CP R81.20 Quantum SecurityManagement AdminGuide
CP R81.20 Quantum SecurityManagement AdminGuide
QUANTUM SECURITY
MANAGEMENT
R81.20
Administration Guide
[Classification: Protected]
Check Point Copyright Notice
© 2022 - 2023 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
Important Information
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the
latest functional improvements, stability fixes, security enhancements and protection against
new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
23 April 2023 Updated "Central Deployment of Hotfixes and Version Upgrades" on page 160 -
Limitations
03 April 2023 Updated "Location of 'user.def' Files on the Management Server" on page 172
02 April 2023 Updated "Creating Application Control and URL Filtering Rules" on page 230
19 February Updated "Configuring Implied Rules or Kernel Tables for Security Gateways" on
2023 page 167
04 Updated:
December
2022
n "Configuring Implied Rules or Kernel Tables for Security Gateways" on page 167 -
added paths for R81.10.X versions on Quantum Spark appliances
Table of Contents
Introduction to Quantum Security Management 22
Getting Started 23
Understanding SmartConsole 24
SmartConsole Window 24
SmartConsole Toolbars 25
Search Engine 28
IP Search 28
General IP Search 28
Packet Search 28
Rule Base Results 29
Access and Custom Policy Tools 29
"Access Tools" in the Security Policies "Access Control" view 29
"Custom Policy Tools" in the Security Policies "Threat Prevention" view 30
Shared Policies 30
API Command Line Interface 31
Keyboard Shortcuts for SmartConsole 31
Web SmartConsole 34
Connecting to the Security Management Server through SmartConsole 35
Planning Security Management 37
Define your Organization's Topology 37
Define Access Rules for Protection of your Organization's Resources 37
Enforce Access Policies 37
Configuring the Security Management Server and Security Gateways 38
Setting up for Team Work 39
Managing Security through API 40
API 40
API Tools 40
Configuring the API Server 41
Configuring API Key Authentication for Administrators 42
Managing Administrator and User Accounts 45
Managing Administrator Accounts 45
Creating an Administrator Account 45
Editing an Administrator Account 47
cpca_client 470
cpca_client create_cert 472
cpca_client double_sign 473
cpca_client get_crldp 475
cpca_client get_pubkey 476
cpca_client init_certs 477
cpca_client lscert 478
cpca_client revoke_cert 480
cpca_client revoke_non_exist_cert 483
cpca_client search 484
cpca_client set_ca_services 486
cpca_client set_cert_validity 488
cpca_client set_mgmt_tool 489
cpca_client set_sign_hash 494
cpca_create 496
cpconfig 497
cpinfo 499
cplic 500
cplic check 503
cplic contract 505
cplic db_add 507
cplic db_print 509
cplic db_rm 511
cplic del 512
cplic del <object name> 513
cplic get 514
cplic print 515
cplic put 517
cplic put <object name> 519
cplic upgrade 522
cppkg 524
cppkg add 525
ppkg delete 526
cppkg get 528
cppkg getroot 529
Item Description
1 SmartConsole - Check Point Graphical User Interface for connection to and management of
Security Management Servers.
2 Security Management Server - Manages Security Gateways with defined security policies and
monitors security events on the network.
3 Security Gateway - Placed at the perimeter of the network topology, to protect your
environment through enforcement of the security policies.
Getting Started
Before you deploy a Check Point security solution, familiarize yourself with:
n Check Point SmartConsole
n Basic setup of a Check Point Security Management Server
n Basic setup of Check Point Security Gateways
n Administrative task delegation
n Security management in a non-GUI environment
Understanding SmartConsole
Check Point SmartConsole makes it easy to manage security for complex networks. Before you configure
your cyber security environment and policies, become familiar with Check Point's SmartConsole.
You can get the SmartConsole package in the Home Page SK article - sk173903.
You must install the SmartConsole package in a folder, whose full path includes only English characters.
SmartConsole Window
SmartConsole Toolbars
Global Toolbar (top of SmartConsole)
Icon Description
The main SmartConsole Menu. When SmartConsole is connected to a Security Management Server, this includes:
Icon Description
Enter session details to view the number of changes made in the session.
Publish the SmartConsole session, to make the changes visible to other administrators,
and ready to install on Security Gateways.
Note - When the policy is installed, published changes are installed on the Security
Gateways and enforced.
Keyboard
Icon Description
Shortcut
Keyboard
Icon Description
Shortcut
Ctrl+5 Manage & Settings view - review and configure the Security
Management Server settings:
n Administrators
n Permissions profiles
n Trusted clients
n Administrator sessions, and session settings
n Blades
n Revisions
n Preferences
n Sync with User Center
For more SmartConsole shortcuts, see "Keyboard Shortcuts for SmartConsole" on page 31.
Item Description
Item Description
Session Status The number of changes made in the session and the session status.
Search Engine
In each view you can search the Security Management Server database for information relevant to the view.
For example:
n Gateway, by name or IP address
n Access Control rule
n NAT rule
n Threat Prevention profile
n Specific threat or a threat category
n Object tags
You can search for an object in the Security Management Server database in two ways:
n Enter the prefix of the object's name. For example, to find USGlobalHost, you can enter USG in the
search box.
n Enter any sequence of characters in the object's name and add an asterisk (*) before such sequence.
For example, to find USGlobalHost, you can enter *oba, *host, *SG and so on in the search box.
IP Search
You can run an advanced search for an IP address, network, or port. It returns direct and indirect matches
for your search criteria.
n IP address: xxx.xxx.xxx.xxx
n Network: xxx.xxx.0.0/16 or xxx.xxx
n Port: svc:<xxx>
These are the different IP search modes:
n General - (Default). Returns direct matched results and indirect results in IP ranges, networks,
groups, groups with exclusion, and rules that contain these objects.
n Packet - Matches rules as if a packet with your IP address arrives at the Security Gateway.
General IP Search
This is the default search mode. Use it to search in Rule Bases and in objects. If you enter a string that is not
a valid IP or network, the search engine treats it as text.
When you enter a valid IP address or network, an advanced search is done and on these objects and rules:
n Objects that have the IP address as a text value for example, in a comment
n Objects that have an IP address property (direct results)
n Groups, networks, and address ranges that contain objects with the text value or address value
n Rules that contain those objects
Packet Search
A Packet Search matches rules as if a packet with your IP address arrives at the Security Gateway.
A direct match on an object name or on textual columns Only the specific matched characters
Known Limitation:
n Packet search does not support IPv6.
Updates Update the Application & URL Filtering database, schedule updates, and configure
updates.
Tool Description
UserCheck Configure UserCheck Interaction objects for Access Control policy actions.
Client Create and distribute client certificates that allow users to authenticate to the Security
Certificates Gateway from handheld devices.
Application Wiki Browse to the Check Point AppWiki. Search and filter the Web 2.0 Applications
Database, to use Check Point security research in your policy rules for actions on
applications, apps, and widgets.
Installation See the Policy installation history for each Security Gateway, and who made the
History changes. See the revisions that were made during each installation, and who made
them. Install a specific version of the Policy.
Updates Configure updates to the Malware database, Threat Emulation engine and images, and
the IPS database.
UserCheck Configure UserCheck Interaction objects for Threat Prevention policy actions.
Threat Wiki Browse to the Check Point ThreatWiki. Search and filter Check Point's Malware
Database, to use Check Point security research to block malware before it enters your
environment, and to best respond if it does get in.
Installation See the Policy installation history for each Security Gateway, and who made the
History changes. See the revisions that were made during each installation, and who made
them. Install a specific version of the Policy.
Shared Policies
The Shared Policies section in the Security Policies shows the policies that are not in a Policy package.
They are shared between all Policy packages.
Shared policies are installed with the Access Control Policy.
Software
Description
Blade
Mobile Launch Mobile Access policy in a SmartConsole. Configure how your remote users
Access access internal resources, such as their email accounts, when they are mobile.
DLP Launch Data Loss Prevention policy in a SmartConsole. Configure advanced tools to
automatically identify data that must not go outside the network, to block the leak, and to
educate users.
HTTPS The HTTPS Policy allows the Security Gateway to inspect HTTPS traffic to prevent
Inspection security risks related to the SSL protocol. The HTTPS Policy shows if HTTPS Inspection
is enabled on one or more Security Gateways.
Inspection You can configure Inspection Settings for the Security Gateway (see "Preferences and
Settings Management Settings" on page 379):
n Deep packet inspection settings
n Protocol parsing inspection settings
n VoIP packet inspection settings
Click to open the API reference (in the command line interface).
Use the Command Line Reference to learn about Session management commands, Host
commands, Network commands, and Rule commands.
In addition to the command line interface, you can create and run API scripts to manage configuration and
operations on the Security Management Server (see "Managing Security through API" on page 40).
Space or + Open drop-down menu for the current cell in the Rule Base
Ctrl+G Switch to grid view (in the Logs and Audit Logs views)
Ctrl+L Switch to table view (in the Logs and Audit Logs views)
F5 Refresh query
F6 Enable auto-refresh
Web SmartConsole
Web SmartConsole provides the SmartConsole GUI functionality from a web browser. This functionality is
available starting from R81.10 and R81 Jumbo Hotfix Accumulator Take 10.
Best Practice - We recommend to use the Google Chrome web browser to connect to
the web SmartConsole.
The fingerprint and the IP address of the Security Management Server / Domain Management Server are
saved to the user settings in Windows.
Define users and user groups that your security environment protects
You can add users and groups to the database manually, through LDAP and User Directory, or with the help
of Active Directory.
To add users: see User Database.
To add groups: see .
To use LDAP and User Directory, see "Configuring Administrators and Users on an External LDAP Server"
on page 130.
To use Active Directory, see "Microsoft Active Directory" on page 130.
1. In the Gateways & Servers view, find the Security Management Server object.
In the Search box at the top of the view, you can search for it by object name or object IP address.
When you select the Security Management Server object, the Summary tab in the lower pane
shows the Software Blades that are enabled on it.
2. Double-click the object to open its properties.
On the Management tab, enable the Software Blades, as necessary:
n Network Policy Management - Manage a comprehensive security policy, unified for all
security functionalities. This is automatically enabled.
n Endpoint Policy Management - Manage Endpoint Security Clients on end-user computers
and hand-held devices.
Important - It is not supported to disable this Software Blade after you enable it.
n Logging & Status - Monitor security events and status of Security Gateways, VPNs, users,
and more, with advanced visuals and data management features.
n Identity Logging - Add user identities, and data of their computers and devices, from Active
Directory domains, to log entries.
n User Directory - Populate your security scope with user accounts from the LDAP servers in
your environment.
n Provisioning - Manage Security Gateway configuration and policies for multiple appliances
and open servers in one central SmartConsole.
n Compliance - Optimize your security settings and comply with regulatory requirements
n SmartEvent Server - Manage security events in real-time.
n SmartEvent Correlation Unit - Correlate security events in real-time.
API
You can configure and control the Management Server through API Requests you send to the API Server
that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions with third
party systems, such as virtualization servers, ticketing systems, and change management systems.
To learn more about the management APIs, to see code samples, and to take advantage of user forums,
see:
n The API Documentation:
l Online - Check Point Management API Reference
l Local - https://<Server IP Address>/api_docs
By default, access to the local API Documentation is disabled. Follow the instructions in
sk174606.
Note - On a Standalone server (a server which runs both a Security
Management Server and a Security Gateway), the API Documentation
web portal (https://<Server IP Address>/api_docs) stops
working when you open SmartView Web Application (https://<Server
IP Address>/smartview).
n The Developers Network section of Check Point CheckMates Community.
API Tools
You can use these tools to work with the API Server on the Management Server:
n Standalone management tool, included with Gaia operating system:
mgmt_cli
n Standalone management tool, included with SmartConsole:
mgmt_cli.exe
You can copy this tool from the SmartConsole installation folder to other computers that run Windows
operating system.
n Web Services APIs that allow communication and data exchange between the clients and the
Management Server over the HTTP protocol.
These APIs also let other Check Point processes communicate with the Management Server over the
HTTPS protocol.
https://<IP Address of Management Server>/web_api/<command>
Select Automatic start to automatically start the API server when you start or reboot the
Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Automatic start option is activated by default during Management
Server installation.
n If the Management Server has less than 4GB of RAM, the Automatic
Start option is deactivated.
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to the API
Server. This option only lets you use the mgmt_cli utility on the Management Server to
send API requests. You cannot use SmartConsole or Web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests from all IP
addresses that are defined as Trusted Clients in SmartConsole. This includes requests
from SmartConsole, Web services, and the mgmt_cli utility on the Management Server.
n All IP addresses - You can send API requests from all IP addresses. This includes requests
from SmartConsole, Web services, and the mgmt_cli utility on the Management Server.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
Note - This administrator can only use the API for executing API commands and cannot
use it for SmartConsole authentication.
1. In SmartConsole click Manage & Settings > Permissions & Administrators > Administrators
Example
This example demonstrates how to use the API-key for login and creating a simple-gateway using the
API.
1. Log in to the Expert mode.
2. Use the previously generated key for the login, and save the standard output to a file (redirect it to
a file using the ">" sign):
Syntax:
Example:
Example:
For more details, see the Check Point Management API Reference.
After you configure API authentication, you can, in addition, configure authentication with a certificate file.
The administrator can then authenticate to the Security Management Server with either an API Key or a
certificate file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to
SmartConsole in two ways:
n Log in to SmartConsole with the Certificate File option. The administrator must provide the password
to use the certificate file.
n You can import the certificate file to the Windows Certificate Store on the Microsoft Windows
SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole
with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no
administrator account of their own.
Authentication
Description
Method
Check Point Check Point password is a static password that is configured in SmartConsole. The
Password local database on the Security Management Server stores the password. No
additional software is required.
See"Configuring Check Point Password Authentication for Administrators" on
page 50.
OS Password OS password is kept on the operating system of the computer on which the Security
Management Server is installed. You can also use passwords that are stored in
Windows domain. No additional software is required.
See "Configuring OS Password Authentication for Administrators" on page 52
TACACS Terminal Access Controller Access Control System (TACACS) provides access
control for routers, network access servers and other networked devices through
one or more centralized servers.
TACACS is an external authentication method that provides verification services.
With TACACS, the Security Management Server forwards authentication requests
by remote administrators to the TACACS server. The TACACS server, which stores
administrator account information, authenticates administrators. The system
supports physical card key devices or token cards and Kerberos secret key
authentication. TACACS encrypts the administrator name, password,
authentication services and accounting information of all authentication requests to
secure communication.
See"Configuring TACACS Server Authentication for Administrators" on page 57
Authentication
Description
Method
API Key You can use SmartConsole to configure an API key for administrators to use the
management API. You can only use the API to execute API commands and not for
SmartConsole authentication. For more information, see "Configuring API Key
Authentication for Administrators" on page 68
SAML An administrators can log in to SmartConsole through a central 3rd party Identity
Provider with the SAML protocol. The Identity Provider holds the information about
the administrators, including the ability to authenticate the administrators. Check
Point supports these Identity Providers: Okta, Ping Identity, Azure. For more
information, see "Configuring SAML Authentication Login for Administrators" on
page 62.
After you configure authentication with one of the Check Point authentication methods, you can, in addition,
configure certificate file authentication. The administrator can then authenticate to SmartConsole with one of
the Check Point authentication methods or with a certificate file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to
SmartConsole in two ways:
n Log in to SmartConsole with the Certificate File option. The administrator must provide the password
to use the certificate file.
n You can import the certificate file to the Windows Certificate Store on the Microsoft Windows
SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole
with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no
administrator account of their own.
To create an Administrator Account with the "Check Point Configuration Tool" tool (cpconfig)
We do not recommend to create an administrator with cpconfig, the Check Point Configuration Tool.
Use it only if there is no access to SmartConsole or the Gaia Portal.
If you use cpconfig to create an administrator:
n You must restart Check Point Services to activate the administrator with these commands:
cpstop ; cpstart
1. Click Manage & Settings > Permissions & Administrators > Advanced.
2. Click Advanced.
3. In the Default Expiration Date section, select a setting:
n Never expires
n Expire at - Select the expiration date from the calendar control
n Expire after - Enter the number of days, months, or years (from the day the account is
made) before administrator accounts expire
4. In the Expiration notifications section, select Show 'about to expire' indication in administrators
view and select the number of days in advance to show the message about the approaching
expiration date.
5. Publish the SmartConsole session.
Note - These restrictions apply only to administrators who authenticate to the Security
Management Server with a Check Point password.
To unlock an administrator:
1. Go to the Manage & Settings view or to the Multi-Domain view.
2. Right-click the locked administrator and select Unlock Administrator.
Or:
Use the "unlock-administrator" API command.
Note - The Unlock Administrator feature does not apply to administrators who use
other authentication methods.
a. Go to Manage & Settings > Permissions & Administrators > Administrators > Click New.
The New Administrator window opens.
b. Give the administrator a name.
c. In Authentication method, select Check Point Password.
d. Click Set New Password, type the Password, and Confirm it.
2. Optional: Import the certificate file into the Windows Certificate Store
a. Right-click the *.p12 file you saved when you created the required administrator, and click
Install PFX.
The Certificate Import Wizard opens.
b. In the Store Location section, select the applicable option:
n Current User (this is the default)
n Local Machine
c. Click Next.
d. Enter the same certificate password you used when you created the required administrator
certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store, click Browse > Personal > OK.
i. Click Next.
j. Click Finish.
a. Go to Manage & Settings > Permissions & Administrators > Administrators > Click New.
The New Administrator window opens.
b. Give the administrator a name.
c. In Authentication method, select OS Password.
2. Optional: Import the certificate file into the Windows Certificate Store
a. Right-click the *.p12 file you saved when you created the required administrator, and click
Install PFX.
The Certificate Import Wizard opens.
b. In the Store Location section, select the applicable option:
n Current User (this is the default)
n Local Machine
c. Click Next.
d. Enter the same certificate password you used when you created the required administrator
certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store, click Browse > Personal > OK.
i. Click Next.
j. Click Finish.
a. Go to the Object Explorer and select New > More > Server > RADIUS.
b. Give the server a Name. It can be any name.
c. In the Host field, click the drop-down arrow, click New and create a New Host with the IP
address of the RADIUS server.
d. Click OK.
This host now appears in the Host field of the New RADIUS window.
e. In the Shared Secret field, type the secret key that you defined previously on the RADIUS
server.
f. Click OK.
g. Publish the SmartConsole session.
a. Go to Manage & Settings > Permissions & Administrators > Administrators > Click New.
The New Administrator window opens.
b. Give the administrator the name that is defined on the RADIUS server.
c. In Authentication method, select RADIUS.
d. Select the RADIUS Server defined earlier.
e. Optional: In the Authentication section > Certificate Information, click Create:
i. Enter a password.
ii. Click OK.
iii. Save the certificate file to a secure location on the SmartConsole computer:
Notes:
n Make sure that the login name is included in the File name
field.
n Make sure that Certificate Files (*p12) is selected in the
Save as type drop-down list. The certificate file is in the
PKCS #12 format, and has a .p12 extension.
n A password is required to protect the sensitive data in the
certificate file. The certificate file contains the private key.
After the certificate is issued, save it to a file and give the
administrator this file and password. The administrator can
then authenticate with the certificate when they log in with
SmartConsole to the Security Management Server.
f. Assign a Permission Profile.
See "Assigning Permission Profiles to Administrators" on page 70.
g. In the Expiration section, select the expiration date and make sure that it is set to a valid
future date.
h. Click OK.
i. Publish the SmartConsole session.
a. In SmartConsole, configure all the servers that you want to include in the server group, as
explained in "To configure RADIUS server authentication for an administrator" on page 54.
For each server, enter its priority in the group. The lower the number is, the higher the
priority.
For example, if you create a group with 3 servers, with priorities 1,2 and 3, the server with
number 1 is approached first, the server with number 2 second, and the server with number
3, third.
b. Create the server group: In SmartConsole, go to Object Explorer and click New > Server >
More > RADIUS Group.
c. Configure the group properties and add servers to the group:
i. Give the group a Name. It can be any name.
ii. Click the plus (+) for each server you want to add, and select each server from the
drop-down list.
iii. Click OK.
iv. Publish the SmartConsole session.
4. Optional: Import the certificate file into the Windows Certificate Store
a. Right-click the *.p12 file you saved when you created the required administrator, and click
Install PFX.
The Certificate Import Wizard opens.
b. In the Store Location section, select the applicable option:
n Current User (this is the default)
n Local Machine
c. Click Next.
d. Enter the same certificate password you used when you created the required administrator
certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store, click Browse > Personal > OK.
i. Click Next.
j. Click Finish.
a. Go to Object Explorer and click New > More > Server > TACACS.
b. Enter the server Name.
c. In the Host field, click the drop-down arrow, click New, and create a New Host with the IP
address of the TACACS server.
d. Click OK.
This host now appears in the Host field of the New TACACS window.
e. Select a Server type.
f. If your server type is TACACS+, type the Secret key that you defined previously on the
TACACS+ server.
g. Click OK.
a. Go to Manage & Settings > Permissions & Administrators > Administrators > click New.
The New Administrator window opens.
b. Enter the administrator name that is defined on the TACACS server.
c. In Authentication Method, select TACACS.
d. Select the TACACS Server defined earlier from the drop-down list.
e. Optional: In the Authentication section > Certificate Information, click Create:
i. Enter a password.
ii. Click OK.
iii. Save the certificate file to a secure location on the SmartConsole computer:
Notes:
n Make sure that the login name is included in the File name
field.
n Make sure that Certificate Files (*p12) is selected in the
Save as type drop-down list. The certificate file is in the
PKCS #12 format, and has a .p12 extension.
n A password is required to protect the sensitive data in the
certificate file. The certificate file contains the private key.
After the certificate is issued, save it to a file and give the
administrator this file and password. The administrator can
then authenticate with the certificate when they log in with
SmartConsole to the Security Management Server.
f. Assign a Permission Profile.
See "Assigning Permission Profiles to Administrators" on page 70.
g. In the Expiration section, select the expiration date and make sure that it is set to a valid
future date.
h. Click OK.
i. Publish the SmartConsole session.
a. In SmartConsole, configure all the servers that you want to include in the server group, as
explained in "To configure TACACS server authentication for an administrator" on the
previous page.
For each server, enter its priority in the group. The lower the number is, the higher the
priority.
For example, if you create a group with 3 servers, with priorities 1,2 and 3, the server with
number 1 is approached first, the server with number 2 second, and the server with number
3, third.
b. Create the server group: In SmartConsole, go to Object Explorer and click New > Server >
More > TACACS Group.
c. Configure the group properties and add servers to the group:
i. Enter the group Name.
ii. Click the + icon for each server you want to add, and select the server from the drop-
down list.
iii. Click OK.
iv. Publish the SmartConsole session.
4. Optional: Import the certificate file into the Windows Certificate Store
a. Right-click the *.p12 file you saved when you created the required administrator, and click
Install PFX.
The Certificate Import Wizard opens.
b. In the Store Location section, select the applicable option:
n Current User (this is the default)
n Local Machine
c. Click Next.
d. Enter the same certificate password you used when you created the required administrator
certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store, click Browse > Personal > OK.
i. Click Next.
j. Click Finish.
There are no specific parameters required for the SecurID authentication method. Authentication requests
can be sent over SDK-supported API or through REST API.
To learn how to configure a SecurID server, refer to the vendor documentation.
After you configure SecurID authentication, you can, in addition, configure authentication with a certificate
file. The administrator can then authenticate to SmartConsole with SecurID authentication or the certificate
file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to
SmartConsole in two ways:
n Log in to SmartConsole with the Certificate File option. The administrator must provide the password
to use the certificate file.
n You can import the certificate file to the Windows Certificate Store on the Microsoft Windows
SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole
with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no
administrator account of their own.
a. Go to Manage & Settings > Permissions & Administrators > Administrators > click New.
The New Administrator window opens.
4. Optional: Import the certificate file into the Windows Certificate Store
a. Right-click the *.p12 file you saved when you created the required administrator, and click
Install PFX.
The Certificate Import Wizard opens.
b. In the Store Location section, select the applicable option:
n Current User (this is the default)
n Local Machine
c. Click Next.
d. Enter the same certificate password you used when you created the required administrator
certificate.
Use Case
Administrators with accounts in Azure want to work with SmartConsole. If each administrator uses two
different administrator names and passwords, one for Azure and one for SmartConsole, this causes a
number of issues:
n The administrators must handle different password and expiration policies (in addition to other
corporate passwords).
n The administrators must remember two different passwords, one for Azure and one for SmartConsole
(in addition to other corporate passwords).
n It requires additional maintenance of the administrators. For example, when an administrator leaves,
you must remove them from all applications they are registered to. If you use an Identity Provider, you
simply need to remove the administrator from the Identity Provider database.
Therefore, the organization prefers that each administrator uses one password for both Azure and
SmartConsole. With the Identity Provider, the administrator can authenticate once to Azure, and when the
administrator connects to SmartConsole, SmartConsole already recognizes them and they do not have to
enter another password. This way, the administrator also does not reveal their password to the Security
Management Server.
a. In the Object Explorer, click New > More > User/Identity > Identity Provider.
The New Identity Provider window opens.
vi $CPDIR/tmp/.CPprofile.sh
Example:
SAML_IP_OR_NAME=example.com;export SAML_IP_OR_NAME
3. In SmartConsole, go to the Manage & Settings view > Permissions & Administrators > Advanced >
Identity Provider > Identity Provider for Managing Administrator Access > Select the Identity
Provider object that you created.
Notes:
n On a Security Management Server, you can use only one Identity Provider
n On a Multi-Domain Security Management Server:
l You can use only one Identity Provider for a Domain.
4. Create the administrator (or group of administrators) that authenticates with an Identity
Provider.
b. Click the icon and from the drop-down list select New Administrator or New Identity
Provider Administrator Group.
a. Open SmartConsole.
b. From the first drop-down menu, select Identity Provider.
The Security Management Server checks if the administrator exists in the Security
Management Server database.
n If the administrator exists, the SmartConsole logs the administrator in.
n If the administrator does not exist, the Security Management Server checks if the
administrator is in an administrator group in the Security Management Server
database.
If the administrator exists in such a group, SmartConsole logs in the administrator,
and the Security Management Server assigns the administrator the permissions of
the group.
Notes:
n If an administrator has an administrator account and is also part of an
administrator group, the Security Management Server assigns to the
administrator the administrator account permissions.
n If the administrator belongs to more than one administrator group, the
Security Management Server assigns to the administrator the
permissions of the administrator group which comes first in alphabetical
order in the Security Management Server database.
n The administrator session is not disconnected if you disconnect or edit
the administrator object in the Identity Provider while the Security
Management Server session is active.
Best Practice - We recommend to use at least one administrator that is not
authenticated through the Identity Provider, in case the Identity Provider is not
available.
CLI Syntax:
To launch SmartConsole with a configuration file for SAML login, use this command in the
Windows Command Prompt:
Example:
SmartConsole.exe -p "D:\MySAML_Configuration.xml"
Parameters:
Parameter Description
<DomainName> Specifies the name of the Domain Management Server object when
connecting to a Multi-Domain Security Management Server.
Parameter Description
Example of the configuration file for a Security Management Server with the IP address
172.30.44.55:
After you configure SAML authentication, you can, in addition, configure authentication with a certificate file.
The administrator can then authenticate to SmartConsole with the SAML Identity Provider or the certificate
file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to
SmartConsole in two ways:
n Log in to SmartConsole with the Certificate File option. The administrator must provide the password
to use the certificate file.
n You can import the certificate file to the Windows Certificate Store on the Microsoft Windows
SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole
with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no
administrator account of their own.
Note - This administrator can only use the API for executing API commands and cannot
use it for SmartConsole authentication.
1. In SmartConsole click Manage & Settings > Permissions & Administrators > Administrators
Example
This example demonstrates how to use the API-key for login and creating a simple-gateway using the
API.
1. Log in to the Expert mode.
2. Use the previously generated key for the login, and save the standard output to a file (redirect it to
a file using the ">" sign):
Syntax:
Example:
Example:
For more details, see the Check Point Management API Reference.
After you configure API authentication, you can, in addition, configure authentication with a certificate file.
The administrator can then authenticate to the Security Management Server with either an API Key or a
certificate file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to
SmartConsole in two ways:
n Log in to SmartConsole with the Certificate File option. The administrator must provide the password
to use the certificate file.
n You can import the certificate file to the Windows Certificate Store on the Microsoft Windows
SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole
with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no
administrator account of their own.
1. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Permission
Profiles.
2. Double-click the profile to change.
3. In the Profile configuration window that opens change the settings as needed.
4. Click Close.
1. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Permission
Profiles.
2. Click New Profile.
The New Profile window opens.
3. Enter a unique name for the profile.
4. Select a profile type:
n Read/Write All - Administrators can make changes to all features
n Auditor (Read Only All) - Administrators can see all information but cannot make changes
n Customized - Configure custom settings (see "Configuring Customized Permissions" on
the next page).
5. Click OK.
1. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Permission
Profiles.
2. Select a profile and click Delete.
You cannot delete a profile that is assigned to an administrator. To see which administrators use a
profile, in the error message, click Where Used.
If the profile is not assigned to administrators, a confirmation window opens.
3. Click Yes to confirm.
Permissions:
n Selected - The administrator has this feature.
n Not selected - The administrator does not have this feature.
Note - If you cannot clear a feature selection, the administrator access to it is mandatory.
Some features have Read and Write options. If the feature is selected:
n Read - The administrator has the feature but cannot make changes.
n Write - The administrator has the feature and can make changes.
To configure customized permissions
1. In the Profile object, in the Overview > Permissions section, select Customized.
2. Configure permissions in these pages of the Profile object:
n Gateways -Configure the Provisioning and the Scripts permissions.
n Access Control - Configure Access Control Policy permissions (see "Configuring
Permissions for Access Control and Threat Prevention" on page 75).
n Threat Prevention - Configure Threat Prevention Policy permissions (see "Configuring
Permissions for Access Control and Threat Prevention" on page 75).
n Others - Configure permissions for Common Objects, user databases, HTTPS Inspection
features, and Client Certificates.
n Monitoring and Logging - Configure permissions to generate and see logs and to use
monitoring features (see "Configuring Permissions for Monitoring, Logging, Events, and
Reports" on page 75).
n Events and Reports - Configure permissions for SmartEvent features (see "Configuring
Permissions for Monitoring, Logging, Events, and Reports" on page 75).
3. In the Management section, configure this profile with permissions to:
n Manage Administrators -Manage other administrator accounts.
n Manage Sessions -Lets the administrator configure the session management settings
(single or multiple sessions)
n High Availability Operations -Configure and work with High Availability.
n Management API Login -Log in with the management API.
n Cloud Management Extension (CME) API - The permission for using CME API.
n Publish sessions without an approval - If not selected, any change made to a session
requires an approval.
n Approve/reject other sessions - If selected, the administrator has permission to approve
changes made by other administrators.
n Manage integration with Cloud Services - If selected, the administrator has permission to
connect to the Infinity Portal through the Cloud Services view in SmartConsole.
4. Click OK.
Important - In a Permission Profile, if you select the permission VSX Provisioning (in
the Gateways tab), you must also select Publish sessions without an approval (in the
Management tab), because the Management Server must save changes in VSX
objects immediately.
