CP 61000 R75 035 Security System CLI Reference 1
CP 61000 R75 035 Security System CLI Reference 1
CLI
Reference Guide
General Availability
22 July 2012
[Protected]
© 2011 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of
relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional
improvements, stability fixes, security enhancements and protection against new and evolving attacks.
This document is relevant only to 61000 R75.035 version.
Latest Documentation
The latest version of this document is at:
http://supportcontent.checkpoint.com/documentation_download?ID=12558
For additional technical information, visit the Check Point Support Center
(http://supportcenter.checkpoint.com).
Revision History
Date Description
29 January 2012 Merge CLI extension document with CLI Reference document.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:[email protected]?subject=Feedback on 61000 Security Systems CLI
Reference Guide).
Contents
Parameter Shows
Page 6
Showing Chassis and Component State (asg stat)
Parameter Shows
Output
Comments
(local)
Represents the SGM on which the command asg stat -v was run.
State
State Meaning
Process
The process state of the SGM, whether the SGM is:
Enforcing Security. The SGM is UP and working properly.
Inactive. The SGM is inactive because its State is: DOWN or DETACHED.
Failure of an SGM with this high unit value will cause a chassis failover, as the minimum default
grade gap for chassis failover is 11.
Minimum threshold for traffic processing
The minimum grade required for a chassis to become ACTIVE.
Minimum grade gap for chassis failover
Minimum grade gap is the value which determines when a chassis fails over. If the active chassis grade
drops by the "minimum grade gap" failover may occur. The active chassis is always the chassis whose
grade is higher by at least the minimum grade gap.
Synchronization
Within chassis Whether synchronization is enabled between SGMs in the same
chassis
Exception Rules Whether the user has configured any synchronization exception rules
using the asg_sync_manager commands
Distribution Whether the control blade feature is enabled. The control blade feature
Control blade sets the SMO not to handle data traffic, only management traffic. When
the feature is enabled, you always have immediate access to the
system through an SSH connection.
Component Command
Component Command
Syntax:
blade <SGM>
Example:
blade 1_03
use “exit” to return to the previous SGM
Input:
SGM is the SGM ID. Should be in the from <SGM#>_<CHASSIS#> and in case only SGM# is specified then
<CHASSIS#> gets the value of the current chassis. <SGM#> can be specified with or without the leading
zero, i.e 1_3 or 1_03
Note:
Multiple “blade” commands will open multiple SSH sessions.
Parameter Description
interval
Monitors SGM state and running processes. Enter a
decimal value in seconds, for example: asg monitor
3
-v interval
Monitors chassis parameters. For example: asg
monitor –v 3.
-all interval
Monitors all SGMs and chassis parameters
Output
Output
Output
Parameter Description
-b sgm List of Security Gateway Modules. For example:
Output
Comments 1. The Resource column identifies the resource. There are 4 kinds of resource:
Memory
HD – hard drive space (/)
HD: /var/log – space on hard drive committed to log files
HD: /boot - location of the kernel
2. The Location column identifies the SGM with the resource.
3. The Usage column shows in percentage terms how much of that resource has
been used (hard drive or directory on hard drive) or is in use (memory).
4. The Threshold column is also expressed as a percentage. The threshold gives
an indication of the health and functionality of the component. When the value of
the resource is greater than the threshold, an alert is sent.
5. The Total column is the total absolute value in units
6. The Units column shows the measurement type, Megabytes (M) or Gigabytes
(G).
For example, the first row shows that SGM1 on Chassis 1 has 11.6 Gigabyte of
memory, 38% of which is used. An alert will be sent if the usage exceeds 80%.
o Packets
o Bytes per second
When invoked with the Error mode parameter (-e) the command shows:
Errors
Drops
IP stack Drops
TX restart queue counter and interface state
Parameter Description
none Displays the interface status table
Example asg if
Output
Parameter Description
Output
Syntax: asg_blade_stats <corr [-pav reset] | corr_online | iterator | smo | vpn [-v] | 6in4 [-v] | gre [-v] |
icmp_error [-v] | all | help>
Parameter Description
corr [-a] Display correction layer statistics for each SGM.
-a - Aggregate statistics from all SGMs
corr –p [-v] [-a] Display correction layer statistics per service (for predefined services) for each SGM.
-v - Display advances statistics
-a - Aggregate statistics from all SGMs
corr –reset Reset correction layer statistics
corr_online Display current correction layer information for each SGM
iterator Display information about the last iterator process
smo Display statistics on SMO task and logs for each SGM
vpn [-v] Display statistics on VPN forwarded packets
-v – Breakdown to PPAK and FW-1 forwarded packets
6in4 [-v] Display statistics on 6in4 forwarded packets
-v – Breakdown to PPAK and FW-1 forwarded packets
gre [-v] Display statistics on GRE forwarded packets
-v – Breakdown to PPAK and FW-1 forwarded packets
icmp_error [-v] Display statistics on ICMP ERROR forwarded packets
-v – Breakdown to PPAK and FW-1 forwarded packets
all Display all correction layer statistics mentioned above
help Display help information
Analyze
Shows accumulated traffic information and traffic distribution between SGMs.
Banalyze
Shows accumulated traffic information and traffic distribution between interfaces.
Parameter Meaning
interface The name of the interface
-rb RX bytes
-tp TX packets
-tb TX bytes
For example if you sort according to the -rb option, then the higher values
appear at the top of the RX bytes column in the traffic distribution table:
SGM ID RX packets RX bytes RX dropped
1_03 70%
1_02 20%
1_01 10%
The traffic distribution table shows as part of the command output, but unsorted
by default.
Native (asg_ifconfig)
Syntax asg_ifconfig [-b] [SGMs] [interface]
Output
Comments
The output shows totals for traffic passed through interface eth2-01 on each SGM of chassis1
Output
Output
Comments Shows accumulated statistics (rates) for the specified interface (verbose mode). If
the SGM option (-b) isn't specified, these statistics are calculated on the active
chassis only.
Output
Comments Shows accumulated statistics (absolute values) for the specified interface (verbose
mode). If the SGM option (-b) isn't specified, these statistics are calculated on the
active chassis only.
Output
Comments
Shows detailed and accumulated statistics (rates) for the Mgmt interface of specified SGMs (1_01 and
1_02). If the SGM option (-b) isn't specified, these statistics are calculated on the active chassis only.
Output
Comment
Shows detailed and accumulated statistics (absolute values) for the specified interface of specified SGMs
(1_01-1_04). If the SGM option (-b) isn't specified, these statistics are calculated on the active chassis only.
Internal interfaces
To show traffic statistics for internal interfaces:
Sync
Sync1
Sync2
CIN
Use the –v (verbose) option while running asg_ifconfig in the analyze or banalyze mode.
delay Time in seconds (optional, default equals 5). Traffic statistics are
divided by the delay interval to show the average per second.
Output
Example2 asg_traffic_stats 1
Output
Parameter Description
-b blades List of Security Gateway Modules. For example:
-h Display usage.
Example 1 If no SGMs are specified, the following shows performance statistics on the active
chassis:
asg perf -v
Output
Parameter Description
asg search Run in interactive mode. In this mode you are asked to
enter the 5 tuples of the connection parameters. Each
parameter can be a wildcard. Press enter for wildcard.
asg search <src> Run in command line. Each parameter can be replaced
<dst> <dport> <ipp> by * for wildcard. If you specify only few parameters,
<sport> the wildcard is used for the others.
For example: asg search 192.0.2.44 * * * 4555 is
translated as: <192.0.2.44, 4555, any, any, any>
-v Verbose mode
Output
Comments Searching for connections from 14.14.14.1 to 24.24.24.1 shows one SSH connection:
<14.14.14.1, 38110, 24.24.24.1, 22, tcp>
This connection is handled by SGM 3 in chassis 1. The connection has a backup on
SGM 1, and another backup in chassis 2 on SGM 3.
Syntax:
asg_syslog config ipv4 <syslog server IPv4 address> - configure syslog server by IPv4 address
asg_syslog config host <syslog server hostname> - configure syslog server by hostname. This functionality
will be applicable when hostname resolution can be made, either via DNS or by static configuration.
asg_syslog verify – verify that the same syslog server is defined on all SGMs.
Note:
When configuring syslog server, syslog service is being restarted on all SGMs.
Command Auditing
Command auditing is a way of:
Notifying users about critical actions they are about to take
Obtaining confirmation for critical actions
Syntax asg log [-b <SGMs>] <log_name> [-tail [number]] [-f filter]
Parameter Description
-b <SGMs> A list of SGMs to show logs for.
List the SGMs in one of these formats:
1_1,1_4
The first and fourth SGMs on chassis 1
1_1-1_4
SGMs 1-4 on chassis 1
1_1,1_3-1_7,2_08
First SGM on chassis1, SGMs 3-7 on chassis 1, SGM 8 on chassis 2.
all
All SGMs
chassis1
All SGMs on chassis1
chassis2
All SGM on chassis2
chassis_active
All SGMs on the active chassis
-tail [number] Shows the last lines of the log file for each SGM. When no number is
specified, the last 10 lines of the log are shown. A parameter such "-
tail 3" limits the output to the last three lines of the log file.
Example 1:
Example 2:
Parameter Meaning
-b <blades> Specifies SGMs from which to collect /var/log/messages*.
-f <filter> Enter a word or phrase to filter by. Only lines that contain the
word or phrase are printed to the standard output.
Syntax asg_chassis_ctrl
Parameter Description
active_sgms Prints a list of active SGMs.
active_ssm Prints the active SSM. An SSM not installed on the chassis or shutdown is
considered inactive.
get_lb_dist Prints the current distribution matrix from the given SSM. The matrix is a
table containing SGM IDs, and used to determine to which other SGMs a
packet should be forwarded.
get_dist_md5sum Print the md5sum of the distribution matrix for the given SSM. Comparing
this checksum against the checkum on other SSM verifies that they are in
sync.
set_dist_mode Sets the distribution mode to all ports of the given SSM. There are four
distribution modes: User, Network, General, and per port. The distribution
mode affects the way an SSM distributes traffic among the SGMs.
set_dist_mask Sets the number of bits to be considered when calculating distribution. The
number of bits is derived from the distribution mode.
get_sel_info Gets SEL data from a CMM. SEL is the event log of a CMM, used in
troubleshooting and system forensics.
Comments To view the usage for any parameter, issue the parameter without any
additional flags.
For parameters which require an SSM ID, the all flag can be used to run the
command on all SSMs.
SNMP messaging between the SGMs, SSMs and CMMs can be configured
using gclish. For example:
> show chassis id 1 module SSM1 ip
> show chassis id all module SSM2 status
> set chassis id 2 general snmp_retries 3
To make sure that the Chassis Control mechanism functions properly, run
asg_chassis_ctrl for each of the chassis modules:
> asg_chassis_ctrl get_cmm_status
Getting CMM(s) status
CMM #1 -> Health: 0, Active: 0
CMM #2 -> Health: 1, Active: 1
> asg_chassis_ctrl get_ssm_firmware all
Firmware version of SSM1 is 7.5.18
Firmware version of SSM2 is 7.5.18
If both commands succeed, it means that the chassis control utility is able to
communicate with the CMMs and SSMs.
