40 Administration Guide      |      626


fwm logexport

The output of the fwm logexport command appears in tabular format.

The first row lists the names of all log fields included in the log entries.

Each of the next rows consists of a single log entry, whose fields are sorted in the same order as
the first row.

If a log entry has no information in a specific field, this field remains empty (as indicated by two
successive semi-colons ";;").

You can control which log fields appear in the output of the command output:

Ste
Description
p

1 Create the $FWDIR/conf/logexport.ini file:


[Expert@MGMT:0]# touch $FWDIR/conf/logexport.ini

2 Edit the $FWDIR/conf/logexport.ini file:


[Expert@MGMT:0]# vi $FWDIR/conf/logexport.ini

3 To include or exclude the log fields from the output, add these lines in the configuration
file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_
FIELDS>,field100
excluded_fields = field10,field11
Where:

n You can specify only the included_fields parameter, only the excluded_
fields parameter, or both.
n The num field must always appear first. You cannot manipulate this field.
n The <REST_OF_FIELDS> is an optional reserved token that refers to a list of
fields.
l If you specify the "-f" parameter, then the <REST_OF_FIELDS> is based
on a list of fields from the $FWDIR/conf/logexport_default.C file.
l If you do not specify the "-f" parameter, then the <REST_OF_FIELDS> is
based on the input log file.

4 Save the changes in the file and exit the Vi editor.

5 Export the logs:


fwm logexport <options>

Security Management R80.40 Administration Guide      |      627


fwm logexport

Example 1 - Exporting all log entries

[Expert@MGMT:0]# fwm logexport -i MySwitchedLog.log


Starting... There are 113 log records in the file
num;date;time;orig;type;action;alert;i/f_name;i/f_dir;product;LogId;ContextNum;origin_
id;ContentVersion;HighLevelLogKey;SequenceNum;log_sys_message;ProductFamily;fg-1_client_in_rule_name;fg-1_
client_out_rule_name;fg-1_server_in_rule_name;fg-1_server_out_rule_
name;description;status;version;comment;update_service;reason;Severity;failure_impact
0;13Jun2018;19:47:54;CXL1_192.168.3.52;control; ;;daemon;inbound;VPN-1 & FireWall-1;-1;-1;CN=CXL1_
192.168.3.52,O=MyDomain_Server.checkpoint.com.s6t98x;5;18446744073709551615;2;Log file has been switched
to: MyLog.log;Network;;;;;;;;;;;;
1;13Jun2018;19:47:54;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;1;;Network;Default;Default;;;;;;;;;;
... ...
35;13Jun2018;19:55:59;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;1;;Network;Default;Default;Host Redirect;;;;;;;;;
36;13Jun2018;19:56:06;CXL1_192.168.3.52;control; ;;;inbound;Security Gateway/Management;-1;-1;CN=CXL1_
192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Started;1.0;<null>;1;;;
... ...
47;13Jun2018;19:57:02;CXL1_192.168.3.52;control; ;;;inbound;Security Gateway/Management;-1;-1;CN=CXL1_
192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Failed;1.0;;1;Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the
gateway.;2;Contracts may be out-of-date
... ...
[Expert@MGMT:0]#

Example 2 - Exporting only log entries with specified numbers

[Expert@MGMT:0]# fwm logexport -i MySwitchedLog.log -x 36 -y 47


Starting... There are 113 log records in the file
num;date;time;orig;type;action;alert;i/f_name;i/f_dir;product;LogId;ContextNum;origin_
id;ContentVersion;HighLevelLogKey;SequenceNum;log_sys_message;ProductFamily;fg-1_client_in_rule_name;fg-1_
client_out_rule_name;fg-1_server_in_rule_name;fg-1_server_out_rule_
name;description;status;version;comment;update_service;reason;Severity;failure_impact
36;13Jun2018;19:56:06;CXL1_192.168.3.52;control; ;;;inbound;Security Gateway/Management;-1;-1;CN=CXL1_
192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Started;1.0;<null>;1;;;
37;13Jun2018;19:56:06;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;2;;Network;Default;Default;Host Redirect;;;;;;;;;
... ...
46;13Jun2018;19:56:59;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;1;;Network;Default;Default;Host Redirect;;;;;;;;;
47;13Jun2018;19:57:02;CXL1_192.168.3.52;control; ;;;inbound;Security Gateway/Management;-1;-1;CN=CXL1_
192.168.3.52,O=MyDomain_
Server.checkpoint.com.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Failed;1.0;;1;Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the
gateway.;2;Contracts may be out-of-date
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      628


fwm mds

fwm mds

Description

n Shows the Check Point version of the Multi-Domain Server.

n Rebuilds status tree for Global VPN Communities.

Note - On a Multi-Domain Server, you can run this command:

n In the context of the MDS:


mdsenv
n In the context of a Domain Management Server:
mdsenv <IP Address or Name of Domain
Management Server>

Syntax

fwm [-d] mds


ver
rebuild_global_communities_status {all | missing}

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then
redirect the output to a file, or use the script
command to save the entire CLI session.
For complete debug instructions, see the description of the
fwm process in sk97638.

ver Shows the Check Point version of the Multi-Domain Server.

rebuild_global_ Rebuilds status tree for Global VPN Communities:


communities_status
n all - Rebuilds status tree for all Global VPN
Communities.
n missing - Rebuild status tree only for Global VPN
Communities that do not have status trees.

Security Management R80.40 Administration Guide      |      629


fwm mds

Example

[Expert@MDS:0]# fwm mds ver


This is Check Point Multi-Domain Security Management R80.40 - Build 11
[Expert@MDS:0]#

Security Management R80.40 Administration Guide      |      630


fwm printcert

fwm printcert

Description

Shows a SIC certificate's details.

Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] printcert


-obj <Name of Object> [-cert <Certificate Nick Name>] [-verbose]
-ca <CA Name> [-x509 <Name of File> [-p]] [-verbose]
-f <Name of Binary Certificate File> [-verbose]

Security Management R80.40 Administration Guide      |      631


fwm printcert

Parameters

Item Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then
redirect the output to a file, or use the script
command to save the entire CLI session.
For complete debug instructions, see the description of the
fwm process in sk97638.

-obj <Name of Object> Specifies the name of the managed object, for which to show
the SIC certificate information.

-cert <Certificate Nick Specifies the certificate nick name.


Name>

-ca <CA Name> Specifies the name of the Certificate Authority.


Note - Check Point CA Name is internal_ca.

-x509 <Name of File> Specifies the name of the X.509 file.

-p Specifies to show the SIC certificate as a text file.

-f <Name of Binary Specifies the binary SIC certificate file to show.


Certificate File>

-verbose Shows the information in verbose mode.