Trusted Client
Description
Definition
IPv4 Address Range Hosts with IPv4 addresses in the specified range
IPv4 Netmask Hosts with IPv4 addresses in the subnet defined by the specified IPv4 address
and netmask
IPv6 Address Range Hosts with IPv6 addresses in the specified range
IPv6 Netmask Hosts with IPv6 addresses in the subnet defined by the specified IPv6 address
and netmask
Wild cards (IP only) Hosts with IP addresses described by the specified regular expression
Administrators with Super User permissions can add, edit, or delete trusted clients in SmartConsole.
Adding a new trusted client
1. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Trusted Clients.
2. Click New.
The New Trusted Client window opens.
3. Enter a unique name for the client.
4. Select a client type and configure corresponding values:
n Any - No values to configure
n IPv4 Address - Enter an IPv4 address of a host
n IPv4 Address Range - Enter the first and the last address of an IPv4 address range
n IPv4 Netmask - Enter the IPv4 address and the netmask
n IPv6 Address - Enter an IPv6 address of a host
n IPv6 Address Range - Enter the first and the last address of an IPv6 address range
n IPv6 Netmask - Enter the IPv6 address and the netmask
n Name - Enter a host name
n Wild cards (IP only) - Enter a regular expression that describes a set of IP addresses
5. Click OK.
1. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Trusted Clients.
2. Double-click the client you want to edit.
3. In the Trusted Client configuration window that opens, change the settings as needed.
4. Click OK.
1. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Trusted Clients.
2. Select a trusted client and click Delete.
The confirmation window opens.
3. Click Yes to confirm.
Note - Administrators can also configure the GUI Clients in the Check Point
Configuration Tool on the Security Management Server (see "cpconfig" on page 497).
Publishing a Session
The validations pane in SmartConsole shows configuration error messages. Examples of errors are object
names that are not unique, or the use of objects that are not valid in the Rule Base. Make sure you correct
these errors before publishing.
To discard a session
In the SmartConsole toolbar, click Discard.
Administrators without the Manage Administrators with the Manage Session Permission
Session permission can: can:
n Publish and discard their own n Publish and discard their own sessions
sessions n See sessions opened by other administrators, the
n See sessions opened by other number the locks they have and number changes
administrators, the number the locks they have made
they have and number of changes n Publish & Disconnect the private sessions of
they have made other administrators
n Take over sessions created by n Disconnect & Discard the private sessions of
applications, for example sessions other administrators
created by the API command line tool n Disconnect another administrator's private
session
n Take over sessions created by applications, for
example sessions created by the API command
line tool
n Take over the private sessions of other
administrators.
Note - If you want to keep changes
made in your own private session,
publish these changes before you take
over the session of another
administrator. If you do not publish your
changes, you will lose them. When you
take over, you disconnect the other
administrator's SmartConsole session.
n Publish & Disconnect the private sessions of
other administrators. The action applies to both
SmartConsole sessions and command line API
sessions.
n Disconnect the private session of other
administrators
n Discard & Disconnect the private session of other
administrators
A report is generated which shows the changes made in the current private session.
Note - There is inconsistency between the number of changes which appears in the
session toolbar and the Revisions view.
Use Case
Suppose you are making changes in a private session and are asked to solve some immediate problem.
The task involves making a change and publishing it. You do not wish to publish or discard your current
private session.
You open a new private session, make the change required to resolve the issue, publish the change, then
return to your previous private session.
To do this, you need to work with multiple sessions. To switch on multiple sessions, you need the Manage
Sessions permission selected on your administrator profile.
Option Description
Recent Shows a list of recent sessions. Selecting a session opens the session in the current
SmartConsole
Option Description
More Opens the Open Session window that shows sessions that you previously created and
saved.
n Sessions shown in this window are owned by the current administrator in the
current domain.
n The Open Session > Actions menu has options to open a saved session in the
current SmartConsole or open the session in a new SmartConsole.
For sessions owned by other administrators that have made private n Publish and Disconnect
changes their changes
n Discard and Disconnect
n Disconnect
n Take over their changes
For sessions owned by other administrators that have not made n Disconnect
private sessions n Take over
Notes:
n When you work in single session, you need to publish or discard your changes
before you take over another session. In multiple sessions, you do not have to
publish or discard your session before you take over the session of another
administrator.
n In multiple sessions, an administrator who connects from another desktop to an
already connected session can still take over the connected session by default.
Use Case
This feature gives you the option to review and approve configuration changes made by other administrators
before publishing them. You can define which administrators must submit their changes for approval and
which administrators are authorized to approve changes.
Configuration
1. Create a new permission profile for the Administrator "A" whose changes require approval
a. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Permission
Profiles > New Profile.
The New Profile window opens.
b. In the Overview page ,select Read/Write All or Customized.
c. In the Management page, clear the Publish sessions without an approval option.
d. Configure the rest of the profile settings, and click OK and publish the changes.
2. Create a new administrator account for the Administrator "A" whose changes require
approval:
3. Create a new permission profile for the Administrator "B" who approves the changes"
a. In SmartConsole, go to Manage & Settings > Permissions & Administrators > Permission
Profiles > New Profile.
The New Profile window opens.
b. In the Overview page ,select Read/Write All or Customized.
c. In the Management page, select Approve/reject other sessions.
d. Configure the rest of the profile settings, and click OK.
4. Create a new administrator account for the Administrator "B" who approves the changes:
b. Configure the Administrator name and other properties, and in the Permission Profile field,
select the profile you created for this administrator.
c. Click OK and publish your changes.
5. To submit your changes for approval, in SmartConsole's top toolbar, click Submit Request
Note - If Administrator "A" tries to install policy before his changes are
approved, a message shows up indicating the changes must be submitted for
approval first.
Note - To see the status of all sessions, go to Manage & Settings > Sessions
> View Sessions.
Note - If you have sessions which are pending approval, a notification with the
number of sessions pending approval appears next to the Manage & Settings
tab and next to the View Sessions tab.
7. Administrator "A" sees the notifications of the reviewed sessions in the Manage & Settings
tab and the View Sessions tab.
To fix a session, click a session and select open session from the drop-down menu.
Notes:
n To get email notifications about session updates, go to Manage & Settings >
SmartTasks, and configure the applicable SmartTask (see "SmartTasks" on
page 384).
n To be able to save changes in the Database Tool or in SmartProvisioning , you
must have permission to publish your changes without an approval. If the Publish
sessions without an approval, option is cleared, you cannot save changes in the
Database Tool or in SmartProvisioning.
Authentication
Description
Method
Check Point Check Point password is a static password that is configured in SmartConsole.The
Password local database on the Security Gateway stores the password. No additional
software is required.
See "Configuring User Access using Check Point Password Authentication" on
page 89.
OS Password OS Password is stored on the operating system of the computer on which the
Security Gateway is installed. You can also use passwords that are stored in a
Windows domain. No additional software is required.
See "Configuring User Access using OS Password" on page 91
Authentication
Description
Method
TACACS Terminal Access Controller Access Control System (TACACS) provides access
control for routers, network access servers and other networked devices through
one or more centralized servers.
TACACS is an external authentication method that provides verification services.
With TACACS, the forwards authentication requests by remote users to the
TACACS server. The TACACS server, which stores user account information,
authenticates users. The system supports physical card key devices or token cards
and Kerberos secret key authentication. TACACS encrypts the user name,
password, authentication services and accounting information of all authentication
requests to make sure communication is secure.
See"Configuring TACACS Authentication for Users" on page 96
SecurID SecurID requires users to both possess a token authenticator and to supply a PIN or
password. Token authenticators generate one-time passwords that are
synchronized to an RSA Authentication Manager (AM) and may come in the form of
hardware or software. Hardware tokens are key-ring or credit card-sized devices.
Software tokens reside on the PC or device from which the user wants to
authenticate. All tokens generate a random, one-time use access code that
changes approximately every minute. When a user attempts to authenticate to a
protected resource, the one-time use code must be validated by the AM.
The Security Gateway forwards authentication requests by remote users to the AM.
The AM manages the database of RSA users and their assigned hard or soft
tokens. The Security Gateway acts as an AM agent and directs all access requests
to the AM for authentication. For more information on agent configuration, refer to
RSA Authentication Manager documentation. There are no specific parameters
required for the SecurID authentication method. Authentication requests can be
sent over SDK-supported API or through REST API.
See ."Configuring SecurID Authentication for Users" on page 99
Important - If you do not select an authentication method, the user cannot log in or use
network resources.
After you configure authentication with one of the Check Point authentication methods, you can, in addition,
create a certificate file for the user. The user can authenticate to the Security Gateway with one of the Check
Point authentication methods or with a certificate file.
You create the certificate file in SmartConsole, and the user can log in to the Security Gateway with the
certificate file in two ways:
n Log in to Security Gateway with the Certificate File option. The user must provide the password to
use the certificate file.
n You can import the certificate file to the Windows Certificate Store on the Microsoft Windows
SmartConsole computer. The user can use this stored certificate to log in to the Security Gateway
with the CAPI Certificate option. The user does not need to provide a password to log in.
Deleting a User
Procedure
1. In the Object Explorer (F11), click New > More > User/Identity > User Group.
The New User Group window opens.
2. Enter a name for the new group.
3. For each user or a group of users, click the [+] sign and select the object from the list.
4. Configure the optional settings:
n Mailing List Address
n Comment
n Tag
n Color
5. Click OK.
1. In the Object Explorer (F11), select Object Categories > Users/Identities > User Groups
2. Right-click the user group and click Edit.
The User Group window opens.
3. Click +
4. Select users or user groups.
5. Click OK.
a. Go to the Object Explorer and select New > More > Server > RADIUS.
a. Give the server a Name. It can be any name.
b. In the Host field, click the drop-down arrow, click New and create a New Host with the IP
address of the RADIUS server.
c. Click OK.
d. Make sure that this host shows in the Host field of the New Radius window.
e. In the Shared Secret field, type the secret key that you defined previously on the RADIUS
server.
f. Click OK.
g. Publish the SmartConsole session.
a. In the Object Explorer (F11), click New > More > User/Identity > User.
The New User window opens.
b. Select a template and Click OK.
g. In Location, select objects from which this user can access or send data and traffic.
In the Allowed locations section:
n Sources - Click Add, to add selected objects to this user's permitted resources. The
user can get data and traffic from these objects.
n Destination - Click Add, to add selected objects to this user's permitted destinations.
The user can send data and traffic to these objects.
h. In Time - If the user has specific working days or hours, you can configure when the user
can be authenticated for access.
n From and To - Enter start time and end time of an expected workday. This user will
not be authenticated if a login attempt is made on a time outside the given range.
n Days in week or Daily - Select the days on which the user can authenticate and
access resources. This user will not be authenticated if a login attempt is made on an
unselected day.
i. In Certificates:
Generate and register SIC certificates for user accounts. This authenticates the user in the
Check Point system. Use certificates with required authentication for added access control.
i. Click New.
ii. Select key or p12 file:
n Registration key for certificate enrollment - Select to send a registration key
that activates the certificate. When prompted, select the number of days the
user has to activate the certificate, before the registration key expires.
n Certificate file (p12) - Select to create a .p12 certificate file with a private
password for the user. When prompted, enter and confirm the certificate
password.
iii. Click OK.
If a user is not in the system for some time (for example, when going on an extended leave),
you can revoke the certificate. This leaves the user account in the system, but the user
cannot access it until you renew the certificate.
To revoke a certificate, select the certificate and click Revoke.
j. In Encryption:
If the user accesses resources from a remote location, traffic between the remote user and
internal resources will be encrypted. Configure encryption settings for remote access users.
i. Select an encryption method for the user.
ii. Click Edit.
The encryption Properties window opens.
The next steps are for IKE Phase 2. The options can be different for different
methods.
iii. Open the Authentication tab.
iv. Select the authentication schemes:
n Password - The user authenticates with a pre-shared secret password. Enter
and confirm the password.
n Public Key - The user authenticates with a public key contained in a certificate
file.
v. Click OK.
k. Click OK.
Note - When defining a group of RADIUS servers, all members of the group must
use the same protocol.
a. In SmartConsole, configure all the servers that you want to include in the server group. For
each server, enter its priority in the group. The lower the number is, the higher the priority.
For example, if you create a group with 3 servers, with priorities 1,2 and 3, the server with
number 1 is approached first, the server with number 2 second, and the server with number
3, third.
g. Enter a Secret key (required only if you selected TACACS+ server type).
h. Click OK.
a. In the Object Explorer (F11), click New > More > User/Identity > User.
The New User window opens.
b. Select a template and click OK.
c. Enter a User Name - A unique, case sensitive character string.
If you generate a user certificate with a non-Check Point Certificate Authority, enter the
Common Name (CN) component of the Distinguished Name (DN).
For example, if the DN is [CN = James, O = My Organization, C = My
Country], then enter James as the username. If you use Common Names as user names,
they must contain exactly one string with no spaces.
d. Configure the user's General Properties:
i. Select an Expiration Date - The date, after which the user is no longer authorized to
access network resources and applications. By default, the date defined in the main
menu > Global Properties > User Accounts > Expiration Date shows as the
expiration date.
ii. Optional settings: Comment, Email Address, Mobile Phone Number.
e. In Groups - Use this window to add users to user groups.
f. Configure the user's Authentication: From the drop-down menu, select TACACS.
g. In Location, select objects from which this user can access or send data and traffic.
In the Allowed locations section:
n Sources - Click Add, to add selected objects to this user's permitted resources. The
user can get data and traffic from these objects.
n Destination - Click Add, to add selected objects to this user's permitted destinations.
The user can send data and traffic to these objects.
h. In Time - If the user has specific working days or hours, you can configure when the user
can be authenticated for access.
n From and To - Enter start time and end time of an expected workday. This user will
not be authenticated if a login attempt is made on a time outside the given range.
n Days in week or Daily - Select the days on which the user can authenticate and
access resources. This user will not be authenticated if a login attempt is made on an
unselected day.
i. In Certificates:
Generate and register SIC certificates for user accounts. This authenticates the user in the
Check Point system. Use certificates with required authentication for added access control.
i. Click New.
ii. Select key or p12 file:
n Registration key for certificate enrollment - Select to send a registration key
that activates the certificate. When prompted, select the number of days the
user has to activate the certificate, before the registration key expires.
n Certificate file (p12) - Select to create a .p12 certificate file with a private
password for the user. When prompted, enter and confirm the certificate
password.
iii. Click OK
If a user is not in the system for some time (for example, when going on an extended leave),
you can revoke the certificate. This leaves the user account in the system, but the user
cannot access it until you renew the certificate.
To revoke a certificate, select the certificate and click Revoke.
j. In Encryption:
If the user accesses resources from a remote location, traffic between the remote user and
internal resources will be encrypted. Configure encryption settings for remote access users.
i. Select an encryption method for the user.
ii. Click Edit.
The encryption Properties window opens.
The next steps are for IKE Phase 2. The options can be different for different
methods.
iii. Open the Authentication tab.
iv. Select the authentication schemes:
n Password - The user authenticates with a pre-shared secret password. Enter
and confirm the password.
n Public Key - The user authenticates with a public key contained in a certificate
file.
k. Click OK.
Note - When defining a group of TACACS servers, all members of the group must
use the same protocol.
a. In SmartConsole, configure all the servers that you want to include in the server group.
For each server, enter its priority in the group. The lower the number is, the higher the
priority.
For example, if you create a group with 3 servers, with priorities 1,2 and 3, the server with
number 1 is approached first, the server with number 2 second, and the server with number
3, third.
b. Create the server group:
In SmartConsole, go to Object Explorer and click New > Server > More > TACACS Group.
c. Configure the group properties and add servers to the group:
i. Give the group a Name. It can be any name.
ii. Click the plus (+) for each server you want to add, and select each server from the
drop-down list.
iii. Click OK.
iv. Publish the SmartConsole session.
d. Add a new user.
e. Publish the SmartConsole session.
n SDK-supported API
A proprietary API that uses a proprietary communication protocol on UDP port 5500
through SDKs available for selected platforms.
n REST API
Note - If you do not complete the REST API configuration, the authentication is
performed through the SDK-supported API.
This configuration procedure is different for internal users (that are defined in SmartConsole) and
for external users.
To configure SecurID authentication settings for internal users
Internal users are users that you configure in SmartConsole. The Security Management Server
keeps these users in the management database.
External users are users that are you configure the Legacy SmartDashboard. The Security
Management Server does not keep these users in the management database.
a. In SmartConsole, click Manage & Settings > Blades.
b. In the Mobile Access section, click Configure in SmartDashboard.
Legacy SmartDashboard opens.
c. In the bottom left Network Objects pane, and click Users.
a. Make sure that connections between the Security Gateway and the Authentication Manager
are not NATed in the Address Translation Rule Base.
On a Virtual System, follow the instructions in sk107281.
b. Save, verify, and install the policy in SmartConsole.
When a Security Gateway has multiple interfaces, the SecurID agent on the Security Gateway
sometimes uses the wrong interface IP to decrypt the reply from the Authentication Manager, and
authentication fails.
To overcome this problem, place a new text file, named sdopts.rec in the same directory as
sdconf.rec.
The file should contain this line:
CLIENT_IP=<IP Address>
Where <IP Address> is the primary IP address of the Security Gateway, as defined on the
Authentication Manager. This is the IP address of the interface, to which the server is routed.
Example:
CLIENT_IP=192.168.20.30
Note - On a VSX Gateway and VSX Cluster Members, you must create the
same sdopts.rec file in the context VSID 0 and in the context of each
applicable Virtual System.
Access Roles
Access Role objects let you configure network access according to:
n Networks
n Users and user groups
n Computers and computer groups
n Remote Access VPN clients (supported for Security Gateways R80.10 and higher)
After you activate the Identity Awareness Software Blade, you can create access role objects and use them
in the Source and Destination columns of Access Control Policy rules.
For more information, see the R81.20 Identity Awareness Administration Guide.
1. In the object tree, click New> More > Users > Access Role.
The New Access Role window opens.
2. Enter a Name for the access role.
3. Enter a Comment (optional).
4. Select a Color for the object (optional).
5. In the Networks pane, select one of these:
n Any network
n Specific networks - For each network, click and select the network from the list
6. In the Users pane, select one of these:
n Any user
n All identified users - includes any user identified by a supported authentication method
(internal users, Active Directory users, or LDAP users).
n Specific users/groups - For each user or user group, click and select the user or the
group from the list
7. In the Machines pane, select one of these:
n Any machine
n All identified machines - includes machines identified by a supported authentication
method (Active Directory).
n Specific machines - For each machine, click and select the machine from the list
8. In the Remote Access Clients pane, select the clients for remote access.
9. Click OK.
Identity Awareness engine automatically recognizes changes to LDAP group membership and updates
identity information, including access roles.
User Directory
The Check Point User Directory stores user-specific information.
Note - User Directory requires a special license. If you have the Mobile Access Software
Blade, you have the User Directory license.
n Assign users to different Account Units, branches, and sub-branches, so that users with common
attributes (such as their role in the organization, permissions, an so on) are grouped together.
See "Managing Users on a User Directory Server" on page 127.
Item Description
2 Internet
3 Security Gateway - Queries LDAP user information, retrieves CRLs, and does bind operations
for authentication
Note - You cannot use the SmartConsole User Database when the User Directory LDAP
server is enabled.
Schema Checking
When schema checking is enabled, User Directory requires that every Check Point object class and its
associated attributes is defined in the directory schema.
Before you work with User Directory, make sure that schema checking is disabled. Otherwise the integration
will fail.
After the Check Point object classes and attributes are applied to the User Directory server's schema, you
must enable schema checking again.
Each of the proprietary object classes and attributes (all of which begin with "fw1") has a proprietary Object
Identifier (OID), listed below.
Object Class OIDs
fw1template 1.3.114.7.4.2.0.1
fw1person 1.3.114.7.4.2.0.2
The OIDs for the proprietary attributes begin with the same prefix ("1.3.114.7.4.2.0.X").
Only the value of "X" is different for each attribute.
See "User Directory Schema Attributes" below.
cn
uid
The user's login name, that is, the name used to login to the Security Gateway.
This attribute is passed to the external authentication system in all authentication methods except for
"Internal Password", and must be defined for all these authentication methods.
The login name is used by the Security Management Server to search the User Directory server(s).
For this reason, each user entry should have its own unique UID value.
It is also possible to login to the Security Gateway using the full DN.
The DN can be used when there is an ambiguity with this attribute or in "Internal Password" when this
attribute may be missing.
The DN can also be used when the same user (with the same uid) is defined in more than one Account
Unit on different User Directory servers.
description
member
userPassword
Must be given if the authentication method (fw1auth-method) is "Internal Password". The value can be
hashed using "crypt". In this case the syntax of this attribute is:
"{crypt}xxyyyyyyyyyyy"
where:
n "xx" is the "salt"
n "yyyyyyyyyyy" is the hashed password
It is possible (but not recommended) to store the password without hashing. However, if hashing is
specified in the User Directory server, you should not specify hashing here, in order to prevent the
password from being hashed twice. You should also use SSL in this case, to prevent sending an
unencrypted password.
The Security Gateway never reads this attribute, though it does write it. Instead, the User Directory bind
operation is used to verify a password.
fw1authmethod
One of these:
n RADIUS
n TACACS
n SecurID
n OS Password
n Defender
This default value for this attribute is overridden by Default authentication scheme in the Authentication
tab of the Account Unit window in SmartConsole.
For example: a User Directory server can contain User Directory entries that are all of the object-class
"person" even though the proprietary object-class "fw1person" was not added to the server's schema.
If Default authentication scheme in SmartConsole is "Internal Password", all the users will be
authenticated using the password stored in the "userPassword" attribute.
fw1authserver
1 y y "undefined"
method meaning
2 y
fw1pwdLastMod
"X" in
fw1person fw1template default
OID
fw1expiration-date
The last date on which the user can login to a Security Gateway, or "no value" if there is no expiration
date.
The format is yyyymmdd (for example, 20 August 1998 is 19980820).
The default is "no value".
8 y y "no value"
fw1hour-range-from
The time from which the user can login to a Security Gateway.
The format is hh:mm (for example, 8:15 AM is 08:15).
9 y y "00:00"
fw1hour-range-to
The time until which the user can login to a Security Gateway.
The format is hh:mm (for example, 8:15 AM is 08:15).
10 y y "23:59"
fw1day
The days (of week) on which the user can login to a Security Gateway.
Can have the values "SUN","MON", and so on.
fw1allowed-src
The names of one or more network objects from which the user can run a client, or "Any" to remove this
limitation, or "no value" if there is no such client.
The names should match the name of network objects defined in Security Management Server.
12 y y "no value"
fw1allowed-dst
The names of one or more network objects which the user can access, or "Any" to remove this limitation,
or "no value" if there is no such network object.
The names should match the name of network objects defined on the Security Management Server.
13 y y "no value"
fw1allowed-vlan
14 y y "no value"
fw1SR-keym
15 y y "Any"
fw1SR-datam
16 y y "Any"
fw1SR-mdm
17 y y "none"
fw1enc-fwz-expiration
The number of minutes after which a SecuRemote user must re-authenticate himself or herself to the
Security Gateway.
18 y y
fw1sr-auth-track
19 y y "none"
fw1groupTemplate
20 y y "False"
fw1ISAKMP-EncMethod
21 y y "DES", "3DES"
fw1ISAKMP-AuthMethods
The allowed authentication methods for SecuRemote users using IKE, (formerly known as ISAMP).
This can be one or more of: "preshared", "signatures".
22 y y "signatures"
fw1ISAKMP-HashMethods
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP).
This can be one or more of: "MD5", "SHA1".
23 y y "MD5", "SHA1"
fw1ISAKMP-Transform
The IPSec Transform method for SecuRemote users using IKE, (formerly known as ISAMP).
This can be one of: "AH", "ESP".
24 y y "ESP"
fw1ISAKMP-DataIntegrityMethod
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP).
This can be one of: "MD5", "SHA1".
25 y y "SHA1"
fw1ISAKMP-SharedSecret
The pre-shared secret for SecuRemote users using IKE, (formerly known as ISAMP).
The value can be calculated using the fw ikecrypt command line.
26 y y
fw1ISAKMP-DataEncMethod
fw1ISAKMP-DataEncMethod
The data encryption method for SecuRemote users using IKE, (formerly known as ISAMP).
27 y y "DES"
fw1enc-Methods
28 y y "FWZ"
fw1userPwdPolicy
Defines when and by whom the password should and can be changed.
29 y
fw1badPwdCount
30 y
fw1lastLoginFailure
31 4
memberof template
33 4
To add the propriety schema to your Netscape directory server, use the
$FWDIR/lib/ldap/schema.ldif file.
Important - This deletes the object class definition from the schema and adds the
updated one in its place.
We recommend that you back up the User Directory server before you run the command.
The ldif file:
The User Directory profile is a configurable LDAP policy that lets you define more exact User Directory
requests and enhances communication with the server.
Profiles control most of the LDAP server-specific knowledge. You can manage diverse technical
solutions, to integrate LDAP servers from different vendors.
Use User Directory profiles to make sure that the user management attributes of a Security Management
Server are correct for its associated LDAP server.
For example, if you have a certified OPSEC User Directory server, apply the OPSEC_DS profile to get
enhanced OPSEC-specific attributes.
LDAP servers have difference object repositories, schemas, and object relations.
n The organization's user database may have unconventional object types and relations because of
a specific application.
n Some applications use the cn attribute in the User object's Relatively Distinguished Name (RDN)
while others use uid.
n In Microsoft Active Directory, the user attribute memberOf describes which group the user belongs
to, while standard LDAP methods define the member attribute in the group object itself.
n Different servers implement different storage formats for passwords.
n Some servers are considered v3 but do not implement all v3 specifications. These servers cannot
extend the schema.
n Some LDAP servers already have built in support for certain user data, while others require a
Check Point schema extended attribute.
For example, Microsoft Active Directory has the accountExpires user attribute, but other
servers require the Check Point attribute fw1expirationdate, which is part of the Check Point
defined fw1person objectclass.
n Some servers allow queries with non-defined types, while others do not.
To apply a profile:
1. Open the Account Unit.
2. Select the profile.
To change a profile:
1. Create a new profile.
2. Copy the settings of a User Directory profile into the new profile.
3. Change the values.
User Directory servers organize groups and members through different means and relations. User Directory
operations are performed by Check Point on users, groups of users, and user templates where the template
is defined as a group entry and users are its members. The mode in which groups/templates and users are
defined has a profound effect on the performance of some of the Check Point functionality when fetching
user information. There are three different modes:
n Defining a "Member" attribute per member, or "Member" user-to-group membership mode. In this
case, each member of a specific group gets the 'Member" attribute, where the value of this attribute is
the DN of that member.
n Defining a "Memberof" attribute per group, or "MemberOf" user-to-group membership mode. In this
case, each group gets the "Memberof" attribute per group, where the value of this attribute is the DN
of a group entry. This is referred to as "MemberOf" user-to-group membership mode.
n Defining a "Memberof" attribute per member and group, or "Both" user-to-group membership mode.
In this case both members and groups are given the "Memberof" attribute.
The most effective mode is the "MemberOf" and "Both" modes where users' group membership information
is available on the user itself and no additional User Directory queries are necessary.
Set the user-to-group membership mode in the profile objects for each User Directory server in the
objects_5_0.C file.
n To specify the user-to-group and template-to-group membership mode set the GroupMembership
attribute to one of the following values: "Member", "MemberOf", "Both" accordingly.
n To specify the user-to-template membership mode set the TemplateMembership attribute to one of
the following values: "Member", "MemberOf" accordingly.
After successfully converting the database, set the User Directory server profile in the objects_5_0.C file
to the proper membership setting and start the Security Management Server.
Make sure to install policy/user database on all Security Gateways to enable the new configuration.
Profile Attributes
UserLoginAttr
Default Other
UserPasswordAttr
Default Other
TemplateObjectClass
default Other
ExpirationDateAttr
Default Other
ExpirationDateFormat
Default Other
PsswdDateFormat
Default Other
PsswdDateAttr
Default Other
BadPwdCountAttr
User Directory attribute to store and read bad password authentication count.
Default Other
ClientSideCrypt
If 1, the sent password will be encrypted with the algorithm specified in the DefaultCryptAlgorithm.
Default Other
DefaultCryptAlgorith
The algorithm used to encrypt a password before updating the User Directory server with a new
password.
Default Other
CryptedPasswordPrefix
The text to prefix to the encrypted password when updating the User Directory server with a modified
password.
Default Other
PhoneNumberAttr
User Directory attribute to store and read the user phone number.
Default Other
AttributesTranslationMap
General purpose attribute translation map, to resolve problems related to peculiarities of different server
types.
For example, an X.500 server does not allow the "-" character in an attribute name.
To enable the Check Point attributes containing "-", specify a translation entry: (e.g., "fw1-expiration
=fw1expiration").
Default Other
ListOfAttrsToAvoid
All attribute names listed here will be removed from the default list of attributes included in read/write
operations.
This is most useful in cases where these attributes are not supported by the User Directory server
schema, which might fail the entire operation.
This is especially relevant when the User Directory server schema is not extended with the Check Point
schema extension.
Default Other
BranchObjectClass
Use this attribute to define which type of objects (objectclass) is queried when the object tree branches
are displayed after the Account Unit is opened in SmartConsole.
Default Other
BranchOCOperator
If "One" is set, an "OR"ed query will be sent and every object that matches the criteria will be displayed
as a branch.
If "All" is set, an "AND"ed query will be sent and only objects of all types will be displayed.
Default Other
OrganizationObjectClass
This attribute defines what objects should be displayed with an organization object icon.
A new object type specified here should also be in BranchObjectClass.
Default Other
OrgUnitObjectClass
This attribute defines what objects should be displayed with an organization object icon.
Default Other
DomainObjectClass
This attribute defines what objects should be displayed with a Domain object icon.
A new object type specified here should also be in BranchObjectClass.
Default Other
UserObjectClass
Default Other
UserOCOperator
If "One" is set, an "OR"ed query will be sent and every object that matches one of the types will be
displayed as a user.
If "All" is set, an "AND"ed query will be sent and only objects of all types will be displayed.
Default Other
GroupObjectClass
Default Other
GroupOCOperator
If "One" is set, an "OR"ed query will be sent and every object that matches one of the types will be
displayed as a user.
If "All" is set, an "AND"ed query will be sent and only objects of all types will be displayed.
Default Other
GroupMembership
Defines the relationship Mode between the group and its members (user or template objects) when
reading group membership.
Default Other
n Member mode defines the member DN in the Group object (most One value allowed
servers)
n MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
n Modes define member DN in Group object and group DN in Member
object.
UserMembershipAttr
Defines what User Directory attribute to use when reading group membership from the user or template
object if GroupMembership mode is 'MemberOf' or 'Both' you may be required to extend the
user/template object schema in order to use this attribute.
Default Other
TemplateMembership
Defines the user to template membership mode when reading user template membership information.
Default Other
n Member mode defines the member DN in the Group object (most One value allowed
servers)
n MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
TemplateMembershipAttr
Defines which attribute to use when reading the User members from the template object, as User DNs, if
the TemplateMembership mode is Member.
Default Other
UserTemplateMembershipAttr
Defines which attribute to use when reading from the User object the template DN associated with the
user, if the TemplateMembership mode is MemberOf.
Default Other
OrganizationRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when you
create a new organizational unit in SmartConsole.
Default Other
OrgUnitRDN
This value is used as the attribute name in the Relatively Distinguished Name (RDN) when you create a
new organizational Unit in SmartConsole.