SUL state
change SUL Feature flow
SUL set to ON - if reported high CPU
SUL will set to OFF if no report has been received for at least 10 seconds by
default from the last report (short timeout)
if system is continually under load (high CPU report gap is less then short
timeout, SUL will stay ON for up to 3 minutes by default (Long interval)
SUL ON mode will be delayed for a fixed timeout (Start timeout) (default=0) if at
least one SGM continually reports high CPU more than 3min ( Long interval) and
the reason for setting OFF from the begging was the long-timeout expiration
Value Description
0 Turns SUL mechanism ON
Tuning feature SUL feature can be modified and tuned to meet user specific needs.
Parameters
Parameter Description
fwha_pnote_timeout_mechanism_cpu_load_limit (CPU threshold)
(highest average CPU usage of a
single core)
default = 80
Notes In order for the modified SUL parameters, including state (ON/OFF) to survive
reboot
Add them to the fwkern.conf file using g_update_conf_file utility
Parameter Meaning
show Shows the existing database configuration
Parameter Meaning
-b <SGMs> The ID of the SGM.
Use a comma to separate specified SGMs, for example: asg
conns 1_1, 1_3.
When this parameter is not specified, only connections on the
active chassis are shown.
Output
Parameter Meaning
[-b <blades>] Specifies SGMs
Use a comma to separate specified SGMs, for example:
asg_version -b 1_01
Example 1 asg_version
Output
The first part of the output shows software and firmware versions
installed on SSMs and CMMs.
The second part shows:
tp_cp> software versions installed on SGMs
Internal firmware versions, such as BIOS.
CPU related information, such as frequency and CoreXL allocation
Output
Comments Using the verify option, the command identifies firmware that is not up to
date, and prints the required version. (Database refers to an internal
database of approved versions) In the example, the firmware on SSM1
does not match the version recorded in the internal predefined database
of approved versions. SSM1 has firmware version 7.5.19. The internal
database lists the required version as 7.5.20.
Run in verbose (-v) mode, all hardware components are shown,
including those which have up-to-date firmware.
Syntax: asg_auditlog [-b blades] [-d <n>] [-tail <n>] [filter <filter>]
Parameter Meaning
-b <blades> Specifies SGMs
Example 1
Comments
The output shows that:
The administrator set the fan factor to 1 and that the change was transient (1), to memory only
Then the administrator made the change permanent by doing a SAVE CONFIG action that:
o Deleted the old fan factor of 11 from the SGM database on hard disk. (2)
o Added the new fan factor of 1 to the database (3)
All the actions happened to the same nine SGMs
Example 2
Comments
This output shows that:
Auditlog file was collected from SGMs 1_03 and 1_04
Events that occurred in 50 seconds of each other are considered parallel: they occurred at the same
time.
Only records with the cpu_load phrase are shown
gclish
Description:
The gclish is a command line interface which stands for global clish.
It is used like clish, but the commands are global by default, hence they are performed on all the SGMs,
which are part of the security group.
gclish commands are not applied on down SGMs: If a set command is performed while a SGM was down
(either administratively or not) it will not be applied on it. The down SGM will sync its database during its
startup process. If the database was changed, the SGM will reboot itself in order for the changes to apply.
clish commands are documented in Gaia Admin Guide. Almost all commands are also available in 61000.
Few notes:
1. 61000 introduces chassis feature, which is documented in the hardware monitoring and chassis HA
section
2. In 61000 auditlog is enabled by default. All set commands are recorded to log and can be retrieved
with asg_auditlog (documented separately)
3. config-lock is the lock that protects gclish database. The lock can be held by single SGM per
system. When user attempts to perform gclish set operations from specific SGM, he should make
sure that this SGM holds the config-lock. In order to acquire config-lock, the command set config-
lock on override should be executed
4. As mentioned afore, gclish commands are applied on all SGMs, which are part of the security group.
Command output will include the list of these SGM and their reply. See examples below
5. gclish traffic runs on Sync interface, port 1129/TCP
6. Similarly to Gaia, gclish is capable of running extended commands. Use show commands extended
to see the list of extended commands, which can run from gclish
7. In order to run command on specific set of SGMs, use the blade-range specification. Once
specifying blade-range, all gclish embedded commands will run only on this subset of SGMs. Since
all SGMs must have identical configuration, the use of blade-range is hardly recommended
CP global commands
Description:
The global commands are utilities to run certain commands on multiple SGMs. This document is dealing
with Check Point products related commands, those utilities are mostly extended wrapper to known Check
Point products commands (like fw, sim, fwaccel). And some new utilities that are related to those products
(cpconfig)
The general global command syntax is shown in “OS global commands” document
The list of available commands is: sim, sim6, fwaccel, fwaccel6, fw, fw6, cpconfig
Those commands are available in the gclish in addition they are available in bash with the initial “g_”
Other relevant documents may include “OS global commands” and “General commands”.
sim, sim6
Description:
When invoked from gclish, sim/sim6 commands are global wrappers to the known sim/sim6 command.
sim/sim6 are, for most parameters, comparison type global commands which shows unified information from
all SGMs.
Note: sim affinity is not supported on 61000 Security System, g_mq_affinity should be used instead.
fwaccel, fwaccel6
Description:
When invoked from gclish, fwaccel/fwaccel6 commands are global wrappers to the known fwaccel/fwaccel6
command.
fwaccel/fwaccel6 are, for most parameters, comparison type global commands which shows unified
information from all SGMs. “fwaccel stats” and “fwaccel notifstats” commands shows an aggregated
statistics from all SGMs
Example:
gdual7-t43-ch02-02 > fwaccel stats
Displaying aggregated data from blades: all
Accelerated Path
------------------------------------------------------------------------------
accel packets 6518 accel bytes 870476
conns created 38848 conns deleted 38043
C total conns 801 C templates 0
C TCP conns 493 C delayed TCP conns 0
C non TCP conns 308 C delayed nonTCP con 0
conns from templates 0 temporary conns 0
nat conns 0 C nat conns 0
dropped packets 0 dropped bytes 0
nat templates 0 port alloc templates 0
conns from nat tmpl 0 port alloc conns 0
Policy deleted tmpl 0 C Policy deleted tmp 0
Medium Path
------------------------------------------------------------------------------
PXL packets 0 PXL async packets 0
PXL bytes 0 PXL conns 0
C PXL conns 0 C PXL templates 0
Firewall Path
------------------------------------------------------------------------------
F2F packets 10077862 F2F bytes 1185051123
F2F conns 38839 C F2F conns 800
TCP violations 0 C partial conns 0
C anticipated conns 0
General
------------------------------------------------------------------------------
memory used 0 free memory 0
(*) Statistics marked with C refer to current value, others refer to total value
Monitoring mode: fwaccel_m is an extension to global fwaccel command. It provides constant monitoring on
fwaccel output. This extension is useful for acceleration statistics display.
fw, fw6
Description:
When invoked from gclish, fw/fw6 commands are global wrappers to the known fw/fw6 command.
fw/fw6 are, for most parameters, comparison type global commands which shows unified information from
all SGMs.
Example:
gdual7-t43-ch02-02 > fw ctl
-*- 6 blades: 1_01 1_02 1_03 2_01 2_02 2_03 -*-
Usage: fw ctl command args...
chain, conn
fw dbgfile:
Description:
This command is used for easy debugging of the system
fw dbgfile collect collects firewall debugging information (fw ctl debug). User needs to stop its collection
manually - by writing stop.
fw dbgfile view shows the collected debugging information
Examples:
Debug collection: fw dbgfile collect [-buf BUF_SIZE] -f FILE [FLAGS]
FILE - file to collect the debug information to, full path should be provided
FLAGS - debug flags
For example: fw dbgfile collect -f /home/admin/temp.dbg -buf 2300 -m kiss + pmdump -m fw + xlate
OS global commands
Description:
The global commands are utilities to run certain commands on multiple SGMs. This document is dealing
with Operating System related commands, those utilities are mostly an extended wrapper to known UNIX
commands (like ls, cp, tcpdump…).
The list of available commands is: arp, cat, cp, dmesg, ethtool, ls, md5sum, mv, netstat, reboot, tail,
tcpdump asg_ifconfig, asg_ifconfig_m, top.
Other relevant documents may include “CP global commands” and “General commands”.
[global command-flags] are optional flags that determine on which SGMs the command would run. The
default behavior is to run on all up SGMs. Optional flags:
-b SGMs: in one of the following formats
A list of comma separated SGMs ids. e.g 1_1,1_4
A range of SGM ids. e.g 1_1-1_4
A list of SGMs ids and ranges e.g 1_1,1_3-1_10,1_11
all
chassis1 – all SGMs on chassis 1
chassis2 – all SGMs on chassis 2
chassis_active – all SGMs on active chassis
[native command arguments] are optional argument relevant for the running command. For example if the
command is the global extension of the UNIX command “ls” then the [cmd arguments] would be the
command arguments of the ls command, for example a directory with flags: “/var/log –lrt”
simple
Utilities of this family will run the command on all selected SGMs and returns the output as is.
Example:
> arp
1_01:
Address HWtype HWaddress Flags Mask Iface
192.0.2.2 ether 00:1C:7F:02:04:FE C Sync
172.23.9.28 ether 00:14:22:09:D2:22 C eth1-Mgmt4
192.0.2.3 ether 00:1C:7F:03:04:FE C Sync
1_02:
Address HWtype HWaddress Flags Mask Iface
192.0.2.3 ether 00:1C:7F:03:04:FE C Sync
172.23.9.28 ether 00:14:22:09:D2:22 C eth1-Mgmt4
192.0.2.1 ether 00:1C:7F:01:04:FE C Sync
1_03:
Address HWtype HWaddress Flags Mask Iface
192.0.2.1 ether 00:1C:7F:01:04:FE C Sync
172.23.9.28 ether 00:14:22:09:D2:22 C eth1-Mgmt4
192.0.2.2 ether 00:1C:7F:02:04:FE C Sync
Comparison
Utilities of this family will run the command on the selected SGM and will try to unify outputs from different
SGMs.
Example:
> md5sum /opt/CPsuite-R75/fw1/modules/fwkern.conf
-*- 6 blades: 1_01 1_02 1_03 2_01 2_02 2_03 -*-
0a3a446b638331e7815f49fdc794f9b7 /opt/CPsuite-R75/fw1/modules/fwkern.conf
Streaming
Utilities of this family will run the command on the selected SGMs in a streaming mode.
Example:
gdual7-t43-ch02-02 > tcpdump -nnni bond1
[1_01]tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
[1_01]listening on bond1, link-type EN10MB (Ethernet), capture size 96 bytes
[1_02]tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
[1_02]listening on bond1, link-type EN10MB (Ethernet), capture size 96 bytes
[1_03]tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
[1_03]listening on bond1, link-type EN10MB (Ethernet), capture size 96 bytes
[2_03]tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
[2_03]listening on bond1, link-type EN10MB (Ethernet), capture size 96 bytes
[2_02]tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
[2_02]listening on bond1, link-type EN10MB (Ethernet), capture size 96 bytes
[2_02]19:23:35.904080 IP 16.16.16.1.22 > 26.26.26.4.47780: P 274688837:274688965(128) ack
124949355 win 90 <nop,nop,timestamp 3909308151 3890511453>
[2_02]19:23:35.904189 IP 26.26.26.4.47780 > 16.16.16.1.22: . ack 128 win 501
<nop,nop,timestamp 3890512454 3909308151>
[2_02]19:23:36.547600 802.1d unknown version
[2_03]19:23:35.045794 802.1d unknown version
[2_02]19:23:36.904856 IP 16.16.16.1.22 > 26.26.26.4.47780: P 128:256(128) ack 1 win 90
<nop,nop,timestamp 3909309152 3890512454>
[2_02]19:23:36.905045 IP 26.26.26.4.47780 > 16.16.16.1.22: . ack 256 win 501
<nop,nop,timestamp 3890513455 3909309152>
[2_02]19:23:37.905665 IP 16.16.16.1.22 > 26.26.26.4.47780: P 256:384(128) ack 1 win 90
<nop,nop,timestamp 3909310153 3890513455>
[2_02]19:23:37.905819 IP 26.26.26.4.47780 > 16.16.16.1.22: . ack 384 win 501
<nop,nop,timestamp 3890514456 3909310153>
[2_02]19:23:38.547545 802.1d unknown version
[2_03]19:23:37.045745 802.1d unknown version
[2_02]19:23:38.757232 5c:26:0a:9f:07:21 > 01:80:c2:00:00:0e, ethertype Unknown (0x88cc), length
60:
[2_02] 0x0000: 0207 045c 260a 9f07 1f04 0705 312f 302f ...\&.......1/0/
[2_02] 0x0010: 3134 0602 0078 0000 0000 0000 0000 0000 14...x..........