Security Management R80.40 Administration Guide      |      632


fwm printcert

Examples

Example 1 - Showing the SIC certificate of a Management Server


[Expert@MGMT:0]# fwm printcert -ca internal_ca
Subject: O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Apr 8 13:41:00 2018 Local Time
Not Valid After: Fri Jan 1 05:14:07 2038 Local Time
Serial No.: 1
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint:
is CA
MD5 Fingerprint:
7B:F9:7B:4C:BD:40:B9:1C:AB:2C:AE:CF:66:2E:E7:06
SHA-1 Fingerprints:
1. A6:43:3A:2B:1A:04:7F:A6:36:A6:2C:78:BF:22:D9:BC:F7:7E:4D:73
2. KEYS HEM GERM PIT ABUT ROVE RAW PA IQ FAWN NUT SLAM
[Expert@MGMT:0]#

Example 2 - Showing the SIC certificate of a Management Server in verbose mode


[Expert@MGMT:0]# fwm printcert -ca internal_ca -verbose
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] fwa_db_init: called
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] fwa_db_init: closing existing database
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] do_links_getver: strncmp failed. Returning -2
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] db_fetchkey: entering
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] PubKey:
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] Modulus:
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] ae b3 75 36 64 e4 1a 40 fe c2 ad 2f 9b 83 0b 45 f1 00 04 bc
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 3f 77 77 76 d1 de 8a cf 9f 32 78 8b d4 b1 b4 be db 75 cc c8
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] c2 6d ff 3e aa fe f1 2b c3 0a b0 a2 a5 e0 a8 ab 45 cd 87 32
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] ac c6 9f a4 a9 ba 30 79 08 fa 59 4c d2 dc 3d 36 ca 17 d7 c1
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] b2 a2 41 f5 89 0f 00 d4 2d f2 55 d2 30 a5 32 c7 46 7a 6b 32
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 29 0f 53 9f 35 42 91 e5 7d f7 30 6d bc b3 f2 ae f3 f0 ed 88
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] c4 d7 7d 0c 2d f6 5f c8 ed 9f 9a 57 54 79 d0 0f 0b 2f 9c 0d
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 94 2e f0 f4 66 62 f7 ae 2e f8 8e 90 08 ba 63 85 b6 46 2f b7
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] a7 01 29 9a 14 58 a8 ef eb 07 17 4e 95 8b 2f 48 5f d3 18 10
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 3f 00 d5 03 d7 fd 45 45 ca 67 5b 34 be b8 00 ae ea 9a cd 50
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] d6 e7 a2 81 86 78 11 d7 bf 04 9f 8b 43 3f f7 36 5f ed 31 a8
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] a3 9d 8b 0a de 05 fb 5c 44 2e 29 e3 3e f4 dd 50 01 0f 86 9d
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 55 16 a3 4d f8 90 2d 13 c6 c1 28 57 f8 3e 7c 59
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] Exponent: 65537 (0x10001)
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52]
X509 Certificate Version 3
refCount: 1
Serial Number: 1
Issuer: O=MGMT.checkpoint.com.s6t98x
Subject: O=MGMT.checkpoint.com.s6t98x
Not valid before: Sun Apr 8 13:41:00 2018 Local Time
Not valid after: Fri Jan 1 05:14:07 2038 Local Time
Signature Algorithm: RSA with SHA-256 Public key: RSA (2048 bits)
Extensions:
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint (Critical):
is CA

[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] destroy_rand_mutex: destroy


[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] cpKeyTaskManager::~cpKeyTaskManager: called.
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      633


fwm printcert

Example 3 - Showing the SIC certificate of a managed Cluster object


[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244

printing all certificates of CXL_192.168.3.244

defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH

*****
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      634


fwm printcert

Example 4 - Showing the SIC certificate of a managed Cluster object in verbose


mode
[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed. Returning -2

printing all certificates of CXL_192.168.3.244

[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] db_fetchkey: entering


[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] 1 certificates
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] PubKey:
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] Modulus:
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] df 35 c3 45 ca 42 16 6e 21 9e 31 af c1 fd 20 0a 3d 5b 6f 5d
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] e0 a2 0c 0e fa fa 5e e5 91 9d 4e 73 77 fa db 86 0b 5e 5d 0c
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] ce af 4a a4 7b 30 ed b0 43 7d d8 93 c5 4b 01 f4 3d b5 d8 f4
... ... ...
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] 34 b1 db ac 18 4f 11 bd d2 fb 26 7d 23 74 5c d9 00 a1 58 1e
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] 60 7c 83 44 fa 1e 1e 86 fa ad 98 f7 df 24 4a 21
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] Exponent: 65537 (0x10001)
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45]
X509 Certificate Version 3
refCount: 1
Serial Number: 85021
Issuer: O=MGMT.checkpoint.com.s6t98x
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Not valid before: Sun Jun 3 19:58:19 2018 Local Time
Not valid after: Sat Jun 3 19:58:19 2023 Local Time
Signature Algorithm: RSA with SHA-256 Public key: RSA (2048 bits)
Extensions:
Key Usage:
digitalSignature
keyEncipherment
Subject Alternate names:
IP: 192.168.3.244
Basic Constraint:
not CA
CRL distribution Points:
URI: http://192.168.3.240:18264/ICA_CRL2.crl
DN: CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x

defaultCert:

[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] destroy_rand_mutex: destroy


[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] cpKeyTaskManager::~cpKeyTaskManager: called.
*****
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      635


fwm sic_reset

fwm sic_reset

Description

Resets SIC on the Management Server.

For detailed procedure, see sk65764: How to reset SIC.

Warning:

n Before you run this command, take a Gaia Snapshot and a full
backup of the Management Server.
This command resets SIC betw een the Management Server and all
its managed objects.
n This operation breaks trust in all Internal CA certificates and SIC
trust across the managed environment.
Therefore, w e do not recommend it at all, except for real disaster
recovery.

Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] sic_reset

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.

For complete debug instructions, see the description of the fwm process in
sk97638.

Security Management R80.40 Administration Guide      |      636


fwm snmp_trap

fwm snmp_trap

Description

Sends an SNMPv1 Trap to the specified host.

Notes:

n On a Multi-Domain Server, you must run this command in the context of


the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n On a Multi-Domain Server, the SNMP Trap packet is sent from the IP
address of the Leading Interface.

Syntax

fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s
<Specific Trap Number>] [-p <Source Port>] [-c <SNMP Community>]
<Target> ["<Message>"]

Security Management R80.40 Administration Guide      |      637


fwm snmp_trap

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect
the output to a file, or use the script command to save
the entire CLI session.
For complete debug instructions, see the description of the fwm
process in sk97638.

-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.

-g <Generic Trap Specifies the generic trap number.


Number> One of these values:

n 0 - For coldStart trap


n 1 - For warmStart trap
n 2 - For linkDown trap
n 3 - For linkUp trap
n 4 - For authenticationFailure trap
n 5 - For egpNeighborLoss trap
n 6 - For enterpriseSpecific trap (this is the default
value)

-s <Specific Trap Specifies the unique trap type.


Number> Valid only of generic trap value is 6 (for enterpriseSpecific).
Default value is 0.

-p <Source Port> Specifies the source port, from which to send the SNMP Trap
packets.

-c <SNMP Community> Specifies the SNMP community.

<Target> Specifies the managed target host, to which to send the SNMP
Trap packets.
Enter an IP address of a resolvable hostname.

"<Message>" Specifies the SNMP Trap text message.

Security Management R80.40 Administration Guide      |      638


fwm snmp_trap

Example - Sending an SNMP Trap from a Management Server and capturing the traffic on the
Security Gateway

[Expert@MGMT:0]# fwm snmp_trap -g 2 -c public 192.168.3.52 "My Trap Message"


[Expert@MGMT:0]#

[Expert@MyGW_192.168.3.52:0]# tcpdump -s 1500 -vvvv -i eth0 udp and host 192.168.3.51


tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 1500 bytes
22:49:43.891287 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: UDP (17), length: 103)
192.168.3.51.53450 > MyGW_192.168.3.52.snmptrap: [udp sum ok] { SNMPv1 { Trap(58) E:2620.1.1 192.168.3.240
linkDown 1486440 E:2620.1.1.11.0="My Trap Message" } }
Pressed CTRL+C
[Expert@MyGW_192.168.3.52:0]#

Security Management R80.40 Administration Guide      |      639


fwm unload

fwm unload

Description

Unloads the policy from the specified managed Security Gateways or Cluster Members.

Warning:

1. The fwm unload command prevents all traffic from passing through the
Security Gateway (Cluster Member), because it disables the IP Forwarding
in the Linux kernel on the specified Security Gateway (Cluster Member).
2. The fwm unload command removes all policies from the specified
Security Gateway (Cluster Member).
This means that the Security Gateway (Cluster Member) accepts all
incoming connections destined to all active interfaces without any
filtering or protection enabled.