Default Other
UserRDN
This value is used as the attribute name in the Relatively Distinguished Name (RDN), when you create a
new User object in SmartConsole.
Default Other
GroupRDN
This value is used as the attribute name for the RDN, when you create a new Group object in
SmartConsole.
Default Other
DomainRDN
This value is used as the attribute name for the RDN, when you create a new Domain object in
SmartConsole.
Default Other
AutomaticAttrs
Default Other
user:userAccountControl:66048 Multiple
For Microsoft_AD This means that when a user object is created an extra attribute is values
included automatically: userAccountControl with the value 66048 allowed
GroupObjectClass
Default Other
OrgUnitObjectClass
Default Other
OrganizationObjectClass
This determines which ObjectClass to use when creating and/or modifying an Organization object.
These values can be different from the read counterpart.
Default Other
UserObjectClass
This determines which ObjectClass to use when creating and/or modifying a user object.
These values can be different from the read counterpart.
Default Other
DomainObjectClass
Determines which ObjectClass to use when creating and/or modifying a domain context object.
These values can be different from the read counterpart.
Default Other
The users of an organization can be distributed across several LDAP servers. Each LDAP server must be
represented by a separate Account Unit.
User Directory lets you use SmartDashboard to manage information about users and OUs (Organizational
Units) that are stored on the LDAP server.
To manage LDAP information from SmartDashboard
Create LDAP groups for the User Directory. These groups classify users according to type and can be used
in Policy rules. You can add users to groups, or you can create dynamic filters.
To create LDAP groups for User Directory
1. In SmartConsole, open Object Categories > New > More > Users > LDAP group.
2. In the New LDAP Group window that opens, select the Account Unit for the User Directory group.
3. Define Group's Scope - select one of these:
n All Account-Unit's Users - All users in the group
n Only Sub Tree - Users in the specified branch
n Only Group in branch - Users in the branch with the specified DN prefix
4. Apply an advanced LDAP filter:
a. Click Apply filter for dynamic group.
b. Enter the filter criteria.
5. Click OK.
Examples:
n If the User objects for managers in your organization have the object class "myOrgManager",
define the Managers group with the filter: objectclass=myOrgManagers
n If users in your organization have an e-mail address ending with us.org.com, you can define the
US group with the filter: mail=*us.org.com
n Free Form - Enter your own query expression. See RFC 1558 for information about the syntax of
User Directory (LDAP) query expressions.
n Add - Appends the condition to the query (in the text box to the right of Search Method).
Example of a Query
filter:(&(|(objectclass=fw1person)(objectclass=person)
(objectclass=organizationalPerson)(objectclass=inetOrgPerson))
(|(cn=Brad)(mail=*Andy*)))
n run the dcpromo command from the Start > Run menu, or
n run the Active Directory setup wizard using the System Configuration window.
The Active Directory has the following structure:
DC=qa, DC=checkpoint,DC=com
CN=Configuration,DCROOT
CN=Schema,CN=Configuration,DCROOT
CN=System,DCROOT
CN=Users,DCROOT
CN=Builtin,DCROOT
CN=Computers,DCOOT
OU=Domain Controllers,DCROOT
...
Most of the user objects and group objects created by Windows 2000 tools are stored under the CN=Users,
DCROOT branch, others under CN=Builtin, DCROOT branch, but these objects can be created under
other branches as well.
The branch CN=Schema, CN=Configuration, DCROOT contains all schema definitions.
Check Point can take advantage of an existing Active Directory object as well as add new types. For users,
the existing user can be used "as is" or be extended with fw1person as an auxiliary of "User" for full feature
granularity. The existing Active Directory "Group" type is supported "as is". A User Directory template can be
created by adding the fw1template object-class. This information is downloaded to the directory using the
schema_microsoft_ad.ldif file (see "Adding New Attributes to the Active Directory" on the next page).
Performance
The number of queries performed on the directory server is significantly low with Active Directory. This is
achieved by having a different object relations model. The Active Directory group-related information is
stored inside the user object. Therefore, when fetching the user object no additional query is necessary to
assign the user with the group. The same is true for users and templates.
Manageability
SmartConsole allows the creation and management of existing and new objects. However, some specific
Active Directory fields are not enabled in SmartConsole.
Enforcement
It is possible to work with the existing Active Directory objects without extending the schema. This is made
possible by defining an Internal Template object and assigning it with the User Directory Account Unit
defined on the Active Directory server.
For example, if you wish to enable all users with IKE+Hybrid based on the Active Directory passwords,
create a new template with the IKE properties enabled and "Check Point password" as the authentication
method.
To modify the Active Directory schema, add a new registry DWORD key named Schema Update
Allowed with the value different from zero under
HKLM\System\CurrentControlSet\Services\NTDS\Parameters.
Delegating Control
Delegating control over the directory to a specific user or group is important since by default the
Administrator is not allowed to modify the schema or even manage directory objects through User Directory
protocol.
To delegate control over the directory
Modify the file with the Active Directory schema, to use SmartConsole to configure the Active Directory
users.
To extend the Active Directory schema
1. From the Security Gateway, go to the directory of the schema file: $FWDIR/lib/ldap.
2. Copy schmea_microsoft_ad.ldif to the C:\ drive in the Active Directory server.
3. From Active Directory server, with a text editor open the schema file.
4. Find the value DOMAINNAME, and replace it with the name of your domain in LDIF format.
For example, the domain sample.checkpoint.com in LDIF format is:
DC=sample,DC=checkpoint,DC=com
5. Make sure that there is a dash character - at the end of the modify section.
This is an example of the modify section.
dn: CN=User,CN-
Schema,CN=Configuration,DC=sample,DC=checkpoint,DC=com
changetype: modify
add: auxiliaryClass
auxiliaryClass: 1.3.114.7.3.2.0.2
-
6. Run:
ldifde -i -f c:/schema_microsoft_ad.ldif
Below is the example in LDAP Data Interchange (LDIF) format that adds one attribute to the Microsoft Active
Directory:
dn:CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
changetype: add
adminDisplayName: fw1auth-method
attributeID: 1.3.114.7.4.2.0.1
attributeSyntax: 2.5.5.4
cn: fw1auth-method
distinguishedName:
CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
instanceType: 4
isSingleValued: FALSE
LDAPDisplayName: fw1auth-method
name: fw1auth-method
objectCategory:
CN=Attribute-Schema,CN=ConfigurationCN=Schema,CN=Configuration,DCROOT
ObjectClass: attributeSchema
oMSyntax: 20
rangeLower: 1
rangeUpper: 256
showInAdvancedViewOnly: TRUE
Note - A shell script is available for UNIX gateways. The script is at:
$FWDIR/lib/ldap/update_schema_microsoft_ad
ldapmodify -c -h support.checkpoint.com -D
cn=administrator,cn=users,dc=support,dc=checkpoint,dc=com" -w SeCrEt -f
$FWDIR/lib/ldap/schema_microsoft_ad.ldif
Account Units
An Account Unit represents branches of user information on one or more LDAP servers. The Account Unit is
the interface between the LDAP servers and the Security Management Server and Security Gateways.
You can have a number of Account Units representing one or more LDAP servers. Users are divided among
the branches of one Account Unit, or between different Account Units.
Note - When you enable the Identity Awareness and Mobile Access Software Blade ,
SmartConsole opens a First Time Configuration Wizard. The Active Directory
Integration window of this wizard lets you create a new AD Account Unit. After you
complete the wizard, SmartConsole creates the AD object and Account Unit.
n General
Configure how the Security Management Server uses the Account Unit
These are the configuration fields in the General tab:
l Name - Name for the Account Unit
l Comment - Optional comment
l Color - Optional color associated with the Account Unit
l Profile - LDAP vendor
l Domain - Domain of the Active Directory servers, when the same user name is used
in multiple Account Units (this value is also necessary for AD Query and SSO)
l Prefix - Prefix for non-Active Directory servers, when the same user name is used in
multiple Account Units
l Account Unit usage - Select applicable options:
o CRL retrieval - The Security Management Server manages how the CA sends
information about revoked licenses to the Security Gateways
o User Management - The Security Management Server uses the user
information from this LDAP server (User Directory must be enabled on the
Security Management Server).
n Servers
Manage LDAP servers that are used by this Account Unit. You can add, edit, or delete LDAP
server objects.
To configure an LDAP server for the Account Unit
a. To add a new server, click Add. To edit an existing one, select it from the table and
click Edit.
The LDAP Server Properties window opens.
b. From the Host drop-down menu, select the server object.
If necessary, create a new SmartConsole server object:
i. Click New.
ii. In the New Host window opens, enter the settings for the LDAP server.
iii. Click OK.
c. Enter the login credentials and the Default priority.
d. Select access permissions for the Check Point Gateways:
l Read data from this server
l Write data to this server
e. In the Encryption tab, configure the optional SSL encryption settings. To learn about
these settings, see the Help. Click ? or press F1 in the Encryption tab.
f. Click OK.
n Objects Management
Configure the LDAP server for the Security Management Server to query and the branches
to use
n Authentication
Configure the authentication scheme for the Account Unit. These are the configuration fields
in the Authentication tab:
l Use common group path for queries - Select to use one path for all the LDAP group
objects (only one query is necessary for the group objects)
l Allowed authentication schemes - Select one or more authentication schemes
allowed to authenticate users in this Account Unit - Check Point Password, SecurID,
RADIUS, OS Password, or TACACS
l Users' default values - The default settings for new LDAP users:
o User template - Template that you created
o Default authentication scheme - one of the authentication schemes selected
in the Allowed authentication schemes section
l Limit login failures (optional):
o Lock user's account after - Number of login failures, after which the account
gets locked
o Unlock user's account after - Number of seconds, after which the locked
account becomes unlocked
l IKE pre-shared secret encryption key - Pre-shared secret key for IKE users in this
Account Unit
3. Click OK.
4. Install the Access Control Policy.
1. On the LDAP Account Unit Properties > Servers tab, double-click a server.
The LDAP Server Properties window opens.
2. On the General tab, you can change:
Item Description
1 Security Management Server. Manages user data in User Directory. It has an Account Unit
object, where the two servers are defined.
3 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory server
replication (2).
4 Internet
5 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory server
replication (6).
With multiple replications, define the priority of each LDAP server in the Account Unit. Then you can define a
server list on the Security Gateways.
Select one LDAP server for the Security Management Server to connect to. The Security Management
Server can work with one LDAP server replication. All other replications must be synchronized for standby.
To set priority on the Account Unit
The Security Management Server and Security Gateways can use certificates to secure communication
with LDAP servers. If you do not configure certificates, the management server, Security Gateways, and
LDAP servers communicate without authentication.
To configure User Directory to use certificates
a. On the IPSec VPN page of the network object properties, click Add in the Repository of
Certificates Available list.
Managing Gateways
This section describes how to create, update, and manage Security Gateways, and to use Secure Internal
Communication (SIC) methods for Check Point platforms and products to authenticate each other.
Important - Make sure to select the correct Appliance model. Otherwise, policy
installation may fail.
If trust is established between the server and the Security Gateway, click Get to automatically retrieve
the information from the Security Gateway.
13. Select the Software Blades to enable on the Security Gateway.
For some of the Software Blades a first-time setup wizard will open. You can run the wizard now or
later. For more on the setup wizards, see the relevant Administration Guide.
Note - You cannot add additional information fields to the Security Gateway object.
Note - The physical interfaces that are part of a Bridge interface always
appear with the topology "Undefined".
Workaround: Use the API command "get-interfaces".
For explanations on how to use the API Get Interfaces command, see the Check Point Management API
Reference.
Dynamic Anti-Spoofing
When Anti-Spoofing is selected and you click Get interfaces, the Security Gateway generates a list of valid
IP addresses based on the IP address and netmask of the interface and the routes assigned to the interface.
Anti-Spoofing drops packets with a source IP address that does not belong to the network behind the
packet's interface. For example, packets with an internal IP address that comes from an external interface.
When the Network defined by routes option is selected along with Perform Anti-Spoofing based on
interface topology, you get Dynamic Anti-Spoofing. The valid IP addresses range is automatically
calculated without the administrator having to do click Get Interfaces or install a policy.
Initializing Trust
To establish the initial trust, a Security Gateway and a Security Management Server use a one-time
password. After the initial trust is established, further communication is based on security certificates.
Note - Make sure the clocks of the Security Gateway and Security Management Server
are synchronized, before you initialize trust between them. This is necessary for SIC to
succeed. To set the time settings of the Security Gateway and Security Management
Server, go to the Gaia Portal > System Management > Time.
To initialize Trust
SIC Status
After the Security Gateway receives the certificate issued by the ICA, the SIC status shows if the Security
Management Server can communicate securely with this Security Gateway:
Trust State
If the Trust State is compromised (keys were leaked, certificates were lost) or objects changed (user leaves,
open server upgraded to appliance), reset the Trust State. When you reset Trust, the SIC certificate is
revoked.
The Certificate Revocation List (CRL) is updated for the serial number of the revoked certificate. The ICA
signs the updated CRL and issues it to all Security Gateways during the next SIC connection. If two Security
Gateways have different CRLs, they cannot authenticate.
1. In SmartConsole, from the Gateways & Servers view, double-click the Security Gateway object.
2. Click Communication.
3. In the Trusted Communication window that opens, click Reset.
4. Install Policy on the Security Gateways.
This deploys the updated CRL to all Security Gateways. If you do not have a Rule Base (and
therefore cannot install a policy), you can reset Trust on the Security Gateways.
Troubleshooting SIC
If SIC fails to Initialize:
1. Make sure there is connectivity between the Security Gateway and Security Management Server.
2. Make sure that the Security Management Server and the Security Gateway use the same SIC
activation key (one-time password).
3. If the Security Management Server is behind a gateway, make sure there are rules that allow
connections between the Security Management Server and the remote Security Gateway. Make sure
Anti-spoofing settings are correct.
4. Make sure the name and the IP address of the Security Management Server are in the /etc/hosts
file on the Security Gateway.
If the IP address of the Security Management Server mapped through static NAT by its local Security
Gateway, add the public IP address of the Security Management Server to the /etc/hosts file on
the remote Security Gateway. Make sure the IP address resolves to the server's hostname.
5. Make sure the date and the time settings of the operating systems are correct. If the Security
Management Server and remote the Security Gateway reside in different time zones, the remote
Security Gateway may have to wait for the certificate to become valid.
6. Remove the Security Policy on the Security Gateway to let all the traffic through:
Important - See the R81.20 CLI Reference Guide > Chapter Security
Gateway Commands > Section fw > Section fw unloadlocal.
In SmartConsole:
1. In the General Properties window of the Security Gateway, click Communication.
2. In the Trusted Communication window, enter the one-time password (activation key) that you
entered on the Security Gateway.
3. Click Initialize.
4. Wait for the Certificate State field to show Trust established.
5. Click OK.
n VPN certificates for gateways - Authentication between members of the VPN community, to create
the VPN tunnel.
n Users - For strong methods to authenticate user access according to authorization and permissions.
ICA Clients
In most cases, certificates are handled as part of the object configuration. To control the ICA and certificates
in a more granular manner, you can use one of these ICA clients:
n The Check Point Configuration Tool - This is the cpconfig CLI utility. One of the options creates the
ICA, which issues a SIC certificate for the Security Management Server.
n SmartConsole - SIC certificates for Security Gateways and administrators, VPN certificates, and user
certificates.
n "The ICA Management Tool" on page 408 - VPN certificates for users and advanced ICA operations.
See audit logs of the ICA in SmartConsole Logs & Monitor > New Tab > Open Audit Logs View.
validity 5 years
To learn more about key size values, see RSA key lengths.
To view license information for each Software Blade
Step Instructions
2 In the Summary tab below, click the object's License Status (for example: OK).
The Device & License Information window opens. It shows basic object information and
License Status, license Expiration Date, and important quota information (in the
Additional Info column) for each Software Blade.
Notes:
n Quota information, quota-dependent license statuses, and blade information
messages are only supported for R80 and higher.
n The tooltip of the SKU is the product name.
The possible values for the Software Blade License Status are:
Status Description
Available The Software Blade is not active, but the license is valid.
No License The Software Blade is active but the license is not valid.
About to The Software Blade is active, but the license will expire in thirty days (default) or less
Expire (7 days or less for an evaluation license).
Quota The Software Blade is active, and the license is valid, but the quota of related objects
Exceeded (Security Gateways, Virtual Systems, files, and so on, depending on the blade) is
exceeded.
Quota The Software Blade is active, and the license is valid, but the number of objects of
Warning this blade is 90% (default) or more of the licensed quota.
Managing Licenses
After you run the First Time Configuration Wizard on a Security Management Server, and the Security
Management Server connects to the User Center, it automatically activates its license . If the Security
Management Server loses Internet connectivity before the license is activated, it tries again, on an interval.
If you make changes to Management Software Blade licenses of a Security Management Server in the
Check Point User Center, these changes are automatically synchronized with that Security Management
Server.
Notes:
n Automatic activation is supported on Check Point appliances only.
n Automatic synchronization is supported on all R80.30 servers and
higher.
To make sure that your environment is synchronized with the User Center, even when the Security
Management Server is not connected to the Internet, we recommend that you configure a Check Point
server with Internet connectivity as a proxy.
Step Instructions
1 In SmartConsole, from the left navigation panel, click Gateways & Servers.
2 In the top pane, select the object of the applicable Management Server or Security
Gateway.
Note - To add or remove licenses on the Licenses tab, an administrator must have
the Run One Time Script permission selected in their profile. To assign this
permission, in SmartConsole, go to Manage & Settings > Permissions &
Administrators > Permission Profiles. Open the relevant permission profile, go to
Gateways > Scripts, and select Run One-Time Scripts.
See also "Assigning Permission Profiles to Administrators" on page 70
You can see these columns with license information:
Column Description
Note - SmartConsole R81 and higher does not support viewing a license of Quantum
Spark appliances with Gaia Embedded OS (in the "Gateways & Servers" view, select
the Security Gateway object > in the bottom pane, click the "Licenses" tab).
Workaround: Use SmartUpdate to view the licenses.
Step Instructions
Column Description
Step Instructions
Step Instructions
2 In the Summary tab below, click the object's License Status (for example: OK).
The Device & License Information window opens. It shows basic object information and
License Status, license Expiration Date, and important quota information (in the Additional
Info column) for each Software Blade.
Notes:
n Quota information, quota-dependent license statuses, and blade information messages
are only supported for R80 and higher.
n The tooltip of the SKU is the product name.
The possible values for the Software Blade License Status are:
Status Description
Available The Software Blade is not active, but the license is valid.
No License The Software Blade is active but the license is not valid.
About to The Software Blade is active, but the license will expire in thirty days (default) or less (7
Expire days or less for an evaluation license).
Quota The Software Blade is active, and the license is valid, but the quota of related objects
Exceeded (Security Gateways, files, virtual systems, and so on, depending on the blade) is
exceeded.
Quota The Software Blade is active, and the license is valid, but the number of objects of this
Warning blade is 90% (default) or more of the licensed quota.
Option Description
License To see and export license information for Software Blades on each specific Security
Status view Management Server, Security Gateway, or Log Server object.
License To see filter and export license status information for all configured Security
Status report Management Server, Security Gateway, or Log Server objects.
License To see filter and export license information for Software Blades on all configured
Inventory Security Management Server, Security Gateway, or Log Server objects.
report
The SmartEvent Software Blade lets you customize the License Status and License Inventory information
from the Logs & Monitor view of SmartConsole.
It is also possible to view license information from the Gateways & Servers view of SmartConsole without
enabling the SmartEvent blade on Security Management Server..
The Gateways & Servers view in SmartConsole lets you see and export the License Inventory report.
Step Instructions
1 View the License Inventory report from the Gateways & Servers view:
1. In SmartConsole, from the left navigation panel, click Gateways & Servers.
2. From the top toolbar, click Actions > License Report.
3. Wait for the SmartView to load and show this report.
By default, this report contains:
n Inventory page: Blade Names, Devices Names, License Statuses
n License by Device page: Devices Names, License statuses, CK, SKU, Account
ID, Support Level, Next Expiration Date
2 Export the License Inventory report from the Gateways & Servers view:
1. In the top right corner, click the Options button.
2. Select the applicable export option - Export to Excel, or Export to PDF.
The Logs & Monitor view in SmartConsole lets you see, filter and export the License Status report.
Step Instructions
1 View License Status report from the Logs & Monitor view:
1. In SmartConsole, from the left navigation panel, click Logs & Monitor
2. At the top, open a new tab by clicking New Tab, or [+].
3. In the left section, click Views.
4. In the list of reports, double-click License Status.
5. Wait for the SmartView to load and show this report.
By default, this report contains:
n Names of the configured objects, License status for each object, CK, SKU,
Account ID, Support Level, Next Expiration Date
2 Filter the License Status report in the Logs & Monitor view:
1. In the top right corner, click the Options button > View Filter.
The Edit View Filter window opens.
2. Select a Field to filter results. For example, Device Name, License Status, Account
ID.
3. Select the logical operator - Equals, Not Equals, or Contains.
4. Select or enter a filter value.
Note - Click the X icon to delete a filter.
5. Optional: Click the + icon to configure additional filters.
6. Click OK to apply the configured filters.
The report is filtered based on the configured filters.
3 Export the License Status report in the Logs & Monitor view:
1. In the top right corner, click the Options button.
2. Select the applicable export option - Export to Excel, or Export to PDF.
The Logs & Monitor view in SmartConsole lets you see, filter and export the License Inventory report.
Step Instructions
1 View the License Inventory report from the Logs & Monitor view:
1. In SmartConsole, from the left navigation panel, click Logs & Monitor
2. At the top, open a new tab by clicking New Tab, or [+].
3. In the left section, click Reports.
4. In the list of reports, double-click License Inventory.
5. Wait for the SmartView to load and show this report.
By default, this report contains:
n Inventory page: Blade Names, Devices Names, License Statuses
n License by Device page: Devices Names, License statuses, CK, SKU, Account
ID, Support Level, Next Expiration Date
Step Instructions
2 Filter the License Inventory report in the Logs & Monitor view:
1. In the top right corner, click the Options button > Report Filter.
The Edit Report Filter window opens.
2. Select a Field to filter results. For example, Blade Name, Device Name, License
Overall Status, Account ID.
3. Select the logical operator - Equals, Not Equals, or Contains.
4. Select or enter a filter value.
Note - Click the X icon to delete a filter.
5. Optional: Click the + icon to configure additional filters.
6. Click OK to apply the configured filters.
The report is filtered based on the configured filters.
3 Export the License Inventory report in the Logs & Monitor view:
1. In the top right corner, click the Options button.
2. Select the applicable export option - Export to Excel, or Export to PDF.
Best Practice - Use the Package Repository on the Management Server if the target's
connectivity to the Management Server is better than the target's connectivity to the
cloud, or if the target is overloaded with traffic.
Note - You can select up to 30 Security Gateways and Cluster Members, but installation
can take place only on 10 targets at the same time. The Management Server places
each target above the 10th in a queue. Each time an installation completes on one of the
targets, the Management Server installs it on the next target in the queue.
Some Security Gateways have Recommended Hotfixes. See the Recommended Jumbo column in the
Gateways & Servers view:
You can deploy a Recommended Jumbo Hotfix Accumulator or a specific Jumbo Hotfix Accumulator take.
Prerequisites
To use Central Deployment:
n The administrator must have SmartUpdate write permission on the Management Server.
n The latest build of the CPUSE Deployment Agent must be installed on the target Security Gateways
and Cluster Members.
n SIC must already be established between the Management Server and the target Security Gateways
and Cluster Members.
n A policy must be installed on the target Security Gateways and Cluster Members.
n Only full clusters can be deployed (you cannot select and deploy one cluster member).
To use Central Deployment directly from the Check Point Cloud:
1. The Management Server must be able to connect to the Check Point Cloud.
2. The target Security Gateways and Cluster Members must be able to connect to the Check Point
Cloud.
To install the Recommended Jumbo Hotfix Accumulator on the target Security Gateways and Cluster
Members, at least these Jumbo Hotfix Accumulator takes must be installed:
Limitations
Central Deployment does not support:
n Connecting from SmartConsole to the Security Management Server through a proxy server.
In this case, use the applicable API command.
n ClusterXL in High Availability mode configured as "Switch to higher priority Cluster
Member" (known as "Primary Up").
n ClusterXL in Load Sharing mode.
n VRRP Cluster.
n Standalone server.
n Scalable Chassis 40000 / 60000.
n For Centrally Managed Quantum Spark Appliances running Gaia Embedded operating system:
Installation
Adding a package to the Package Repository
3. From the toolbar menu, click Actions ( ) and select one of these options:
n Install Hotfix/Jumbo
n Version Upgrade
The Install Hotfix or Version Upgrade window opens, and shows information about the selected
targets and their corresponding recommended Hotfix or Upgrade Package.
4. In the Hotfix/Jumbo section, select one of these options:
n Install the Recommended Hotfix/Jumbo
or
Upgrade to the Recommended Major Version
Note - If there is no recommended Jumbo Hotfix Accumulator for the
selected targets, this option is grayed out.
If a recommended Jumbo Hotfix Accumulator applies only to some of
the selected targets, the deployment takes place only for those targets.
n Install a Specific Hotfix/Jumbo
or
Upgrade to a Specific Major Version
a. Enter the version number / Hotfix file name.
You can copy the Hotfix file name from the applicable SK article to the Install
Specific Hotfix text box.
Note - Use the field "Install a Specific Hotfix/Jumbo" to install a
firmware package on Quantum Spark Appliances that run Gaia
Embedded OS R80.20.xx and higher. The Management Server
considers firmware packages based on the same main version
as Jumbo Hotfixes. For example, all firmware packages
R81.10.XX are based on the main version R81.10.
Example for a Security Gateway R80.20:
n Install on all cluster members - Installs the selected package on all members in this cluster
(active and standby). This can cluster failover and interrupt the traffic.
n Install on non-active members only - Installs the selected package only on standby cluster
members.
l Once installation is complete, turn non-active member to active - Changes the
cluster state of a standby cluster member to active.
7. In the Advanced section, select the where the Security Gateway downloads package from:
n Automatic - If the package is in the Package Repository, the Management Server transfers
it to the Security Gateway. If the package is not in the Package Repository, the Security
Gateway downloads it from the Check Point Cloud.
n Gateway - The Security Gateway downloads the package from the Check Point Cloud. The
Security Gateway must be connected to the Internet.
n Management - The Security Gateway downloads the package from the Management
Server.
8. At the bottom, click Verify.
The verification process starts. The verification process makes sure that the selected Hotfix or
Upgrade Package can be installed on the targets. The verification process makes sure this
package does not override other installed Hotfixes and that enough free disk space is available for
the process to complete.
To see the progress of the verification process open the Tasks view in the bottom left corner of
SmartConsole and click Details.
Example:
9. Click Install.
10. Central Deployment makes sure that Access Control Policy is installed.
11. After the installation is complete, you must install the applicable Threat Prevention policy on the
target Security Gateways and Clusters.
Notes:
n If different targets have different recommended Hotfixes or Upgrade Packages,
each target gets its applicable recommended Hotfix or Upgrade Package.
n Before you install a firmware on a Quantum Spark appliance that runs Gaia
Embedded operating system, you must disconnect an external storage from the
USB port (at minimum, make sure it does not contain firmware images for
Quantum Spark appliances).
Procedure:
1. Connect to the command line on the Security Gateway / each Cluster Member.
2. Log in to the Expert mode.
3. On a VSX Gateway / each VSX Cluster Member, go to the context of the applicable Virtual System:
vsenv <VSID>
b. To force the Security Gateway / Cluster Member to connect only to the real IP address of the
Management Server or Log Server, run:
Configuration files
File Name Controls Location
vpn_table.def Definitions for various kernel tables that hold See "Location of 'vpn_
VPN data. table.def' Files on the
For example, VPN timeouts, number of VPN Management Server" on
tunnels, whether a specific kernel table should page 176
be synchronized between cluster members, and
others.
dhcp.def Definitions of packet inspection for DHCP traffic See "Location of 'dhcp.def'
- DHCP Request, DHCP Reply, and DHCP Files on the Management
Relay. Server" on page 179
gtp.def Definitions of packet inspection for GTP (GPRS See "Location of 'gtp.def'
Tunnelling Protocol) traffic. Files on the Management
Server" on page 180
Configuration Procedure
1. Connect to the command line on the Security Management Server.
2. Log in to the Expert mode.
3. Back up the current file:
Example:
cp -v $FWDIR/conf/user.def.FW1{,_BKP}
Example:
vi $FWDIR/conf/user.def.FW1
5. Make the applicable changes as described in the applicable SK article, or as instructed by Check
Point Support.
6. Save the changes in the file and exit the editor.
7. Connect with SmartConsole to the Security Management Server.
8. In SmartConsole, install the Access Control Policy on the applicable Security Gateway or Cluster
object.
Introduction
An administrator configures Security Policy and other inspection settings in SmartConsole.
During a policy installation, the Management Server creates the applicable files and transfers them to the
target Security Gateways.
The Management Server creates these files based on:
n Security Policy in SmartConsole
n Global properties in SmartConsole
n Security Gateway properties
n Multiple configuration files on the Management Server that control the inspection of various network
protocols
It is possible to modify these configuration files on the Management Server to fine-tune the inspection in
your network (in Check Point INSPECT language).
There are two main categories of these configuration files:
n Files for Security Gateways that have the same software version as the Management Server.
n Files for Security Gateways that have the a lower software version than the Management Server. This
category is called "Backward Compatibility".
Configuration files
File Name Controls Location
vpn_table.def Definitions for various kernel tables that hold See "Location of 'vpn_
VPN data. table.def' Files on the
For example, VPN timeouts, number of VPN Management Server" on
tunnels, whether a specific kernel table should page 176
be synchronized between cluster members, and
others.
dhcp.def Definitions of packet inspection for DHCP traffic See "Location of 'dhcp.def'
- DHCP Request, DHCP Reply, and DHCP Files on the Management
Relay. Server" on page 179
gtp.def Definitions of packet inspection for GTP (GPRS See "Location of 'gtp.def'
Tunnelling Protocol) traffic. Files on the Management
Server" on page 180
Configuration Procedure
1. Connect to the command line on the Management Server.
2. Log in to the Expert mode.
3. On a Multi-Domain Server, go to the context of the applicable Domain Management Server:
Example:
cp -v $FWDIR/conf/user.def.FW1{,_BKP}
Example:
vi $FWDIR/conf/user.def.FW1
6. Make the applicable changes as described in the applicable SK article, or as instructed by Check
Point Support.
7. Save the changes in the file and exit the editor.
8. In SmartConsole, install the Access Control Policy on the applicable Security Gateway or Cluster
object.
On a Multi-Domain Server, connect with SmartConsole to the applicable Domain Management
Server.