[2_02] 0000 0000 0000 0000 ..............
[2_03]19:23:37.255452 5c:26:0a:9f:07:21 > 01:80:c2:00:00:0e, ethertype Unknown (0x88cc), length
60:
[2_03] 0x0000: 0207 045c 260a 9f07 1f04 0705 312f 302f ...\&.......1/0/
[2_03] 0x0010: 3134 0602 0078 0000 0000 0000 0000 0000 14...x..........
[2_03] 0000 0000 0000 0000 ..............
[2_02]19:23:38.906487 IP 16.16.16.1.22 > 26.26.26.4.47780: P 384:512(128) ack 1 win 90
<nop,nop,timestamp 3909311154 3890514456>
[2_02]19:23:38.906636 IP 26.26.26.4.47780 > 16.16.16.1.22: . ack 512 win 501
<nop,nop,timestamp 3890515457 3909311154>
[2_02]19:23:39.907269 IP 16.16.16.1.22 > 26.26.26.4.47780: P 512:640(128) ack 1 win 90
<nop,nop,timestamp 3909312155 3890515457>
[2_02]19:23:39.907417 IP 26.26.26.4.47780 > 16.16.16.1.22: . ack 640 win 501
<nop,nop,timestamp 3890516458 3909312155>
Examples:
The global top relies on the user configuration for the local top utility; The global command will use the local
SGM configuration file for configuring the output on the remote SGMs
Usage:
top [local] [-f [-o filename] [-n niter] | -s filename | -h] [global command-flags] [top command line
arguments]
1. Run local top (from shell) and set the desired display view
local mode
it is also possible for each blade to display output using its own local configuration file
output file
in file mode the output top will be sent to a file (default: /var/log/gtop.<time>). Use --o flag to specify a
different file to save in.
number of iterations
By default top will perform 1 iteration in file mode, use --n to specify a different number
There are three commands, which control SGMs power from CMM:
a. asg_reboot <global command-flags> – power off and on SGMs
b. asg_hard_shutdown <global command-flags> – power off SGMs
c. asg_hard_start <global command-flags> – power on SGMs
Example:
> asg_reboot -b 1_03,2_05
You are about to perform hard reboot on blades: 1_03,2_05
It might cause performance hit for a period of time
Note:
In order to run these commands on SGMs on remote chassis, at least one SGM must be UP and running on
the remote chassis.
For instructions on how to restart SSM from CMM, refer to asg_chassis_ctrl section.
Other relevant documents may include “OS global commands” and “CP global commands”.
update_conf_file:
Usage: update_conf_file <file_name> <var>=<value>
Description: update_conf_file is a utility to add, update and remove variables from configuration files
(configuration file format is specified below)
Input parametes:
file-name - Name\Path of .conf file to update. In case of known conf files full path is not required known conf
files are: fwkern.conf, simkern.conf
var - Variable name
value - New value. An empty value will remove the variable from the .conf file (yet “=” sign must be specified)
Example:
> cat /home/admin/MyConfFile.txt
-*- 3 blades: 2_01 2_02 2_03 -*-
cat: /home/admin/MyConfFile.txt: No such file or directory
global help
Usage: global help
Description: shows the list of global commands accessible through gclish and their general usage
Example:
gcpmodule-ch02-01 > global help
Usage: <command_name> [-b SGMs] [-a -l -r --] <native command arguments>
Executes the given command on specified blades.
Optional Arguments:
-b blades: in one of the following formats
1_1,1_4 or 1_1-1_4 or 1_01,1_03-1_08,1_10
all (default)
chassis1
chassis2
chassis_active
-a : Force execution on all blades (incl. down blades).
-l : Execute only on local blade.
-r : Execute only on remote blades.
Command list:
arp cat cp cpconfig cplic cpstart cpstop dmesg ethtool fw fw6 fwaccel fwaccel6 fwaccel6_m
fwaccel_m ls md5sum mv netstat reboot sim sim6 snapshot_recover snapshot_show_current tail
tcpdump top unlock update_conf_file vpn asg
asg_cp2blades
usage: asg_cp2blades [global command-flags] [-s] file-name-full-path [destination-full-path]
Description: this utility copies files from the current SGM to any specified SGMs
Input parametes:
Global command flags – the global flags which specify on which SGMs to be applied on
-s - flag that specify whether or not to save a local copy of the old file on each of the selected SGMs. The
saved copy will reside on the same directory as the original file and will end with .bak.<date>.<time>
file-name-full-path – full path to the file to be copied. If full-path is not specified the file will be searched in
current directory.
destination-full-path – full path to a destination location for the file. If destination was not specified, the file will
be copied to the source file location
example:
gcpmodule-ch02-01 > cat /home/admin/note.txt
-*- 1 blade: 2_01 -*-
hello world
-*- 2 blades: 2_02 2_03 -*-
cat: /home/admin/note.txt: No such file or directory
asg_clear_table
usage: asg_clear_table [global command-flags]
Description: clears firewall connection table. This function will delete connections from fw connection table.
Its success indication is having less than 50 connections; it will repeat delete process for up to 15 times until
meeting this threshold.
Note: if connected to the machine by SSH, this command will delete current connection and user will need to
re-establish the connection
asg_clear_messages
usage: asg_clear_messages [global command-flags]
Description: clears all messages in /var/log/messages files
Example:
gcpmodule-ch02-01 > asg_clear_messages
This action will erase the messages in /var/log/messages
and will be executed on blades: all
Are you sure? (Y - yes, any other key - no) y
Command completed successfully
Examples:
> show interface eth1-01 ipv4-address
1_01:
ipv4-address 4.4.4.10/24
1_02:
ipv4-address 4.4.4.10/24
1_03:
ipv4-address 4.4.4.10/24
1_04:
ipv4-address 4.4.4.10/24
1_05:
Blade 1_05 is down. See "/var/log/messages".
2_01:
ipv4-address 4.4.4.10/24
2_02:
ipv4-address 4.4.4.10/24
2_03:
ipv4-address 4.4.4.10/24
2_04:
ipv4-address 4.4.4.10/24
2_05:
ipv4-address 4.4.4.10/24
Syntax:
1. tcpdump –mcap
Arguments:
tcpdump [-b blade string] -mcap -w ‘full path to capture file’ [tcpdump cmdline]
Note: in order to stop the capture process and to merge the capture from all SGMs the
“stop” command need to be written.
Output:
The output file specified in the ‘-w’ command line switch. In addition to the merged
capture file, per blade capture files are created in the same directory, suffixed by their
blade id.
[Expert@cpmodule-ch01-01]# ls -l /tmp/capture*
[Expert@cpmodule-ch01-01]#
Example:
Simple usage:
tcpdump –mcap –w /tmp/capture
On selected blades:
tcpdump –b 1_1,1_3,2_1 –mcap –w /tmp/capture –nnni eth1-Mgmt4
On specific interface:
tcpdump –mcap –w /tmp/capture –nnni eth1-Mgmt4
With filter:
tcpdump –mcap –nnni eth1-Mgmt4 –w /tmp/capture proto http
2. tcpdump –view
Arguments:
tcpdump -view -r ‘full path to capture file’ [tcpdump cmdline]
Output:
Regular tcpdump output, prefixed by blade ID of the processing blade
Example:
tcpdump -view -r /tmp/capture port http
Comments
1. Run tcpdump –mcap –w /tmp/capture and wait few seconds. Write ‘stop’ and press Enter.
Check the existence of file /tmp/capture*.
2. Run tcpdump –view –r /tmp/capture to display the captured packets. The packets should be
prefixed with the blade id of the blade on which the packet was captured.
Use this command to collect system information. The information consists of files and commands output.
Major categories of collected information are:
Log files
Configuration files
System status
Indication for possible errors
The information is collected from all the SGMs and placed into a compressed folder named
asg_report.<timestamp> located under /tmp.
Commands
The commands that are being run by the asg_info are clustered into three groups.
System commands - run on SMO
Commands that are executed only on one SGM of each chassis
Commands that are executed on all blades
The output of the three groups is written to the file gasginfo_output.gz located in asg_report.<timestamp>
folder.
Files
asg_info collects certain files from all SGMs.
SGM ID is added to file names, in order to indicate where data was collected from
For example:
Filename format for files that are part of coredump.tar.gz:
coredump_1_3.tar.gz
coredump_2_5.tar.gz
The first one was collected from SGM 3 in chassis 1, and the second was collected from SGM 5 in chassis
2.
No other files exist in coredump folder, which means that all the other SGM didn’t have any information to
send.
General
Information about core dumps created by the system can be found in core.txt.
Parameter Description
List of SGMs, default: all up SGMs
[SGMs list]
Example: asg_info –a will attempt to collect information
from all SGMs, including down SGMs
-x Collect and zip all above files - this operation may take
several minutes
Example 1 asg_info -f
Output
Comments This option handles the collection of relatively light-weight information. It should finish within
few minutes.
Example 2 asg_info -x
Output
Comments This command collects all available data. Its run time is relatively high and may exceed 10
minutes.
Example 3 asg_info -c
Comments This command collects core dump from the SGM if available
This command displays system diagnostics. Upon execution, the command runs over predefined list of
diagnostics utilities from different areas: installation, networking, routing, distribution, security enforcement
and more.
asg_diag can be executed in two ways:
asg diag list
Display the predefined list of diagnostics utilities.
Example:
This example displays the last two stages of the verification:
> asg diag verify
.
.
.
==============================
Summary:
==============================
Bond Verifier - Check raw output
Bond Verifier Verbose - Check raw output
Cores Data - Check raw output
DXL Verifier - OK
Distribution Mode Verifier - OK
Dynamic Routing Verifier - Check raw output
Dynamic Routing Verifier All - Check raw output
General Status - Check raw output
Hardware Status - Check raw output
Installation Verifier - OK
Local ARP Verifier - OK
Local ARP Verifier Verbose - OK
MAC Verifier - Fail
MAC Verifier Verbose - Fail
Policy Verifier - Check raw output
Resource Status - Check raw output
Security Group Verifier - Check raw output
Syslog Verifier - OK
Version Verifier - Check raw output
Note: these commands are also part of the asg_info script which collects configuration and logging files on
the system. Serial information can be found under gasginfo output compressed file.
Both commands can only be executed from Expert shell.
asg_sgm_serial
This command extracts serial numbers from UP SGMs, which belong to the security group. In order to apply
the command on all SGMs in the security group, use [-a] parameter.