Notes:

n On a Multi-Domain Server, you must run this command in the context of


the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n If you need to remove the current policy, but keep the Security Gateway
(Cluster Member) protected, then run the "comp_init_policy"
command on the Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of
these commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch"
l "cpstart"

Syntax

fwm [-d] unload <GW1> <GW2> ... <GWN>

Security Management R80.40 Administration Guide      |      640


fwm unload

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.

<GW1> <GW2> Specifies the managed Security Gateways by their main IP address or
... <GWN> Object Name as configured in SmartConsole.

Security Management R80.40 Administration Guide      |      641


fwm unload

Example

[Expert@MyGW:0]# cpstat -f policy fw

Product name: Firewall


Policy name: CXL_Policy
Policy install time: Wed Oct 23 18:23:14 2019
... ... ...
[Expert@MyGW:0]#

[Expert@MyGW:0]# sysctl -a | grep forwarding | grep -v bridge


net.ipv6.conf.bond0.forwarding = 1
net.ipv6.conf.eth1.forwarding = 1
net.ipv6.conf.eth3.forwarding = 1
net.ipv6.conf.eth2.forwarding = 1
net.ipv6.conf.eth4.forwarding = 1
net.ipv6.conf.eth5.forwarding = 1
net.ipv6.conf.eth0.forwarding = 1
net.ipv6.conf.eth6.forwarding = 1
net.ipv6.conf.default.forwarding = 1
net.ipv6.conf.all.forwarding = 1
net.ipv6.conf.lo.forwarding = 1
net.ipv4.conf.bond0.mc_forwarding = 0
net.ipv4.conf.bond0.forwarding = 1
net.ipv4.conf.eth1.mc_forwarding = 0
net.ipv4.conf.eth1.forwarding = 1
net.ipv4.conf.eth2.mc_forwarding = 0
net.ipv4.conf.eth2.forwarding = 1
net.ipv4.conf.eth0.mc_forwarding = 0
net.ipv4.conf.eth0.forwarding = 1
net.ipv4.conf.lo.mc_forwarding = 0
net.ipv4.conf.lo.forwarding = 1
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 1
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 1
[Expert@MyGW:0]#

[Expert@MGMT:0]# fwm unload MyGW

Uninstalling Policy From: MyGW

Security Policy successfully uninstalled from MyGW...

Security Policy uninstall complete.

[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      642


fwm unload

[Expert@MyGW:0]# cpstat -f policy fw

Product name: Firewall


Policy name:
Policy install time:
... ... ...
[Expert@MyGW:0]#

[Expert@MyGW:0]# sysctl -a | grep forwarding | grep -v bridge


net.ipv6.conf.bond0.forwarding = 0
net.ipv6.conf.eth1.forwarding = 0
net.ipv6.conf.eth3.forwarding = 0
net.ipv6.conf.eth2.forwarding = 0
net.ipv6.conf.eth4.forwarding = 0
net.ipv6.conf.eth5.forwarding = 0
net.ipv6.conf.eth0.forwarding = 0
net.ipv6.conf.eth6.forwarding = 0
net.ipv6.conf.default.forwarding = 0
net.ipv6.conf.all.forwarding = 0
net.ipv6.conf.lo.forwarding = 0
net.ipv4.conf.bond0.mc_forwarding = 0
net.ipv4.conf.bond0.forwarding = 0
net.ipv4.conf.eth1.mc_forwarding = 0
net.ipv4.conf.eth1.forwarding = 0
net.ipv4.conf.eth2.mc_forwarding = 0
net.ipv4.conf.eth2.forwarding = 0
net.ipv4.conf.eth0.mc_forwarding = 0
net.ipv4.conf.eth0.forwarding = 0
net.ipv4.conf.lo.mc_forwarding = 0
net.ipv4.conf.lo.forwarding = 0
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 0
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 0
[Expert@MyGW:0]#

Security Management R80.40 Administration Guide      |      643


fwm ver

fwm ver

Description

Shows the Check Point version of the Security Management Server.

Note - On a Multi-Domain Server, you can run this command:

n In the context of the MDS:


mdsenv
n In the context of a Domain Management Server:
mdsenv <IP Address or Name of Domain
Management Server>

Syntax

fwm [-d] ver [-f <Output File>]

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the entire
CLI session.
For complete debug instructions, see the description of the fwm process
in sk97638.

-f <Output Specifies the name of the output file, in which to save this information.
File>

Example

[Expert@MGMT:0]# fwm ver


This is Check Point Security Management Server R80.40 - Build 11
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      644


fwm verify

fwm verify

Important - This command is obsolete for R80 and above. Use the "mgmt_cli"
on page 666 command to verify a policy on a managed Security Gateway.

Description

Verifies the specified policy package without installing it.

Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>

Syntax

fwm [-d] verify <Policy Name>

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
For complete debug instructions, see the description of the fwm process in
sk97638.

<Policy Specifies the name of the policy package as configured in SmartConsole.


Name>

Example

[Expert@MGMT:0]# fwm verify Standard


Verifier messages:
Error: Rule 1 Hides rule 2 for Services & Applications: any .
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      645


inet_alert

inet_alert
Description

Notifies an Internet Service Provider (ISP) when a company's corporate network is under attack.
This command forwards log messages generated by the alert daemon on your Check Point
Security Gateway to an external Management Station. This external Management Station is
usually located at the ISP site. The ISP can then analyze the alert and react accordingly.

This command uses the Event Logging API (ELA) protocol to send the alerts. The Management
Station receiving the alert must be running the ELA Proxy.

If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must be
performed between the external Management Station running the ELA Proxy at the ISP site and
the Check Point Security Gateway generating the alert.

Procedure

Step Description

1 Connect with SmartConsole to the applicable Security Management Server or Domain


Management Server, which manages the applicable Security Gateway that should
forward log messages to an external Management Station.

2 From the top left Menu , click Global properties.

3 Click on the [+] near the Log and Alert and click Alerts.

4 Clear the Send user defined alert no. 1 to SmartView Monitor .

5 Select the next option Run UserDefined script under the above .

6 Enter the applicable inet_alert syntax (see the Syntax section below).

7 Click OK .

8 Install the Access Policy on the applicable Security Gateway.

Security Management R80.40 Administration Guide      |      646


inet_alert

Syntax

inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f
<Token> <Value>] [-m <Alert Type>]

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Parameters

Parameter Description

-s <IP The IPv4 address of the ELA Proxy (usually located at the ISP site).
Address>

-o Prints the alert log received to stdout.


Use this option when inet_alert is part of a pipe syntax (<some
command> | inet_alert ...).

-a <Auth Specifies the type of connection to the ELA Proxy.


Type> One of these values:

n ssl_opsec-The connection is authenticated and encrypted (this is the


default).
n auth_opsec- The connection is authenticated.
n clear- The connection is neither authenticated, nor encrypted.

-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.

-f <Token> A field to be added to the log, represented by a <Token> <Value> pair as


<Value> follows:

n <Token> - The name of the field to be added to the log. Cannot


contain spaces.
n <Value> - The field's value. Cannot contain spaces.

This option can be used multiple times to add multiple <Token> <Value>
pairs to the log.

Security Management R80.40 Administration Guide      |      647


inet_alert

Parameter Description

-m <Alert The alert to be triggered at the ISP site.