R81.20 $FWDIR/conf/user.def.FW1
R81.10 $FWDIR/conf/user.def.FW1
R81 $FWDIR/conf/user.def.FW1
R80.40 $FWDIR/conf/user.def.R8040CMP
R80.30 $FWDIR/conf/user.def.R8040CMP
R80.20 $FWDIR/conf/user.def.R8040CMP
R80.10 $FWDIR/conf/user.def.R8040CMP
R77.30 $FWDIR/conf/user.def.R77CMP
R81.20 $FWDIR/lib/implied_rules.def
R81.10 $FWDIR/lib/implied_rules.def
R81 $FWDIR/lib/implied_rules.def
R80.40 /opt/CPR8040CMP-R81.20/lib/implied_
rules.def
R80.30 /opt/CPR8040CMP-R81.20/lib/implied_
rules.def
R80.20 /opt/CPR8040CMP-R81.20/lib/implied_
rules.def
R80.10 /opt/CPR8040CMP-R81.20/lib/implied_
rules.def
R77.30 /opt/CPR77CMP-R81.20/lib/implied_
rules.def
R81.20 $FWDIR/lib/table.def
R81.10 $FWDIR/lib/table.def
R81 $FWDIR/lib/table.def
R80.40 /opt/CPR8040CMP-
R81.20/lib/table.def
R80.30 /opt/CPR8040CMP-
R81.20/lib/table.def
R80.20 /opt/CPR8040CMP-
R81.20/lib/table.def
R80.10 /opt/CPR8040CMP-
R81.20/lib/table.def
R77.30 /opt/CPR77CMP-R81.20/lib/table.def
R81.20 $FWDIR/lib/crypt.def
R81.10 $FWDIR/lib/crypt.def
R81 $FWDIR/lib/crypt.def
R80.40 /opt/CPR8040CMP-
R81.20/lib/crypt.def
R80.30 /opt/CPR8040CMP-
R81.20/lib/crypt.def
R80.20 /opt/CPR8040CMP-
R81.20/lib/crypt.def
R80.10 /opt/CPR8040CMP-
R81.20/lib/crypt.def
R77.30 /opt/CPR77CMP-R81.20/lib/crypt.def
R81.20 $FWDIR/lib/vpn_table.def
R81.10 $FWDIR/lib/vpn_table.def
R81 $FWDIR/lib/vpn_table.def
R80.40 /opt/CPR8040CMP-R81.20/lib/vpn_
table.def
R80.30 /opt/CPR8040CMP-R81.20/lib/vpn_
table.def
R80.20 /opt/CPR8040CMP-R81.20/lib/vpn_
table.def
R80.10 /opt/CPR8040CMP-R81.20/lib/vpn_
table.def
R77.30 /opt/CPR77CMP-R81.20/lib/vpn_
table.def
R81.20 $FWDIR/lib/communities.def
R81.10 $FWDIR/lib/communities.def
R81 $FWDIR/lib/communities.def
R80.40 /opt/CPR8040CMP-
R81.20/lib/communities.def
R80.30 /opt/CPR8040CMP-
R81.20/lib/communities.def
R80.20 /opt/CPR8040CMP-
R81.20/lib/communities.def
R80.10 /opt/CPR8040CMP-
R81.20/lib/communities.def
R77.30 /opt/CPR77CMP-
R81.20/lib/communities.def
R81.20 $FWDIR/lib/base.def
R81.10 $FWDIR/lib/base.def
R81 $FWDIR/lib/base.def
R80.40 /opt/CPR8040CMP-
R81.20/lib/base.def
R80.30 /opt/CPR8040CMP-
R81.20/lib/base.def
R80.20 /opt/CPR8040CMP-
R81.20/lib/base.def
R80.10 /opt/CPR8040CMP-
R81.20/lib/base.def
R77.30 /opt/CPR77CMP-R81.20/lib/base.def
R81.20 $FWDIR/lib/dhcp.def
R81.10 $FWDIR/lib/dhcp.def
R81 $FWDIR/lib/dhcp.def
R80.40 /opt/CPR8040CMP-
R81.20/lib/dhcp.def
R80.30 /opt/CPR8040CMP-
R81.20/lib/dhcp.def
R80.20 /opt/CPR8040CMP-
R81.20/lib/dhcp.def
R80.10 /opt/CPR8040CMP-
R81.20/lib/dhcp.def
R77.30 /opt/CPR77CMP-R81.20/lib/dhcp.def
R81.20 $FWDIR/lib/gtp.def
R81.10 $FWDIR/lib/gtp.def
R81 $FWDIR/lib/gtp.def
R80.40 /opt/CPR8040CMP-
R81.20/lib/gtp.def
R80.30 /opt/CPR8040CMP-
R81.20/lib/gtp.def
R80.20 /opt/CPR8040CMP-
R81.20/lib/gtp.def
R80.10 /opt/CPR8040CMP-
R81.20/lib/gtp.def
R77.30 /opt/CPR77CMP-R81.20/lib/gtp.def
Managing Objects
Network Objects, defined in SmartConsole and stored in the proprietary Check Point object database,
represent physical and virtual network components (such as Security Gateways, servers, and users), and
logical components (such as IP address ranges and Dynamic Objects). Before you create Network Objects,
analyze the needs of your organization:
n What are the physical components of your network: devices, hosts, Security Gateways and their
active Software Blades?
n What are the logical components: services, resources, applications, ranges?
n Who are the users? How should you group them, and with what permissions?
Note - In SmartConsole, when you configure properties of an object and create a new
object from the original object, the new object is not available in the original Object
Editor.
Object Categories
Objects in SmartConsole represent networks, devices, protocols and resources. SmartConsole divides
objects into these categories:
Data Types International Bank Account Number - IBAN, HIPAA - Medical Record
Number - MRN, Source Code.
Note - Do not create two objects with the same name. A validation error shows when
you try to publish the SmartConsole session. To resolve, change one of the object
names.
To work with objects, right-click the object in the object tree or in the Object Explorer, and select the action.
You can delete objects that are not used, and you can find out where an object is used.
To clone an object
1. In the object tree or in the Object Explorer, right-click the object and select Clone.
The Clone Object window opens.
2. Enter a name for the cloned object.
3. Click OK.
Object Tags
Object tags are keywords or labels that you can assign to the network objects or groups of objects for search
purposes. These are the types of tags you can assign:
n User tags - Assigned manually to individual objects or groups of objects
n System tags - Predefined keywords, such as "application"
Each tag has a name and a value. The value can be static, or dynamically filled by detection engines.
Networks
A Network is a group of IP addresses defined by a network address and a net mask. The net mask indicates
the size of the network.
A Broadcast IP address is an IP address which is destined for all hosts on the specified network. If this
address is included, the Broadcast IP address will be considered as part of the network.
Network Groups
A Network Group is a collection of hosts, gateways, networks, or other groups. Groups can be used to
facilitate and simplify network management. When you have the same set of objects which you want to use
in different places in the Rule Base, you can create a group to include such set of objects and reuse it.
Modifications are applied to the group instead of to each member of the group.
Groups are also used where SmartConsole lets you select only one object, but you need to work with more
than one. For example, in the Security Gateway object > Network Management > VPN Domain > Manually
defined, you can only select on object from the drop-down menu. If you want to select more than one object
for your VPN Domain, you can create a group, add the required objects to the group, and select the group
from the drop-down menu.
Note - When you upgrade a Management Server from R77.30 or earlier versions, Node
objects are converted to Host objects.
Gateway Cluster
A cluster is a group of Security Gateways configured as one logical object. Clustered gateways add
redundancy through High Availability or Load Sharing.
For more information, see the R81.20 ClusterXL Administration Guide.
Address Ranges
An Address Range is a range of IP addresses on the network, defined by the lowest and the highest IP
addresses. Use an Address Range object when you cannot define a range of IP addresses by a network IP
and a net mask. The Address Range objects are also necessary for the implementation of NAT and VPN.
Wildcard Objects
Wildcard objects are IP address objects that share a common pattern that can be permitted or denied
access in a security policy.
Note - This feature is only supported for Security Gateways R80.20 and higher.
The wildcard netmask is the mask of bits that indicate which parts of the IP address must match and which
do not have to match. For example:
Wildcard Netmask: 0. 0. 3. 0
The third octet represents the mask of bits. If we convert the 3 to binary, we get 00000011.
The 0 parts of the mask must match the equivalent bits of the IP address.
The 1 parts of the mask do not have to match, and can be any value.
0 0 0 0 0 0 1 1
Must match the equivalent bits in the IP address Do not have to match
128 64 32 16 8 4 2 1
Binary Decimal
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 1 1
0 0 0 0 0 0 1 0 2
0 0 0 0 0 0 1 1 3
Scenario One
A supermarket chain has all of its cash registers on subnet 194.29.x.1, where x defines the region. In this
use case, all the cash registers in this region must have access to the database server at 194.30.1.1.
Instead of defining 256 hosts (194.29.0.1, 194.29.1.1, 194.29.2.1....194.29.255.1), the administrator
creates a wildcard object that represents all the cash registers in the region:
The wildcard object can now be added to the Access Control Policy.
Scenario Two
In this use case, a supermarket chain has stores in Europe and Asia.
The 192.30.0-255.1 network contains both the Asian and European regions, and the stores within those
regions.
Item Description
The administrator wants stores in the European and Asia regions to access different database servers. In
this topology, the third octet of the European and Asia network's IP address will be subject to a wildcard.
The first four bits of the wildcard will represent the region and the last four bits will represent the store
number.
Bits that represent the region Bits that represent the store number
0000 0000
Binary Decimal
Region Store
To include all the stores of a particular region, the last four bits of the wildcard mask must be set to 1 (15
in Decimal):
Binary Decimal
Region Store
A wildcard object that represents all the Asian stores will look like this:
Scenario Three
In this scenario, the netmask bits are not consecutive.
Wildcard IP 1 1 0 1
Wildcard mask 0 0 5 0
Wildcard IP 00000001.00000001.00000000.00000001
Mask:
0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0
IPv6
The same principles apply to IPv6 addresses. For example, if the wildcard object has these values:
Domains
A Domain object represents a host or DNS domain by its name only. It is not necessary to have the IP
address of the site.
You can use the Domain object in the source and destination columns of an Access Control Policy.
You can configure a Domain object in two ways:
n Select FQDN
In the object name, use the Fully Qualified Domain Name (FQDN).
Use the format .x.y.z (with a dot "." before the FQDN).
For example, if you use .www.example.com then the Security Gateway matches
www.example.com
This option is supported for R80.10 and higher, and is the default. It is more accurate and faster than
the non-FQDN option.
The Security Gateway looks up the FQDN with a direct DNS query, and uses the result in the Rule
Base.
This option supports SecureXL Accept templates.
Using Domain objects with this option in a rule has no effect on the performance of the rule, or of the
rules that come after it.
n Clear FQDN
This option enforces the domain and its sub-domains.
In the object name, use the format .x.y for the name.
The Security Gateway resolves the name using DNS reverse lookups, which can be inaccurate.
The Security Gateway uses the result in the Rule Base, and caches the result to use again.
Updatable Objects
An Updatable Object is a network object that represents an external service, such as Office 365, AWS,
GEO locations, and more. External services providers publish lists of IP addresses or Domains or both to
allow access to their services. These lists are dynamically updated.
Updatable objects derive their contents from these published lists of the providers, which Check Point
uploads to the Check Point cloud. The updatable objects are updated automatically on the Security
Gateway each time the provider changes a list. There is no need to install policy for the updates to take
effect.
You can use updatable objects in all three types of policies: Access Control, Threat Prevention, and HTTPS
Inspection.
You can use an updatable object in the Access Control, Threat Prevention or the HTTPS Inspection policy
as a Source or a Destination. In the Threat Prevention policy, you can also use an updatable object as the
Protected Scope.
These are the currently supported external services for updatable objects:
n Online services - Office 365, Azure, and AWS
n GEO locations - The GEO database provides mapping of location data to IP addresses. For each
location, there is a network object you can import to SmartConsole. You can block or allow access to
and from specific locations based on their IP addresses.
Notes:
n For Access Control, this feature is supported on Security Gateways R80.20 and
higher.
n For Threat Prevention and HTTPS Inspection, this feature is supported on
Security Gateways R80.40 and higher.
6. Click OK.
7. Install policy.
The Exchange Services object is added to the Rule Base.
Services &
No Name Source Destination VPN Action Track
Applications
You can monitor the updates in the Logs & Monitor > Logs view.
Dynamic Objects
A Dynamic Object is a "logical" object where the IP address is resolved differently for each Security
Gateway, using the "dynamic_objects" command.
For Security Gateways R80.10 and higher, dynamic objects support SecureXL Accept templates. Therefore,
there is no performance impact on a rule that uses a dynamic object, or on rules that come after it.
Dynamic Objects are predefined for LocalMachine-all-interfaces. The DAIP computer interfaces (static and
dynamic) are resolved into this object.
This feature is supported in the Access Control, Threat Prevention, HTTPS Inspection, and NAT Rule
Bases.
The feature is supported only on a Security Management Server R81 and higher, and Security Gateway
(Cluster) R81 and higher.
After you create the Generic Data Center object, any change made in the file is automatically enforced on
the Security Gateway with no need to install policy.
To create the JSON file, follow the guidelines described in sk167210.
Using the Generic Data Center object in a Security Policy
1. In SmartConsole, go to the Object Explorer and click New > More > Cloud > Data Center >
Generic Data Center.
The New Generic Data Center object window opens.
2. Configure these fields:
a. URL - Enter the URL of the JSON file.
b. Interval - Enter the internal at which the file is sampled.
The default interval is 60 seconds.
c. Add Custom Header - If you need to add a custom header to the request to the server,
select this checkbox and enter the Key and Value.
d. Click Test Connection to make sure you can access the file.
3. Add the applicable Generic Data Center object to your Rule Base:
In the Source or Destination column, click Import > Data Center > Generic Data Center, and
select the applicable data center object from the list.
Note - The list contains all the data center objects included in you JSON file.
4. Install Policy.
Limitations
n You can make up to 15,000 changes in a JSON file between two time intervals at which the JSON file
is sampled.
n The number of generic data center objects + dynamic objects + updatable objects in all policy
packages cannot exceed 2,000.
Security Zones
With Security Zones you can create a strong Access Control Policy that controls the traffic between parts of
the network.
A Security Zone object represents a part of the network (for example, the internal network or the external
network). You assign a network interface of a Security Gateway to a Security Zone. You can then use the
Security Zone objects in the Source and Destination columns of the Rule Base.
Use Security Zones to:
n Simplify the Policy. Apply the same rule to many Security Gateways.
n Add networks to Security Gateways interfaces without changing the Rule Base.
For example, in the diagram, we have three Security Zones for a typical network: ExternalZone (1),
DMZZone (2) and InternalZone (3).
n Security Gateway (4) has three interfaces. One interface is assigned to ExternalZone (1), one
interface is assigned to DMZZone (2), and one interface is assigned to InternalZone (3).
n Security Gateway (5) has two interfaces. One interface is assigned to ExternalZone (1) and one
interface is assigned to InternalZone (3).
A Security Gateway interface can belong to only one Security Zone. Interfaces to different networks can be
in the same Security Zone.
Workflow
1. Configure Security Zone objects.
Or, use the predefined Security Zones (see "Predefined Security Zones" on the next page ).
2. Assign Security Gateway interfaces to Security Zones (see "Creating and Assigning Security Zones"
below).
3. Use the Security Zone objects in the Source and Destination of a rule.
For example:
4. Install the Access Control Policy (see "Installing the Access Control Policy" on page 259).
Limitations
n NAT policy supports Security Zones only for R81 Security Gateways and higher.
n The Threat Prevention Policy supports Security Zones only for R81 Security Gateways and higher.
n If the clean-up rule contains Security Zones, it might prevent the creation of Drop templates for that
rule.
Interoperable Devices
An Interoperable Device is a device that has no Check Point Software Blades installed.
The Interoperable Device:
n Cannot have a policy installed on it
n Can participate in Check Point VPN communities and solutions.
VoIP Domains
There are five types of VoIP Domain objects:
n VoIP Domain SIP Proxy
n VoIP Domain H.323 Gatekeeper
n VoIP Domain H.323 Gateway
n VoIP Domain MGCP Call Agent
n VoIP Domain SCCP Call Manager
In many VoIP networks, the control signals follow a different route through the network than the media. This
is the case when the call is managed by a signal routing device. Signal routing is done in SIP by the Redirect
Server, Registrar, and/or Proxy. In SIP, signal routing is done by the Gatekeeper and/or Gateway.
Enforcing signal routing locations is an important aspect of VoIP security. It is possible to specify the
endpoints that the signal routing device is allowed to manage. This set of locations is called a VoIP Domain.
For more information, see the R81.20 VoIP Administration Guide.
Logical Servers
A Logical Server is a group of machines that provides the same services. The workload of this group is
distributed between all its members.
When a Server group is stipulated in the Servers group field, the client is bound to this physical server.
There are two modes of operation:
n Persistency by Service - Once a client is connected to a physical server for a specified service,
subsequent connection to the same Logical Server and the same service will be redirected to the
same physical server for the duration of the session.
Balance Method
The load balancing algorithm stipulates how the traffic is balanced between the servers. There are several
types of balancing methods:
n Server Load - The Security Gateway determines which Security Management Server is best
equipped to handle the new connection.
n Round Trip Time - On the basis of the shortest round trip time between Security Gateway and the
servers, executed by a simple ping, the Security Gateway determines which Security Management
Server is best equipped to handle the new connection.
n Round Robin - The new connection is assigned to the first available server.
n Random - The new connection is assigned to a server at random.
n Domain - The new connection is assigned to a server based on domain names.
Fore more information, see the R81.20 Quantum Security Gateway Guide > Chapter ConnectControl -
Server Load Balancing.
The Check Point Rule Base must not have these objects. If it does, the Security Management Server does
not generate Access Lists.
n Drop (in the Action column)
n Encrypt (Action)
n Alert (Action)
n RPC (Service)
n ACE (Service)
n Authentication Rules
n Negate Cell
Managing Policies
SmartConsole offers a number of tools that address policy management tasks, both at the definition stage
and for maintenance.
At the definition stage:
n Policy Packages let you group different types of policies, to be installed together on the same
installation targets.
n Predefined Installation Targets let you associate each package with a set of gateways. You do not
have to repeat the gateway selection process each time you install a Policy Package.
At the maintenance level:
n Search gives versatile search capabilities for network objects and the rules in the Rule Base.
n Database version control lets you track past changes to the database.
Important - Legacy SmartDashboard does not show the QoS and Desktop policies
when an administrator with read-only permissions is logged in, and the "Desktop
Security" policy is enabled in the policy package.
An organization has four sites, each with its own requirements. Each site has a different set of Software
Blades installed on the Security Gateways:
5 Internet
To manage these different types of sites efficiently, you need to create three different Policy Packages .
Each Package includes a combination of policy types that correspond to the Software Blades installed on
the site's Security Gateway. For example:
n A policy package that includes the Access Control policy type. The Access Control policy type
controls the firewall, NAT, Application & URL Filtering, and Content Awareness Software Blades.
This package also determines the VPN configuration.
Install the Access Control policy package on all Security Gateways.
n A policy package that includes the QoS policy type for the QoS blade on Security Gateway that
manages bandwidth.
Install this policy package on the executive management Security Gateway.
n A policy package that includes the Desktop Security Policy type for the Security Gateway that
handles Mobile Access.
Install this policy package on the executive management Security Gateway.
7. Click Close.
The new policy shows on the Security Policies page.
When you make changes to user definitions through SmartConsole, they are saved to the user database
on the Security Management Server. User authentication methods and encryption keys are also saved in
this database. The user database does not contain information about users defined externally to the
Security Gateway (such as users in external User Directory groups), but it does contain information about
the external groups themselves (for example, on which Account Unit the external group is defined).
Changes to external groups take effect only after the policy is installed, or the user database is
downloaded from the Security Management Server.
You must choose to install the policy or the user database, based on the changes you made:
n Install the policy, if you modified additional components of the Policy Package (for example, added
new Security Policy rules) that are used by the installation targets
n Install the user database, if you only changed the user definitions or the administrator definitions -
from the Menu, select Install Database
The user database is installed on:
n Security Gateways - during policy installation
n Check Point hosts with one or more Management Software Blades enabled - during database
installation
You can also install the user database on Security Gateways and on a remote server, such as a Log
Server, from the command line interface on the Security Management Server.
For more information, see the R81.20 CLI Reference Guide - Chapter Security Management Server
Commands - Section fwm - Sub-section fwm dbload.
Note - Check Point hosts that do not have active Management Software Blades do
not get the user database installed on them.
You can uninstall a policy package through a command line interface on the gateway.
To uninstall a policy package
fw unloadlocal
Warning
n The "fw unloadlocal" command prevents all traffic from passing
through the Security Gateway (Cluster Member), because it disables the IP
Forwarding in the Linux kernel on the Security Gateway (Cluster Member).
n The "fw unloadlocal" command removes all policies from the Security
Gateway (Cluster Member). This means that the Security Gateway (Cluster
Member) accepts all incoming connections destined to all active interfaces
without any filtering or protection enabled.
For more information, see the R81.20 CLI Reference Guide - Chapter Security Gateway Commands -
Section fw - Sub-section fw unloadlocal.
For example, paste this into the query search bar and press Enter:
layer_uuid_rule_uuid:*_46f0ee3b-026d-45b0-b7f0-5d71f6d8eb10
Column Description
Content The data asset to protect, for example, credit card numbers or medical records.
You can set the direction of the data to Download Traffic (into the organization),
Upload Traffic (out of the organization), or Any Direction.
See "Content Column" on page 215.
Action Action that is done when traffic matches the rule. Options include: Accept, Drop, Ask,
Inform (UserCheck message), Inline Layer, and Reject.
See "Actions" on page 217.
Track Tracking and logging action that is done when traffic matches the rule.
See "Tracking Column" on page 218.
Install On Network objects that will get the rule(s) of the policy.
See "Installing the Access Control Policy" on page 259.
You can add network objects to the Source and Destination columns of the Access Control Policy. See
"Managing Objects" on page 181.
VPN Column
You can configure rules for Site-to-Site VPN, Remote Access VPN, and the Mobile Access Portal and
clients.
To make a rule for a VPN Community, add a Site-to-Site Community or a Remote Access VPN Community
object to this column, or select Any to make the rule apply to all VPN Communities.
When you enable Mobile Access on a Security Gateway, the Security Gateway is automatically added to the
RemoteAccess VPN Community. Include that Community in the VPN column of the rule or use Any to
make the rule apply to Mobile Access Security Gateways. If the Security Gateway was removed from the
VPN Community, the VPN column must contain Any.
IPsec VPN
The IPsec VPN solution lets the Security Gateway encrypt and decrypt traffic to and from other Security
Gateways and clients. Use SmartConsole SmartConsole to easily configure VPN connections between
Security Gateways and remote devices.
For Site-to-Site Communities, you can configure Star and Mesh topologies for VPN networks, and include
third-party gateways.
The VPN tunnel guarantees:
n Authenticity - Uses standard authentication methods
n Privacy - All VPN data is encrypted
n Integrity - Uses industry-standard integrity assurance methods
Check Point Mobile Access lets remote users easily and securely use the Internet to connect to internal
networks. Remote users start a standard HTTPS request to the Mobile Access Security Gateway, and
authenticate with one or more secure authentication methods.
The Mobile Access Portal lets mobile and remote workers connect easily and securely to critical resources
over the internet. Check Point Mobile Apps enable secure encrypted communication from unmanaged
smartphones and tablets to your corporate resources. Access can include internal apps, email, calendar,
and contacts.
To include access to Mobile Access applications in the Rule Base, include the Mobile Application in the
Services & Applications column.
To give access to resources through specified remote access clients, create Access Roles for the clients
and include them in the Source column of a rule.
To learn more about Site-to-Site VPN and Remote Access VPN, see these guides:
n R81.20 Site to Site VPN Administration Guide
n R81.20 Remote Access VPN Administration Guide
n R81.20 Mobile Access Administration Guide
Service Matching
The Security Gateway identifies (matches) a service according to IP protocol, TCP and UDP port number,
and protocol signature.
To make it possible for the Security Gateway to match services by protocol signature, you must enable
Application & URL Filtering on the Security Gateway and on the Ordered Layer (see "Enabling Access
Control Features" on page 240 ).
You can configure TCP and UDP services to be matched by source port.
Application Matching
If an application is allowed in the policy, the rule is matched only on the Recommended services of the
application. This default setting is more secure than allowing the application on all services. For example: a
rule that allows Facebook, allows it only on the Application Control Web Browsing Services: http, https,
HTTP_proxy, and HTTPS_proxy.
If an application is blocked in the policy, it is blocked on all services. It is therefore blocked on all ports.
You can change the default match settings for applications.
Configuring Matching for an Allowed Application
You can configure how a rule matches an application or category that is allowed in the policy. You can
configure the rule to match the application in one of these ways:
n On any service
n On a specified service
To do this, change the Match Settings of the application or category. The application or category is
changed everywhere that it is used in the policy.
By default, if an application is blocked in the policy, it is blocked on all services. It is therefore blocked on
all ports.
You can configure the matching for blocked applications so that they are matched on the recommended
services. For Web applications, the recommended services are the Application Control Web browsing
services.
If the match settings of the application are configured to Customize, the blocked application is matched
on the customized services service. It is not matched on all ports.
You can create custom applications, categories or groups, which are not included in the Check Point
Application Database.
7. Click OK.
Services and Applications on R77.30 and Lower Security Gateways, and after Upgrade
Content Column
You can add Data Types to the Content column of rules in the Access Control Policy.
To use the Content column, you must enable Content Awareness, in the General Properties page of the
Security Gateway, and on the Layer.
A Data Type is a classification of data. The Security Gateway classifies incoming and outgoing traffic
according to Data Types, and enforces the Policy accordingly.
You can set the direction of the data in the Policy to Download Traffic (into the organization), Upload Traffic
(out of the organization), or Any Direction.
There are two kinds of Data Types: Content Types (classified by analyzing the file content) and File Types
(classified by analyzing the file ID).
Content Type examples:
n PCI - credit card numbers
n HIPAA - Medical Records Number - MRN
n International Bank Account Numbers - IBAN
n Source Code - JAVA
n U.S. Social Security Numbers - According to SSA
n Salary Survey Terms
File type examples:
n Viewer File - PDF
n Executable file
n Database file
n Document file
n Presentation file
n Spreadsheet file
Notes:
n The Content Awareness Software Blade supports HTTP, HTTPS, SMTP, and
FTP protocols on all ports. It is fully integrated with the Access Control unified
Rule Base. Traffic over QUIC and WebSocket is not inspected . You can use
'Quic protocol' / 'WebSocket protocol' in a new Application rule to Drop or Allow
this traffic.HTTP connections that are not RFC-compliant are not inspected.
n The Content Awareness Software Blade does not match Binary Certificate *.cer
files to the 'Certificates and Private Keys' Data Type.
n Content Awareness and Data Loss Prevention (DLP) both use Data Types.
However, they have different features and capabilities. They work independently,
and the Security Gateway enforces them separately.
To learn more about the Data Types, open the Data Type object in SmartConsole and press the ? button (or
F1 key) to see the Help.
To learn more about DLP, see the R81.20 Data Loss Prevention Administration Guide.
Actions
Action Meaning
Drop Drops the traffic. The Security Gateway does not send a response to the originating
end of the connection and the connection eventually does a time-out. If no UserCheck
object is defined for this action, no page is displayed.
Ask Asks the user a question and adds a confirmatory check box, or a reason box. Uses a
UserCheck object.
Inform Sends a message to the user attempting to access the application or the content. Uses
a UserCheck object.
Reject Rejects the traffic. The Security Gateway sends an RST packet to the originating end of
the connection and the connection is closed.
UserCheck Configure how often the user sees the configured message when the action is ask,
Frequency inform, or block.
Enable Redirects HTTP traffic to an authentication (captive) portal. After the user is
Identity authenticated, new connections from this source are inspected without requiring
Captive authentication.
Portal
Important - A rule that drops traffic, with the Source and Destination
parameters defined as Any, also drops traffic to and from the Captive Portal.
UserCheck Actions
When you enable the UserCheck feature, the Security Gateway sends messages to users about possible
non-compliant or dangerous Internet browsing, based on the rules an administrator configures in the
Security Policy. This help users prevent security incidents and learn about the organizational security policy.
Create UserCheck objects and use them in the Rule Base, to communicate with the users. These actions
use UserCheck objects:
n Inform
n Ask
n Drop
For more information, see the UserCheck section.
UserCheck on a computer
The UserCheck Client is installed on endpoint computers. This client:
n Sends messages for applications that are not based on Internet browsers, such as Skype and iTunes,
and Internet browser add-ons and plug-ins.
n Shows a message on the computer when it cannot be shown in the Internet browser.
Tracking Column
These are some of the Tracking options:
n None - Do not generate a log.
n Log -This is the default Track option. It shows all the information that the Security Gateway used to
match the connection.
n Accounting - Select this to update the log at 10 minute intervals, to show how much data has passed
in the connection: Upload bytes, Download bytes, and browse time.
To learn more about Tracking options, see the R81.20 Logging and Monitoring Administration Guide.
These example Rule Bases show how the Security Gateway matches connections.
Note that these Rule Bases intentionally do not follow the best practices for Access Control Rules (see
"Best Practices for Access Control Rules" on page 257). This is to make the explanations of rule
matching clearer.
Rule Base Matching - Example 1
Services &
No Source Destination Content Action
Applications
SYN Run the Rule Base: Final match (drop on rule 1).
Look for the first rule Shows in the log.
that matches: The Security Gateway does not turn on the inspection
engines for the other rules.
n Rule 1 - Match.
Services &
No. Source Destination Content Action
Applications
This is the matching procedure when browsing to a file sharing Web site. Follow the rows from top to
bottom. Follow each row from left to right:
Part of
Security Gateway action Inspection result
connection
HTTP Header The Security Gateway turns on inspection Application: File sharing
engines to examine the data in the connection. (category).
In this example turn on the: Content: Don't know yet.
n URL Filtering engine - Is it a gambling
site?
n Content Awareness engine - Is it an
executable file?
Services &
No. Source Destination Content Action
Applications
This is the matching procedure when downloading an executable file from a business Web site.
Follow the rows from top to bottom. Follow each row from left to right:
Part of
Security Gateway action Inspection result
connection
n The Security Gateway sometimes runs the Rule Base more than one time. Each time it runs,
the Security Gateway optimizes the matching, to find the first rule that applies to the
connection.
n If the rule includes an application, or a site, or a service with a protocol signature (in the
Application and Services column), or a Data Type (in the Content column), the Security
Gateway:
l Turns on one or more inspection engines.
l Postpones making the final match decision until it has inspected the body of the
connection.
n The Security Gateway searches for the first rule that applies to (matches) a connection. If the
Security Gateway does not have all the information it needs to identify the matching rule, it
continues to inspect the traffic.
Basic Rules
Best Practice - These are basic Access Control rules we recommend for all Rule Bases:
n Stealth rule that prevents direct access to the Security Gateway
n Cleanup rule that drops all traffic that is not matched by the earlier rules in the
policy
Services &
No Name Source Destination Action Track Install On
Applications
Services &
No Name Source Destination Action Track Install On
Applications
Rule Explanation
2 Stealth - All internal traffic that is NOT from the SmartConsole administrators to one of the
Security Gateways is dropped. When a connection matches the Stealth rule, an alert window
opens in SmartView Monitor.
3 Critical subnet - Traffic from the internal network to the specified resources is logged. This
rule defines three subnets as critical resources: Finance, HR, and R&D.
4 Tech support - Allows the Technical Support server to access the Remote-1 web server which
is behind the Remote-1 Security Gateway. Only HTTP traffic is allowed. When a packet
matches the Tech support rule, the Alert action is done.