Example: > asg_sgm_serial
1_01:
Board Serial : AKO0769153
1_02:
Board Serial : AKO0585533
2_01:
Board Serial : AKO0462069
2_02:
Board Serial : AKO0447878
asg_serial_info
This command extracts serial numbers from CMMs, SSMs and chassis. In case of dual chassis system, the
information will be extracted from both units.
Example: > asg_serial_info
chassis 1 CMM1 serial: 1163978/005
chassis 1 CMM2 serial: 1157482/001
chassis 1 SSM1 serial: 0011140011
chassis 1 SSM2 serial: 0011140012
chassis 1 serial: 1159584/016
chassis 2 CMM1 serial: 1163090/041
chassis 2 CMM2 serial: 1155519/014
chassis 2 SSM1 serial: 0311310621
chassis 2 SSM2 serial: 0311310626
chassis 2 serial: 0831232/001
Note: To extract CMM, SSM and chassis serial numbers one of the SGMs on each chassis must be up and
running (i.e. if no SGM is found on chassis#2, the serial numbers of the components, associated with this
chassis, will neither be extracted nor displayed).
Chapter 2
61000 Security Systems
Configuration
Parameter Description
blade_string
List of Security Gateway Modules. For example:
-p
Persistent. The setting is kept after reboot.
-h
Display usage
Description Administer the Security Gateway Modules (blades). Administratively turn the blades
on and off.
You are about to perform blade_admin up on blades:
Output
2_03
When a blade is brought administratively up, the blade imports the configuration
from one of the up blades. This makes sure that the system configuration is
consistent.
This command is audited. Auditing makes it possible to maintain a log of critical
changes made in the system. To show audited activities, run the asg log audit
command.
This command is useful for debugging. However, we do not recommend using it in
production environments because it degrades system performance.
Parameter Description
chassis_id ID of one chassis to be modified (1 / 2)
+--------------------------------------+
| Chassis | Security Gateway Modules |
|--------------------------------------|
| 1 | 1,2,3 |
|--------------------------------------|
| 2 | 1,2,3 |
+--------------------------------------+
Comments Select which SGMs should be added or removed from the security group. Note
that:
An SGM added to the security group automatically joins the single
management object of the Security Gateway and then reboots
Before you remove an SGM from the security gateway, make sure that
its state is DOWN.
To optimize connection distribution amongst the SGMs, keep the
security group updated with the actual number of SGMs in the
appliance.
Important - Run: asg security_group verify to make sure that
the security group is correctly configured.
Distribution Modes
Distribution mode refers to the way in which an SSM disperses incoming traffic to SGMs. An SSM supports
four distribution modes:
Mode Description
User In user mode, the SGM that receives the packet is determined by the
connection destination.
User mode applies to a specified SSM.
Network In network mode, the SGM that receives the packet is determined by
the connection source.
Network mode applies to a specified SSM.
General In general mode, the SGM that receives the packet is determined by
the connection source and destination.
General mode applies to all SSM in the 61000 Security Systems.
Per-port In per-port mode, each port on the SSM is configured separately to user mode or
network mode.
Note -
Despite having four distribution modes, User/Network is considered
one mode as the two modes work together.
The configuration of the first SSM must match the configuration of the
second. For example, if the first SSM is User/Network the second
SSM must also be User/Network.
User/Network Mode
By default, the distribution mode is derived from the interfaces Topology as configured in SmartDashboard:
Data interfaces configured as Internal are set to User Mode.
Data interfaces configured as External are set to Network Mode.
For example:
Eth1-03 Internal
Eth2-03 External
Responding to the topology defined in SmartDashboard, the system sets SSM1 to User mode and SSM2 to
Network mode. The system as a whole is in User/Network mode. These two modes work together.
Note -
If all the data interfaces are set to internal, the system is still considered as being
in user/network distribution mode, even though SSM1 and SSM2 are both set to
User mode.
Management and sync interfaces, not shown in the SmartDashboard Topology
table, are not set in this way. An automatic mechanism attempts to set the
distribution mode for management interfaces per SSM as either user or network.
General Mode
General mode can only be configured manually using the asg_dxl dist_mode command ("Manually
Configuring Distribution Modes (asg_dxl dist_mode)" on page 96).
To cancel general mode:
Use the asg_dxl dist_mode set to change to a different distribution mode, or:
Use asg_dxl dist_mode policy_control to cancel the current mode and then reconfigure
the interfaces as either external or internal using the Topology page in SmartDashboard.
Note -
If you use the asg_dxl dist_mode command, you redefine SSM interfaces
(and related SGM interfaces) to be internal or external. However, this change
is not reflected in the SmartDashboard Topology for the gateway.
To see the updated configuration, run: asg_dxl dist_mode get –v.
Per-port Mode
If you configure the links this way in SmartDashboard:
SSM Interface Configured as: Distribution Mode
Eth1-03 External
2 Eth2-02 Internal
Eth2-03 External
The 61000 Security Systems is now in per port distribution mode. Each port on the SSM is configured
separately to internal or external. The distribution mode is still per port if the interfaces are configured this
way:
Eth1-03 External
2 Eth2-02 External
Eth2-03 External
Even though the interfaces on SSM2 are configured identically, as external, its distribution mode is not
user/network but per port because of the configuration on SSM1.
Parameter Description
get Shows current distribution mode.
Output
Output
If you decide on the User/Network distribution mode, you need to set the distribution mode for each
SSM separately:
If you select Per port, you need to configure the mode for each interface on an SSM:
2. To make sure that the distribution mode has been set to derive from the Topology as configured in
SmartDashboard, run: asg_dxl dist_mode verify. The origin text in the output should read
policy.
When manually configuring the distribution mode, a file (dist_mode.conf) file is created (in
/var/opt/CPsuite-R75/fw1/conf) and synchronized between the SGMs.
The file has entries similar to these:
Entry Meaning
eth1-01=1 =1 means eth1-01 is set to the User distribution mode.
SSM1 is set to per port because the interfaces are not set to the same
distribution mode.
The SSM1 configuration sets SSM2 to per port as well, even though the
interfaces on SSM2 are set to the identical distribution mode:
eth2-01=0 =0 means the eth2-01=0 is set to the Network distribution mode.
Parameter Description
enable Enables support for IPv6 and updates the distribution matrix size.
The distribution matrix is a table containing SGM IDs and used to
determine to which other SGMs a packet should be forwarded.
Output
Output
Parameters Description
Note - Before running the link aggregation commands, make sure that the slave
interfaces do not have an IP Address already assigned.
Output 1_01:
success
1_02:
success
1_03:
success
2_01:
success
2_03:
success
>
Explanation Running the command creates one virtual interface, bond4, consisting of all the
SGM interfaces on each chassis.
Page 80
Configuring Link Aggregation (Bonding)
Output 1_01:
success
1_02:
success
1_03:
success
2_01:
success
2_03:
success
>
Explanation The polling interval is how often (in milliseconds) the OS checks to see if the bond
is up.
Enslaving Interfaces
Use this command to enslave a physical interface to a named bond.
Note - There is no command to delete all slave interfaces at the same time.
Configuring VLANs
Description
Use this command to configure VLANs.
Parameter Meaning
interface The name of the interface
Parameter Description
port standard A port has one of two grades: high or standard. This parameter sets a
weight factor for the standard grade
The factor must be between 0 and 1000
Example: set chassis high-availability factors Port
standard 50
This means that ports set to standard grade have a weight of 50.
Parameter Description
Parameter Description
1 Standard priority
2 Other priority
Use this command together with the set chassis high-availability factors port command.
1. First set the port grade as standard or high.
For example:
set chassis high-availability factors port standard 50
This sets the standard grade at 50.
2. Then decide which ports have the high grade or the standard grade.
For example:
set chassis high-availability port eth1-01 priority 2
This assigns to eth1-01 the standard port grade.
Verification
Each of the set commands has a corresponding show command. For example: set chassis high-
availability primary-chassis <0-2> can be verified by running: show chassis high-
availability primary-chassis.
The Link Preemption Mechanism prevents constantly Chassis fail-over and failback whenever there is an
interface link flapping.
When Interface state has changed form down to up, it will be considered in the chassis grade only if the link
state is up for X seconds (default is 10 sec).
Configuration:
The Link Preemption Mechanism is enabled by default with preemption time of 10 seconds
In order to set a different value, run from gclish:
Deactivation:
Verification:
Parameter Meaning
chassis id The chassis ID, 1 or 2
Output
Parameter Meaning
chassis id The chassis ID, 1 or 2 or all
Output
Although the UIPC feature is automatically enabled when you run the configuration commands, you can also
manually enable or disable it:
To manually enable UIPC, run:
g_fw ctl set int fwha_uipc_enabled 1
To manually disable UIPC run:
g_fw ctl set int fwha_uipc_enabled 0
To show the existing UIPC configuration, run:
show chassis id <1|2|all> general unique_ip
Parameter Meaning
interface The interface the ROUTED daemon will use to listen for and
send OSPF messages.
Comments Before running this command, you must run the set router-id <IP
address> command. If you want to set ospf on interface eth1-01, and
the IP address of eth1-01 is 40.40.40.1, then you must to run: set
route-id 40.40.40.1 first.
To verify that the interface has OSPF enabled, run:show ospf
interfaces
To show OSPF state in relation to its neigbors, run: show ospf
neighbors
To show OSPF statistics, run: show ospf summary
To set BGP:
To configure BGP you need to:
Set the ID of the Autonomous System
Set at least one BGP neighbor
To set the AS:
Description Use this command to set the AS number
Example set as 2
Syntax set bgp <internal |external> remote-as <AS number> peer <peer IP address>
[on|off]
Parameter Meaning
internal |external Autonomous system type
Syntax
asg_blade_config [pull_config>| full_sync <ip_addr> | set_sync_start_ip
<start_ip>| reset_uptime | reset_uptime_user | get_smo_ip
|is_in_security_group|is_in_pull_conf_group |config fetch_smc]
Parameters
Parameter Description
pull_config Pulls (clones) the configuration from other SGMs ("Manual Policy
and Configuration Cloning" on page 135).
full_sync Runs full sync from a remote SGM. The <ip_addr> is the Sync IP
of the remote SGM. The full Sync process synchronizes kernel
tables between SGMs.
set_sync_start_ip Changes the Sync start IP address from the local SGM to the
specified address.
reset_uptime Resets the system uptime on all SGMs to the current time.
reset_uptime_user An interactive command that resets the uptime for all SGMs to a
user configured time.
is_in_pull_conf_group Check whether the local SGM is in the Pulling Configuration Group
(if not, the SGM won’t pull configuration and policy)
config fetch_smc Fetches the policy from the Security Management server, and
distributes it to all SGMs.
Troubleshooting asg_blade_config
To troubleshoot problems associated with the asg_blade_config command, examine the logs stored at:
/var/log_blade_config. For example, if the SGM unexpectedly reboots, you can search the log file for
the word reboot to learn why.
Syntax asg_unique_mac_utility
Output
Explanation
Use this command if you intend to deploy a number of 61000 Security Systems on the same network
segment.
The menu has four options:
This results in a new Hostname with a unique MAC value of 22 (16 in HEX):
New HOSTNAME Unique MAC
armgdn_asg22 22
The setup number replaces the default Magic MAC value of 254. After running this option, all interfaces
of type ethX-YZ have the a unique MAC value of 22 (16 in HEX)
Note - Manually setting the unique MAC without changing the HOSTNAME can
lead to confusion when number of 61000 Security Systems exist on the same
network. segment.