Type> This alert overrides the alert specified in the log message generated by the
alert daemon.
The response to the alert is handled according to the actions specified in the
ISP Security Policy:
These alerts execute the OS commands:

n alert - Popup alert command


n mail - Mail alert command
n snmptrap - SNMP trap alert command
n spoofalert - Anti-Spoof alert command

These NetQuota and ServerQuota alerts execute the OS commands specified


in the $FWDIR/conf/objects.C: file:
value=clientquotaalert. Parameter=clientquotaalertcmd

Exist Status

Exit Status Description

0 Execution was successful.

102 Undetermined error.

103 Unable to allocate memory.

104 Unable to obtain log information from stdin

106 Invalid command line arguments.

107 Failed to invoke the OPSEC API.

Example

inet_alert -s 10.0.2.4 -a clear -f product cads -m alert

This command specifies to perform these actions in the event of an attack:

n Establish a clear connection with the ELA Proxy located at IP address 10.0.2.4

n Send a log message to the specified ELA Proxy. Set the product field of this log message to
cads

n Trigger the OS command specified in the SmartConsole > Menu > Global properties > Log
and Alert > Popup Alert Command field.

Security Management R80.40 Administration Guide      |      648


ldapcmd

ldapcmd
Description

This is an LDAP utility that controls these features:

Feature Description

Cache LDAP cache operations, such as emptying the cache, as well as providing debug
information.

Statistics LDAP search statistics, such as:

n All user searches


n Pending lookups (when two or more lookups are identical)
n Total lookup time (the total search time for a specific lookup)
n Cache statistics such as hits and misses

These statistics are saved in the $FWDIR/log/ldap_pid_<Process


PID>.stats file.

Logging View the alert and warning logs.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

ldapcmd [-d <Debug Level>] -p {<Process Name> | all} <Command>

Security Management R80.40 Administration Guide      |      649


ldapcmd

Parameters

Parameter Description

-d <Debug Runs the command in debug mode with the specified TDERROR debug
Level> level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).

-p {<Process Runs on a specified Check Point process, or all supported Check Point
Name> | all} processes.

<Command> One of these commands:

n cacheclear {all | UserCacheObject |


TemplateCacheObject | TemplateExtGrpCacheObject}
l all - Clears cache for all objects

l UserCacheObject - Clears cache for user objects

l TemplateCacheObject - Clears cache for template

objects
l TemplateExtGrpCacheObject - Clears cache for

external template group objects


n cachetrace {all | UserCacheObject |
TemplateCacheObject | TemplateExtGrpCacheObject}
l all - Traces cache for all objects

l UserCacheObject - Traces cache for user objects

l TemplateCacheObject - Traces cache for template

objects
l TemplateExtGrpCacheObject - Traces cache for

external template group objects


n log {on | off}
l on - Creates LDAP logs

l off - Does not create LDAP logs

n stat {<Print Interval in Sec> | 0}


l <Print Interval in Sec> - How frequently to collect

the statistics
l 0 - Stops collecting the statistics

Security Management R80.40 Administration Guide      |      650


ldapcompare

ldapcompare
Description

This is an LDAP utility that performs compare queries and prints a message whether the result
returned a match or not.

This utility opens a connection to an LDAP directory server, binds, and performs the comparison
specified on the command line or from a specified file.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

ldapcompare [-d <Debug Level>] [<Options>] <DN> {<Attribute> <Value> |


<Attribute> <Base64 Value>}

Parameters

Parameter Description

-d <Debug Runs the command in debug mode with the specified TDERROR debug
Level> level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).

<Options> See the tables below:

n Compare options
n Common options

<DN> Specifies the Distinguished Name.

<Attribute> Specifies the assertion attribute.

<Value> Specifies the assertion value.

<Base64 Value> Specifies the Base64 encoding of the assertion value.

Security Management R80.40 Administration Guide      |      651


ldapcompare

Compare options

Option Description

-E [!]<Extension> Specifies the compare extensions.


[=<Extension Parameter>]
Note - The exclamation sign "!" indicates criticality.
For example: !dontUseCopy = Do not use Copy

-M Enables the Manage DSA IT control.


Use the "-MM" option to make it critical.

-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version is
3.

-z Enables the quiet mode.


The command does not print anything. You can use
the command return values.

Common options

Option Description

-D <Bind DN> Specifies the LDAP Server administrator Distinguished


Name.

Security Management R80.40 Administration Guide      |      652


ldapcompare

Option Description

-e [!]<Extension> Specifies the general extensions:


[=<Extension Parameter>]
Note - The exclamation sign "!" indicates criticality.
n [!]assert=<Filter>
RFC 4528; an RFC 4515 filter string
n [!]authzid=<Authorization ID>
RFC 4370; either "dn:<DN>", or "u:<Username>"
n [!]chaining[=<Resolve Behavior>
[/<Continuation Behavior>]]
One of these:
l "chainingPreferred"

l "chainingRequired"

l "referralsPreferred"

l "referralsRequired"

n [!]manageDSAit
RFC 3296
n [!]noop
n ppolicy
n [!]postread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]preread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]relax
n abandon
SIGINT sends the abandon signal; if critical, does
not wait for SIGINT. Not really controls.
n cancel
SIGINT sends the cancel signal; if critical, does not
wait for SIGINT. Not really controls.
n ignore
SIGINT ignores the response; if critical, does not
wait for SIGINT. Not really controls.

-h <LDAP Server> Specifies the LDAP Server computer by its IP address or


resolvable hostname.

-H <LDAP URI> Specifies the LDAP Server Uniform Resource Identifier(s).

-I Specifies to use the SASL Interactive mode.

-n Dry run - shows what would be done, but does not


actually do it.

Security Management R80.40 Administration Guide      |      653


ldapcompare

Option Description

-N Specifies not to use the reverse DNS to canonicalize SASL


host name.

-o <Option>[=<Option Specifies the general options:


Parameter>] nettimeout={<Timeout in Sec> | none | max}

-O <Properties> Specifies the SASL security properties.

-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.

-Q Specifies to use the SASL Quiet mode.

-R <Realm> Specifies the SASL realm.

-U <Authentication Specifies the SASL authentication identity.


Identity>

-v Runs in verbose mode (prints the diagnostics to stdout).

-V Prints version information (use the "-VV" option only).

-w <LDAP Admin Password> Specifies the LDAP Server administrator password (for
simple authentication).

-W Specifies to prompt the user for the LDAP Server


administrator password.

-x Specifies to use simple authentication.

-X <Authorization Specifies the SASL authorization identity (either


Identity> "dn:<DN>", or "u:<Username>" option).

-y <File> Specifies to read the LDAP Server administrator


password from the <File>.

-Y <SASL Mechanism> Specifies the SASL mechanism.

-Z Specifies to start the TLS request.


Use the "-ZZ" option to require successful response.

Security Management R80.40 Administration Guide      |      654


ldapmemberconvert

ldapmemberconvert
Description

This is an LDAP utility that ports from the "Member" attribute values in LDAP group entries to the
"MemberOf" attribute values in LDAP member (User or Template) entries.

This utility converts the LDAP server data to work in either the "MemberOf" mode, or "Both"
mode. The utility searches through all specified group or template entries that hold one or more
"Member" attribute values and modifies each value. The utility searches through all specified
group/template entries and fetches their "Member" attribute values.

Each value is the DN of a member entry. The entry identified by this DN is added to the
"MemberOf" attribute value of the group/template DN at hand. In addition, the utility delete those
"Member" attribute values from the group/template, unless you run the command in the "Both"
mode.

When your run the command, it creates a log file ldapmemberconvert.log in the current
working directory. The command logs all modifications done and errors encountered in that log
file.

Important - Back up the LDAP server database before you run this conversion utility.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

ldapmemberconvert [-d <Debug Level>] -h <LDAP Server> -p <LDAP Server


Port> -D <LDAP Admin DN> -w <LDAP Admin Password> -m <Member Attribute
Name> -o <MemberOf Attribute Name> -c <Member ObjectClass Value> [-B]
[-f <File> | -g <Group DN>] [-L <LDAP Server Timeout>] [-M <Number of
Updates>] [-S <Size>] [-T <LDAP Client Timeout>] [-Z]

Security Management R80.40 Administration Guide      |      655


ldapmemberconvert

Parameters

Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).