5 DNS server - Allows UDP traffic to the external DNS server. This traffic is not logged.
6 Mail and Web servers - Allows incoming traffic to the mail and web servers that are located in
the DMZ. HTTP, HTTPS, and SMTP traffic is allowed.
7 SMTP - Allows outgoing SMTP connections to the mail server. Does not allow SMTP
connections to the internal network, to protect against a compromised mail server.
8 DMZ and Internet - Allows traffic from the internal network to the DMZ and Internet.
9 Cleanup rule - Drops all traffic that does not match one of the earlier rules.
Services &
No Name Source Destination Application Content Action Track
s
Rules Explanation
9 Cleanup rule - Drop all traffic that does not match one of the earlier rules in the Ordered
Layer. This is a default explicit rule. You can change or delete it.
Best Practice - Have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.
To configure the value for the Source, Destination, and Services & Applications columns after removing
the last object from a cell:
1. In the Manage & Settings view > Policy Settings > Rule Base Cell Settings.
2. In the After removing the last object in a cell section, select one of these options:
n Add 'None' to the cell - After removing the last object from a cell, the value in the cell becomes
"None".
n Add the object according to the Rule Base cell default - After removing the last object in a
cell, the value in the cell becomes as configured in the Security Access Defaults section.
Monitoring Applications
Scenario: I want to monitor all Facebook traffic in my organization. How can I do this?
Scenario: I want to block pornographic sites in my organization, and tell the user about the violation. How
can I do this?
To block an application or category of applications and tell the user about the policy violation:
1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Choose a Layer with Applications and URL Filtering enabled.
3. Create a rule that includes these components:
n Services & Applications - Select the Pornography category.
n Action - Drop, and a UserCheck Blocked Message - Access Control
The message informs users that their actions are against company policy and can include a
link to report if the website is included in an incorrect category.
n Track - Log
Note - This Rule Base example contains only those columns that are
applicable to this subject.
The rule blocks traffic to pornographic sites and logs attempts to access those sites. Users who violate
the rule receive a UserCheck message that informs them that the application is blocked according to
company security policy. The message can include a link to report if the website is included in an
incorrect category.
Important - A rule that blocks traffic, with the Source and Destination parameters
defined as Any, also blocks traffic to and from the Captive Portal.
Scenario: I want to limit my employees' access to streaming media so that it does not impede business
tasks.
If you do not want to block an application or category, there are different ways to set limits for employee
access:
n Add a Limit object to a rule to limit the bandwidth that is permitted for the rule.
n Add one or more Time objects to a rule to make it active only during specified times.
The example rule below:
n Allows access to streaming media during non-peak business hours only.
n Limits the upload throughput for streaming media in the company to 1 Gbps.
To create a rule that allows streaming media with time and bandwidth limits:
1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Choose a Layer with Applications and URL Filtering enabled.
3. Click one of the Add Rule toolbar buttons to add the rule in the position that you choose in the Rule
Base.
4. Create a rule that includes these components:
n Services & Applications - Media Streams category.
Note - Applications are matched on their Recommended services,
where each service runs on a specific port, such as the default
Application Control Web browsing Services: http, https, HTTP_
proxy, and HTTPS_proxy. To change this, see "Services &
Applications Column" on page 212.
n Action - Click More and select Action: Accept, and a Limit object.
n Time - Add a Time object that specifies the hours or time period in which the rule is active.
Note - The Time column is not shown by default in the Rule Base table. To see it, right-click
on the table header and select Time.
Services
Destinatio and Install
Name Source Action Track Time
n Applicatio On
ns
Important:
n In ClusterXL Load Sharing modes, the specified bandwidth limit is divided
between all configured Cluster Members, regardless of the cluster state. For
example, if a maximum limit requirement is 30 Gbps, and there are three
Cluster Members, you must configure the Limit object in the rule to 30 Gbps / 3
= 10 Gbps.
n In a Scalable PlatformSecurity Group, the specified bandwidth limit is divided
between all Security Group Members, regardless of their state. For example, if
a maximum limit requirement is 30 Gbps, and there are three Security Group
Members, you must configure the Limit object in the rule to 30 Gbps / 3 = 10
Gbps.
Scenario: I want to allow a Remote Access application for a specified group of users and block the same
application for other users. I also want to block other Remote Access applications for everyone. How can
I do this?
If you enable Identity Awareness on a Security Gateway, you can use it together with Application Control
to make rules that apply to an access role. Use access role objects to define users, machines, and
network locations as one object.
In this example:
n You have already created an Access Role Identified_Users that represents all identified users in
the organization. You can use this to allow access to applications only for users who are identified
on the Security Gateway.
n You want to allow access to the Radmin Remote Access tool for all identified users.
n You want to block all other Remote Access tools for everyone within your organization. You also
want to block any other application that can establish remote connections or remote control.
Blocking Sites
Scenario: I want to block sites that are associated with categories that can cause liability issues. Most of
these categories exist in the Application Database but there is also a custom defined site that must be
included. How can I do this?
You can do this by creating a custom group and adding all applicable categories and the site to it. If you
enable Identity Awareness on a Security Gateway, you can use it together with URL Filtering to make
rules that apply to an access role. Use access role objects to define users, machines, and network
locations as one object.
In this example:
n You have already created
l An Access Role that represents all identified users in the organization (Identified_Users).
l A custom application for a site named FreeMovies.
n You want to block sites that can cause liability issues for everyone within your organization.
n You will create a custom group that includes Application Database categories as well as the
previously defined custom site named FreeMovies.
To create a custom group
1. In the Object Explorer, click New > More > Custom Application/Site > Application/Site
Group.
2. Give the group a name. For example, Liability_Sites.
Services &
Name Source Destination Action Track
Applications
The Inline Layer has a parent rule (Rule 2 in the example), and sub rules (Rules 2.1 and 2.2). The Action of
the parent rule is the name of the Inline Layer.
If the packet does not match the parent rule of the Inline Layer, the matching continues to the next rule of the
Ordered Layer (Rule 3).
If a packet matches the parent rule of the Inline Layer (Rule 2), the Security Gateway checks it against the
sub rules:
n If the packet matches a sub rule in the Inline Layer (Rule 2.1), no more rule matching is done.
n If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup Rule is applied
(Rule 2.2). If this rule is missing, the Implicit Cleanup Rule is applied (see "Types of Rules in the Rule
Base" on page 241). No more rule matching is done.
Important:
n Always add an explicit Cleanup Rule at the end of each Inline Layer, and make
sure that its Action is the same as the Action of the Implicit Cleanup Rule.
n For Security Gateways R80.10 and lower, the second layer behaves like an
Application Control policy.
Item Description
1 Ordered Layer 1
2 Ordered Layer 2
3 Ordered Layer 3
If none of the rules in the Ordered Layer match the packet, the explicit Default Cleanup Rule is applied. If
this rule is missing, the Implicit Cleanup Rule is applied (see "Types of Rules in the Rule Base" on
page 241).
Every Ordered Layer has its own implicit cleanup rule. You can configure the rule to Accept or Drop in the
Layer settings (see "Configuring the Implicit Cleanup Rule" on page 243).
Important - Always add an explicit Cleanup Rule at the end of each Ordered Layer, and
make sure that its Action is the same as the Action of the Implicit Cleanup Rule.
Note - A Remote Access VPN community object is not supported in the parent rule of
an Inline Layer if the action is "Inline Layer".
To resolve this issue: Use "*Any" in the parent rule instead of the Remote Access
VPN community object. You can use the Remote Access VPN community object in
the rules in the inline layer.
Security Gateways R77.30 or lower: To create a Layer for URL Filtering and Application Control
The Layer Editor window opens and shows the General view.
5. Enable Application & URL Filtering on the Layer.
a. Enter a name for the Layer.
We recommend the name Application.
b. In the Blades section, select Application & URL Filtering.
c. Click OK and the Layer Editor window closes.
d. Click OK and the Policy window closes.
6. Publish the SmartConsole session.
1. In SmartConsole, from the left navigation panel, click Gateways & Servers and double-click the
Security Gateway object.
The General Properties window of the Security Gateway opens.
2. From the navigation tree, click General Properties.
3. In the Network Security tab, select one or more of these Access Control features:
n IPsec VPN
n Mobile Access
n Application Control
n URL Filtering
n Content Awareness
n Identity Awareness
4. Click OK.
Note - Do not enable a Blade that is not enabled in the Ordered Layer.
5. Click OK.
Explicit rules
The rules that the administrator configures explicitly, to allow or to block traffic based on specified criteria.
Important - The default Cleanup rule is an explicit rule that is added by default to every
new layer. You can change or delete the default Cleanup rule. We recommend that you
have an explicit Cleanup rule as the last rule in each layer.
Implied rules
The default rules that are available as part of the Global properties configuration and cannot be edited. You
can only select the implied rules and configure their position in the Rule Base:
n First - Applied first, before all other rules in the Rule Base - explicit or implied
n Last - Applied last, after all other rules in the Rule Base - explicit or implied, but before the Implicit
Cleanup Rule
n Before Last - Applied before the last explicit rule in the Rule Base
Implied rules are configured to allow connections for different services that the Security Gateway uses. For
example, the Accept Control Connections rules allow packets that control these services:
n Installation of the security policy on a Security Gateway
n Sending logs from a Security Gateway to the Security Management Server
n Connecting to third party application servers, such as RADIUS and TACACS authentication servers
Note - If you change the default values, the policy installation fails on Security Gateway
R77.30 or lower.
Note - If you use the Cleanup rule as the last explicit rule, the Last Implied Rule
and the Implicit Cleanup Rule are not enforced.
5. Last Implied Rule - Remember that although this rule is applied after all other explicit and implied
rules, the Implicit Cleanup Rule is still applied last.
6. Implicit Cleanup Rule - The default rule that is applied if none of the rules in the Layer match.
Configuring the Implied Rules
Some of the implied rules are enabled by default. You can change the default configuration as
necessary.
In SmartConsole, from the Security Policies View, select Actions > Implied Rules.
The Implied Policy window opens.
It shows only the implied rules, not the explicit rules.
You can also delegate ownership of different Layers to different administrators. See "Configuring
Permissions for Access Control Layers" on page 74.
Sharing Layers
You may need to use the same rules in different parts of a Policy, or have the same rules in multiple Policy
packages.
There is no need to create the rules multiple times. Define an Ordered Layer or an Inline Layer one time, and
mark it as shared. You can then reuse the Inline Layer or Ordered layer in multiple policy packages or use
the Inline Layer in multiple places in an Ordered Layer. This is useful, for example, if you are an
administrator of a corporation and want to share some of the rules among multiple branches of the
corporation:
n It saves time and prevents mistakes.
n To change a shared rule in all of the corporation's branches, you must only make the change once.
To mark a Layer as shared
You can export Layer rules to a .CSV file. You can open and change the .CSV file in a spreadsheet
application such as Microsoft Excel.
This use case shows an example unified Access Control Policy. It controls applications and content in
one Ordered Layer.
Services
N Destinat & Trac
Name Source VPN Content Action
o. ion Applicatio k
ns
Services
N Destinat & Trac
Name Source VPN Content Action
o. ion Applicatio k
ns
Cleanup (6)
Rule Explanation
1 General Compliance section - Block access to unacceptable Web sites and applications.
2 Block risky executables section - Block downloading of high risk executable files.
3-4 Credit card data section - Allow uploading of credit cards numbers only by the finance
department, and only over HTTPS. Block other credit cards.
5 Block sensitive data over VPN section - A remote user that connects over the
organization's VPN sees an informational message.
6 cleanup rule - Accept all traffic that does not match one of the earlier rules.
This use case shows an example Access Control Policy that controls Web traffic. The Web server rules
are in an Inline Layer.
Services &
Destinatio
No Name Source Application Content Action Track
n
s
Services &
Destinatio
No Name Source Application Content Action Track
n
s
Rule Explanation
4 This is the parent rule of the Inline Layer. The Action is the name of the Inline Layer. If a
packet matches on the parent rule, the matching continues to rule 4.1 of the Inline Layer. If
a packet does not match on the parent rule, the matching continues to rule 5.
4.1 If a packet matches on rule 4.1, the rule action is done on the packet, and no more rule
-4.4 matching is done. If a packet does not match on rule 4.1, continue to rule 4.2. The same
logic applies to the remaining rules in the Inline Layer.
4.5 If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup Rule
is applied. The Cleanup rule is a default explicit rule. You can change or delete it. We
recommend that you have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.
This use case shows a Policy that controls the upload and download of data from and to the organization.
Services &
Destinatio
No Name Source Application Content Action Track
n
s
Regulatory compliance
Human Resources
Services &
Destinatio
No Name Source Application Content Action Track
n
s
Intellectual Property
Rule Explanation
1-3 Regulatory Compliance section - Controls the upload and download of executable files
and credit cards.
You can set the direction of the Content. In rule 1 it is Download Traffic, in rule 2 it is
Upload Traffic, and in rule 3 it is Any Direction.
Rule 1 controls executable files, which are File Types. The File Type rule is higher in the
Rule Base than rules with Content Types (Rules 2 to 7). This improves the efficiency of the
Rule Base, because File Types are matched sooner than Content Types.
4-5 Personally Identifiable Information section - Controls the upload and download of social
security number and medical records.
The rule Action for rule 4 is Inform. When an internal user uploads a file with a social
security number, the user sees a message.
Rule Explanation
6 Human resources section - Controls the sending of salary survey information outside of
the organization.
The rule action is Ask. If sensitive content is detected, the user must confirm that the
upload complies with the organization's policy.
7 Intellectual Property section - A group of rules that control how source code leaves the
organization.
Rule 7 is the parent rule of an Inline Layer (see "Ordered Layers and Inline Layers" on
page 236). The Action is the name of the Inline Layer.
If a packet matches on rule 7.1, matching stops.
If a packet does not match on rule 7.1, continue to rule 7.2. In a similar way, if there is no
match, continue to 7.3. The matching stops on the last rule of the Inline Layer. We
recommend that you have an explicit cleanup rule as the last rule in each Inline Layer
This use case shows some examples of URL Filtering and Application Control rules for a typical policy
that monitors and controls Internet browsing. (The Hits, VPN and Install On columns are not shown.)
Services &
No. Name Source Destination Action Track Time
Applications
Services &
No. Name Source Destination Action Track Time
Applications
Rule Explanation
1 Liability sites - Blocks traffic to sites and applications in the custom Potential_liability
group. The UserCheck Blocked Message is shown to users and explains why their traffic is
blocked. See "Blocking Sites" on page 234.
Scenario: I want to block sites that are associated with categories that can cause liability
issues. Most of these categories exist in the Application Database but there is also a
custom defined site that must be included. How can I do this?
You can do this by creating a custom group and adding all applicable categories and the
site to it. If you enable Identity Awareness on a Security Gateway, you can use it together
with URL Filtering to make rules that apply to an access role. Use access role objects to
define users, machines, and network locations as one object.
In this example:
n You have already created
l An Access Role that represents all identified users in the organization
(Identified_Users).
l A custom application for a site named FreeMovies.
n You want to block sites that can cause liability issues for everyone within your
organization.
n You will create a custom group that includes Application Database categories as well
as the previously defined custom site named FreeMovies.
4. Click OK.
You can now use the Liability_Sites group in the Access Control Rule Base.
Rule Explanation
Services &
Name Source Destination Action Track
Applications
2 High risk applications - Blocks traffic to sites and applications in the High Risk category
and blocks the iTunes application. The UserCheck Block Message is shown to users and
explains why their traffic is blocked.
3 Allow IT department Remote Admin - Allows the computers in the IT department network
to use the Radmin application. Traffic that uses Radmin is allowed only during the Work-
Hours (set to 8:00 through 18:30, for example).
4 Allow Facebook for HR - Allows computers in the HR network to use Facebook. The total
traffic downloaded from Facebook is limited to 1 Gbps, there is no upload limit.
5 Block these categories - Blocks traffic to these categories: Streaming Media, Social
Networking, P2P File Sharing, and Remote Administration. The UserCheck Blocked
Message is shown to users and explains why their traffic is blocked.
Note - The Remote Administration category blocks traffic that uses the Radmin
application. If this rule is placed before rule 3, then this rule can also block
Radmin for the IT department.
6 Log all applications - Logs all traffic that matches any of the URL Filtering and Application
Control categories.
Services &
Source Destination Content
Applications
Services &
Source Destination Content
Applications
Reason for 2 and 3: Application Control and Content Awareness rules require content inspection.
Therefore, they:
n Allow the connection until the Security Gateway has inspected connection header and body.
n May affect performance.
4. For rules with Data Types: Place rules that check File Types higher in the Rule Base than rules that
check for Content Types. See "Content Column" on page 215.
Reason: File Types are matched sooner than Content Types.
5. Do not use Application Control and URL Filtering in the same rule, this may lead to wrong rule
matching. Use Application Control and URL Filtering in separate rules. This makes sure that the URL
Filtering rule is used as soon as the category is identified. For more information, see sk174045.
To see examples of some of these best practices, see the "Use Cases for the Unified Rule Base" on
page 247 and "Creating a Basic Access Control Policy" on page 224.
Important - After upgrade, do not change the Action of the implicit cleanup rules, or the
order of the Policy Layers. If you do, the policy installation will fail.
New Access Control Policy for pre-R80.10 Security Gateways on an R80.x Security Management
Server must have this structure:
1. The first Policy Layer is the Network Layer (with the Firewall blade enabled on it).
2. The second Policy Layer is the Application & URL Filtering Layer (with the Application & URL
Filtering blade enabled on it).
3. There are no other Policy Layers.
If the Access Control Policy has a different structure, the policy will fail to install.
You can change the names of the Layers, for example, to make them more descriptive.
Each new Policy Layer will have the explicit default rule, added automatically and set to Drop all the traffic
that does not match any rule in that Policy Layer. We recommend that the Action is set to Drop for the
Network Policy Layer and Accept for the Application Control Policy Layer.
If you remove the default rule, the Implicit Cleanup Rule will be enforced. The Implicit Cleanup Rule is
configured in the Policy configuration window and is not visible in the Rule Base table. Make sure the
Implicit Cleanup Rule is configured to Drop the unmatched traffic for the Network Policy Layer and to
Accept the unmatched traffic for the Application Control Policy Layer.
Note - If you see a rule with a zero Hit Count it only means that in the Security
Gateways enabled with Hit Count there were no matching connections. There
can be matching connections on other Security Gateways.
Note - From R81, Hit Count is also supported in the NAT Rule Base (requires Security
Gateways R81 and higher).
These are the options you can configure for how matched connection data is shown in the Hits column:
n Value - Shows the number of matched hits for the rule from supported Security Gateways.
Connection hits are not accumulated in the total Hit Count for:
l Security Gateways that are not supported
l Security Gateways that have disabled the Hit Count feature
The values are shown with these letter abbreviations:
l K = 1,000
l M = 1,000,000
l G = 1,000,000,000
l T = 1,000,000,000,000
For example, 259K represents 259 thousand connections, and 2M represents 2 million
connections.
n Percentage - Shows the percentage of the number of matched hits for the rule from the total
number of matched connections. The percentage is rounded to a tenth of a percent.
n Level - The Hit Count level is a label for the range of hits according to the table.
The Hit Count range = Maximum hit value - Minimum hit value (does not include zero hits)
Zero 0 hits
Preventing IP Spoofing
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack connections to your
network. Attackers use IP spoofing to send malware and bots to your protected network, to execute DoS
attacks, or to gain unauthorized access.
Anti-Spoofing detects if a packet with an IP address that is behind a certain interface, arrives from a different
interface. For example, if a packet from an external network has an internal IP address, Anti-Spoofing blocks
that packet.
Example:
The diagram shows a Security Gateway with interfaces 2 and 3, and 4, and some example networks behind
the interfaces.
Make sure to configure Anti-Spoofing protection on all the interfaces of the Security Gateway, including
internal interfaces.
The Security Gateway network topology shows. If SmartConsole fails to automatically retrieve the
topology, make sure that the details in the General Properties section are correct and the Security
Gateway, the Security Management Server, and the SmartConsole can communicate with each
other.
5. Select an interface and click Edit.
The interface properties window opens.
6. From the navigation tree, click General.
7. In the Topology section of the page, click Modify.
The Topology Settings window opens.
8. In the Leads To section, select the type of network, to which this interface leads:
n Internet (External) - This is the default setting. It is automatically calculated from the
topology of the Security Gateway. To update the topology of an internal network after
changes to static routes, click Network Management > Get Interfaces in the Gateway
Properties window.
n Override - Override the default setting.
If you Override the default setting:
n Internet (External) - All external/Internet addresses
n This Network (Internal) -
l Not Defined - All IP addresses behind this interface are considered a part of the
internal network that connects to this interface
l Network defined by the interface IP and Net Mask - Only the network that directly
connects to this internal interface
l Network defined by routes - The Security Gateway dynamically calculates the
topology behind this interface. If the network of this interface changes, there is no
need to click Get Interfaces and install a policy. For more, see "Dynamically
Updating the Security Gateway Topology" on page 146.
l Specific - A specific object (a Network, a Host, an Address Range, or a Network
Group) behind this internal interface
l Interface leads to DMZ - The DMZ that directly connects to this internal interface
9. Optional: In the Security Zone section, select User defined, check Specify Security Zone and
choose the zone of the interface.
10. Configure Anti-Spoofing options (see "Anti-Spoofing Options" on the next page). Make sure that
Perform Anti-Spoofing based on interface topology is selected.
11. Select an Anti-Spoofing action:
n Prevent - Drops spoofed packets
n Detect - Allows spoofed packets. To monitor traffic and to learn about the network topology
without dropping packets, select this option together with the Spoof Tracking Log option.
12. Configure Anti-Spoofing exceptions (optional). For example, configure addresses, from which
packets are not inspected by Anti-Spoofing:
a. Select Don't check packets from.
b. Select an object from the drop-down list, or click New to create a new object.
13. Configure Spoof Tracking - select the tracking action that is done when spoofed packets are
detected:
n Log - Create a log entry (default)
n Alert - Show an alert
n None - Do not log or alert
14. Click OK twice to save Anti-Spoofing settings for the interface.
For each interface, repeat the configuration steps. When finished, install the Access Control policy.
Anti-Spoofing Options
n Perform Anti-Spoofing based on interface topology - Select this option to enable spoofing
protection on this external interface.
n Anti-Spoofing action is set to - Select this option to define if packets will be rejected (the Prevent
option) or whether the packets will be monitored (the Detect option). The Detect option is used for
monitoring purposes and should be used in conjunction with one of the tracking options. It serves as a
tool for learning the topology of a network without actually preventing packets from passing.
n Don't check packets from - Select this option to make sure anti-spoofing does not take place for
traffic from internal networks that reaches the external interface. Define a network object that
represents those internal networks with valid addresses, and from the drop-down list, select that
network object. The anti-spoofing enforcement mechanism disregards objects selected in the Don't
check packets from drop-down menu.
n Spoof Tracking - Select a tracking option.
Introduction
NAT (Network Address Translation) is a feature of the Firewall Software Blade and replaces IPv4 and IPv6
addresses to add more security. NAT protects the identity of a network and does not show internal IP
addresses to the Internet.
The Security Gateway can change:
n The source IP address in a packet.
n The destination IP address in a packet.
n The TCP / UDP port in a packet.
Example flow
Automatic Management Server creates these rules automatically You must change the NAT
NAT Rules based on the NAT settings you configure in objects' settings in objects' properties
properties (on the NAT page) on the NAT page.
Manual NAT You create these rules, select all objects and the NAT You change these rules.
Rule method.
The Security Gateway changes the source IP address of all connections from a source to the same IP
address - either that of the Security Gateway's outgoing interface, or an IP address you configure.
Example diagram
Item Description
1 Internal computers
Internet sends
back Security Gateway translates Internal computer
packet to this address from 192.0.2.1 to A
192.0.2.1, to port 10.10.0.26 receives packet
11000
Static
The Security Gateway changes the source IP address of all connections from a source to the IP address
your configure.
Notes:
n When you configure Static NAT, the Security Gateway allows external traffic to
access internal resources.
n If you enable this configuration in an object that represents one IP address (a
Host object), then this gives you a one-to-one address translation.
n If you enable this configuration in an object that represents many IP addresses
(a Network object, an Address Range object), then this gives you a many-to-
one address translation.
The Security Gateway translates each internal IP address to a different
external IP address.
Example diagram
Item Description
1 Internal computers
Security Gateway
Internal computer
Internet sends translates
A (10.10.0.26)
packet to 192.0.2.5 this address from 192.0.2.5
receives packet
to 10.10.0.26
Translate
Origin Original Original Translat Translat
d Instal Commen
No al Destinati Service ed ed
Destinati l On ts
Source on s Source Services
on
Translate
Origin Original Original Translat Translat
d Instal Commen
No al Destinati Service ed ed
Destinati l On ts
Source on s Source Services
on
n Manual NAT rules - The Security Gateway enforces the first Manual NAT rule that matches a
connection. The Security Gateway does not examine other Manual NAT rules.
n Automatic NAT rules - The Security Gateway can enforce two Automatic NAT rules that match a
connection - one rule for the Source and one for the Destination. When a connection matches two
Automatic NAT rules, the Security Gateway enforces those rules.
Note - SmartConsole organizes the Automatic NAT rules in this order:
1. Static NAT rules for the Security Gateway, or Host (computer or server)
objects
2. Hide NAT rules for the Security Gateway, or Host objects
3. Static NAT rules for Network or Address Range objects
4. Hide NAT rules for Network or Address Range objects
Intranet (for network and address Rule does not translate IP Rule does not translate IP
range objects) address address
Origina Translate
Origin Original Translat Translat
l d Install Commen
No al Destinati ed ed
Service Destinati On ts
Source on Source Services
s on
1 HR HR Any = = = Policy
Origina Origina Origina Target
l l l s
Origina Translate
Origin Original Translat Translat
l d Install Commen
No al Destinati ed ed
Service Destinati On ts
Source on Source Services
s on
Origina Translate
Origin Original Translat Translat
l d Install Commen
No al Destinati ed ed
Service Destinati On ts
Source on Source Services
s on
Example Deployment
Example
Item Description
Configuration Procedure:
1. Configure Automatic Static NAT for the Web server:
a. Double-click the Alaska_Web object.
b. From the left, click NAT.
c. Select Add Automatic Address Translation Rules.
d. In Translation method, select Static.
e. Select Hide behind IP Address and enter 2001:db8:0:a::5.
f. Click OK
2. Enable Automatic Static NAT for the EMail server:
a. Double-click the Alaska_Mail object.
b. From the left, click NAT.
c. Select Add Automatic Address Translation Rules.
d. In Translation method, select Static.
e. Select Hide behind IP Address and enter 2001:db8:0:a::6.
f. Click OK.
3. Enable Automatic Hide NAT for the internal computers:
a. Double-click the Alaska_LAN object.
b. From the left, click NAT.
c. Select Add Automatic Address Translation Rules.
d. In Translation method, select Hide.
e. Select Hide behind Gateway.
4. Click OK.
5. Install the Access Control Policy.
The Management Server creates these Automatic NAT rules in Security Policies view > Access Control
> NAT:
Origina Translate
Origin Original Translat Translat
l d Install Commen
No al Destinati ed ed
Service Destinati On ts
Source on Source Services
s on
An easy alternative is to enable a Security Gateway to automatically Hide NAT for all traffic with external
networks. The Security Gateway translates all traffic that goes through an external interface to the valid
IP address of that interface.
In this sample configuration, computers in internal networks open connections to external servers on the
Internet. The source IP addresses of internal clients are translated to the IP address of an external
interface.
Item Description
1 Internal networks
Source IP addresses are translated to the applicable external interface IP address: 192.0.2.1 or
192.0.2.100.
Note - For Manual NAT rules, it is necessary to configure Proxy ARP entries to
associate the translated IP address. See "Automatic and Proxy ARP" on page 315.
Translate
Origin Original Original Translate
Translate d Install Commen
No al Destinati Service d
d Source Destinati On ts
Source on s Services
on
Example Deployment
Example
This example configuration shows how to let external computers access an internal web server and an
internal mail server in a DMZ network from one IP address.
To do this, you must configure Hide NAT for the DMZ network object and create manual NAT rules for the
servers.
Item Description
Configuration Procedure:
1. Configure Automatic Hide NAT for the DMZ network:
a. Double-click the Network object Alaska_DMZ.
b. From the left, click NAT.
c. Select Add Automatic Address Translation Rules.
d. In Translation method, select Hide.
e. Select Hide behind Gateway.
f. Click OK.
The Management Server creates these Automatic NAT rules in Security Policies view > Access
Control > NAT:
2. Create a Manual NAT rule to translate incoming HTTP traffic to the internal Web server:
3. Create a Manual NAT rule to translate incoming SMTP traffic to the internal Mail server:
4. Create an Access Control rule to allow the incoming HTTP and SMTP traffic to the internal
servers:
Services
Sourc Destinati VP & Trac Install
No Name Action
e on N Applicatio k On
ns
Note - NAT46 rules are only supported on Security Gateways and Cluster Members
R80.20 and higher.
Overview
NAT46 rules translate IPv4 traffic to IPv6 traffic without maintaining any session information on a Security
Gateway.
Properties of Stateless NAT46
n [IPv4 Network] --- (Internet) --- [Security Gateway] --- [IPv6 Network]
Common use case for Content Providers.
n [IPv4 Network] --- [Security Gateway] --- (Internet) --- [IPv6 Network]
Common use case for Enterprises.
Example topology:
[IPv4 Client] --- (internal) [Security Gateway] (external) --- [IPv6 Server]
Where:
Item Description
Item Description
IPv6 NATed network IPv6 address of the network on the external Security Gateway side is
2001:DB8:90::/96
These IPv6 addresses are used to translate the IPv4 address of the IPv4
Client to IPv6 address
IPv4 NATed network IPv4 address of the network on the internal Security Gateway side is
1.1.1.0/24
These IPv4 addresses are used to translate the IPv6 address of the IPv6
Server to IPv4 address
Traffic flow:
1. IPv4 Client opens an IPv4 connection to the NATed IPv4 address of the IPv6 Serve
From IPv4 address 192.168.2.55 to IPv4 address 1.1.1.66
2. Security Gateway performs these NAT translations:
a. From the source IPv4 address 192.168.2.55 to the source IPv6 address
2001:DB8:90::192.168.2.55/96
b. From the destination IPv4 address 1.1.1.66 to the destination IPv6 address
2001:DB8:5001::30
3. IPv6 Server receives this request connection as from the IPv6 address
2001:DB8:90::192.168.2.55/96 to the IPv6 address 2001:DB8:5001::30
4. IPv6 Server replies to this connection from the IPv6 address 2001:DB8:5001::30 to the IPv6
address 2001:DB8:90::192.168.2.55/96
5. Security Gateway performs these NAT translations:
a. From the source IPv6 address 2001:DB8:5001::30 to the source IPv4 address 1.1.1.66
b. From the destination IPv6 address 2001:DB8:90::192.168.2.55/96 to the destination IPv4
address 192.168.2.55
6. IPv4 Client receives this reply connection as from the IPv4 address 1.1.1.66 to the IPv4 address
192.168.2.55
To summarize:
n Request: [IPv4 Client] ---> [Security Gateway] ---> [IPv6 Server]
Configuring NAT46
Step 1 - Prepare Security Gateway / Cluster Members for NAT46
Note - In a Cluster, you must configure all the Cluster Members in the same way.