For the unique MAC Kernel value, run (from gclish): fw ctl get int fwha_mac_magic
> fw ctl get int fwha_mac_magic
-*- 4 sgms: 1_01 1_02 2_02 2_03 -*-
fwha_mac_magic = 22
You can also display the magic attribute within type ethX-YZ interfaces by using the ifconfig command:
# ifconfig eth1-01
eth1-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:16
inet6 addr: fe80::21c:7fff:fe81:116/64 Scope:Link
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:154820 errors:0 dropped:0 overruns:0 frame:0
TX packets:23134 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0 RX bytes:15965660 (15.2 MiB)
TX bytes:2003398 (1.9 MiB)
Output
If log server distribution is already enabled, the command shows which log servers are assigned to each
SGM:
Page 93
Configuring DNS Session Rate (cphwd_udp_selective_delay_ha)
Note - You cannot configure an SGM to send its logs to a particular log server.
Distribution takes place automatically.
Note - If the connection is not completely handled (and closed) by the acceleration device
during the set delay period, then the firewall is notified in the usual manner.
Delete on Response
After the DNS response is received, the connection is immediately deleted from the gateway instead of
being kept for an additional 60 seconds (the UDP connection default timeout).
Syntax
From gclish, run these commands in this order:
>fw ctl set int cphwd_udp_selective_delay_ha <delay in seconds>
>fwaccel off
>fwaccel on
Verification
To make sure that DNS connections are delayed by the set value:
1. Open several DNS connections from the same client to the same server
2. Run: fwaccel templates
The delay you see for the DNS template (under DLY field) should match the value specified for
cphwd_udp_selective_delay_ha.
Note - The default value for this parameter is 30 seconds. The maximum value is 60.
Note -
The number of services is limited to 8.
The command must contain 8 values. If you configure less than 8 services, enter 0
for the others.
Directly updating fwkern.conf is the only way to extend DNS session rate
enhancements to other UDP services (fw ctl set int is not supported).
The configuration takes effect only after reboot.
Parameter Description
physical-if The physical interface encapulated traffic will
leave the system from, for example eth1-01.
Parameter Description
sit if name The name of the virtual interface, which begins:
sit_6in4_<ID_number given in previous
command>.
Page 96
Configuring a Dedicated Logging Port
Important - Do not use the same port which connects to the Security Management server.
3. In gclish, run the set interface command to configure the port as a dedicated logging port:
Parameter Description
interface The interface that connects directly to the log server.
Output
Note -
The SMO in SmartDashboard makes sure that return traffic from the logging
server, such as ACKS, reaches the correct SGM.
61000 Security Systems can be configured to send logs to more than one log
server. For more on logging servers, see the R75 documentation
http://supportcontent.checkpoint.com/solutions?id=sk58362.
Configuring ECMP
Description Equal-cost multi-path routing (ECMP) is a routing strategy where you manually
define a static route to a number of next-hop gateways. To reach the destination
network defined in the static route, the packets must first go through one of the
defined next-hop gateways.
Parameter Description
<network> The IP address of the destination network
Comments To reach addresses on the 50.50.50.0/24 network, packets must first be forwarded
to one of these gateways:
20.20.20.101
20.20.20.102
20.20.20.103
Setting the static route enforces the first hop to one of these gateways.
Verification
To make sure static routes to the next-hop gateways are being enforced, run: show route static.
The output shows that the static route to 50.50.50.0/24 is via three next-hop gateways.
Disabling ECMP
ECMP is enabled by default. To disable it:
1. Open this file for editing:
$PPKDIR/boot/modules/simkern.conf
If simkern.conf does not exist, create it.
2. Add this line:
sim_routing_by_source=0
3. Save the file and reboot.
Running this command creates table 3 with a default route via 151.1.2.2
ip ro add default via 251.1.2.2 table 4
Running this command creates table 4 with a default route via 251.1.2.2
To associate traffic from a specified interface with a specified routing table:
1. On the gateway, open $FWDIR/bin/iproute.load for editing.
2. Associate the traffic using this syntax:
ip rule add dev <incoming interface> table <table number>
For example, to add a rule that routes traffic from eth3 according to table 3, run:
ip rule add dev eth3 table 3
Note -
For IPv6, replace ip with ip -6. For example: ip -6 ip -6 rule add
dev eth3 table
To see rules already listed in table 3, run: iproute showtable 3
1. Save and close the file.
2. Copy the file to all SGMs by running: g_cp2blades $FWDIR/bin/iproute.load.
To associate traffic from a specified source with a specified routing table:
1. On the gateway, open $FWDIR/bin/iproute.load for editing.
2. Associate the traffic using this syntax:
ip rule add from <ip address> table <table number>
For example, to add a rule that routes traffic from 1.1.1.1 according to table 4, run:
ip rule add from 1.1.1.1 table 4
Note -
For IPv6, replace ip with ip -6
To see rules already listed in table 4, run: iproute showtable 4
1. Save and close the file.
2. Copy the file to all SGMs by running: g_cp2blades $FWDIR/bin/iproute.load.
To create a default route for a specified routing table:
1. On the gateway, open $FWDIR/bin/iproute.load for editing.
2. Create a default route using this syntax:
ip ro add default via <IP address> table <table number>
For example, to add a default route to table 3, run:
ip ro add default via 151.1.2.2 table 3
(If necessary, replace ip with ip -6.)
3. Save and close the file
4. Copy the file to all SGMs by running: g_cp2blades $FWDIR/bin/iproute.load
To delete an interface from a routing table:
1. On the gateway, open $FWDIR/bin/iproute.load for editing.
2. Delete interfaces using this syntax:
ip rule del dev <incoming interface> table <table number>
For example to delete eth3 from table 3, run:
ip rule del dev eth3 table 3
(If necessary, replace ip with ip -6.)
3. Save and close the file.
4. Copy the file to all SGMs by running: g_cp2blades $FWDIR/bin/iproute.load
To delete a default route:
1. On the gateway, open $FWDIR/bin/iproute.load for editing.
2. Delete default routes using this syntax:
Verification
To make sure source based routing is taking place, examine the local routing table.
To see the local routing table:
1. Enter shell to exit gclish.
2. Enter iproute.list.
Shows IPv4 routes in all the routing tables.
3. Enter iproute.list -6.
Shows IPv6 routes in all the routing tables.
To compare routing tables on all SGMs:
1. On the command line, enter shell to exit the gclish.
2. Enter g_allc iproute.list.
Shows IPv4 addresses.
3. On the command line, enter g_allc iproute.list -6
Shows IPv6 routes.
Note - After editing iproute.load, you must copy the edited file to all SGMs to
implement the changes.
Monitor Only Runs verification tests and logs the result. But but does not take the
corrective actions specified in: /etc/smd_user.conf.
Debug Flags Enabled One of these debug flags are enabled: check_debug_flags
error
info
debug
tcpdump Enabled The tcpdump utility is running check_tcpdump_running
Date and Time The date and time on the tested SGM check_date_time_configuration
Configuration and on the SMO SGM differ by more
than 5 minutes.
Option Meaning
Monitor Only Mode Switches the SMD mode from the (default) enforce to monitor only.
asg log smd –f fix Shows corrective actions taken by the SMD in enforce
mode.
asg log smd –tail 10 Shows the last 10 logs from each SGM.
watch asg log smd –tail 5 Periodically shows the last 5 logs from each SGM.
cat /var/log/smd_smo.log This log is mostly used for monitoring SGMs state (e.g., UP,
DOWN and reboot). For examples, to find out when SGM
1_01 was DOWN run:
cat /var/log/smd_smo.log | grep 1_01 | grep
DOWN
To find out when SGM 2_03 was UP run:
cat /var/log/smd_smo.log | grep 2_03 | grep
UP
To confirm if SGM 2_08 has been rebooted by the SMD,
run:
cat /var/log/smd_smo.log | grep 2_08 | grep
reboot
load_ips Loads a user defined list of host IP addresses that SSM ports
should be connected to.
The pingable hosts IP file is located at:
$FWDIR/conf/pingable_hosts.ips
The file contains instructions on how to add new
hosts to the list prior to running the load_ips
command.
After adding hosts to the list, run:
asg_pingable_hosts load_ips
disable Disables the pingable hosts utility.
-monitor
Enables monitor mode only
Output
Comments When running asg stat after enabling pingable hosts, each chassis
shows the pingable hosts pnote factor:
The UP/Required column shows the pnote status, not the number of
pingable hosts up or required. The status means:
o 1 / 1 when OK
o 0 / 1 when one of the pingable hosts on the list
fails to reply
Pingable host log files are stored under: /var/log/pingable_hosts
Pingable_hosts default factor is 50. That factor can be changed by:
> set chassis high-availability factors pnote
pingable_hosts <factor>
SNMP
Description
61000 Security Systems implements an SNMP agent for:
Extracting requested SNMP parameter(s) by means of the CLI or an SNMP management tool
Sending SNMP traps
61000 Security Systems use two MIB files located on the gateway at /$CPDIR/lib/snmp:
Note - To make the setting persistent, from gclish run: save config.
asgSystemUp OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION
"Time elapsed since the last system startup"
::= { asg 11 }
The parameter is asgSystemUp, with the parameter's OID given in the last line: 11.
To extract SNMP values using the CLI
To extract the value of this SNMP parameter, use the snmpwalk command with the specified OID:
snmpwalk -v 2c -c public localhost 1.3.6.1.4.1.2620.1.44.11
SNMPv2-SMI::enterprises.2620.1.44.11.0 = STRING: "04:57:27 hours"
To extract OIDs and their values on the CLI:
To extract a list of OIDs and values, run:
snmpwalk -v 2c -c public localhost 1.3.6.1.4.1.2620.1.44
Note - An SNMP management tool can also be used to access any SNMP parameter
specified in Check Point MIB (chkpnt.mib) or to receive SNMP traps specified in the
MIB trap file (chkpnt-mbs-trap.mib).
To validate SNMP connectivity between SGMs and the SNMP management tool:
1. Do an SNMP GET operation from the SNMP Management tool.
2. On the gateway, make sure the tcpdump utility uses UDP port 162 by running:
> tcpdump -nnni Mgmt host 194.29.47.75 and port 162
Note -
port 162 is the port for SNMP traps
194.29.47.75 is the IP address of the SNMP management tool
3. Run: tcpdump.
SNMP GetRequest and GetResponse messages should be in the output:
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on Mgmt, link-type EN10MB (Ethernet), capture size 96 bytes
04:16:18.920123 IP 194.29.47.75.52184 > 172.23.9.91.161: GetRequest(31)
.1.3.6.1.4.1.2620.1.44.1.0
04:16:18.920507 IP 172.23.9.91.161 > 194.29.47.75.52184: GetResponse(34)
.1.3.6.1.4.1.2620.1.44.1.0="ASG"
4. Make sure SNMP packets arrived on ports 161 and 162 are not dropped by running:
> fw ctl zdebug + drop
Search for: Rulebase drop - rule x, where x is the rule number in SmartDashboard. Make sure
the rule allows SNMP and SNMP trap services.
asg_sync_manager
Description
The asg_sync_manager enables the user to define its required synchronization level. The synchronization
level is a combination of system synchronization settings (e.g. backup connections to standby chassis) and
specific rules (e.g. do not sync HTTP connections). Specific rules are referred to as sync exception table.
Connections are serially matched against this table.
In addition to the synchronization settings, this utility also controls SecureXL delayed synchronization
parameters: when connection is created within SecureXL (from SecureXL template), asg_sync_manager
can set the period until it will be synchronized to firewall.
By default, specific sync exception table consists of a single rule, which is not to synchronize DNS traffic.