-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command
connects to localhost.

-p <LDAP Server Specifies the LDAP Server port. Default is 389.


Port>

-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.

-w <LDAP Admin Specifies the LDAP Server administrator password.


Password>

-m <Member Specifies the LDAP attribute name when fetching and (possibly)
Attribute Name> deleting a group Member attribute value.

-o <MemberOf Specifies the LDAP attribute name for adding an LDAP "MemberOf"
Attribute Name> attribute value.

-c <Member Specifies the LDAP "ObjectClass" attribute value that defines,


ObjectClass Value> which type of member to modify.
You can specify multiple attribute values with this syntax:
-c <Member Object Class 1> -c <Member Object
Class 2> ... -c <Member Object Class N>

-B Specifies to run in "Both" mode.

-f <File> Specifies the file that contains a list of Group DNs separated by a
new line:
<Group DN 1>
<Group DN 2>
...
<Group DN N>
Length of each line is limited to 256 characters.

Security Management R80.40 Administration Guide      |      656


ldapmemberconvert

Parameter Description

-g <Group DN> Specifies the Group or Template Distinguished Name, on which to


perform the conversion.
You can specify multiple Group DNs with this syntax:
-g <Group DN 1> -g <Group DN 2> ... -g <Group DN
N>

-L <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout> Default is "never".

-M <Number of Specifies the maximal number of simultaneous member LDAP


Updates> updates.
Default is 20.

-S <Size> Specifies the Server side size limit for LDAP operations, in number
of entries.
Default is "none".

-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".

-Z Specifies to use SSL connection.

Notes

There are two "GroupMembership" modes. You must keep these modes consistent:
n template-to-groups

n user-to-groups

For example, if you apply conversion on LDAP users to include the "MemberOf" attributes for their
groups, then this conversion has to be applied on LDAP defined templates for their groups.

Security Management R80.40 Administration Guide      |      657


ldapmemberconvert

Troubleshooting

Symptom:

A command fails with an error message stating the connection stopped unexpectedly when you
run it with the parameter -M <Number of Updates>.

Root Cause:

The LDAP server could not handle that many LDAP requests simultaneously and closed the
connection.

Solution:

Run the command again with a lower value for the "-M" parameter. The default value should be
adequate, but can also cause a connection failure in extreme situations. Continue to reduce the
value until the command runs normally. Each time you run the command with the same set of
groups, the command continues from where it left off.

Security Management R80.40 Administration Guide      |      658


ldapmemberconvert

Examples

Example 1

A group is defined with the DN "cn=cpGroup,ou=groups,ou=cp,c=us" and these


attributes:

...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...

For the two member entries:

...
cn=member1
objectclass=fw1Person
...

and:

...
cn=member2
objectclass=fw1Person
...

Run:

[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer -d cn=admin -w secret -m uniquemember -o


memberof -c fw1Person

The result for the group DN is:

...
cn=cpGroup
...

The result for the two member entries is:

...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...

and:

...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...

If you run the same command with the "-B" parameter, it produces the same result, but the
group entry is not modified.

Security Management R80.40 Administration Guide      |      659


ldapmemberconvert

Example 2

If there is another member attribute value for the same group entry:

uniquemember="cn=template1,ou=people, ou=cp,c=us"

and the template is:

cn=member1
objectclass=fw1Template

Then after running the same command, the template entry stays intact, because of the
parameter "-c fw1Person", but the object class of "template1" is "fw1Template".

Security Management R80.40 Administration Guide      |      660


ldapmodify

ldapmodify
Description

This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF
format.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server
Port>] [-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b] [-c]
[-F] [-k] [-n] [-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f <Input
File> .ldif | < <Entry>]

Parameters

Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).

-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command
connects to localhost.

-p <LDAP Server Specifies the LDAP Server port. Default is 389.


Port>

-D <LDAP Admin Specifies the LDAP Server administrator Distinguished Name.


DN>

-w <LDAP Admin Specifies the LDAP Server administrator password.


Password>

Security Management R80.40 Administration Guide      |      661


ldapmodify

Parameter Description

-a Specifies that this is the LDAP "add" operation.

-b Specifies to read values from files (for binary attributes).

-c Specifies to ignore errors during continuous operation.

-F Specifies to force changes on all records.

-k Specifies the Kerberos bind.

-K Specifies the Kerberos bind, part 1 only.

-n Specifies to print the LDAP "add" operations, but do not actually


perform them.

-r Specifies to replace values, instead of adding values.

-v Specifies to run in verbose mode.

-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".

-Z Specifies to use SSL connection.

-f <Input Specifies to read from the <Input File>.ldif file.


File>.ldif The input file must be in the LDIF format.

< <Entry> Specifies to read the entry from the stdin.


The "<" character is mandatory part of the syntax.
It specifies the input comes from the standard input (from the data
you enter on the screen).

Security Management R80.40 Administration Guide      |      662


ldapsearch

ldapsearch
Description

This is an LDAP utility that queries an LDAP directory and returns the results.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>] [-D
<LDAP Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b <Base DN>]
[-F <Separator>] [-l <LDAP Server Timeout>] [-s <Scope>] [-S <Sort
Attribute>] [-t] [-T <LDAP Client Timeout>] [-u] [-z <Number of Search
Entries>] [-Z] <Filter> [<Attributes>]

Parameters

Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).

-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command
connects to localhost.

-p <LDAP Port> Specifies the LDAP Server port. Default is 389.

-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.

-w <LDAP Admin Specifies the LDAP Server administrator password.


Password>

-A Specifies to retrieve attribute names only, without values.

Security Management R80.40 Administration Guide      |      663


ldapsearch

Parameter Description

-B Specifies not to suppress the printing of non-ASCII values.

-b <Base DN> Specifies the Base Distinguished Name (DN) for search.

-F <Separator> Specifies the print separator character between attribute names


and their values.
The default separator is the equal sign (=).

-l <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout> Default is "never".

-s <Scope> Specifies the search scope. One of these:

n base
n one
n sub

-S <Sort Specifies to sort the results by the values of this attribute.


Attribute>

-t Specifies to write values to files in the /tmp/ directory.


Writes each <attribute>-<value> pair to a separate file named:
/tmp/ldapsearch-<Attribute>-<Value>
For example, for the fw1color attribute with the value a00188,
the command writes to the file named:
/tmp/ldapsearch-fw1color-a00188

-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is never.

-u Specifies to show user-friendly entry names in the output.


For example:
shows cn=Babs Jensen, users, omi
instead of cn=Babs Jensen, cn=users,cn=omi

-z <Number of Specifies the maximal number of entries to search on the LDAP


Search Entries> Server.

-Z Specifies to use SSL connection.

<Filter> LDAP search filter compliant with RFC-1558.


For example:
objectclass=fw1host

Security Management R80.40 Administration Guide      |      664


ldapsearch

Parameter Description

<Attributes> Specifies the list of attributes to retrieve.


If you do not specify attributes explicitly, then the command
retrieves all attributes.

Example

[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass

With this syntax, the command:

1. Connects to the LDAP Server to port 18185.

2. Connects to the LDAP Server with Base DN "cn=omi".

3. Queries the LDAP directory for "fw1host" objects.

4. For each object found, prints the value of its "objectclass" attribute.

Security Management R80.40 Administration Guide      |      665


mgmt_cli

mgmt_cli
Description

The mgmt_cli tool lets you work directly with the management database on your Management
Server.

Syntax on Management Server or Security Gateway running on Gaia OS

mgmt_cli <Command Name> <Command Parameters> <Optional Switches>

Syntax on SmartConsole computer running on Windows OS 32-bit

Open Windows Command Prompt and run these commands:

cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>

Syntax on SmartConsole computer running on Windows OS 64-bit

Open Windows Command Prompt and run these commands:

cd /d "%ProgramFiles(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>

Notes

n For a complete list of the mgmt_cli options, enter the mgmt_cli (mgmt_cli.exe)
command and press Enter.

n For more information, see the Check Point Management API Reference.