Step Instructions
1 Make sure that an IPv6 address is assigned to the interface that connects to the destination
IPv6 network, and the IPv6 network prefix length is equal to 96.
Note - This can be any valid IPv6 address with the IPv6 network prefix length equal to 96.
n In Gaia Portal:
Click Network Management > Network Interfaces.
n In Gaia Clish:
Run:
show interface <Name of Interface> ipv6-address
Step Instructions
2 Make sure that the routing is configured to send the traffic that is destined to the NATed
IPv4 addresses (defined in the Translated Destination column in the NAT46 rule) through
the interface that connects to the destination IPv6 network.
n In Gaia Portal:
Click Advanced Routing > Routing Monitor.
n In Gaia Clish:
Run:
show route
Step Instructions
3 Make sure that the number of IPv6 CoreXL Firewall instances is equal to the number of
IPv4 CoreXL Firewall instances.
1. Connect to the command line on the Security Gateway.
2. Log in to Gaia Clish, or Expert mode.
3. Show the number of IPv6 CoreXL Firewall instances:
fw6 ctl multik stat
4. Show the number of IPv4 CoreXL Firewall instances. Run:
fw ctl multik stat
5. If the number of IPv6 CoreXL Firewall instances is less than the number of IPv4
CoreXL Firewall instances, then do these steps:
a. Run:
cpconfig
b. Select Check Point CoreXL
c. Select Change the number of IPv6 firewall instances
d. Configure the number of IPv6 CoreXL Firewall instances to be the same as
the number of IPv4 CoreXL Firewall instances
e. Select Exit
f. Reboot the Security Gateway
6. Connect to the command line on the Security Gateway.
7. Log in to Gaia Clish, or Expert mode.
8. Show the number of IPv6 CoreXL Firewall instances. Run:
fw6 ctl multik stat
9. Show the number of IPv4 CoreXL Firewall instances. Run:
fw ctl multik stat
Example output:
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#
[Expert@GW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#
Configure NAT46 rules as Manual NAT rules in the Access Control Policy.
Make sure that you add Access Control rules that allow this NAT traffic.
1. Configure an applicable source IPv4 object (IPv4 Host, IPv4 Address Range, or IPv4 Network).
To configure a source IPv4 Host object
a. Click Objects menu > More object types > Network Object > Address Range > New
Address Range.
b. In the Object Name field, enter the applicable name.
c. In the Comment field, enter the applicable text.
d. Click the General page of this object.
3. Configure a translated source IPv6 Network object with an IPv6 address defined with the 96-bit
prefix.
This object represents the translated source IPv6 addresses, to which you translate the source
IPv4 addresses.
To configure a translated source IPv6 Network object with an IPv6 address defined with
the 96-bit prefix
c. Right-click on the Manual Lower Rules section title, and near the New Rule, click Above
or Below.
Configure this NAT46 rule:
Do these steps:
i. In the Original Source column, add the applicable IPv4 object.
In this rule column, NAT46 rules support only these types of objects:
n *Any
n Host with a static IPv4 address
n Address Range with IPv4 addresses
n Network with IPv4 address
ii. In the Original Destination column, add the IPv4 Host object that represents the
destination IPv4 address, to which the IPv4 sources connect.
In this rule column, NAT46 rules support only IPv4 Host objects.
iii. In the Original Services column, you must leave the default Any.
iv. In the Translated Source column, add the IPv6 Network object with an IPv6
address defined with the 96-bit prefix.
In this rule column, NAT64 rules support only IPv6 Network objects with an IPv6
address defined with the 96-bit prefix.
v. In the Translated Source column, right-click the IPv6 Network object with the 96-
bit prefix > click NAT Method > click Stateless NAT46.
The 46 icon shows in the Translated Source column.
vi. In the Translated Destination column, add the IPv6 Host object represents the
translated destination IPv6 address, to which the translated IPv4 sources connect.
In this rule column, NAT46 rule supports only an IPv6 Host objects.
vii. In the Translated Services column, you must leave the default = Original.
To summarize, you must configure only these NAT46 rules (rule numbers are for
convenience only):
In the Security Gateway log for NAT64 connection, the source and destination IPv6 addresses show in
their original IPv6 format.
To identify a NAT46 entry, look in the More section of the Log Details window.
Xlate (NAT) Shows the translated source IPv6 address, to which the Security Gateway
Source IP translated the original source IPv4 address
Xlate (NAT ) Shows the translated destination IPv6 address, to which the Security Gateway
Destination IP translated the original destination IPv4 address
One of these:
n A host with a networking stack that implements only IPv6.
n A host with a networking stack that implements both IPv4 and IPv6 protocols, but with only IPv6
connectivity.
n A host that runs an IPv6-only client application.
One of these:
n A host with a networking stack that implements only IPv4.
n A host with a networking stack that implements both IPv4 and IPv6 protocols, but with only IPv4
connectivity.
n A host that runs an IPv4-only server application.
The translation of IP addresses is done by translating the packet headers according to the IP/ICMP
Translation Algorithm defined in RFC 6145. The IPv4 addresses of IPv4 hosts are translated to and from
IPv6 addresses using the algorithm defined in RFC 6052, and an IPv6 prefix assigned to the stateful NAT64
for this specific purpose.
n [IPv6 Network] --- (Internet) --- [Security Gateway] --- [internal IPv4 Network]
Common use case for Content Providers. DNS64 is not needed.
n [internal IPv6 Network] --- [Security Gateway] --- (Internet) --- [IPv4 Network]
Common use case for Carriers, ISPs, Enterprises. DNS64 is required.
n [IPv6 Network] --- [Security Gateway] --- [IPv4 Network]
Common use case for Enterprises. DNS64 is required.
[IPv6 Client] --- (interface) [Security Gateway] (internal) --- [IPv4 Server]
Where:
Item Description
Item Description
IPv6 NATed IPv6 address of the network on the external Security Gateway side is
network 1111:2222::/96
These IPv6 addresses are used to translate the IPv4 address of the IPv4 Server to
the IPv6 address
IPv4 NATed IPv4 address of the network on the internal Security Gateway side is 1.1.1.0/24
network These IPv4 addresses are used to translate the IPv6 address of the IPv6 Client to
the IPv4 address
1. IPv6 Client opens an IPv6 connection to the NATed IPv6 address of the IPv4 Server:
From the IPv6 Client's IPv6 real address 1111:1111::0100 to the IPv4 Server's NATed IPv6
address 1111:2222::0A00:0064
Where:
The "1111:2222::" part is the NATed IPv6 subnet
The "0A00:0064" part is 10.0.0.100
2. Security Gateway performs these NAT translations:
a. Translate the IPv6 Client's source address from the real IPv6 address 1111:1111::0100 to
the special concatenated source IPv6 address 0064:FF9B::0101:01X
Where:
The "0064:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the RFC)
The "0101:01XX" part is 1.1.1.X
b. Translate the IPv6 Client's source address from the special concatenated source IPv6
address 0064:FF9B::0101:01XX to the source IPv4 address 1.1.1.X
c. Translate the IPv6 Client's NATed destination address from the IPv6 address
1111:2222::0A00:0064 to the NATed destination IPv4 address 10.0.0.100
3. IPv4 Server receives this request connection as from the source IPv4 address 1.1.1.X to the
destination IPv4 address 10.0.0.100
4. IPv4 Server replies to this connection from the source IPv4 address 10.0.0.100 to the destination
IPv4 address 1.1.1.X
5. Security Gateway performs these NAT translations:
a. Translate the IPv4 Server's source real IPv4 address 10.0.0.100 to the source NATed IPv6
address 1111:2222::0A00:0064
b. Translate the IPv6 Client's NATed destination IPv4 address 1.1.1.X to the destination
special concatenated IPv6 address 0064:FF9B::0101:01X
Where:
The "64:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the RFC)
The "0101:01XX" part is 1.1.1.X
c. Translate the IPv6 Client's destination special concatenated IPv6 address
0064:FF9B::0101:01XX to the destination IPv6 real address 1111:1111::0100
6. IPv6 Client receives this reply connection as from the source IPv6 address 1111:2222::0A00:0064
to the destination IPv6 address 1111:1111::0100
Example summary
Configuring NAT64
Step 1 - Prepare the Security Gateway for NAT64
Note - In a Cluster, you must configure all the Cluster Members in the same way.
Step Instructions
1 Make sure that an IPv6 address is assigned to the interface that connects to the destination
IPv4 network, and the IPv6 network prefix length is equal to, or less than 96.
Note - This can be any valid IPv6 address with the IPv6 network prefix length
equal to, or less than 96.
n In Gaia Portal:
Click Network Management > Network Interfaces.
n In Gaia Clish:
Run:
show interface <Name of Interface> ipv6-address
2 Make sure that the IPv6 routing is configured to send the traffic that is destined to the
NATed IPv6 addresses (defined in the Original Destination column in the NAT64 rule)
through the interface that connects to the destination IPv4 network.
n In Gaia Portal:
Click Advanced Routing > Routing Monitor.
n In Gaia Clish:
Run:
show ipv6 route
Step Instructions
3 Make sure that the number of IPv6 CoreXL Firewall instances is equal to the number of
IPv4 CoreXL Firewall instances.
1. Connect to the command line on the Security Gateway.
2. Log in to Gaia Clish, or Expert mode.
3. Show the number of IPv6 CoreXL Firewall instances:
fw6 ctl multik stat
4. Show the number of IPv4 CoreXL Firewall instances:
fw ctl multik stat
5. If the number of IPv6 CoreXL Firewall instances is less than the number of IPv4
CoreXL Firewall instances, then do these steps:
i. Run:
cpconfig
ii. Select Check Point CoreXL
iii. Select Change the number of IPv6 firewall instances
iv. Configure the number of IPv6 CoreXL Firewall instances to be the same as
the number of IPv4 CoreXL Firewall instances
v. Select Exit
vi. Reboot the Security Gateway
6. Connect to the command line on the Security Gateway.
7. Log in to Gaia Clish, or Expert mode.
8. Show the number of IPv6 CoreXL Firewall instances:
fw6 ctl multik stat
9. Show the number of IPv4 CoreXL Firewall instances:
fw ctl multik stat
Example output:
[Expert@GW:0]# fw ctl multik
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#
Define NAT64 rules as Manual NAT rules in the Access Control Policy.
Make sure that you add access rules that allow this NAT traffic.
1. Define a source IPv6 Network object.
This object represents the source IPv6 addresses, which you translate to source IPv4 addresses.
Procedure
2. Define a translated destination IPv6 Network object with an IPv4-embedded IPv6 address, or a
translated destination IPv6 Host object with a static IPv6 address.
This object represents the translated destination IPv6 address, to which the IPv6 sources connect.
Procedure
a. Click Objects menu > More object types > Network Object > Address Range > New
Address Range.
b. In the Object Name field, enter the applicable name.
c. In the Comment field, enter the applicable text.
d. Click the General page of this object.
e. In the IPv4 section:
i. In the First IP address field, enter the first IPv4 address of your IPv4 addresses
range, to which you translate the source IPv6 addresses.
ii. In the Last IP address field, enter the last IPv4 address of your IPv4 addresses
range, to which you translate the source IPv6 addresses.
Notes:
n This IPv4 addresses range must not use private IPv4
addresses (see RFC 1918 and Menu > Global properties >
Non Unique IP Address Range
n This IPv4 addresses range must not be used on the IPv4 side
of the network.
n We recommend that you define a large IPv4 addresses range
for more concurrent NAT64 connections.
c. Right-click on the Manual Lower Rules section title, and near the New Rule, click Above
or Below.
Configure this Manual NAT64 rule:
Important - Some combinations of object types are not supported in
the Original Source and Original Destination columns. See the
summary table with the supported NAT rules at the bottom of this
section.
i. In the Original Source column, add the IPv6 object for your original source IPv6
addresses.
In this rule column, NAT64 rules support only these types of objects:
n *Any
n Host with a static IPv6 address
n Address Range with IPv6 addresses
n Network with IPv6 address
ii. In the Original Destination column, add a translated destination IPv6 object with
an IPv4-embedded IPv6 address.
In this rule column, NAT64 rules support only these types of objects:
n Host with a static IPv6 address
n Address Range with IPv4-embedded IPv6 addresses
n Network with an IPv4-embedded IPv6 address
iii. In the Original Services column, you must leave the default Any.
iv. In the Translated Source column, add the IPv4 Address Range object for your
translated source IPv4 addresses range.
In this rule column, NAT64 rules support only these types of objects:
n Host with a static IPv4 address, only if in the Original Source column you
selected a Host with a static IPv6 address
n Address Range with IPv4 addresses
v. In the Translated Source column, right-click the IPv4 Address Range object >
click NAT Method > click Stateful NAT64:
n The Translated Packet Destination column shows = Embedded IPv4
Address.
n The 64 icon shows in both the Translated Source and Translated
Destination columns.
In this rule column, NAT64 rule supports only these types of objects:
n Host with a static IPv4 address, only if in the Original Source column you
selected a Host with a static IPv6 address
n Embedded IPv4 Address
vi. In the Translated Services column, you must leave the default = Original.
You can configure the additional settings that control the NAT64 translation mechanism.
These settings are compliant with RFC 6145.
Best Practice - We recommend that you change the default settings only if you are
familiar with the technology.
Procedure
1. Close all SmartConsole windows connected to the Management Server.
2. Connect with Database Tool (GuiDBEdit Tool) (see sk13009) to the applicable Security
Management Server or Domain Management Server.
3. In the top left section, click Table > Global Properties > properties.
4. In the top right section, click firewall_properties.
5. In the bottom section, scroll to these Field Names:
n nat64_add_UDP_checksum
n nat64_avoid_PMTUD_blackhole
n nat64_copy_type_of_service
n nat64_error_message_on_dropped_packets
6. Right-click the applicable parameter in the Field Name column and click Edit.
7. Select the applicable Value (true, or false) and click OK.
nat64_add_UDP_ This parameter controls whether the translator should calculate and
checksum add a valid UDP checksum value to a packet, if the packet checksum
value is zero.
This is important because, by default, an IPv4 UDP packet with a
checksum value of zero is dropped on the IPv6 side.
Default: false
nat64_copy_type_ This parameter controls whether to copy the traffic Class Field to the
of_service Type Of Service field, and set the Type Of Service field in the
translated packet to zero.
Default: true
In the Security Gateway log for NAT64 connection, the source and destination IPv6 addresses show in
their original IPv6 format.
To identify a NAT64 entry, in the Log Details window, look at the More section.
Xlate (NAT) Shows the translated source IPv4 address, to which the Security Gateway
Source IP translated the original source IPv6 address
Xlate (NAT ) Shows the translated destination IPv4 address, to which the Security Gateway
Destination IP translated the original destination IPv6 address
Item Description
2 Security Gateway with external interface IP address 192.168.0.2 responds to ARP Requests
on behalf of translated internal objects
4 External network
If you are using manual NAT rules, you must configure Proxy ARP entries to associate the translated IP
address with the MAC address of the Security Gateway interface that is on the same network as the
translated IP addresses.
See sk30197 for more information about configuring:
n Proxy ARP for IPv4 Manual NAT.
n Proxy ARP for Scalable Platforms.
See sk91905 for more about configuring Proxy NDP for IPv6 Manual NAT.
Example topology:
For example, assume both Network 2A and Network 2B share the same address space (192.168.1.0/24).
Therefore, it is not possible to use standard NAT to enable communication between the two networks.
Instead, it is necessary to perform overlapping NAT on a per-interface basis.
n Users in Network 2A, who want to communicate with users in Network 2B, must use the
192.168.30.0/24 network as a destination.
n Users in Network 2B, who want to communicate with users in Network 2A, must use the
192.168.20.0/24 network as a destination.
The Security Gateway (4) translates the IP addresses in this way for each individual interface:
Communication Examples
If user 1A, at IP address 192.168.1.10 in Network 2A, wants to connect to user 1B, at IP address
192.168.1.10 (the same IP address) in Network 2B, user 1A opens a connection to the IP address
192.168.30.10.
Communication Between Internal Networks
Source IP Destination IP
Step
address address
User 1A, at IP address 192.168.1.10 in Network 2A, connects to IP address 192.0.2.10 on the Internet
(3).
Communication Between an Internal Network and the Internet
Source IP Destination IP
Step
address address
Routing Considerations
To allow routing from Network 2A to Network 2B (in our example above), you must configure the required
routes on the Security Gateway:
192.168.20.0 / 24 192.168.2.2
192.168.30.0 / 24 192.168.3.2
For configuration instructions, see the R81.20 Gaia Administration Guide > Chapter "Network Management"
> Section "IPv4 Static Routes".
To activate the overlapping NAT feature, use Database Tool (GuiDBEdit Tool) (see sk13009), or the
dbedit command (see skI3301).
In our example network, the per-interface values for the interface 4A and the interface 4B are:
Parameter Value
enable_overlapping_nat true
Explanation
The Security Management Server sometimes uses a private IP address (as listed in RFC 1918), or some
other non-routable IP address, because of the lack of public IP addresses.
NAT (Static or Hide) for the Security Management Server IP address can be configured in one click,
while still allowing connectivity with managed Security Gateways. All Security Gateways can be
controlled from the Security Management Server, and logs can be sent to the Security Management
Server. NAT can also be configured for a Management High Availability server and a Log Server.
Example:
Item Description
2 Local Security Gateway that is directly connected to the Security Management Server.
The Remote Security Gateway connects to the Security Management Server through this
Local Security Gateway.
3 Remote Security Gateway that must connect to the Security Management Server.
Procedure
1. Configure NAT for Control Connections on the Security Management Server as described above.
2. Configure the Security Management Server not to override the $FWDIR/conf/masters file on
the remote Security Gateway / Cluster Members.
Procedure
3. Configure the required IP address in the $FWDIR/conf/masters file on the remote Security
Gateway / Cluster Members.
Procedure
Note - In a Cluster, you must configure all the Cluster Members in the same way.
a. Connect to the command line on the Security Gateway / each Cluster Member.
b. Log in to the Expert mode.
c. Back up the current file:
cp -v $FWDIR/conf/masters{,_BKP}
vi $FWDIR/conf/masters
e. In the [Policy] section and in the [Log Server] section, add a new line above the current
line.
In the new line, enter the NATed (external) IP address of the Security Management
Server.
Important - If the remote Security Gateway has to connect to the real
IP address of the Security Management Server, you must also
configure the SIC name of the Security Management Server.
Copy it from the existing line:
CN=cp_mgmt,O=<xxx>.checkpoint.com.<yyy>
Notes:
n Only one object can be defined with these settings, unless the second object is
defined as a Secondary Security Management Server or as a Log Server.
n Make sure in objects of all managed Security Gateways, on the Network
Management page, you configure the correct the Topology settings of the
applicable interfaces.
IP Pool NAT
Overview
NAT Priorities
IP Pool NAT can be used both for encrypted (VPN) and non-encrypted (decrypted by the Security Gateway)
connections.
Note - To enable IP Pool NAT for clear connections through the Security Gateway, it is
necessary to configure the required INSPECT settings in the applicable user.def file
(see "Location of 'user.def' Files on the Management Server" on page 172). Contact
Check Point Support for assistance.
For non-encrypted connections, IP Pool NAT has the following advantages over Hide NAT:
n New back connections (for example, X11) can be opened to the NATed host.
n User-to-IP server mapping of protocols that allow one connection per IP can work with a number of
hosts instead of only one host.
n IPsec, GRE, and IGMP protocols can be NATed using IP Pool NAT (and Static NAT). Hide NAT
works only with TCP, UDP, and ICMP protocols.
Because of these advantages, you can specify that IP Pool NAT has priority over Hide NAT, if both match
the same connection. Hide NAT is only applied if the IP pool is used up.
You can define a separate IP address pool on one or more of the Security Gateway interfaces instead of
defining a single pool of IP addresses for the Security Gateway.
Defining an IP pool per interface solves routing issues that occur when the Security Gateway has more than
two interfaces.
Sometimes it is necessary that reply packets return to the Security Gateway through the same Security
Gateway interface.
Example:
This example diagram shows one of the MEP Security Gateways in a Remote Access Client to a MEP
Security Gateway deployment:
Item Description
3A IP Pool 1 packets:
Source: 10.55.8.x
Destination:
3B IP Pool 2 packets:
Source: 10.55.10.x
Destination:
If a remote client opens a connection to the internal network, reply packets from hosts inside the internal
networks are routed to the correct Security Gateway interface through the use of static IP pool NAT
addresses.
The remote client's IP address is NATed to an address in the IP pool on one of the Security Gateway
interfaces. The addresses in the IP pool can be routed only through that Security Gateway interface so that
all reply packets from the target host are returned only to that interface. Therefore, it is important that the IP
NAT pools of the interfaces do not overlap.
When the packet returns to the Security Gateway interface, the Security Gateway restores the remote peer's
source IP address.
The routing tables on the routers that lie behind the Security Gateway must be edited so that addresses from
a Security Gateway IP pool are returned to the correct Security Gateway interface.
Switching between IP Pool NAT per Security Gateway and IP Pool NAT per interface and then installing the
security policy deletes all IP Pool allocation and all NATed connections.
IP Pool addresses can be reused for different destinations, which makes more efficient use of the addresses
in the pool. If a pool contains N addresses, then any number of clients can be assigned an IP from the pool
as long as there are no more than N clients per server.
Using IP Pool allocation per destination, two different clients can receive the same IP from the pool as long
as they communicate with different servers (connections 1 and 2). When reusing addresses from the IP
Pool, back connections are supported from the original server only (connection 3). This means that
connections back to the client can be opened only from the specific server to which the connection was
opened.
Item Description
2 Clients.
Source: Original
Destination:
6A This server cannot open a connection with Destination A back to the client.
The default Do not reuse IP Pool NAT behavior means that each IP address in the IP Pool is used once
(connections 1 and 2 in the following illustration). In this mode, if an IP pool contains 20 addresses, up to 20
different clients can be NATed and back connections can be opened from any source to the client
(connection 3).
Item Description
2 Clients.
Source: Original
Destination:
5 Connection.
Source: Original
Destination: A
Switching between the Reuse and Do not reuse modes and then installing the security policy, deletes all IP
Pool allocations and all NATed connections.
2. For each Security Gateway or Security Gateway interface, create an object that represents
its IP pool NAT addresses
Important:
n In a Cluster, you must configure separate IP Pool for each Cluster Member.
n It is not possible to configure a separate IP Pool for each Cluster Member
interface.
For example, for an Address Range, do the following:
a. From the Objects Bar (F11), In the network objects tree, select New > More > Network
Object > Address Range > Address Range.
b. In the General tab, enter the first and last IP addresses of the range.
c. Click OK.
Configure the applicable routes so that packets with an IP address assigned from the NAT pool are
routed to the appropriate Security Gateway or, if using IP Pools per interface, the appropriate
Security Gateway interface.
Item Description
1 Mobile devices
In this sample Mobile Access deployment, a mobile device uses a Mobile Access tunnel to connect to the
internal network. The Mobile Access Security Gateway decrypts the packets and authenticates the user.
The connection is allowed and the mobile device connects to the internal network resources.
9. Select the AD domain and enter the user name and password.
10. Click Connect.
The Security Gateway makes sure that it can connect to the AD server.
11. Click Next.
The Users page opens.
Click Add and then select the group Mobile Access.
12. Click Next and then click Finish.
The Mobile Access Configuration Wizard closes.
13. Click OK.
The Gateway Properties window closes.
Install
Name Source Destination VPN Service Action Track
On
All connections from the RemoteAccess VPN community to the Exchange server are allowed. These are
the only protocols that are allowed: HTTP, HTTPS, and MS Exchange. This rule is installed on Security
Gateway in the MobileAccessGW group.
By default, SSO is enabled on new Mobile Access applications that use HTTP. Most Web applications
authenticate users with specified Web forms. You can configure SSO for an application to use the
authentication credentials from the Mobile Access Portal. It is not necessary for users to log in again to each
application.
To configure SSO
1. In the Application Single Sign-On Method section, select Advanced and click Edit.
The Advanced window opens.
2. Select This application reuses the portal credentials. Users are not prompted.
3. Click OK.
4. Select This application uses a Web form to accept credentials from users.
5. Click OK.
6. Install the policy.
Item Description
1 Mobile devices
Compliance Check
The Mobile Access Software Blade lets you use the Endpoint Security on Demand feature to create
compliance policies and add more security to the network. Mobile devices and computers are scanned one
time to make sure that they are compliant before they can connect to the network.
The compliance scanner is installed on mobile devices and computers with ActiveX (for Internet Explorer on
Windows) or Java. The scan starts when the Internet browser tries to open the Mobile Access Portal.
Secure Workspace
Secure Workspace is a security solution that allows remote users to connect to enterprise network
resources safely and securely. The Secure Workspace virtual workspace provides a secure environment on
endpoint computers that is segregated from the "real" workspace. Users can only send data from this secure
environment through the Mobile Access Portal. Secure Workspace users can only access permitted
applications, files, and other resources from the virtual workspace.
Secure Workspace creates an encrypted folder on the computer called My Secured Documents and can be
accessed from the virtual desktop. This folder contains temporary user files. When the session terminates,
Secure Workspace deletes this folder and all other session data.
For more about configuring Secure Workspace and Mobile Access VPN, see the R81.20 Mobile Access
Administration Guide.
To enable Secure Workspace on a Mobile Access Security Gateway
Secure Workspace
Secure Workspace is a security solution that allows remote users to connect to enterprise network
resources safely and securely. The Secure Workspace virtual workspace provides a secure environment on
endpoint computers that is segregated from the "real" workspace. Users can only send data from this secure
environment through the Mobile Access Portal. Secure Workspace users can only access permitted
applications, files, and other resources from the virtual workspace.
Secure Workspace creates an encrypted folder on the computer called My Secured Documents and can be
accessed from the virtual desktop. This folder contains temporary user files. When the session terminates,
Secure Workspace deletes this folder and all other session data.
For more about configuring Secure Workspace and Mobile Access VPN, see the R81.20 Mobile Access
Administration Guide.
Site-to-Site VPN
The basis of Site-to-Site VPN is the encrypted VPN tunnel. Two Security Gateways negotiate a link and
create a VPN tunnel and each tunnel can contain more than one VPN connection. One Security Gateway
can maintain more than one VPN tunnel at the same time.
A, B Security Gateways
2 VPN tunnel
4 Host 4
5 Host 5
In this sample VPN deployment, Host 4 and Host 5 securely send data to each other. The Security
Gateways perform IKE negotiation and create a VPN tunnel. They use the IPsec protocol to encrypt and
decrypt data that is sent between Host 4 and Host 5.
VPN Workflow
VPN Communities
A VPN Domain is a collection of internal networks that use Security Gateways to send and receive VPN
traffic. Define the resources that are included in the VPN Domain for each Security Gateway. Then join the
Security Gateways into a VPN community - collection of VPN tunnels and their attributes. Network
resources of different VPN Domains can securely communicate with each other through VPN tunnels that
terminate at the Security Gateways in the VPN communities.
VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN tunnels
between each pair of Security Gateway. In a Star community, each satellite Security Gateway has a VPN
tunnel to the central Security Gateway, but not to other Security Gateways in the community.
Mesh Topology Star Topology
Item Description
1 Security Gateway
This section explains how to configure a VPN star community. This deployment lets the satellite Security
Gateways connect to the internal network of the central Security Gateway. The internal network object is
named: Internal-network.
For each Security Gateway in the VPN community, follow these configuration steps.
1. In SmartConsole, go to the Gateways & Servers page and double-click the Security Gateway
object.
The Security Gateway properties window opens.
2. In the Network Security section of the General Properties page, select IPsec VPN.
3. From the navigation tree, go to Network Management > VPN Domain.
n For the central Security Gateway, click Manually defined and select the Internal-network
object
n For a satellite Security Gateway, select All IP addresses
4. From the navigation tree, click IPsec VPN.
5. Configure the Security Gateway as a member of a VPN star community.
a. In the This Security Gateway participates in the following VPN Communities section,
click Add.
The Add this Gateway to Community window opens.
b. Select the VPN Community.
c. Click OK.
6. Click OK.
After you create a community and configure Security Gateways, add those Security Gateways to the
community as a center or as a satellite Security Gateway.
Item Description
Item Description
This deployment is composed of a Mesh community for London and New York Security Gateways that
share internal networks. The Security Gateways for external networks of company partners do not have
access to the London and New York internal networks. However, the Star VPN communities let the
company partners access the internal networks of the sites that they work with.
1. Automatic rule that SmartConsole adds to the top of the Implied Rules when the Accept All
Encrypted Traffic configuration option is selected for the BranchOffices VPN community and the
LondonOffices VPN community. This rule is installed on all the Security Gateways in these
communities. It allows all VPN traffic to hosts and clients on the internal networks of these
communities. Traffic that is sent to the Security Gateways in these VPN communities is dropped.
Note - This automatic rule can apply to more than one VPN community.
2. Site-to-site VPN - Connections between hosts in the VPN Domains of all Site-to-Site VPN
communities are allowed. These are the only protocols that are allowed: FTP, HTTP, HTTPS and
SMTP.
3. Remote access - Connections between hosts in the VPN Domains of Remote Access VPN
community are allowed. These are the only protocols that are allowed: HTTP, HTTPS, and IMAP.
6. Add Access Control rules to the Access Control Rule Base to allow VPN traffic to the internal
networks.
Configure Configure
user authentication user authentication
Configure rules
for VPN access
in Access Control
Rule Base
Install policy
1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.
The Security Gateway object opens and shows the General Properties page.
2. From the navigation tree, click IPsec VPN.
The page shows the VPN communities that the Security Gateway is participating.
3. To add the Security Gateway to a Remote Access community:
a. Click Add.
b. Select the community.
c. Click OK.
4. From the navigation tree, click Network Management > VPN Domain.
5. Configure the VPN Domain.
1. From the navigation tree, click VPN Clients > Office Mode.
2. Configure the settings for Office Mode.
Note - Office Mode support is mandatory on the Security Gateway side.
3. Click OK.
4. Publish the SmartConsole session.
Note - Local feeds hosted on the Security Gateway are not supported.
Use Case
This feature is relevant for any customer who wants to use an external source as a network data provider,
and use this data in the Rule Base.
When you use a network feed, the Security Gateway updates the feed automatically, which:
n Requires less manual maintenance of the feed
n Reduces the number of policy installations
n Simplifies policy configuration
Notes:
n To work well, the Security Gateway must have access to the feed server through
HTTP/HTTPS. Otherwise, the Security Gateway cannot fetch the feed.
n A Security Gateway supports up to 500 network feed objects.
n A Security Gateway supports a total of 5,000 objects of these types: Dynamic
objects, Updatable objects, Generic Data Center objects, and Network Feed
objects.
n Supported feed formats: flat list, JSON.
n Dynamic and domain objects enforce the network feeds on the Security Gateway.
n SmartConsole shows logs for update feed events (if there is an Error/Warning
during the update), and for a successful feed update. Search for the network feed
name in the logs search field.
4. Feed Parsing:
Format - Configure the content structure in the feed, so the Security Gateway knows how to parse the
feed. The supported formats are Flat list and JSON.
If you select the Flat list format, configure these settings:
n Data type - From the drop-down menu, select: Domain, IP Address or IP Address/Domain, so
the Security Gateway knows which data type to enforce.
n Delimiter - Separates between the data values in the feed.
n Ignore lines with prefix - Defines which lines to ignore in the feed.