Key synchronization properties are also displayed in asg stat -v
Syntax:
Usage:
The utility is interactive. The following options are available:
Use Description
1) Print sync This view displays the sync exception table. Each entry in this table consists of:
exceptions table 1. <5-tuple, including wild cards>
2. synchronization mode (none, within chassis only, between chassis only, both
within and between chassis)
3. SecureXL delayed synchronization value
In addition, global synchronization values are displayed
2) Add new sync Add new rule to the sync exceptions table. The user can hit enter at any stage to
exceptions rule apply the default value. Specific rules allow the use of wildcards within 5-tuple. New
rule will apply for new connections
3) Delete old sync Delete rule from the sync exceptions table
exception rule
4) Set sync Global system setting: whether to synchronize connections to backup chassis
between chassis
flag on / off
5) Set sync within Global system setting: whether to synchronize connections within active chassis
local chassis flag
on / off
6) Configure sync Minimal blades ratio between active and backup chassis for synchronization to occur.
between chassis If the number of UP SGMs in standby chassis is significantly low, compared to active
blades ratio chassis, synchronization might overload them. Default ratio for synchronization is
70% and it can be re-configured here. After configuration, user can also choose to
restore default settings
7) Set default Default delayed synchronization setting are divided to HTTP related services (30)
delay notifications and all other services (5). User can reconfigure these settings here. Note that when
configuring service delayed synchronization in SmartDashboard it overrides these
settings
8) Enable / The user can enable / disable unicast sync (correction layer will be enabled /
Disable unicast disabled accordingly) and return to legacy synchronization scheme (synchronize
sync connections to all SGMs). Changing this setting requires reboot of all SGMs
Output:
This is the main menu of the tool:
Please choose one of the following:
-----------------------------------
1) Print sync exceptions table
2) Add new sync exceptions rule
3) Delete old sync exception rule
4) Set sync between chassis flag on / off
5) Set sync within local chassis on / off
6) Configure sync between chassis blades ratio
7) Set default delay notifications
8) Enable / Disable unicast sync
9) Exit
Example:
The following example shows how to add rule which limits the synchronization of HTTP traffic, initiated from
network 3.3.3.0/24 to network 4.4.4.0/24 to active chassis only:
Example:
Syntax
New glclish command asg_ntp_sync_config was implemented to allow configuring automatic time updates
from NTP server.
asg_ntp_sync_config on <NTP Server IP | hostname> [-v <NTP version>] [-r <Refresh Timeout>] -
configures automatic ntp time synchronization each Refresh Timeout seconds from the NTP server.
If Refresh Timeout is not specified, it defaults to 5 minutes. If NTP version is not specified, NTPv4 will be
used.
asg_ntp_sync_config off - disables automatic time synchronization via NTP
The command updates all blades with the NTP server IP address and other settings into /config/active
(equal to running the gclish command "set ntp server primary <IP Address> version <NTP version>") and
schedules running of the script $FWDIR/bin/asg_ntp_update_time, which pulls the time from the NTP
server. The scheduled task can be viewed by running the command 'cpd_sched_config print'.
Each Refresh Timeout seconds, the local time is updated on each blade by running the command 'ntpdate -
u'. If timeout is less than 300 seconds (5 minutes), the time on the CMM is updated no more than each 5
minutes.
Validation
Execute “show time” from gclish, validate same time on all SGMs
Execute tcpdump on port 123/UDP on the relevant interface and verify that all SGMs initiate NTP
connections
Comments
If new blade is added after configuring NTP time synchronization, the script needs to be re-run to
schedule it also on the new blade.
Jumbo Frames
Description:
61000 Security System has the capability to support Jumbo Frames but it is still not fully integrated. For that
reason the configuration is not trivial and requires several steps:
1. Configuration of Jumbo Frames on the SSM.
2. Enabling Jumbo Frames on the gateway.
3. Configuring Jumbo Frames on the gateway interfaces.
The maximum MTU supported is 9146 for SSM60 systems and 12288 for SSM160 systems.
Configuration
Configuration of Jumbo Frames on the SSM
In order to allow Jumbo Frames on the SSM we need to modify the MTU of the ports leading to the blades
(downlinks) and of the front panel ports we wish to allow Jumbo Frames on.
Instructions for SSM60:
1. Connect to the SSM with telnet (Use “show chassis id <chassis ID> module SSM<SSM ID> ip“ to
verify the SSM IP. Password is admin).
2. Issue "en" to enter "enable" mode.
3. Issue "conf t" to enter the Configuration terminal.
4. Select to configure all the downlinks interfaces ("#interface range 1/2/1-1/14/1")
5. Set the required MTU (#packet-size-limit 9146).
6. Select to configure the required front panel ports. Interfaces 1/15/1 – 1/15/5 represents ports 1-5 of
the SSM. ("#interface range 1/15/1-1/15/5" for all of them).
7. Set the required MTU (#packet-size-limit 9146).
8. Exit Configuration terminal ("#end") and save configuration ("#write").
# telnet 198.51.100.32
Trying 198.51.100.32...
Connected to 198.51.100.32.
Escape character is '^]'.
Note: In SSM160 systems this action will also enable Jumbo frames on the SSMs, but only for the local
chassis.
Validation
Before you start transmitting jumbo frames via the gateway it is recommended to verify your Jumbo Frames
configuration
# telnet 198.51.100.32
Trying 198.51.100.32...
Connected to 198.51.100.32.
Escape character is '^]'.
# asg_jumbo_conf show -v
Jumbo frames are enabled (SSM1 max MTU: 9146, SSM2 max MTU: 9146)
Current interfaces MTU configuration:
interface:BPEth0:mtu 9146
interface:BPEth1:mtu 9146
interface:eth1-01:mtu 3500
interface:eth1-02:mtu 6500
interface:eth1-03:mtu 9146
interface:eth2-01:mtu 9146
interface:eth2-02:mtu 9000
interface:eth2-03:mtu 9146
The MTU of all the interfaces which are not in the list is 1500.
Syntax:
# asg_gre load | stat | verify
Example:
Configuration:
To configure GRE, you will need to edit this configuration file:
$FWDIR/conf/gre_loader.conf
Tunnel configuration:
tunnel=<tunnel interface name> local_tun_addr=<local tunnel ip address>
remote_tun_addr=<remote tunnel ip address> phy_ifname=<physical interface name>
local_addr=<local physical address> remote_addr=<remote physical address>
ttl=<ttl>
Route configuration:
tunnel_route=<tunnel interface name> remote_tun_addr=<remote tunnel ip address>
network=<network>
Configuration Example:
To configure tunnel interface with these parameters:
Tunnel interface name: "GREtun"
Local tunnel address 10.0.0.3
Remote tunnel address 10.0.0.4
Physical interface eth2-01
Local address 40.40.40.1
Remote address 40.40.40.2
ttl 64
To add route for 50.50.50.0/24 to go thorugh the tunnel use the following line:
tunnel_route=GREtun remote_tun_addr=10.0.0.4 network=50.50.50.0/24
Output:
# asg_gre load
# asg_gre load
1_01:
Configuration loaded
1_02:
Configuration loaded
1_03:
Configuration loaded
1_04:
Configuration loaded
Configuration:
In order to configure the proxy ARP mechanism on 61K GW:
1. Add any IPs for which 61k should answer to ARP requests and the respective MAC addresses to be
advertised to the $FWDIR/conf/local.arp file on the local SGM.
Note: Interface VMAC value is different between Chassis when working on a Dual Chassis setup.
When editing the local.arp file, MAC values should be taken from the local SGM.
For example, in order to reply to ARP requests for IP 192.168.10.100 on interface eth2-01 with MAC
address 00:1C:7F:82:01:FE, add the following entry to the local.arp file:
192.168.10.100 00:1C:7F:82:01:FE
2. Execute the command local_arp_update on the SGM with the updated file in order to distribute it
among all the SGMs in the system. That command distributes the local.arp file to any SGM in the
system, automatically changes the MAC values for SGMs on another chassis.
4. Install policy (in order for the updated proxy ARP entries to be applied)
Notes:
1. When adding additional SGMs to a system that has the proxy ARP configured, the local.arp file will
be copied and applied during the configuration cloning.
2. Proxy ARP is also required when configuring Connect Control on the 61K appliance.
Verification:
In order to verify that all the entries in local.arp file are applied correctly on the system run
asg_local_arp_verifier. Manual comparison can be done by running g_fw ctl arp.
Syntax
asg_affinity_enhance [ -s | -u | -v | -d | -h ]
Options:
-s : turn on multi-queue for vlan (for improved vlan packet-rate)
-u : turn off multi-queue for vlan (for improved clear packet-rate)
-v : show current setting
-d : restore default setting (off)
-h : show this help
Example
To enable VLAN performance enhancement run:
gperf-ch01-02 > asg_affinity_enhance -s
Chapter 3
61000 Security Systems
Miscellaneous Commands
Policy Installation and the Single
Management Object
The Single Management Object (SMO), a software technology used to manage 61000 Security Systems
gateways, can handle up to 24 SGMs (24 in a dual chassis deployment).
Under SMO, multiple SGMs have the same management IP address.
Management tasks such as policy installation and logging are handled by one SGM, called the
SMO Master.
The SMO Master is active SGM with the lowest ID.
During policy installation:
1. The Security Management server installs the policy on the SMO Master.
2. The SMO distributes the policy to all SGMs.
3. Each SGM begins installing the policy locally, and sends and receives policy stage updates to and from
the other SGMs. SGMs need to install the policy in a synchronized manner. Policy installation has four
stages:
a) Policy Started
Indicates that Policy installation has started on the local SGM.
b) Policy Ready2Finish
Local policy installation has completed, but the SGM is waiting for other SGMs to reach the same
stage.
c) Policy Completed
The policy is applied in a way that synchronizes with the other SGMs.
d) Enforcing Security
The SGM enforces the new policy.
Note - When installing the 61000 Security Systems, SGMs enforce an initial policy where
only the implied rules necessary for management are enforced.
Uninstalling a Policy:
A policy can be uninstalled from the gateway in two ways
Useful Commands
asg stat –i tasks
Use this command to identify the SMO and view how tasks are distributed on the SGMs.
asg monitor
asg_policy verify
Use this command to make sure the SGMs have the same policy installed.
Parameter Description
Syntax:
g_avsu_update -b <blade string> <urlf/av/all>
Note:
Update configuration (proxy, username, etc.) should be set in SmartDashboard before issuing this
command. Policy should be installed afterwards.
Manual updates of Anti-Virus and URL Filtering from SmartDashbaord are not supported.
To add other services to the template (for example HTTP and Telnet), on the SMO:
1. Exit gclish
(To exit gclish, enter: shell.)
2. Open: /etc/fw.boot/modules/fwkern.conf for editing
3. Add cphwd_use_srcip_wildcard_for_template=80,23 to the file.
This adds ports 80 and 23 to the list of permitted destination ports.
Separate each port number with a comma
Verification
To make sure extended SecureXL templates are being used:
1. In gclish, run: fwaccel templates.
2. Examine the output.
An asterisk (*) in the Source column and an increasing Conns counter means the extended template is
being utilized.
d) Click Initialize.
3. On the gateway, run: g_cpconfig sic state.
Make sure that Trust is established.
SIC Cleanup
To resolve other SIC issues, do a SIC cleanup. There are two ways to do a SIC cleanup:
Run: asg_blade_config reset_sic -reboot_all <activation_key>.