Security Management R80.40 Administration Guide      |      666


migrate

migrate
Important - This command is used to migrate the management database from
R80.10 and lower versions.
For more information, see the R80.40 Installation and Upgrade Guide.

Description

Exports the management database and applicable Check Point configuration.

Imports the exported management database and applicable Check Point configuration.

Backing up and restoring in Management High Availability environment:

n To back up and restore a consistent environment, make sure to collect


and restore the backups and snapshots from all servers in the High
Availability environment at the same time.
n Make sure other administrators do not make changes in SmartConsole
until the backup operation is completed.

For more information:

n About Gaia Backup and Gaia Snapshot, see the R80.40 Gaia Administration
Guide.
n About Virtual Machine Snapshots, see the vendor documentation.

Notes:

n You must run this command from the Expert mode.


n If you need to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software
version, then you can use the built-in command in the
$FWDIR/bin/upgrade_tools/ directory.
n If you plan to import the management database on a Management Server
that runs a higher software version, then you must use the migrate
utility from the migration tools package created specifically for that
higher software version. See the Installation and Upgrade Guide for
that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log

Security Management R80.40 Administration Guide      |      667


migrate

Syntax

n To see the built-in help:

[Expert@MGMT:0]# ./migrate -h

n To export the management database and configuration:

[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File> &

n To import the management database and configuration:

[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File>.tgz &

Parameters

Parameter Description

-h Shows the built-in help.

yes | nohup This syntax:


./migrate ...
& 1. Sends the "yes" input to the interactive "migrate" command
through the pipeline.
2. The "nohup" forces the "migrate" command to ignore the hangup
signals from the shell.
3. The "&" forces the command to run in the background.

As a result, when the CLI session closes, the command continues to run
in the background.
See:

n sk133312
n https://linux.die.net/man/1/bash
n https://linux.die.net/man/1/nohup

export Exports the management database and applicable Check Point


configuration.

import Imports the management database and applicable Check Point


configuration that were exported from another Management Server.

Security Management R80.40 Administration Guide      |      668


migrate

Parameter Description

-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.

Note - The command can export only closed logs (to which the
information is not currently written).

-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:

n This parameter only supports Management Servers and


Log Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).

-n Runs silently (non-interactive mode) and uses the default options for
each setting.
Important:

n If you export a management database in this mode and


the specified name of the exported file matches the name
of an existing file, the command overwrites the existing
file without prompting.
n If you import a management database in this mode, the
"migrate import" command runs the "cpstop"
command automatically.

--exclude- n During the export operation, does not back up the PostgreSQL
uepm-postgres- database from the Endpoint Security Management Server.
db
n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.

--include- n During the export operation, backs up the MSI files from the
uepm-msi-files Endpoint Security Management Server.
n During the import operation, restores the MSI files on the Endpoint
Security Management Server.

/<Full Path>/ Absolute path to the exported database file.


This path must exist.

Security Management R80.40 Administration Guide      |      669


migrate

Parameter Description

<Name of n During the export operation, specifies the name of the output file.
Exported File> The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported
file.
You must manually enter the *.tgz extension in the end.

Example 1 - Export operation succeeded

[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export

You are required to close all clients to Security Management Server


or execute 'cpstop' before the Export operation begins.

Do you want to continue? (y/n) [n]? y

Copying required files...


Compressing files...

The operation completed successfully.

Location of archive with exported database: /var/log/Migrate_Export.tgz

[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#

Example 2 - Export operation failed

[Expert@MGMT:0]# ./migrate export /var/log/My_Migrate_Export


Execution finished with errors. See log file '/opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log' for
further details
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      670


migrate_server

migrate_server
Important - This command is used to migrate the management database from
R80.20.M1, R80.20, R80.20.M2, R80.30, and higher versions.
For more information, see the R80.40 Installation and Upgrade Guide.

Description

Exports the management database and applicable Check Point configuration.

Imports the exported management database and applicable Check Point configuration.

Backing up and restoring in Management High Availability environment:

n To back up and restore a consistent environment, make sure to collect


and restore the backups and snapshots from all servers in the High
Availability environment at the same time.
n Make sure other administrators do not make changes in SmartConsole
until the backup operation is completed.

For more information:

n About Gaia Backup and Gaia Snapshot, see the R80.40 Gaia Administration
Guide.
n About Virtual Machine Snapshots, see the vendor documentation.

Notes:

n You must run this command from the Expert mode.


n If you need to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software
version, then you can use the built-in command in the
$FWDIR/scripts/ directory.
n If you plan to import the management database on a Management Server
that runs a higher software version, then you must use the migrate_
server utility from the migration tools package created specifically for
that higher software version. See the Installation and Upgrade Guide
for that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log

Security Management R80.40 Administration Guide      |      671


migrate_server

Syntax

n To see the built-in help:

[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server -h

n To run the Pre-Upgrade Verifier:

[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server verify -v R80.40 [-skip_upgrade_
tools_check]

n To export the management database and configuration:

[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export -v R80.40 [-skip_upgrade_
tools_check] [-l | -x] [--include-uepm-msi-files] [--exclude-uepm-
postgres-db] /<Full Path>/<Name of Exported File>

n To import the management database and configuration:

[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server import -v R80.40 [-skip_upgrade_
tools_check] [-l | -x] [-change_ips_file /<Full Path>/<Name of
JSON File>.json] [--include-uepm-msi-files] [--exclude-uepm-
postgres-db] /<Full Path>/<Name of Exported File>.tgz

Parameters

Paramet
Description
er

-h Shows the built-in help.

export Exports the management database and applicable Check Point configuration.

import Imports the management database and applicable Check Point configuration that
were exported from another Management Server.

Important - This command automatically restarts Check Point services


(runs the "cpstop" and "cpstart" commands).

verify Verifies the management database and applicable Check Point configuration that
were exported from another Management Server.

Security Management R80.40 Administration Guide      |      672


migrate_server

Paramet
Description
er

-v Specifies the version, to which you plan to migrate / upgrade.


R80.40

-skip_ Does not try to connect to Check Point Cloud to check for a more recent version of
upgrad the Upgrade Tools.
e_
tools_ Best Practice - Use this parameter on the Management Server that is
check
not connected to the Internet.

-l Exports and imports the Check Point logs without log indexes in the $FWDIR/log/
directory.

Note - The command can export only closed logs (to which the
information is not currently written).

-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:

n This parameter only supports Management Servers and Log


Servers R80.10 and higher.
n The command can export only closed logs (to which the information
is not currently written).

- Specifies the absolute path to the special JSON configuration file with new IPv4
change_ addresses.
ips_
This file is mandatory during an upgrade of a Multi-Domain Security Management
file
/<Full environment.
Path Even if only one of the servers migrates to a new IP address, all the other servers
>/<Name must get this configuration file for the import process.
of JSON Example:
File
>.json [{"name":"MyPrimaryMultiDomainServer","newIpAddress4":"172.
30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAddress4":"172
.30.40.52"}]

-- n During the export operation, backs up the MSI files from the Endpoint
includ Security Management Server.
e-uepm-
n During the import operation, restores the MSI files on the Endpoint Security
msi-
files Management Server.

Security Management R80.40 Administration Guide      |      673


migrate_server

Paramet
Description
er

-- n During the export operation, does not back up the PostgreSQL database
exclud from the Endpoint Security Management Server.
e-uepm-
n During the import operation, does not restore the PostgreSQL database on
postgre
s-db the Endpoint Security Management Server.