If you select the JSON format, configure these settings:
n Data Type - From the drop-down menu, select: Domain, IP Address or IP Address/Domain, so
the Security Gateway knows which data type to enforce.
n JSON Query - Defined how to extract the data from the feed in JQ syntax. For more
information on JQ, visit http://stedolan.github.io/jq/
5. Advanced Settings:
n Authentication - Enter the username and password with which you authenticate to the URL.
n Network:
l Use gateway proxy for connection - Select this checkbox to use the proxy when the
Security Gateway connects to the external server.
l Check feed interval - Interval in minutes for the feed update on the Security Gateway.
The default is 60 minutes.
6. Test Feed:
a. Click the Test Feed button to make sure that the Security Gateway can connect to the Feed
URL and that the certificate of the server which contains the Feed URL is valid.
The Test Feed window opens.
b. In the Select gateway field, from the drop-down menu, select the Security Gateway on which
you want to run the test:
n If the test succeeds, you get a test completed successfully message.
n If the test fails, you get an error message.
n If the test fails because of an invalid certificate, this error message appears: Test failed
to authenticate the server certificate.
In this case, you can override the error message and connect to the server if you trust it.
Select Accept certificate anyway to connect to the server.
7. Click OK.
8. Use the New Network Feed object in your Access Control Rule Base.
9. Install the Access Control policy.
Monitoring
To monitor network feeds on the Security Gateway, run these commands in the Expert mode:
Operation Command
See error and warning messages for network grep -i <Name of Network Feed>
feed update events $FWDIR/log/efo_error.elg
Get a list of Domains and IP ranges related to a dynamic_objects -efo <Name of Network
specific network feed Feed>
Get a list of Domains associated with a specific domains_tool -ip <IP Address>
IP address
Troubleshooting
To debug network feeds on the Security Gateway, run these commands in the Expert mode:
Operation Procedure
Collect the policy installation 1. In the first shell, start the debug:
debug to see information about fw -d fetchlocal -d $FWDIR/state/__tmp/FW1/
network feeds >> /var/log/policy_installation.txt 2>&1
2. In the second shell, monitor the output file:
tail -f /var/log/policy_installation.txt
3. In the first shell, stop the debug:
Press the CTRL+C keys.
4. In the second shell, stop monitoring the output file:
Press the CTRL+C keys.
5. Analyze the debug output file:
/var/log/policy_installation.txt
Operation Procedure
Collect the debug of the network 1. In the first shell, start the debug:
feed update events TDERROR_ALL_ALL=1 dynamic_objects -efo_update
<Name of Network Feed> >> /var/log/network_
feed_update.txt 2>&1
2. In the second shell, monitor the output file:
tail -f /var/log/network_feed_update.txt
3. In the first shell, stop the debug:
Press the CTRL+C keys.
4. In the second shell, stop monitoring the output file:
Press the CTRL+C keys.
5. Analyze the debug output file:
/var/log/network_feed_update.txt
Sharing SmartConsole
Configuration and Logs with Infinity
Portal
Starting from R81.20, you can connect from your on-premises Management Server to the Infinity Portal.
This lets you:
n Run services that are managed in the Infinity Portal on your Management Server objects.
To see the full list of services, go to SmartConsole > Infinity Services view.
For some services, you must enable Configuration Sharing and Log Sharing. See the documentation
for the specific service in the Infinity Portal Administration Guide.
n See a unified log view of all your Check Point products, both in cloud and on-premises.
This way, you can search for logs and events from all Check Point products in the same place.
n Use new administrator capabilities on the on-premises Management Server.
For example, you can run management APIs on the on-premises Management Server through the
Infinity Portal securely from anywhere in the world.
Prerequisites
n You must have a valid license for each Infinity Portal application or service that you use.
n You must have the Manage integration with Cloud Services option selected on your permission
profile. To have this option selected:
1. Go to Manage & Settings > Permissions & Administrators > Permission Profiles
2. Open the relevant Permission Profile.
3. Go to Management, and select Manage integration with Cloud Services.
To connect from SmartConsole to the Infinity Portal
To share your on-premises Management Server configuration information with the Infinity Portal
1. In SmartConsole > Infinity Services view, go to Data Sharing at the bottom of the page >
Configuration Sharing.
2. Click Edit.
The Configuration Sharing window opens.
3. Turn the Enable button to ON, and click OK.
The Management Server configuration information is now synchronized with the Infinity Portal.
Note - You cannot edit objects shared from the Management Server in the Infinity Portal.
To share your on-premises Management Server log information with the Infinity Portal:
1. In SmartConsole > Infinity Services view > go to Data Sharing (located at the bottom of the page)
> Log Sharing.
2. Click Edit.
The Log Sharing window opens.
3. Select the products whose log information you want to share:
n All products
n Specific products - Select the applicable products from the drop-down list.
4. Change the Enable button to ON, and click OK.
The Management Server now synchronizes the log information with the Infinity Portal.
Note - To enable log sharing on a Standalone, the server must have:
n For an incoming log rate of less than 500 logs per second - at least 2 CPU
cores and 16GB of RAM.
n For an incoming log rate of more than 500 logs per second - at least 4 CPU
cores and 16GB of RAM.
HTTPS Inspection
HTTPS Internet traffic uses the TLS (Transport Layer Security) protocol and is encrypted to give data
privacy and integrity. However, HTTPS traffic has a possible security risk and can hide illegal user activity
and malicious traffic. Security Gateways cannot inspect HTTPS traffic because it is encrypted. You can
enable the HTTPS Inspection feature to let the Security Gateways create new TLS connections with the
external site or server. The Security Gateways are then able to decrypt and inspect HTTPS traffic that uses
the new TLS connections.
There are two types of HTTPS Inspection:
n Outbound HTTPS Inspection - To protect against malicious traffic that is sent from an internal client
to an external site or server.
n Inbound HTTPS Inspection - To protect internal servers from malicious requests that arrive from the
Internet or an external network.
The Security Gateway uses certificates and becomes an intermediary between the client computer and the
secure web site. All data is kept private in HTTPS Inspection logs. Only administrators with HTTPS
Inspection permissions can see all the fields in such a log.
1. An HTTPS request (from an internal client to an external server) arrives at the Security Gateway.
2. The Security Gateway inspects the HTTPS request.
3. The Security Gateway determines whether the HTTPS request matches an existing HTTPS
Inspection rule:
n If the HTTPS request does not match a rule, then the Security Gateway does not inspect the
HTTPS payload.
n If the HTTPS request matches a rule, then the Security Gateway continues to the next step.
4. The Security Gateway validates the HTTPS certificate from the external server.
The Security Gateway uses the Online Certificate Status Protocol (OCSP) standard.
5. The Security Gateway creates a new certificate for the connection to the external server.
6. The Security Gateway decrypts the HTTPS connection.
7. The Security Gateway inspects the decrypted HTTPS connection.
8. If the Security Policy allows this traffic, the Security Gateway encrypts the HTTPS connection.
9. The Security Gateway sends the HTTPS request to the external server.
1. An HTTPS request (from an external client to an internal server) arrives at the Security Gateway.
2. The Security Gateway inspects the HTTPS request.
3. The Security Gateway determines whether the HTTPS request matches an existing HTTPS
Inspection rule:
n If the HTTPS request does not match a rule, then the Security Gateway does not inspect the
HTTPS payload.
n If the HTTPS request matches a rule, then the Security Gateway continues to the next step.
4. The Security Gateway uses the certificate for the internal server to create an HTTPS connection
with the external client.
5. The Security Gateway creates a new HTTPS connection with the internal server.
6. The Security Gateway decrypts the HTTPS connection.
7. The Security Gateway inspects the decrypted HTTPS connection.
8. If the Security Policy allows this traffic, the Security Gateway encrypts the HTTPS connection and
sends it to the internal server.
Step Instructions
Step Instructions
1 From the SmartConsole Gateways & Servers view, edit the Security Gateway object.
The first time you enable HTTPS Inspection on one of the Security Gateways, you must create an outbound
CA certificate for HTTPS Inspection or import a CA certificate already deployed in your organization. This
outbound certificate is used by all Security Gateways managed on the Security Management Server.
Step Instructions
1 In SmartConsole Gateways & Servers view, right-click the Security Gateway object and
select Edit.
The Gateway Properties window opens.
Step Instructions
5 Click OK.
6 Export and deploy the CA certificate (see "Exporting and Deploying the Generated CA" on
page 364).
For each Security Management Server that has Security Gateways enabled with HTTPS Inspection, you
must:
n Import the CA certificate.
n Enter the password the Security Management Server uses to decrypt the CA certificate file and sign
the certificates for users. Use this password only when you import the certificate to a new Security
Management Server.
To import a CA certificate
Step Instructions
1 If the CA certificate was created on another Security Management Server, export the
certificate from the Security Management Server, on which it was created (see "Exporting a
Certificate from the Security Management Server" on the next page).
2 In the SmartConsole Gateways & Servers view, right-click the Security Gateway object
and select Edit.
The Gateway Properties window opens.
7 Click OK.
Example:
Step Instructions
1 From the HTTPS Inspection window of the Security Gateway, click Export
certificate.
3 Use the Group Policy Management Console to add the certificate to the
Trusted Root Certification Authorities certificate store (see "Deploying
Certificates by Using Group Policy" on the next page).
5 Test the distribution by browsing to an HTTPS site from one of the clients.
Also, make sure the CA certificate shows the name you entered for the CA
certificate that you created in the Issued by field.
Step Instructions
1 On the Microsoft Windows Server, open the Group Policy Management Console.
2 Find an existing GPO or create a new GPO to contain the certificate settings. Make sure
the GPO is associated with the domain, site, or organization unit whose users you want
affected by the policy.
4 Open Computer Configuration > Policies > Windows Settings > Security Settings >
Public Key Policies > Trusted Publishers.
6 Do the instructions in the Certificate Import Wizard to find and import the certificate you
exported from SmartConsole.
7 In the navigation pane, click Trusted Root Certification Authorities and repeat steps 5-6 to
install a copy of the certificate to that store.
Step Instructions
1 From the SmartConsole Gateways & Servers view, edit the Security Gateway object.
4 Import server certificates for servers behind the organization Security Gateway.
The first time you enable HTTPS Inspection on one of the Security Gateways, you must create an outbound
CA certificate for HTTPS Inspection or import a CA certificate already deployed in your organization. This
outbound certificate is used by all Security Gateways managed on the Security Management Server.
Step Instructions
1 In SmartConsole, go to Security Policies > HTTPS Inspection > HTTPS Tools >
Additional Settings.
4 Click Add.
The Import Inbound Certificate window opens.
7 Enter the Private key password. Enter the same password that was used to protect the
private key of the certificate on the server.
8 Click OK.
The Successful Import window opens the first time you import a server certificate. It shows you where to
add the object in the HTTPS Inspection Rule Base. Click Don't show this again if you do not want to see the
window each time you import a server certificate and Close.
Fields
These are the fields that manage the rules for the HTTPS Inspection Security Policy.
Field Description
Field Description
Site Category Categories for applications or web sites that are inspected or bypassed.
Action Action that is done when HTTPS traffic matches the rule. The traffic is inspected or
ignored (Bypass).
Track Tracking and logging action that is done when traffic matches the rule.
Install On Network objects that will enforce the HTTPS Inspection Policy. You can only select
Security Gateways that have HTTPS Inspection enabled (by default, the gateways
which appear in the Install On column have HTTPS inspection enabled).
This table shows a sample HTTPS Inspection Rule Base for a typical policy (The Track and Install On
columns are not shown. Track is set to Log and Install On is set to HTTPS policy targets.)
Site
Sourc Destinatio Service Blad
No Name Catego Action Certificate
e n s e
ry
1. Inbound traffic - Inspects HTTPS traffic to the network object WebCalendarServer. This rule uses
the WebCalendarServer certificate.
2. Financial sites - This is a bypass rule that does not inspect HTTPS traffic to websites that are
defined in the Financial Services category.
3. Outbound traffic - Inspects HTTPS traffic to the Internet. This rule uses the Outbound CA
certificate.
The administrator also added the 10.1.1.0/24 net to the Global Exceptions for the IPS blade. User with IP
10.1.1.2 surfs to some HTTPS websites.
HTTPS Inspection Rule Base execution:
The connection was matched to the rule with action Inspect.
IPS is the only active blade on the matched rule, but the connection is in exception for the IPS blade.
Therefore the updated action is Bypass.
Performed action: SSL is not terminated, HTTPS Inspection log is sent with data from the matched rule, and
the action sent is Bypass.
Step Instructions
Saving a CA Certificate
You can save a selected certificate in the trusted CAs list to the local file system.
To export a CA certificate
Step Instructions
HTTPS Validation
In the HTTPS Validation page of SmartDashboard you can set options for
n Fail mode
n HTTPS site categorization mode
n Server validation
n Certificate blacklisting
n Whitelisting
n Troubleshooting
To learn more about these options, see the Help. Click the ? symbol in the HTTPS Validation page.
Step Instructions
1 In the SmartConsole Logs & Monitor view, go to the Logs tab, and click Queries.
The Logs tab includes an HTTP Inspection Action field. The field value can be inspect or bypass. If HTTPS
Inspection was not done on the traffic, this field does not show in the log.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Note - To disable the inspection of the TLS v1.3 traffic for testing purposes, set the value
of the global parameter fwtls_enable_tlsio to 0 and reboot.
The HTTPS Inspection feature decrypts traffic for better protection against advanced threats, bots, and
other malware.
1. In SmartConsole, select Security Policies > Access Control > Access Tools > Client
Certificates.
2. In the Client Certificates pane, click New.
The Certificate Creation and Distribution wizard opens.
3. In the Certificate Distribution page, select how to distribute the enrollment keys to users. You can
select one or both options.
a. Send an email containing the enrollment keys using the selected email template -Each
user gets an email, based on the template you choose, that contains an enrollment key.
n Template - Select the email template that is used.
n Site - Select the Security Gateway, to which users connect.
n Mail Server - Select the mail server that sends the emails.
You can click Edit to view and change its details.
b. Generate a file that contains all of the enrollment keys - Generate a file for your records
that contains a list of all users and their enrollment keys.
4. Optional: To change the expiration date of the enrollment key, edit the number of days in Users
must enroll within x days.
5. Optional: Add a comment that will show next to the certificate in the certificate list on the Client
Certificates page.
6. Click Next.
The Users page opens.
7. Click Add to add the users or groups that require certificates.
n Type text in the search field to search for a user or group.
n Select a type of group to narrow your search.
8. When all included users or groups show in the list, click Generate to create the certificates and
send the emails.
9. If more than 10 certificates are being generated, click Yes to confirm that you want to continue.
A progress window shows. If errors occur, an error report opens.
10. Click Finish.
11. Click Save.
12. In SmartConsole, install the Policy.
Revoking Certificates
If the status of a certificate is Pending Enrollment, after you revoke it, the certificate does not show in the
Client Certificate list.
1. In SmartConsole, select Security Policies > Access Control > Access Tools > Client
Certificates.
2. To create a new template: In the Email Templates for Certificate Distribution pane, select New.
To edit a template: In the Email Templates for Certificate Distribution pane, double-click a
template.
The Email Template opens.
3. Enter a Name for the template.
4. Optional: Enter a Comment. Comments show in the Mail Template list on the Client Certificates
page.
5. Optional: Click Languages to change the language of the email.
6. Enter a Subject for the email. Click Insert Field to add a predefined field, such as a Username.
7. In the message body add and format text. Click Insert Field to add a predefined field, such as
Username, Registration Key, or Expiration Date.
8. Click inside the E-mail Template body.
9. Click Insert Link and select the type of link to add (link or QR code).
n Site and Certificate Creation
n Download Application
Direct users to download a Check Point App for their mobile devices.
Select the client device operating system:
l iOS
l Android
Select the client type that will connect to the site- Select one client type that users will
have installed:
l Capsule Workspace - An app that creates a secure container on the mobile
device to give users access to internal websites, file shares, and Exchange
servers.
l Capsule Connect/VPN - A full Layer 3 tunnel app that gives users network access
to all mobile applications.
n Custom URL
For each link type, you can select which elements are added to the mail template
Cloning a Template
Clone an email template to create a template that is similar to one that already exists.
To create a clone of an email template
1. Select a template from the template list in the Client Certificates page.
2. Click Clone.
3. A new copy of the selected template opens for you to edit.
Database Revisions
The Security Management architecture has built-in revisions. Each publish operation creates a new revision
which contains only the changes from the previous revisions.
Benefits of the revision architecture:
n Safe recovery from a crisis, restoring a database to a good known revision.
n Fast policy verification, based on the differences between installed versions
n More efficient Management High Availability.
Important - Before using the revision feature consider these limitations:
n Database Revision revert operation is not supported on a Backup Security
Management Server.
n Reverting to a previous revision is an irreversible operation. Versions that are
newer than the target revision are lost.
n Changes apply to objects only and not to the file system.
n Tasks, SIC and Licenses are not reverted.
n The revert action disconnects all other connected users and discards all of their
private sessions.
n Revision is not supported in these scenarios:
l For the Endpoint Security Management Server.
through a proxy server, the GUI for this feature is not supported. In this
case, use the applicable API command.
l VSX configuration or related networks differ between the source and target
revisions.
l A new Multi-Domain Server, a Security Management Server or a Check
Point object was created or deleted after the target revision date.
l The corresponding revision of the Global Domain, or the IPS or Application
Best Practices:
1. We recommend to update the IPS and Application Control signatures and install
the policy after the revert. Install policy if changes to log destinations are applied.
2. If you need a full environment restore to a certain point in time, use Restore
Backup. All work done after the backup is lost. To learn more, see the: R81.20
Gaia Administration Guide
3. We recommend to purge irrelevant revisions. Accumulating too many revisions
can create a heavy load on the server, which may cause disk and performance
issues.
To delete all versions of the database that are older than the selected version:
1. Go to Manage & Settings > Sessions > Revisions, and select a revision.
2. In Actions, click Purge.
3. In the confirmation window that opens, click Yes.
Important - Purge is irreversible. When you purge, that revision and older revisions are deleted.
Notes:
n When connected with SmartConsole to a Security Management Server, sessions
that were published through the Management API in the system Domain are not
shown in the Revisions view.
n When you connect with the Management API to the Domain of a Security
Management Server and run the show sessions API command with view-
published-sessions set to true, sessions that were published through
SmartConsole are not returned, even if they include changes in the system
Domain.
5. If you want the message to have a warning icon, in Customize Layout, select Add warning sign.
6. If you want the Login window to show your organization's logo, in Customize Layout, select Add
logo and then Browse to an image file.
Inspection Settings
You can configure inspection settings for the Security Gateway:
n Deep packet inspection settings
n Protocol parsing inspection settings
n VoIP packet inspection settings
The Security Management Server comes with two preconfigured inspection profiles for the Security
Gateway:
n Default Inspection
n Recommended Inspection
When you configure a Security Gateway, the Default Inspection profile is enabled for it. You can also
assign the Recommended Inspection profile to the Security Gateway, or to create a custom profile and
assign it to the Security Gateway.
To activate the Inspection Settings, install the Access Control Policy.
To edit a setting
1. In the Inspection Settings > General view, click View > Show Profiles.
2. In the window that opens, select Specific Inspection settings profiles.
3. Select profiles.
4. Click OK.
Only settings for the selected profiles are shown.
You can add, edit, or delete custom Inspection Settings profiles.
1. In the Inspection Settings > Gateways view, select a Security Gateway, and click Edit.
2. In the window that opens, select an Inspection Settings profile.
3. Click OK.
1. In the Inspection Settings > Exceptions view, click New to add a new exception, or select an
exception and click Edit to modify an existing one.
The Exception Rule window opens.
2. Configure the exception settings:
n Apply To - select the Profile to which to apply the exception
n Protection - select the setting
n Source - select the source Network Object, or select IP Address and enter a source IP
address
n Destination - select the destination Service Object
n Service - select Port/Range, TCP or UDP, and enter a destination port number or a range
of port numbers
n Install On - select a Security Gateway, on which to install the exception
3. Click OK.
To enforce the changes, install the Access Control Policy.
SmartTasks
Management SmartTasks let you configure automatic actions according to different triggers in the system. A
SmartTask is a combination of trigger and action.
n Triggers are events – currently defined in terms of existing management operations, such as installing
a policy or publishing a session.
n Actions are automatic responses that take place after the trigger event , such as running a script,
posting a web request or sending email.
Available Triggers
n Before Publish - Fired when an administrator publishes a session. The SmartTask passes the
sessions meta-data (publishing administrator, domain information and session name) to the action. If
the local Management API server is available, the session changes about to be published are
formatted as a response to the "show changes" API.
n After Publish - Fired after an administrator successfully publishes a session. The SmartTask passes
the same information to the action as the Before Publish trigger.
n After Install Policy - Fired after a policy has been installed. The SmartTask passes to the action
information related to the policy installation task, such as the package installed, the administrator who
initiated the installation and the task's result.
n CloudGuard Controller Event - Fired when a new log is generated that matches this query in
SmartConsole > Logging & Monitoring view > Logs tab:
More Information
{
"severity": "<VALUE1>",
"log-description": "<VALUE2>",
"product": "CloudGuard IaaS",
"gateway-name": "<VALUE3>",
"datacenter-name": [
"<VALUE4>",
"<VALUE5>",
"...",
"<VALUEx>"
],
"version": "1.0"
}
#!/bin/sh
input=$(echo $1 | base64 --decode)
severity=$(echo $input | jq '.severity')
message=$(echo $input | jq '."log-description"')
gw_name=$(echo $input | jq '."gateway-name"')
dc_name=$(echo $input | jq '."datacenter-name"')
n After Submit - Fired after an administrator submits the current session for approval by another
administrator (see "Approval Cycle for Sessions (SmartWorkflow and Identity Provider)" on page 83).
n Before Submit - Fired immediately before an administrator submits the current session for approval
by another administrator (see "Approval Cycle for Sessions (SmartWorkflow and Identity Provider)"
on page 83).
n Before Reject - Fired immediately before an administrator rejects a submitted session (see "Approval
Cycle for Sessions (SmartWorkflow and Identity Provider)" on page 83).
n After Reject - Fired after an administrator rejects a submitted session (see "Approval Cycle for
Sessions (SmartWorkflow and Identity Provider)" on page 83).
n Before Login - Fired immediately before an administrator logs in to SmartConsole.
n After Approve - Fired after an administrator approves the session created by another administrator
(see "Approval Cycle for Sessions (SmartWorkflow and Identity Provider)" on page 83.
n Before Approve - Fired immediately before an administrator approves the session created by another
administrator (see "Approval Cycle for Sessions (SmartWorkflow and Identity Provider)" on page 83).
Available Actions
n Run Script - Runs a pre-defined Repository Script. The first parameter that the script gets is a path to
a file that contains the trigger's data. When the script is not configured to run on the local machine, the
trigger's data is passed as Base64 encoded JSON data, which can be decoded to implement custom
business logic. However, when the script is configured to run on the local machine, no decoding is
needed.
For SmartTasks configured to run with "Before" operation triggers, the repository script can signal
whether to abort or continue the operation by printing a JSON object with the "result" and optional
"message" fields and then exit with code 0. If the value of the "result" field is "failure" the operation
aborts.
For SmartTasks configured to run with other triggers, exit code 0 is treated as success. Any other exit
code is treated as failure.
n Web Request - Executes an HTTPS POST web request to the configured URL. The trigger's data is
passed as JSON data to the request's payload.
Notes:
l The configured URL must start with HTTPS and the target web server
l You can use this action only for these triggers: After Install Policy, After
Run script
n Time-out – Number of seconds before the request times out and the request aborted.
n If the script fails to run or times-out – Treat time-out (or execution failure) as an error and abort the
event or continue normally.
Send Email
Enter these email details:
n To
n Cc
n Sender
n Subject
n Attachment
n Body text
You can use the pre-defined options in the "To", "Cc", and "Sender" fields only for administrators that have
an email address defined in SmartConsole. You cannot use these fields for administrators that are
connected through an Identity Provider.
For administrators that do not have an email address defined in SmartConsole, do one of these:
n Manually enter the applicable email addresses of the administrators, or
n Create a mailing list of the administrators in your email program, and use the mailing list in the
relevant field.
For example:
In an "After Session Approve" SmartTask, an administrator reviews and approves a change made by a
submitter.
In the Email Configuration fields:
In the "To" field, instead of the pre-defined Submitter email" field, enter a mailing list of all the submitters.
In the "Cc" field, instead of the pre-defined "All reviewers" field" enter a mailing list of all the reviewers.
In the "Sender" field, instead of the pre-defined "Reviewer email" field, enter a dummy email, such as
"[email protected]".
For more information about the approval cycle workflow, see "Session Flow for Administrators" on page 77.
Example
Use Case:
A company policy dictates that the publish operation must be used with a service request number as a
prefix to the session name before saving any changes to the database, so the administrators can see
what the rationale for changing the security policy was.
Procedure:
Add the Validate Session Name Prefix to the Scripts Repository.
a. Click Gateways & Servers > Scripts > Scripts Repository > New ( )
b. Give the script a name.
c. In the Content text box, paste the script code below.
d. Click OK to save the script in the repository.
Script Code
#!/bin/bash
JQ=${CPDIR}/jq/jq
data=`echo $1 | base64 --decode -i`
# Extracting the required session name prefix for the session name
based on the input JSON
sessionNamePrefix=`echo $data | $JQ -r .\"custom-data\".\"session-
name-prefix\"`
# Abort the publish if the session name doesn't match the expected
prefix
if [[ ! $sessionName == $sessionNamePrefix* ]]; then
m1="Corporate Policy requires you to use a ticket number as the
session's name."
m2="For example: ${sessionNamePrefix}###### "
m2=${m2//\"/\\\"}
m3="Please change your session's name to meet the requirements and
publish again."
printf '{"result":"failure","message":"%s %s
%s"}\n' "$m1" "$m2" "$m3"
exit 0
else
# Session name matches the expected prefix, publish is allowed
printf '{"result":"success"}\n'
exit 0
fi
Note - If you publish the session without using the prefix, the process fails.
Introduction
The complexity of using IoT devices in the modern work environment such as hospitals, industries, and
smart-buildings has, at cost, exposed them to ill-natured and harmful cyber attacks. Malicious cyber
invasions into IoT devices have caused considerable financial loss to a number of enterprises. In addition to
monetary loss and physical damage, these attacks can lead to data breaches, data tampering, ransomware,
and even denial of service.
Common IoT devices susceptible to attack:
Printers, copiers, fax machines Printers, copiers, fax machines Printers, copiers, fax machines
-- C-arms --
-- Infusion pumps --
-- Patient monitor --
Note - Enforcement of IoT assets in the Access Control policy is not supported on
Centrally Managed Quantum Spark appliances running Gaia Embedded operating
system.
Prerequisites
n Check Point certified IoT Third Party Discovery Service installed on the network with a connection to
the Management Server.
n Discovery Service
l Industrial / Enterprise:
o Armis
o Claroty
o Indegy
o Ordr
o SAM
o SCADAfence
l Medical:
o Medigate
o CyberMDX
o Cynerio
n Identity Awareness Web API must be activated on the enforcing Security Gateway (the configuration
is done automatically).
n Security Gateway version R80.10 and above
Network Overview
Check Point's Infinity for IoT delivers comprehensive IoT cyber-security by applying granular IoT-based
policies. Check Point's IoT protection solution mobilizes hospitals, industries, smart buildings and offices to
reduce and even eliminate IoT attacks.
n Identify and analyze IoT devices and traffic
n Deploy IoT policy enforcement points
n Identify and block IoT malicious intents
Network Diagram
n Discover the connected IoT assets (mainly in the Industrial and Healthcare sectors).
n Group the discovered assets into zones.
n Share the discovered assets and the recommended policies with the Check Point Management
Server.
To define the IoT Third Party Discovery Service
Step Instructions
1 Go to SmartConsole > Manage & Settings > Blades > IoT Third Party Discovery Service
> Create Controller.
The New IoT Third Party Discovery Service window opens.
4 Install Policy.
Configuring a new IoT Third Party Discovery Service generates a new IoT policy layer on the selected
profiles, a new Threat Prevention profile, and a new rule in the Threat Prevention policy.
To create a new IoT Third Party Discovery Service from an existing IoT Third Party Discovery Service
1. In SmartConsole, go to the Object Explorer pane.
2. Right-click an existing IoT Third Party Discovery Service and select New.
Category Description
Category Description
Auto-Generated Rules generated from network traffic and IoT network patterns.
Step Instructions
1 From Security Policies > Access Control, select the IoT Layer.
3 In the Source and/or Destination field, click the plus sign > Add new item....
The Add new item window opens.
4 Select Import > IoT Controllers, and then select the IoT asset to add to the rule.
Some servers could not be A communication issue prevents synchronization, or some other
synchronized synchronization issue exists.
Collision or HA conflict More than one management server configured as active. Two active
servers cannot sync with each other.
Status window
Peer Status Additional Information
area:
Peers Standby The peer is in standby. The message can also show:
n Sync problem, last time sync
n Synchronized successfully. Last sync time:
<time>
n No communication
Peers Active The peer is on standby. The message can also show:
n No communication, last sync time
n OK., last sync time: <time>
n Sync problem, last sync time (in any direction)
Best Practice - We recommend that you publish the SmartConsole session before
initiating a changeover to the Standby Security Management Server.
Not Communicating
Solution:
1. Check connectivity between the servers.
2. Test SIC.
Collision or HA Conflict
More than one management server is configured as active.
Solution:
1. From the main SmartConsole menu, select Management High Availability.
The High Availability Status window opens.
2. Use the Actions button to set one of the active servers to standby.
Warning - When this server becomes the Standby, all its data is overwritten by
the active server.
Sync Error
Solution:
Do a manual sync.
Step Instruction
3 Install the new Secondary Management Server with the IP of the old Primary
Management Server.
4 Reset SIC and connect with SIC to the new Secondary Management Server
To switch back to the original setup (to set the original Primary Management Server as the
Primary Management Server again):
Step Instruction
3 Install the new Secondary Management Server with the IP of the old Primary
Management Server.
4 Reset SIC and connect with SIC to the Secondary Management Server
2. Promote the Secondary Management Server to Primary and create new licenses.
The first Management Server installed is the Primary Server and all servers installed afterwards
are Secondary servers. The Primary server acts as the synchronization master. When the Primary
server is down, secondary servers cannot synchronize their databases until a Secondary is
Note - This is the disaster recovery method supported for High Availability
environments with Endpoint Security.
Before you start - make sure that the primary server is offline.
Step Instruction
3 Remove the $FWDIR/conf/mgha* files. They contain information about the current
Secondary settings. These files will be recreated when you start the Check Point
services.
4 Make sure you have a mgmtha license on the newly promoted server.
Note - All licenses must have the IP address of the promoted Security
Management Server.
Note - When you remove the old Primary Management Server, all
previous licenses are revoked.
b. Install database.
Check Point ICA is fully compliant with X.509 standards for both certificates and CRLs. See the related
X.509 and PKI documentation, and RFC 2459 for more information.
For more information, see:
n sk102837: Best Practices - ICA Management Tool configuration
n sk39915: Invoking the ICA Management Tool
2. In the command line on the Management Server, add the required administrators and users that are
permitted to use the ICA Management Tool.
cpca_client set_mgmt_tool on
Important - The fact that the TCP port 18265 is open is not a vulnerability. The
ICA Management Tool Portal is secured and protected by SSL. In addition, only
authorized administrators and users are allowed to access it using a certificate.