Or:
1. Shutdown all SGMs (but not the SMO SGM) using the ccutil command in the Bash shell.
2. Connect to the SMO SGM using a serial connection.
3. In SmartDashboard > General Properties > Communication initialize SIC.
4. Install a policy on the SMO SGM.
5. Turn on all SGMs.
Configuration
Select “Keep all connections” in SDB gateway’s properties->other->connection persistence
Note: Feature is enabled only if:
SecureXL is enabled
FW blade only is enabled
Legacy mode:
To allow “Keep all connections” while disabling “SecureXL keep connections” set cphwd_policy_accel=0 in
fwker.conf
Verification:
After policy installation, templates of the old policy should be deleted. This can be tracked in the following
way:
o Run g_fwaccel stats
o Save the old value of the “Policy deleted tmpl” statistic
o Install policy
o Run g_fwaccel stats again
o Make sure that templates were deleted
Configuration:
In order to set a different value, instead of 3.5M, run:
# fw ctl set int fwconn_tab_limit_user <new value, e.g. 4000000>
# update_conf_file fwkern.conf fwconn_tab_limit_user=<new value, e.g. 4000000>
# Install policy
Deactivation:
In order to restore legacy behavior and configure firewall connections table size from SmartDashboard-
>Gateway Properties->Capacity Optimization->Maximum concurrent connections, run:
# update_conf_file fwkern.conf fwconn_tab_limit_from_policy=1
# reboot -b all
Verification:
To verify firewall connections table size run:
# fw tab -t connections -m 1
And check limit attribute in each blade.
Example:
gcp-ch01-01 > fw tab -t connections -m 1
1_01:
localhost:
-------- connections --------
dynamic, id 8158, attributes: keep, sync, aggressive aging, kbufs 18 19 20 21
22 23 24 25 26 27 28 29 30 31 32 33 34 35, expires 25, refresh, limit 3500000,
hashsize 4194304
1_02:
localhost:
-------- connections --------
dynamic, id 8158, attributes: keep, sync, aggressive aging, kbufs 18 19 20 21
22 23 24 25 26 27 28 29 30 31 32 33 34 35, expires 25, refresh, limit 3500000,
hashsize 4194304
Note -
During the restore procedure, you can select whether to restore:
Only the network configuration
Network configuration and security policy.
Warning: After reverting to a backed-up policy, SmartDashboard no longer reflects
the actual policy settings on the gateway.
The backup_system command is only available from the bash shell.
After restoring a configuration and policy, all SGMs must be rebooted
(Run: g_reboot –b all)
Parameter Description
backup Creates a backup file with a default name in
/var/CPbackup/asg_backup/
Example:
> backup_system restore
Backup files:
-------------
1) initial.tgz
2) ipv6.tgz
3) normal.tgz
Please select file
>1
copying /var/CPbackup/asg_backup/initial.tgz to all blades
Would you like to restore policy in addition to configuration? y/n [n]
>y
copying /var/CPbackup/asg_backup/initial.policy.tgz to all blades
Would you like to backup your system now? y/n [y]
>n
extracting file initial.tgz
extracting file initial.policy.tgz
restore completed successfully, please reboot all blades
> g_reboot –b all
Traceroute (asg_tracert)
Description:
Native tracert tool that runs locally from blade's shell (e.g., tracert <IP>) does not work properly on 61000.
The reason is that tracert is probing the requests in high rate and due to stickiness mechanism in the firewall
these packets are being dropped. Thus, asg_tracert replaces tracert and it limits the probing rate by pausing
0.5 seconds between probes. Actually asg_tracert runs tracert with “–z 500” option by force to slow down
tracert probing. Note that asg_tracert can be used also with other tracert options.
Syntax:
Example:
asg_tracert 100.100.100.99
Output:
gesx-ch01-01 >
gesx-ch01-01 >
Explanation
RADIUS authentication
Description
RADIUS (Remote Authentication Dial-In User Service) is a client/server authentication system that supports
remote-access applications. User profiles are kept in a central database on a RADIUS authentication server.
Client computers or applications connect to the RADIUS server to authenticate users.
You can configure 61k to work as a RADIUS client. 61k does not include RADIUS server functionality. You
can configure 61k to authenticate users even when they are not defined locally. See Configuring Non-local
RADIUS Users.
You can configure your 61k computer to connect to more than one RADIUS server. If the first server in the
list is unavailable, the next RADIUS server in the priority list connects. You can delete a server at all times.
Note: On R75.035 RADIUS server is accessed through data interface only. Radius Server cannon be
accessed through the management interface. (This is supported from 61k R75.050)
Syntax:
add aaa radius-servers priority VALUE host VALUE [ port VALUE ] prompt-
secret timeout VALUE
add aaa radius-servers priority VALUE host VALUE [ port VALUE ] secret
VALUE timeout VALUE
Example: Adding a new radius server 1.1.1.1 which listens on port 1812
Note: the configuration is done according to the priority and not the sever ID or name.
Parameters:
Parameter Description
priority RADIUS server priority as an integer between 0 and 999 (default=0).
When there two or more RADIUS servers, Gaia connects to the server
with the highest priority. Low numbers have the higher priority.
port UDP port on the RADIUS server. This value must match the port as
configured on the RADIUS server. Typically this 1812 (default) or 1645
(non-standard but a commonly used alternative).
prompt secret Shared secret (password) text string. The system prompts you to enter
the value.
timeout The number of seconds to wait for the server to respond. The default
value 3 seconds.
secret The shared secret used to authenticate the RADIUS server and the
local client. You must define this value on your RADIUS server.
Note: After the 61000 is configured as a RADIUS client, any authentication request will be forwarded to the
RADIUS server. As a result, every account which is configured locally should be configured on the RADIUS
server as well.
The default role can include a combination of administrative (read/write) access to some features,
monitoring (read-only) access to other features, and no access to other features.
readonly-features <List> - Comma separated list of Gaia features that have read only
permissions in the specified role.
readwrite-features <List> - Comma separated list of Gaia features that have read/write
permissions in the specified role.
Example:
add rba role radius-group-any domain-type System readonly-features arp
Verification:
Upon successful authentication, the user 'my_radius_user' will be assigned the role 'radius-group-any'
granted all the privileges defined in the radius-group-any role
Parameters:
Parameter Description
Login name of the user.
user
Parameters:
Parameter Description
The user name to assign a role to.
User
The role to assign to the user.
Roles
Parameters:
Parameter Description
Determines the role’s name.
Role
Comma separated list of features to grant read only permissions for.
readonly-features
Chapter 4
61000 Security Systems - Appendix
Policy and Configuration Cloning
In 61000 GW, configuration is identical on all SGMs. When SGM goes up, it pulls all configurations from
SMO (if there is SMO). If there is no SMO (meaning the SGM goes up while there is no other SGM up), the
SGM will run its local configuration.
Configuration includes two parts:
1. FW1 policy.
2. Set of files as defined under “xfer files list”.
“xfer files list” file can be found under “/etc/xfer_file_list” and containing the files that would be pulled during
configuration cloning. Each pulled file is matched against the already file available on the machine. The
structure of each entry in that file is composed of two parts. First part is a path to the file. Second part is
action. The format of the file is explained in “Cloning the Configuration” section.
The configuration cloning is done automatically every time SGM goes up, and can also be done manually by
the user (only for troubleshooting)
Parameter Description
SGM_sync_ip IP address of sync port
If there is a configuration problem on a Security Gateway Module, use this command to manually pull and
apply (clone) the configuration from another Security Gateway Module:
Parameter Description
SGM_sync_ip IP address of sync port
Explanation
All Security Gateway Modules maintain a local configuration. The local configuration consists of the firewall
policy and the set of files listed in /etc/xfer_file_list. The xfer_file_list file has this format:
Each line describes a path to a configuration file, in this case fwkern.conf, followed by an action to take
if the "pulled" file is different from the local file. (When you clone the configuration, the firewall policy and
configuration files are "pulled" from the specified SGM and matched against the local versions). The action
attributed to each file in the list can be:
Action Meaning
/bin/false Reboot immediately after cloning completes
If the entry does not specify /bin/true or /bin/false for a given file, a "callback script" decides on the
necessary action.
Output
SW Upgrade Procedure
Description:
61K supports upgrade procedure on Dual Chassis setup. The procedure assures network connectivity at all
times during the upgrade by maintaining at least one Active Chassis that handles traffic. Old connections,
meaning connections that were opened on the chassis with the old version, will survive the upgrade only
when upgrading between minor versions.
Upgrade procedure:
1. Copy new_version snapshot file (*.tar) to SMO SGM, and from SMO to all SGMs
[asg_cp2blades].
6. Revert to the new snapshot on the down admin chassis via shell:
[g_snapshot <blade_string> revert <snapshot_name>]
Example of reverting to snapshot: my_snapshot, for chassis 2:
[g_snapshot –b chassis2 revert my_snapshot]
7. Wait until the chassis is UP, running the new version (verify with [ver] via gclish).
10. Perform Chassis admin down to the active chassis via gclish:
[asg_chassis_admin -c <chassis_id> down]
11. Revert to new snapshot on the down admin chassis via shell:
[g_snapshot <blade_string> revert <snapshot_name>]
12. Wait until the chassis is be UP, running the new version (verify with [ver] via gclish)
Notes:
1. The procedure requires Dual Chassis setup
2. The procedure is supported for upgrade from R75.01 to R75.03 or to R75.035, and for upgrade from
R75.03 to R75.035 (refer to official version names section in the CLI guide appendix).
3. All SGMs should be in UP state during the upgrade
4. Both SSH or console can be used
Verification:
Verify the current snapshot on all SGMs (via gclish):
“show snapshots”
Screenshots:
“show snapshots” output:
Detailed steps:
1. Pre Upgrade
a. Connect to 61k, get and save the following chassis configuration for later verifications:
asg if
asg stat -v
asg diag
asg_version
b. Create a backup of the configuration by running the following command from shell:
g_all backup_system backup ssm60
Important note:
Make sure the correct firmware version on the SSM160s is installed:
61000 R75.035 is only compatible with SSM160 firmware 2.4.B6
61000 R75.050 is only compatible with SSM160 firmware 2.4.B11
2. Disconnect Standby chassis (B) entirely from the Network and upgrade SSMs
a. Disconnect the Standby chassis (B) entirely from the network (Management Interfaces,
Traffic Interfaces and Sync Interface)
b. Shutdown (physically) all SGMs in the disconnected chassis
c. Replace both SSM60 with SSM160 in the disconnected chassis. Wait for both SSM160 to
boot up (might take few minutes).
Verify SSM160s have the correct firmware installed (see section 1), upgrade if needed.
d. Power up all SGMs in the disconnected chassis
e. Wait for all SGMs to go UP. Check this by running asg_monitor on one of the SGMs (via
console).
Note: SGMs may perform more than one reboot while booting up, therefore this step might
take a while to finish.
f. Reconfigure management interfaces if needed. See SSM Upgrade - Appendix below.
g. Run verification tests:
Verify SSM firmware – run from gclish ‘asg_version’.
Validate Chassis configuration by comparing the following with configuration output
from section 1
1. asg if – Validate same IP addresses exist on the Interfaces.
Pay attention to management interface changes according to the above
reconfiguration (note that the new management interface will not appear
until policy with the new topology is installed).
2. asg diag
3. asg stat –v – Verify all local chassis SGMs are up and running and chassis
state is Active.
To verify successful creation of interfaces on all SGMs, run ethtool eth1-[1-16] and
ethtool eth2-[1-16] from gclish and verify that all SGMs identify them.