/<Full Specifies the absolute path to the exported database file. This path must exist.
Path
>/<Name n During the export operation, specifies the name of the output file.
of The command automatically adds the *.tgz extension.
Exporte n During the import operation, specifies the name of the exported file.
d File>
You must manually enter the *.tgz extension in the end.

Example 1 - Export operation succeeded

[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export /var/log/Migrate_Export

You are required to close all clients to Security Management Server


or execute 'cpstop' before the Export operation begins.

Do you want to continue? (y/n) [n]? y

Copying required files...


Compressing files...

The operation completed successfully.

Location of archive with exported database: /var/log/Migrate_Export.tgz

[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#

Example 2 - Export operation failed

[Expert@MGMT:0]# ./migrate_server export /var/log/My_Migrate_Export


Execution finished with errors. See log file '/opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log' for
further details
[Expert@MGMT:0]#

Security Management R80.40 Administration Guide      |      674


queryDB_util

queryDB_util
Description

Searches in the management database for objects or policy rules.

Important - This command is obsolete for R80 and above. Use the "mgmt_cli"
on page 666 command to load a policy on a managed Security Gateway.

Security Management R80.40 Administration Guide      |      675


rs_db_tool

rs_db_tool
Description

Manages Dynamically Assigned IP address (DAIP) gateways in a DAIP database.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Syntax

n To add an entry to the DAIP database:

[Expert@MGMT:0]# rs_db_tool [-d] -operation add -name <Object


Name> -ip <IPv4 Address> -ip6 <Pv6 Address> -TTL <Time-To-Live>

n To fetch a specific entry from the DAIP database:

[Expert@MGMT:0]# rs_db_tool [-d] -operation fetch -name <Object


Name>

n To delete a specific entry from the DAIP database:

[Expert@MGMT:0]# rs_db_tool [-d] -operation delete -name <Object


Name>

n To list all entries in the DAIP database:

[Expert@MGMT:0]# rs_db_tool [-d] -operation list

n To synchronize the DAIP database:

[Expert@MGMT:0]# rs_db_tool [-d] -operation sync

Note - You must run this command from the Expert mode.

Security Management R80.40 Administration Guide      |      676


rs_db_tool

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Best Practice - If you use this parameter, then redirect the
output to a file, or use the script command to save the
entire CLI session.

-name <Object Specifies the name of the DAIP object.


Name>

-ip <IPv4 Specifies the IPv4 address of the DAIP object


Address>

-ip6 <IPv6 Specifies the IPv6 address of the DAIP object.


Address>

-TTL <Time-To- Specifies the relative time interval (in seconds), during which the
Live> entry is valid.

Security Management R80.40 Administration Guide      |      677


sam_alert

sam_alert
Description

For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the
information received from the standard input.

For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined
Alerts mechanism.

Notes:

n VSX Gateways and VSX Cluster Members do not support Suspicious


Activity Monitoring (SAM) Rules. See sk79700.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n See the "fw sam" on page 576 and "fw sam_policy" on page 585 commands.

SAM v1 syntax

Syntax for SAM v1

sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}

Parameters for SAM v1

Parameter Description

-v Enables the verbose mode for the fw sam command.

-o Specifies to print the input of this tool to the standard output (to use with
pipes in a CLI syntax).

-s <SAM Specifies the SAM Server to be contacted. Default is localhost.


Server>

-t <Time> Specifies the time (in seconds), during which to enforce the action. The
default is forever.

Security Management R80.40 Administration Guide      |      678


sam_alert

Parameter Description

-f Specifies the Security Gateway, on which to run the operation.


<Security
Gateway> Important - If you do not specify the target Security Gateway
explicitly, this command applies to all managed Security
Gateways.

-C Cancels the specified operation.

-n Specifies to notify every time a connection, which matches the specified


criteria, passes through the Security Gateway.

-i Inhibits (drops or rejects) connections that match the specified criteria.

-I Inhibits (drops or rejects) connections that match the specified criteria and
closes all existing connections that match the specified criteria.

-src Matches the source address of connections.

-dst Matches the destination address of connections.

-any Matches either the source or destination address of connections.

-srv Matches specific source, destination, protocol and port.

Security Management R80.40 Administration Guide      |      679


sam_alert

SAM v2 syntax

Syntax for SAM v2

sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r |
a}] -a {d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}

Parameters for SAM v2

Parameter Description

-v2 Specifies to use SAM v2.

-v Enables the verbose mode for the fw sam command.

-O Specifies to print the input of this tool to the standard output (to
use with pipes in a CLI syntax).

-S <SAM Server> the SAM server to be contacted. Default is localhost

-t <Time> Specifies the time (in seconds), during which to enforce the action.
The default is forever.

-f <Security Specifies the Security Gateway, on which to run the operation.


Gateway>
Important - If you do not specify the target Security
Gateway explicitly, this command applies to all managed
Security Gateways.

-n <Name> Specifies the name for the SAM rule.


Default is empty.

-c "<Comment>" Specifies the comment for the SAM rule.


Default is empty.
You must enclose the text in the double quotes or single quotes.

-o <Originator> Specifies the originator for the SAM rule.


Default is sam_alert.

-l {r | a} Specifies the log type for connections that match the specified
criteria:

n r - Regular
n a - Alert

Default is None.

Security Management R80.40 Administration Guide      |      680


sam_alert

Parameter Description

-a {d | r| n | b Specifies the action to apply on connections that match the


| q | i} specified criteria:

n d- Drop
n r- Reject
n n- Notify
n b- Bypass
n q- Quarantine
n i- Inspect

-C Specifies to close all existing connections that match the criteria.

-ip Specifies to use IP addresses as criteria parameters.

-eth Specifies to use MAC addresses as criteria parameters.

-src Matches the source address of connections.

-dst Matches the destination address of connections.

-any Matches either the source or destination address of connections.

-srv Matches specific source, destination, protocol and port.

Example

See sk110873: How to configure Security Gateway to detect and prevent port scan.

stattest
Description

Check Point AMON client to query SNMP OIDs.

You can use this command as an alternative to the standard SNMP commands for debug
purposes - to make sure the applicable SNMP OIDs provide the requested information.

Notes:

n You can run this command only in the Expert mode.


n On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>

Security Management R80.40 Administration Guide      |      681


sam_alert

Syntax

n To query a Regular OID:


stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2>
... <Regular_OID_N>

These are specified in the SNMP MIB files.

For Check Point MIB files, see sk90470.

n To query a Statistical OID:


stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] -l <Polling Interval> -r <Polling Duration> [-v <VSID>] [-t
<Timeout>] <Statistical_OID_1> <Statistical_OID_2> ... <Statistical_OID_N>

Statistical OIDs take some time to "initialize".

For example, to calculate an average, it is necessary to collect enough samples.

Check Point statistical OIDs are registered in the $CPDIR/conf/statistical_oid.conf


file.

Parameters

Parameter Description

-d Runs the command in debug mode.


Use only if you troubleshoot the command
itself.
Best Practice - If you use this
parameter, then redirect the output
to a file, or use the script command
to save the entire CLI session.

-h <Host> Specifies the remote Check Point host to query


by its IP address or resolvable hostname.

-p <Port> Specifies the port number, on which the


AMON server listens. Default port is 18192.

-x <Proxy Server> Specifies the Proxy Server by its IP address or


resolvable hostname.

Note - Use only when you query a


remote host.

Security Management R80.40 Administration Guide      |      682


sam_alert

Parameter Description

-l <Polling Interval> Specifies the time in seconds between queries.

Note - Use only when you query a


Statistical OID.

-r <Polling Duration> Specifies the time in seconds, during which to


run consecutive queries.

Note - Use only when you query a


Statistical OID.

-v <VSID> On a VSX Gateway, specifies the context of a


Virtual Device to query.

-t <Timeout> Specifies the session timeout in milliseconds.