Run asg hw_monitor to verify CIN health
h. Configure the GARPs refresh interval to 10 seconds by “g_fw ctl set int
fwha_gratuitous_arp_timeout 100”
3. Disconnect the Active chassis (A) and reconnect the new upgraded Active chassis (B)
a. The existing cables should be disconnected from the Active chassis (A).
b. The existing cables should be reconnected to the new upgraded Active chassis (B).
Take into account the change in the management interface which was configured in the
previous section.
c. In case of bond interfaces, it is recommended to run asg_chassis_ctrl clear_mac_learning.
d. Very that traffic is processed by the new Active upgraded chassis (B).
At this point, rollback to the previous Active chassis can be performed if needed.
4. Upgrade SSMs on the previous Active (disconnected) chassis (A)
a. Repeat steps 2.b – 2.g on the disconnected chassis.
5. Re-connect the previous Active chassis (A) to the network and to the other chassis
a. Re-Connect the Sync network Cables between the chassis
b. Re-Connect the other network Cables (Management Interfaces, Traffic Interfaces)
Take into account the change in the management interface which was configured in the
previous section.
c. Verify both chassis communicate
d. Run from gclish ‘asg stat –v’ and verify you have Active & Standby Chassis and all SGMs
are UP.
e. Get topology and install policy (make sure the new management port configuration takes
effect).
6. Configure GARPs on chassis (B) back to their default
c. Configure the GARPs refresh interval in the system back to its default (60 seconds) by
running from shell “g_fw ctl set int fwha_gratuitous_arp_timeout 600”
For example, if the management port on SSM60 is eth1-Mgmt3 (10G port), it will have to be reconfigured,
for instance, to port eth1-Mgmt1 on SSM160 (also 10G port), by running the following commands in gclish:
delete interface eth1-Mgmt3 ipv4-address
set interface eth1-Mgmt1 ipv4-address <Mgmt IP> mask-length <mask length>
Hybrid System
Description:
The number of physical cores on an SGM dictates the number of firewall and ppak instances that will run on
the SGM (1 core per instance). For example, an SGM with 8 physical cores might have 4 instances of
firewall and 4 instances of ppak, on the other hand an SGM with 12 physical cores might have 8 instances
of firewall and 4 instances of ppak.
The number of firewall and ppak instances must be identical on all SGMs in order for the system to work
properly. The hybrid systems mechanism allows 61k to work with SGMs which have different numbers of
physical cores.
When an SGM boots up, as part of the configuration cloning, it tries to adjust its instances number to the
current instances number in the system (which is dictated by the SGM it clones the configuration from –
usually the SMO). If the booting SGM has enough physical cores to match the other SGMs, then it will
complete the boot process successfully and will go to “UP” state (note that some cores may remain
unutilized). If on the other hand, the booting blade does not have enough physical cores to match the
configuration, then it will remain in “DOWN” state and will have a “Cores” PNote (Problem Notification).
To “fix” an SGM with the “Cores” PNote it must be rebooted, in order to try again to match the instance
configuration in the system.
Configuration:
In order to manually configure the firewall instances number, run:
# cpconfig corexl instances [n]
n – the number of desired firewall instances
Note: The number of ppak instances will be automatically derived from the firewall instance configuration.
Verification:
In order to display the cores and instances information in the system, run:
# asg cores_stat
To see: Run:
To see: Run:
This utility will collect information regarding dynamic routing protocols configured on the system, and will
check for inconsistency among blades.
If the "all" parameter is specified, factors which are not indicate on inconsistency problem will also be
compared (disable smart compare).
Bit Conventions
BMAC
1 - 1 bit stating if this address is BMAC/SMAC(0) or VMAC(1) to avoid possible collision with
VMAC space.
2,...,8 - 7 bits that state the member ID (starting from 1) - limited to 127 members
9,...,13 - zero bits.
14 - 1 bit stating if this address is BMAC(0) or SMAC(1) to avoid possible collision with SMAC
space
15,16 - 2 bits that state the absolute interface number (taken from interface name: i.e. in BPEthX,
X is the interface number - limited to 4 interfaces.)
SMAC
1 - 1 bit stating if this address is BMAC/SMAC(0) or VMAC(1) to avoid possible collision with
VMAC space
2,...,8 - 7 bits that state the member ID (starting from 1) - limited to 127 members
9 - 1 bit stating whether it is Sync1(0) or Sync2(1)
9,...,13 - zero bits
14 - 1 bit stating if this address is BMAC(0) or SMAC(1) to avoid possible collision with BMAC
space
15 - Zero bit
16 - 1 bit stating whether it is Sync1(0) or Sync2(1)
VMAC
1 - 1 bit stating if this address is BMAC/SMAC(0) or VMAC(1) to avoid possible collision with
BMAC/SMAC space
2,...,3 - 2 bits to indicate chassis id (starting from 0) - limited to 4 boxes
4,...,8 - 5 bits to indicate switch number - limited to 32 switches
9,...,16 - 8 bits to indicate port number - limited to 256 ports per switch.
MAC type
Chassis ID
SGM ID
Assigned interface
Explanation
The given MAC Address was taken from the interface BPEth0, within SGM 1 on Chassis 1
Assuming 00:1C:7F:XY:ZW:FE is the structure of the MAC address MAC magic attribute is
denoted by FE.
INDEX are 16 bits (2 Bytes) denoted by XY:ZW 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16.
In 61K system, each MAC address contains information about the Chassis ID, Blade ID and interface.
mac_verifier utility will verify that all vmac on ethx-yz interfaces and bond interfaces are the same on all
blades on the same chassis.
Usage:
Output example:
SMM60 CLI
The Security Switch Module (SSM):
Distributes network traffic to the Security Gateway Modules (SGMs)
Forwards traffic from the SGMs to the network
Shares the load amongst the SGMs
Communication between the SSMs and SGMs occurs automatically via SNMP requests, but you can also
connect directly to the SMM and run commands.
There are two ways to connect to the SMM CLI:
Connect to a serial port on the front panel of the SMM.
The SSM60 has two serial ports, one for the fabric switch (data ports) and one for the base switch
(management ports).
1 Base 198.51.100.31
Fabric 198.51.100.32
2 Base 198.51.100.231
Fabric 198.51.100.232
SSM160 CLI
Description:
The SSM (Security Switch Module) is the networking module of the gateway. It transmits traffic to and from
the SGM and performs the load distribution among the SGMs. The SSM includes two modules, the fabric
switch which includes the data ports and the base switch which includes the Management ports. Most of the
communication with the SSM is done automatically by SNMP requests from the SGM but on some events
connecting directly to the SSM can be useful.
Configuration:
Connection to the SSM CLI can be established in two ways:
1. The administrator can connect with a serial console to the “CLI” port on the SSM front panel (baud
rate 9600).
2. From one of the SGMs use ssh to connect to the SSM. The SSM IPs can be retrieved by “show
chassis id <1|2|all> module SSM<1|2> ip” from clish/gclish.
The password for the SSM is “admin”.
Once connected to the SSM CLI you can do the following:
1. View the current configuration:
# show running-config [feature name]
Since the entire configuration is very long it is recommended to specify the feature which you are
interested in its configuration, for example “show running-config load-balance” to see the Load
Balance configuration. You can press tab to see a complete list of the features.
2. View current ports status:
#show port
3. View detailed port information (speed, administrative state, link state, etc.):
#show port <port ID>
4. View interface statistics:
# show port <Port ID> statistics
Pay special intention to “Discards” and “Errors” fields which might indicate on a problem if they are
constantly increasing.
5. View SSM logs:
#unhide private (default password is “private”)
#show private shell
# tail /var/log/messages
6. Modify load distribution SGM group:
# configure terminal
(config)# load-balance mtx-bucket 1 buckets [<SGM ID><SGM ID>:<SGM ID><SGM ID>…]
(config)# commit
(config)# exit
#load-balance apply
Note that you need to provide a full list of the SGMs as the SGM list parameter to the “load-balance
mtx-bucket” command, otherwise, traffic might be dropped on the SSM.
7. Switch between Ports modes for 40G ports (4X10G or 1X40G):
#unhide private (default password is “private”)
#show private shell
For switching to 1X40G mode:
# /batm/binux/bin/ub_util -s ahub4_40G yes
For switching to 4X10G mode:
# /batm/binux/bin/ub_util -s ahub4_40G
# exit
#config terminal
(config)#system reload
Note that the process requires to reload the SSM, it is recommended to do it one SSM at a time.
8. View the current version information:
#show version
9. Logout from current session:
#logout
Each port ID on the SGM maps to a port on the SSM, the below table maps the SSM port IDs to the SGM
port IDs. Note that it relates to SSM1, for SSM2 simply replace eth1-X with eth2-X:
SGM SSM SGM SSM
eth1-01 1/3/1 eth1-11 1/1/3
eth1-02 1/3/2 eth1-12 1/1/4
eth1-03 1/3/3 eth1-13 1/2/1
eth1-04 1/3/4 eth1-14 1/2/2
eth1-05 1/3/5 eth1-15 1/2/3
eth1-06 1/3/6 eth1-16 1/2/4
eth1-07 1/3/7 eth1-Mgmt1 1/5/1
eth1-Sync 1/3/8 eth1-Mgmt2 1/5/2
eth1-09 1/1/1 eth1-Mgmt3 1/5/3
eth1-10 1/1/2 eth1-Mgmt4 1/5/4
Verification:
To verify that you have connectivity to the SSMs from the SGMs ping all the SSM modules IPs. You can
also verify that SNMP connectivity is available by running “asg_chassis_ctrl get_ssm_firmware all”.
Off 10 Mbps
Off N/A
Chassis ID Configuration
When installing and configuring chassis high availability, you must make sure that chassis ID are different
before you start to configure the software.
Chassis IDs are configured on the CMM and should be <1> for the first chassis and <2> for the second
chassis.
Note: In case your 61000 Security System is up and running, change the chassis ID on the Standby
Chassis, hence you will have to perform chassis failover.
Procedure
Page 153
Chassis ID Configuration
II. Connect to the 61000 Security System CMM using a terminal emulation application such as
PuTTY.
Make sure the Speed (baud rate) is set to 9600.
No IP address is necessary.
III. Log in with username and password: admin/admin.
3. Edit the file /etc./shmm.cfg using ‘vi’. And set the correct ID on the line with the string
SHMM_CHASSID
# vi /etc./shmm.cfg
# ------------------------------------
# Shelf Manager Config file, template
# <<--- '#' for comment
#
#!/bin/bash
SHMM_IP="10.10.11.35"
SHMM_IP2="10.10.12.35"
SHMM_IPMASK="255.255.255.0"
# power budget setup for each slot, by hw_addr
# format: <hw_addr, fru ID, watts>
# or <"board", slot, watts>
PWR_SET="41 0 320"
PWR_SET="42 0 320"
PWR_SET="43 0 320"
PWR_SET="44 0 320"
PWR_SET="45 0 320"
PWR_SET="46 0 320"
PWR_SET="47 0 320"
PWR_SET="48 0 320"
PWR_SET="49 0 320"
PWR_SET="4a 0 320"
PWR_SET="4b 0 320"
PWR_SET="4c 0 320"
PWR_SET="4d 0 320"
PWR_SET="4e 0 320"
# add ... others
# SNMP Credential
SNMP_rwuser="asg1"
SNMP_createUser="asg1 MD5 asg1asg1 DES"
# authentication type
# format is: <callback user op admin oem>
# SNMP_authen="0x04 0x04 0x04 0x04 0"
#Chassis ID
SHMM_CHASSID="1"