<Regular_OID_1> <Regular_OID_2> Specifies the Regular OIDs to query.


... <Regular_OID_N>
Notes:

n OID must not start with period.


n Separate the OIDs with spaces.
n You can specify up to 100 OIDs.

<Statistical_OID_1> <Statistical_ Specifies the Statistical OIDs to query.


OID_2> ... <Statistical_OID_N>
Notes:

n OID must not start with period.


n Separate the OIDs with spaces.
n You can specify up to 100 OIDs.

Example - Query a Regular OID

Query the CPU Idle utilization at the OID 1.3.6.1.4.1.2620.1.6.7.2.3 (procIdleTime).

[Expert@HostName]# stattest get 1.3.6.1.4.1.2620.1.6.7.4.2

Example - Query a Statistical OID

Query the CPU Idle utilization at the OID 1.3.6.1.4.1.2620.1.6.7.2.3 (procIdleTime).

Information is collected with intervals of 5 seconds during 5 seconds

[Expert@HostName]# stattest get -l 5 -r 5 1.3.6.1.4.1.2620.1.6.7.2.3

Security Management R80.40 Administration Guide      |      683


threshold_config

threshold_config
Description

You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts.

You can use these thresholds to monitor many system components automatically without
requesting information from each object or device.

You configure these SNMP Monitoring Thresholds only on the Security Management Server, Multi-
Domain Server, or Domain Management Server.

During policy installation, the managed a Security Gateway and Clusters receive and apply these
thresholds as part of their policy.

For more information, see sk90860: How to configure SNMP on Gaia OS.

Procedure

Step Description

1 Connect to the command line on the Management Server.

2 Log in to the Expert mode.

3 On a Multi-Domain Server, switch to the context of the applicable Domain Management


Server:
[Expert@HostName:0]# mdsenv <Name or IP address of Domain
Management Server>

4 Go to the Threshold Engine Configuration menu:


[Expert@HostName:0]# threshold_config

Security Management R80.40 Administration Guide      |      684


threshold_config

Step Description

5 Select the applicable options and configure the applicable settings


(see the Threshold Engine Configuration Options table below).
Threshold Engine Configuration Options:
---------------------------------------

(1) Show policy name


(2) Set policy name
(3) Save policy
(4) Save policy to file
(5) Load policy from file
(6) Configure global alert settings
(7) Configure alert destinations
(8) View thresholds overview
(9) Configure thresholds

(e) Exit (m) Main Menu

Enter your choice (1-9) :

6 Exit from the Threshold Engine Configuration menu.

7 Stop the CPD daemon:


[Expert@HostName:0]# cpwd_admin stop -name CPD -path
"$CPDIR/bin/cpd_admin" -command "cpd_admin stop"

See "cpwd_admin stop" on page 534.

8 Start the CPD daemon:


[Expert@HostName:0]# cpwd_admin start -name CPD -path
"$CPDIR/bin/cpd" -command "cpd"

See "cpwd_admin start" on page 531.

9 Wait for 10-20 seconds.

10 Verify that CPD daemon started successfully:


[Expert@HostName:0]# cpwd_admin list | egrep "STAT|CPD"

See "cpwd_admin list" on page 528.

11 In SmartConsole, install the Access Control Policy on Security Gateways and Clusters.

Security Management R80.40 Administration Guide      |      685


threshold_config

Threshold Engine Configuration Options

Menu item Description

(1) Show policy Shows the name of the current configured threshold policy.
name

(2) Set policy Configures the name for the threshold policy.
name If you do not specify it explicitly, then the default name is "Default
Profile".

(3) Save policy Saves the changes in the current threshold policy.

(4) Save policy Exports the configured threshold policy to a file.


to file If you do not specify the path explicitly, the file is saved in the current
working directory.

(5) Load policy Imports a threshold policy from a file.


from file If you do not specify the path explicitly, the file is imported from the
current working directory.

(6) Configure Configures global settings:


global alert
settings n How frequently alerts are sent (configured delay must be greater
than 30 seconds)
n How many alerts are sent

(7) Configure Configures the SNMP Network Management System (NMS), to which
alert the managed Security Gateways and Cluster Members send their
destinations
SNMP alerts.
Configure Alert Destinations Options:
-------------------------------------
(1) View alert destinations
(2) Add SNMP NMS
(3) Remove SNMP NMS
(4) Edit SNMP NMS

(8) View Shows a list of all available thresholds and their current settings.
thresholds These include:
overview
n Name
n Category (see the next option "(9)")
n State (disabled or enabled)
n Threshold (threshold point, if applicable)
n Description

Security Management R80.40 Administration Guide      |      686


threshold_config

Menu item Description

(9) Configure Shows the list of threshold categories to configure.


thresholds
Thresholds Categories
----------------------
(1) Hardware
(2) High Availability
(3) Local Logging Mode Status
(4) Log Server Connectivity
(5) Networking
(6) Resources

See the Thresholds Categories table below.

Thresholds Categories

Category Sub-Categories

(1) Hardware Hardware Thresholds:


--------------------
(1) RAID volume state
(2) RAID disk state
(3) RAID disk flags
(4) Temperature sensor reading
(5) Fan speed sensor reading
(6) Voltage sensor reading

(2) High Availability High Availability Thresholds:


-----------------------------
(1) Cluster member state changed
(2) Cluster block state
(3) Cluster state
(4) Cluster problem status
(5) Cluster interface status

(3) Local Logging Mode Status Local Logging Mode Status Thresholds:
-------------------------------------
(1) Local Logging Mode

(4) Log Server Connectivity Log Server Connectivity Thresholds:


-----------------------------------
(1) Connection with log server
(2) Connection with all log servers

Security Management R80.40 Administration Guide      |      687


threshold_config

Category Sub-Categories

(5) Networking Networking Thresholds:


----------------------
(1) Interface Admin Status
(2) Interface removed
(3) Interface Operational Link Status
(4) New connections rate
(5) Concurrent connections rate
(6) Bytes Throughput
(7) Accepted Packet Rate
(8) Drop caused by excessive traffic

(6) Resources Resources Thresholds:


---------------------
(1) Swap Memory Utilization
(2) Real Memory Utilization
(3) Partition free space
(4) Core Utilization
(5) Core interrupts rate

Security Management R80.40 Administration Guide      |      688


threshold_config

Notes:

n If you run the threshold_config command locally on a Security


Gateway or Cluster Members to configure the SNMP Monitoring
Thresholds, then each policy installation erases these local SNMP
threshold settings and reverts them to the global SNMP threshold settings
configured on the Management Server that manages this Security
Gateway or Cluster.
n On a Security Gateway and Cluster Members, you can save the local
Threshold Engine Configuration settings to a file and load it locally later.
n The Threshold Engine Configuration is stored in the
$FWDIR/conf/thresholds.conf file.
n In a Multi-Domain Security Management environment:
l You can configure the SNMP thresholds in the context of Multi-
Domain Server (MDS) and in the context of each individual Domain
Management Server.
l Thresholds that you configure in the context of the Multi-Domain
Server are for the Multi-Domain Server only.
l Thresholds that you configure in the context of a Domain
Management Server are for that Domain Management Server and
its managed Security Gateway and Clusters.
l If an SNMP threshold applies both to the Multi-Domain Server and
a Domain Management Server, then configure the SNMP threshold
both in the context of the Multi-Domain Server and in the context of
the Domain Management Server.
However, in this scenario you can only get alerts from the Multi-
Domain Server, if the monitored object exceeds the threshold.
Example:
If you configure the CPU threshold, then when the monitored value
exceeds the configured threshold, it applies to both the Multi-
Domain Server and the Domain Management Server. However, only
the Multi-Domain Server generates SNMP alerts.

Security Management R80.40 Administration Guide      |      689

You might also like