8. Select the appropriate certificate for authenticating to the ICA Management Tool.
9. Click OK.
10. In the Security Alert dialog box, click Yes.
n Run an LDAP query for the details of all the organization's employees
n Create a file out of this data, and then use this file to:
l Start (initialize) the creation of certificates for all employees
l Send a notification about the new certificates to each of those employees
These operations can be done simultaneously:
n Start (initialize) user certificates
n Revoke user certificates
n Send mail to users
n Remove expired certificates
n Remove certificates for which the registration procedure was not completed
To do a certificate search:
In the Manage Certificates page, enter the search parameters, and click Search.
l Renewed (superseded)
n Serial Number - Serial number of the requested certificate (by default, this field is empty)
Note - The status bar shows search statistics after each search.
To generate a certificate
Note - There are two ways to create this file - through an LDAP query or a non-
LDAP query.
n Each line after a blank line or the first line in the file represents one DN to be initialized
n If the line starts with "mail=", the string continues with the mail of the use
If no email is given, the email address will be taken from the ICA's "Management Tool Mail To
Address" attribute.
n If there is a line with the not_after attribute, then the value at the next line is the Certificate
Expiration Date.
The date is given in seconds from now.
n If there is a line with the is otp_validity attribute, then the value at the next line is the
Registration Key Expiration Date.
The date is given in seconds from now.
Here is an example of an LDAP Search output:
not_after
86400
otp_validity
3600
uid=user_1,ou=People,o=intranet,dc=company,dc=com
[email protected]
<blank_line>
...
uid=...
For more information, see "Configuring Administrators and Users on an External LDAP Server" on
page 130.
It is possible to create a simple (non-LDAP) query by configuring the DN + email in a file using this
format:
CRL
CRL Management
By default, the CRL is valid for one week. This value can be configured. New CRLs are issued:
n When approximately 60% of the CRL validity period has passed
n Immediately following the revocation of a certificate
It is possible to recreate a specified CRL using the ICA Management Tool. The utility acts as a recovery
mechanism in the event that the CRL is deleted or corrupted. An administrator can download a DER
encoded version of the CRL using the ICA Management Tool.
CRL Modes
The ICA can issue multiple CRLs. Multiple CRLs prevent one CRL from becoming larger than 10K. If the
CRL exceeds 10K, IKE negotiations can fail when trying to open VPN tunnels.
Multiple CRLs are created by attributing each certificate issued to a specified CRL. If revoked, the serial
number of the certificate shows in the specified CRL.
The CRL Distribution Point (CRLDP) extension of the certificate contains the URL of the specified CRL. This
ensures that the correct CRL is retrieved when the certificate is validated.
CRL Operations
You can download, update, or recreate CRLs through the ICA management tool.
CA Procedures
CA Cleanup
To clean up the CA, you must remove the expired certificates. You can remove the expired certificates
manually or automatically.
Configuring the CA
To configure the CA
1. In the Menu pane, select Configure the CA.
2. Edit the"CA Data Types and Attributes" below as necessary.
3. In the Operations pane, select an operation:
n Apply - Save and enter the CA configuration settings.
If the values are valid, the configured settings become immediately effective. All non-valid
strings are changed to the default values.
n Cancel - Reset all values to the values in the last saved configuration.
n Restore Default - Revert the CA to its default configuration settings.
Entering the string Default in one of the attributes will also reset it to the default after you click
Configure. Values that are valid will be changed as requested, and others will change to
default values.
You can enter the values in the format in which they are displayed (<number> days <number>
seconds) or as a number of seconds.
n Integer - a regular integer, for example: SIC Key Size: 2048
n Boolean - the values can be true or false (not case sensitive), for example: Enable renewal:
true
n String - an alphanumeric string, for example: Management Tool DN prefix: cn=tests
These are the CA attributes, in alphabetical order:
CRL Duration The period of time for which the CRL is valid. min-5 1 week
minutes
max-1 year
Grace Period The amount of time the old certificate will remain min-0 1 week
Before in Renewed (superseded) state. max-5
Revocation years
Grace Period The amount of time between sequential checks min-10 1 day
Check Period of the Renewed (superseded) list in order to minutes
revoke those whose duration has passed. max-1
week
IKE Certificate The amount of time an IKE certificate will be min-10 1 year
Validity Period valid. minutes
max-3
years
IKE Certificate Certificate purposes for describing the certificate Digital signature
Key usage operations. Refer to RFC 2459. and Key
encipherment
Management For security reasons the mail sending button true or false
Tool Hide Mail after displaying a single certificate can be false
Button hidden.
Management The amount of time that a user certificate is valid min-one 2 years
Tool User when initiated using the Management Tool. week
Certificate max-20
Validity Period years
Management The text that appears in the body of the Registration Key:
Tool Mail Text message. 3 variables can be used in addition to $REG_KEY
Format the text: $REG_KEY (user's registration key); Expiration:
$EXPIRE (expiration time); $USER (user's DN). $EXPIRE
Max The maximum capacity of a CRL in the new CRL min-3 400
Certificates Per mode. max-400
Distribution
Point
New CRL Mode A Boolean value describing the CRL mode. 0 for old true
CRL mode
1 for new
mode
Number of The number of certificates that will be displayed min-1 approx 700
certificates per in each page of the search window. max-
search page approx 700
SIC Key Size The key size in bits of keys used in SIC. possible 2048
values:
1024
2048
4096
SIC Certificate Certificate purposes for describing the certificate Digital signature
Key usage operations. Refer to RFC 2459. and Key
encipherment
SIC Certificate The amount of time a SIC certificate will be valid. min-10 5 years
Validity Period minutes
max-20
years
User Certificate The key size in bits of the user's certificates. Possible 2048
Key Size values:
1024
2048
4096
User Certificate Certificate purposes for describing the certificate Digital signature
Key usage operations. Refer to RFC 2459 and Key
encipherment
SIC certificates are renewed automatically after 75% of the validity time of the certificate has passed. If, for
example, the SIC certificate is valid for five years. After 3.75 years, a new certificate is created and
downloaded automatically to the SIC entity. This automatic renewal ensures that the SIC connectivity of the
Security Gateway is continuous. The administrator can revoke the old certificate automatically or after a set
period of time. By default, the old certificate is revoked one week after certificate renewal.
Example diagram
Item Description
1 An API Client
4 A managed ClusterXL
Important - Scalable Platforms (Maestro and Chassis) do not support this feature
(Known Limitation MBS-10832).
Workflow:
1. Run the Management API "login" command to log in to the Management Server
When you work with an API Client, run the Check Point API "login" command to log in to the
Management Server (see the Check Point Management API Reference).
Important - The administrator that logs in must have the Run One Time Script
permission enabled in the assigned permission profile. See "Assigning
Permission Profiles to Administrators" on page 70.
2. Run the Gaia API commands on managed Security Gateways and Cluster Members
The Management API "login" command returns the Session Unique Identifier (SID) token.
In the same API Client, use this SID token in the "X-chkp-sid" field of the Gaia API commands
you run on managed Security Gateways and Cluster Members.
Gaia API Syntax:
3. The Gaia API Proxy logs in to the specified Security Gateway or Cluster Member
The Gaia API Proxy on the Management Server interprets the Gaia API command and logs in to
the specified Security Gateway or Cluster Member.
a. This login returns the SID for the Security Gateway or Cluster Member.
b. The Gaia API Proxy uses this SID to run the Gaia API commands.
c. The Gaia API Proxy saves this SID in its database:
n The SID timeout is 580 seconds on the Management Server.
n The SID timeout is 10 minutes on a Security Gateway or Cluster Member.
4. The Gaia API Proxy forwards the response from the Security Gateway or Cluster Member
to the API client
n To increase performance, the Gaia API Proxy saves the response in the Gaia API Proxy
cache on the Management Server.
n If the Gaia API Proxy gets the same Gaia API request during the cache timeout, it returns
the Gaia API response from its cache and updates the cache.
n An administrator can configure these cache parameters in the
$FWDIR/api/conf/cache.conf file on the Management Server:
Accepted
Parameter Description
Values
timeout 0, or greater Specifies the time, after which the next Gaia API
command triggers a cache update for that Gaia API
command:
l 0 - The Gaia API proxy does not use cache
Important - The Gaia API Proxy sends Gaia API command over HTTPS. The Access
Control policy for the Security Gateway or ClusterXL must explicitly allow HTTPS traffic
from the Management Server to the Security Gateway or Cluster Members.
Examples
Gaia API command "show-hostname"
In this example, we identify the managed Security Gateway by the object primary IP address.
Request
Response
{
"command-name" : "show-hostname",
"response-message" : {
"name" : "gw-832546"
}
}
In this example, we identify the managed Security Gateway by the object name.
Request
Response
{
"command-name" : "v1.4/show-interfaces",
"response-message" : {
"ipv6-local-link-address": "Not Configured",
"type": "physical",
"name": "eth0",
"ipv6-mask-length": "Not-Configured",
"ipv6-address": "Not-Configured",
"ipv6-autoconfig": "Not configured",
"ipv4-address": "192.168.1.1",
"enabled": true,
"comments": "",
"ipv4-mask-length": "24"
}
}
In this example, we identify the managed Security Gateway by the object UID.
Request
Response
{
"command-name" : "v1.4/show-diagnostics",
"response-message" : {
"to": 3,
"total": 3,
"from": 1,
"objects": [
{
"total": "34342961152",
"partition": "/",
"used": "5718065152",
"free": "28624896000"
},
{
"total": "304624640",
"partition": "/boot",
"used": "26991616",
"free": "277633024"
},
{
"total": "34342961152",
"partition": "/var/log",
"used": "455684096",
"free": "33887277056"
}
]
}
}
Syntax Legend
Whenever possible, this guide lists commands, parameters and options in the alphabetical order.
This guide uses this convention in the Command Line Interface (CLI) syntax:
Character Description
Curly brackets or braces Enclose a list of available commands or parameters, separated by the
{ } vertical bar |.
User can enter only one of the available commands or parameters.
Square brackets or Enclose an optional command or parameter, which user can also enter.
brackets
[ ]
contract_util
Description
Works with the Check Point Service Contracts.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify
Parameters
Parameter Description
cpmacro Overwrites the current cp.macro file with the specified cp.macro file.
<options> See "contract_util cpmacro" on page 434.
download Downloads all associated Check Point Service Contracts from the User Center, or
<options> from a local file.
See "contract_util download" on page 435.
mgmt Delivers the Service Contract information from the Management Server to the
managed Security Gateways.
See "contract_util mgmt" on page 437.
print Shows all the installed licenses and whether the Service Contract covers these
<options> license, which entitles them for upgrade or not.
See "contract_util print" on page 438.
update Updates Check Point Service Contracts from your User Center account.
<options> See "contract_util update" on page 440.
contract_util check
Description
Checks whether the Security Gateway is eligible for an upgrade.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
hfa Checks whether the Security Gateway is eligible for an upgrade to a higher Hotfix
Accumulator.
maj_ Checks whether the Security Gateway is eligible for an upgrade to a higher Major
upgrade version.
min_ Checks whether the Security Gateway is eligible for an upgrade to a higher Minor
upgrade version.
contract_util cpmacro
Description
Overwrites the current cp.macro file with the specified cp.macro file, if the specified is newer than the
current file.
For more information about the cp.macro file, see sk96217: What is a cp.macro file?
Syntax
Message Description
CntrctUtils_Write_ The contract_util cpmacro command did not overwrite the current
cp_macro returned 1 file, because it is newer than the specified file.
contract_util download
Description
Downloads all associated Check Point Service Contracts from User Center, or from a local file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service Contract
File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}] <Username>
<Password> [<Proxy Server> [<Proxy Username>:<Proxy Password>]]
Parameters
Parameter Description
-i Interactive mode - prompts the user for the User Center credentials
and proxy server settings.
local Specifies to download the Service Contract from the local file.
This is equivalent to the "cplic contract put" command (see
"cplic contract" on page 505).
<Proxy Server> [<Proxy Specifies that the connection to the User Center goes through the
Username>:<Proxy proxy server.
Password>]
n <Proxy Server> - IP address of resolvable hostname of
the proxy server
n <Proxy Username> - Username for the proxy server.
n <Proxy Password> - Password for the proxy server.
Note - If you do not specify the proxy server explicitly, the command
uses the proxy server configured in the management database.
<Service Contract File> Path to and the name of the Service Contract file.
First, you must download the Service Contract file from your User
Center account.
contract_util mgmt
Description
Delivers the Service Contract information from the Management Server to the managed Security Gateways.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util mgmt
contract_util print
Description
Shows all the installed licenses and whether the Service Contract covers these license, which entitles them
for upgrade or not.
This command can show which licenses are not recognized by the Service Contract file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
Parameters
Parameter Description
contract_util summary
Description
Shows post-installation summary and whether this Check Point computer is eligible for upgrades.
Syntax
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
contract_util update
Description
Updates the Check Point Service Contracts from your User Center account.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]
Parameters
Parameter Description
-proxy <Proxy Specifies that the connection to the User Center goes through the proxy
Server>:<Proxy Port> server:
n <Proxy Server> - IP address of resolvable hostname of the
proxy server.
n <Proxy Port> - The applicable port on the proxy server.
Note - If you do not specify the proxy explicitly, the command
uses the proxy configured in the management database.
-ca_path <Path to ca- Specifies the path to the Certificate Authority Bundle file (ca-
bundle.crt File> bundle.crt).
contract_util verify
Description
Checks whether the Security Gateway is eligible for an upgrade.
This command is the same as the "contract_util check" on page 433 command, but it also interprets the
return values and shows a meaningful message.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util verify
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
Parameters
Parameter Description
admin Configures Check Point system administrators for the Security Management Server.
<options> See "cp_conf admin" on page 444.
auto Shows and configures the automatic start of Check Point products during boot.
<options> See "cp_conf auto" on page 447.
client Configures the GUI clients that can use SmartConsole to connect to the Security
<options> Management Server.
See "cp_conf client" on page 449.
Parameter Description
cp_conf admin
Description
Configures Check Point system administrators for the Security Management Server.
Notes:
n Multi-Domain Server does not support this command.
n Only one administrator can be defined in the "cpconfig" on page 497 menu.
To define additional administrators, use SmartConsole.
n This command corresponds to the option Administrator in the "cpconfig" on page 497
menu.
Syntax
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get
Parameters
Parameter Description
add -gaia [{a | w | r}] Adds the Gaia administrator user admin:
n a - Assigns all permissions - read settings, write settings,
and manage administrators
n w - Assigns permissions to read and write settings only
(cannot manage administrators)
n r - Assigns permissions to only read settings
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 497 menu.
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
{enable | disable} <Product1> Controls whether the installed Check Point products start
<Product2> ... automatically during boot.
This command is for Check Point use only.
[Expert@MGMT:0]#
cp_conf ca
Description
n Initializes the Internal Certificate Authority (ICA).
n Configures the Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).
Syntax
cp_conf ca
-h
fqdn <FQDN Name>
init
Parameters
Parameter Description
fqdn <FQDN Configures the Certificate Authority's (CA) Fully Qualified Domain Name
Name> (FQDN).
<FQDN Name> is the text string hostname.domainname
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cp_conf client
Description
Configures the GUI clients that are allowed to connect with SmartConsoles to the Security Management
Server.
Notes:
n Multi-Domain Server does not support this command.
n This command corresponds to the option GUI Clients in the "cpconfig" on page 497
menu.
Syntax
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get
Parameters
Parameter Description
createlist <GUI Client 1> <GUI Deletes the current allowed GUI clients and creates a new
Client 2> ... list of allowed GUI clients.
del <GUI Client 1> <GUI Client Deletes the specified the GUI clients.
2> ...
Examples
Example 1 - Configure one IPv4 address
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
cp_conf finger
Description
Shows the Internal Certificate Authority's Fingerprint.
This fingerprint is a text string derived from the ICA certificate on the Security Management Server, Multi-
Domain Server, or Domain Management Server.
This fingerprint verifies the identity of the Security Management Server, Multi-Domain Server, or Domain
Management Server when you connect to it with SmartConsole.
Syntax
cp_conf finger
-h
get
Parameters
Parameter Description
Example
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 497 menu.
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to License Adds a license from the specified Check Point license file.
File> You get this license file in the Check Point User Center.
This is the same command as the "cplic db_add" on
page 507.
cp_log_export
Description
Exports Check Point logs over syslog.
For more information, see sk122323 and R81.20 Logging and Monitoring Administration Guide.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_log_export
Parameters
Parameter Description
<command-name> help Shows the built help for the specified internal command.
Internal Commands
Name Description
reexport Resets the current log position and exports all logs again based on the configuration.
cp_log_export reexport name <Name> --apply-now
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
--apply-now Applies immediately any Optio Optio Mand N/A N/A Mand
change that was done nal nal atory atory
with the "add", "set",
"delete", or
"reexport" command.
ca-cert Specifies the full path to Optio Optio N/A N/A N/A N/A
<Path> the CA certificate file nal nal
*.pem.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
client-cert Specifies the full path to Optio Optio N/A N/A N/A N/A
<Path> the client certificate nal nal
*.p12.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
client-secret Specifies the challenge Optio Optio N/A N/A N/A N/A
<Phrase> phrase used to create the nal nal
client certificate *.p12.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
enabled {true Default: true Optio Optio N/A N/A N/A N/A
| false} nal nal
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
encrypted Specifies whether to use Optio Optio N/A N/A N/A N/A
{true | TSL (SSL) encryption to nal nal
false} send the logs.
Default: false
end-position Specifies the end N/A N/A N/A N/A N/A Optio
<Position> position, up to which to nal
export the logs.
export- Specifies whether to add Optio Optio N/A N/A N/A N/A
attachment- a field to the exported nal nal
ids {true | logs that represents the
false} ID of log's attachment (if
exists).
Default: false
export- Specifies whether to add Optio Optio N/A N/A N/A N/A
attachment- a field to the exported nal nal
link {true | logs that represents a link
false} to SmartView that shows
the log card and
automatically opens the
attachment.
Default: false
export-link Specifies whether to add Optio Optio N/A N/A N/A N/A
{true | a field to the exported nal nal
false} logs that represents a link
to SmartView that shows
the log card.
Default: false
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
n Mobile
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
format Specifies the format, in Optio Optio N/A N/A N/A N/A
{generic | which the logs are nal nal
cef | json | exported.
leef | Default: syslog
logrhythm |
rsa | splunk
| syslog}
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
name "<Name>" Specifies the unique Mand Mand Mand Optio Optio Mand
name of the Log Exporter atory atory atory nal. nal. atory
configuration. By By
Notes: defau defau
lt, lt,
n Allowed appli appli
characters are: es to es to
Latin letters, digits all. all.
("0-9"), minus ("-
"), underscore ("_
"), and period
(".").
n Must start with a
letter.
n The minimum
length is two
characters.
n The "add"
command creates
a new target
directory with the
specified unique
name in the
$EXPORTERDIR/
targets/
directory.
protocol {tcp Specifies the Layer 4 Mand Optio N/A N/A N/A N/A
| udp} Transport protocol to use atory nal
(TCP or UDP).
There is no default value.
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
read-mode Specifies the mode, in Optio Optio N/A N/A N/A N/A
{raw | semi- which to read the log files. nal nal
unified}
n raw - Specifies to
export log records
without any
unification.
n semi-unified -
Specifies to export
log records with
step-by-step
unification. That is,
for each log record,
export a record
that unifies this
record with all
previously-
encountered
records with the
same ID.
Default: semi-unified
Default: raw
reconnect- Specifies the interval (in Optio Optio N/A N/A N/A N/A
interval minutes) after which the nal nal
{<Number> | Log Exporter must
default} connect again to the
target server after the
connection is lost.
To disable, enter the
value "default".
There is no default value.
start- Specifies the start N/A N/A N/A N/A N/A Optio
position position, from which to nal
<Position> export the logs.
Requ
ired
for
"rest
Requi Requ art", Requi
Requi Requi
red ired "sho red
red red
for for w", for
for for
Name Description "delet "reco "stat "reex
"add" "set"
e" nf" us", port"
comm comm
comm com "star comm
and and
and mand t", and
"sto
p"
com
mand
target-port Specifies the listening Mand Optio N/A N/A N/A N/A
<Target- port on the target server, atory nal
Server-Port> to which you export the
logs.
target-server Specifies the IP address Mand Optio N/A N/A N/A N/A
<Target- or FQDN of the target atory nal
Server> server, to which you
export the logs.
cpca_client
Description
Execute operations on the Internal Certificate Authority (ICA).
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_ca_services <options>
set_cert_validity <options>
set_mgmt_tool <options>
set_sign_hash <options>
Parameters
Parameter Description
create_cert <options> Issues a SIC certificate for the Security Management Server or
Domain Management Server.
See "cpca_client create_cert" on page 472.
get_crldp <options> Shows how to access a CRL file from a CRL Distribution Point.
See "cpca_client get_crldp" on page 475.
Parameter Description
get_pubkey <options> Saves the encoding of the public key of the ICA's certificate to a file.
See "cpca_client get_pubkey" on page 476.
init_certs <options> Imports a list of DNs for users and creates a file with registration keys
for each user.
See "cpca_client init_certs" on page 477.
set_cert_validity Configures the default certificate validity period for new certificates.
<options> See "cpca_client set_cert_validity" on page 488.
set_sign_hash <options> Sets the hash algorithm that the CA uses to sign the file hash.
See "cpca_client set_sign_hash" on page 494.
cpca_client create_cert
Description
Issues a SIC certificate for the Security Management Server or Domain Management Server.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
-f <Full Path to Specifies the PKCS12 file, which stores the certificate and keys.
PKCS12 file>
-c "<Comment for Optional. Specifies the certificate comment (must enclose in double quotes).
Certificate>"
Example
cpca_client double_sign
Description
Creates a second signature for a certificate.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
-o <Full Path to Optional. Saves the certificate into the specified file.
Output File>
Example
[Expert@MGMT:0]#
cpca_client get_crldp
Description
Shows how to access a CRL file from a CRL Distribution Point.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-p <CA Optional. Specifies the TCP port on the Security Management Server or Domain
port Management Server, which is used to connect to the Certificate Authority.
number> The default TCP port number is 18209.
Example
cpca_client get_pubkey
Description
Saves the encoding of the public key of the ICA's certificate to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cpca_client [-d] get_pubkey [-p <CA port number>] <Full Path to Output
File>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
<Full Path to Saves the encoding of the public key of the ICA's certificate to the specified file.
Output File>
Example
cpca_client init_certs
Description
Imports a list of Distinguished Names (DN) for users and creates a file with registration keys for each user.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cpca_client [-d] init_certs [-p <CA port number>] -i <Full Path to Input
File> -o <Full Path to Output File>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
cpca_client lscert
Description
Shows all certificates issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-dn <SubString> Optional. Filters the search results to those with a DN that
matches the specified <SubString>.
This command does not support multiple values.
-stat {Pending | Valid | Optional. Filters the search results to those with certificate
Revoked | Expired | Renewed} status that matches the specified status.
This command does not support multiple values.
-kind {SIC | IKE | User | Optional. Filters the search results to those with certificate
LDAP} kind that matches the specified kind.
This command does not support multiple values.
-ser <Certificate Serial Optional. Filters the search results to those with certificate
Number> serial number that matches the specified serial number.
This command does not support multiple values.
-dp <Certificate Optional. Filters the search results to the specified Certificate
Distribution Point> Distribution Point (CDP).
This command does not support multiple values.
Example
Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023
Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023
cpca_client revoke_cert
Description
Revokes a certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
Note - You can use the parameter '-n' only, or together with the
parameter "-s".
Note - You can use the parameter "-s" only, or together with the
parameter "-n".
cpca_client revoke_non_exist_cert
Description
Revokes a non-existent certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Paramete
Description
r
-i Specifies the file that contains the list of the certificate to revoke.
<Full You must create this file in the same format as the "cpca_client lscert" on page 478
Path to command prints its output.
Input
File> Example
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7
19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri Apr 7
19:40:13 2023
Note - This command saves the error messages in the <Name of Input
File>.failures file.
cpca_client search
Description
Searches for certificates in the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-where {dn | comment | serial | device_ Optional. Specifies the certificate's field, in
type | device_id | device_name} which to search for the string:
n dn - Certificate DN
n comment - Certificate comment
n serial - Certificate serial number
n device_type - Device type
n device_id - Device ID
n device_name - Device Name
The default is to search in all fields.
Parameter Description
-kind {SIC | IKE | User | LDAP} Optional. Specifies the certificate kind to
search.
You can enter multiple values in this format:
-kind <Kind1> <Kind2> <Kind3>
The default is to search for all kinds.
Example 1
[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP -stat Pending Valid Renewed
Example 2
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#
Example 3
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#
cpca_client set_ca_services
Description
This command enables and disables the Certificate Authority Services Portal on the Management Server on
the TCP port 18268.
From this portal, you can download the applicable Internal Certificate Authority certificates.
For trust purposes, you can install this certificate on the applicable Security Gateways, externally managed
Site to Site VPN peer gateways, Remote Access VPN clients, clients that use Clientless VPN, and so on.
Note - In R81.20, the TCP port 18264 on the Management Server is available only for
the retrieval of the CRL (Certificate Revocation List).
Syntax
Parameters
Parameter Description
cpca_client set_ca_services on
cpca_client set_ca_services on
cpca_client set_cert_validity
Description
This command configures the default certificate validity period for new certificates.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n The new certificate validity period applies only to certificate you create after this
change.
Syntax
Parameters
Parameter Description
Example
cpca_client set_mgmt_tool
Description
Controls the ICA Management Tool.
This tool is disabled by default.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
See:
n sk39915: Invoking the ICA Management Tool
n sk102837: Best Practices - ICA Management Tool configuration
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
add Adds the specified administrator, user, or custom user that is permitted to use the
ICA Management Tool.
remove Removes the specified administrator, user, or custom user that is permitted to
use the ICA Management Tool.
clean Removes all administrators, users, or custom users that are permitted to use the
ICA Management Tool.
print Shows the configured administrators, users, or custom users that are permitted
to use the ICA Management Tool.
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18265.
-a Optional. Specifies the DN of the administrator that is permitted to use the ICA
<Administrator Management Tool.
DN> Must specify the full DN as appears in SmartConsole
Procedure
Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
-u <User DN> Optional. Specifies the DN of the user that is permitted to use the ICA
Management Tool.
Must specify the full DN as appears in SmartConsole:
Procedure
Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
Parameter Description
-c <Custom User Optional. Specifies the DN for the custom user that is permitted to use the ICA
DN> Management Tool.
Must specify the full DN as appears in SmartConsole.
Procedure
Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
2. In the command line on the Management Server, add the required administrators and users that are
permitted to use the ICA Management Tool.
3. In the command line on the Management Server, start the ICA Management Tool.
cpca_client set_mgmt_tool on
5. Import the administrator's / user's certificate into the Windows Certificate Store:.
a. Right-click the *.p12 file you saved when you created the required administrator / user, and
click Install PFX.
The Certificate Import Wizard opens.
b. In the Store Location section, select the applicable option:
n Current User (this is the default)
n Local Machine
c. Click Next.
d. Enter the same certificate password you used when you created the required administrator /
user certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store > click Browse > select Personal > click
OK.
i. Click Next.
j. Click Finish.
6. In a web browser, connect to the ICA Management Tool:
Important - The fact that the TCP port 18265 is open is not a vulnerability. The
ICA Management Tool Portal is secured and protected by SSL. In addition, only
authorized administrators and users are allowed to access it using a certificate.
8. Select the appropriate certificate for authenticating to the ICA Management Tool.
9. Click OK.
10. In the Security Alert dialog box, click Yes.
cpca_client set_sign_hash
Description
Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
{sha1 | sha256 | sha384 | The hash algorithms that the CA uses to sign the file
sha512} hash.
The default algorithm is SHA-256.
Example
cpca_create
Description
Creates new Check Point Internal Certificate Authority database.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).
cpconfig
Description
This command starts the Check Point Configuration Tool.
This utility configures specific settings for the installed Check Point products.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and Manages Check Point licenses and contracts on this server.
contracts
GUI Clients Configures the GUI clients that can use SmartConsole to connect to this
server.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Certificate Authority Initializes the Internal Certificate Authority (ICA) and configures the Certificate
Authority's (CA) Fully Qualified Domain Name (FQDN).
Automatic start of Shows and controls which of the installed Check Point products start
Check Point Products automatically during boot.
[Expert@MyMGMT:0]# cpconfig
This program will let you re-configure
your Check Point Security Management Server configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products
(9) Exit
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on your Check
Point server.
For more information, see sk92739.
cplic
Description
The cplic command manages Check Point licenses.
You can run this command in Gaia Clish or in the Expert mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
Local licensing Management Servers, You execute these commands locally on the Check Point
commands Security Gateways computers.
and Cluster Members
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Syntax for Remote Licensing on managed Security Gateways and Cluster Members
cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>
cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
check <options> Confirms that the license includes the feature on the local Security Gateway or
Management Server.
See "cplic check" on page 503.
contract Manages (deletes and installs) the Check Point Service Contract on the local
<options> Check Point computer.
See "cplic contract" on page 505.
del <options> Deletes a Check Point license on a host, including unwanted evaluation,
expired, and other licenses.
See "cplic del" on page 512.
del <Object Detaches a Central license from a remote managed Security Gateway or
Name> <options> Cluster Member.
See "cplic del <object name>" on page 513.
Parameter Description
print <options> Prints details of the installed Check Point licenses on the local Check Point
computer.
See "cplic print" on page 515.
put <Object Attaches one or more Central or Local licenses to a remote managed Security
Name> <options> Gateways and Cluster Members.
See "cplic put <object name>" on page 519.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management Server. See
sk66245.
Syntax
cplic [-d] check [-p <Product>] [-v <Version>] [{-c | -count}] [-t <Date>]
[{-r | -routers}] [{-S | -SRusers}] <Feature>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member / Scalable Platform Security Group, you must update the license
repository on the applicable Management Server - either with the "cplic get" on
page 514 command, or in SmartUpdate.
Syntax
cplic contract -h
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
cplic db_add
Description
Adds licenses to the license repository on the Management Server.
When you add Local licenses to the license repository, Management Server automatically attaches them to
the managed Security Gateway / Cluster Member with the matching IP address.
When you add Central licenses, you must manually attach them.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command "cplic db_add -l
192.0.2.11.lic" produces output similar to:
cplic db_print
Description
Shows the details of Check Point licenses stored in the license repository on the Management Server.
Syntax
cplic [-d] db_print {<Object Name> | -all} [{-n | -noheader}] [-x] [{-t | -
type}] [{-a | -attached}]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Example
cplic db_rm
Description
Removes a license from the license repository on the Management Server.
After you remove the license from the repository, it can no longer use it.
Warning - You can run this command ONLY after you detach the license with the "cplic
del" on page 512 command.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
Example
[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other licenses.
This command can delete a license on both local computer, and on remote managed computers.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
<Object Name> The name of the Security Gateway / Cluster Member object as configured in
SmartConsole.
Syntax
cplic [-d] del <Object Name> [-F <Output File>] [-ip <Dynamic IP Address>]
<Signature>
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object as defined in
SmartConsole.
-ip <Dynamic IP Deletes the license on the DAIP Security Gateway with the specified IP
Address> address.
Note - If this parameter is used, then object name must be a DAIP Security
Gateway.
cplic get
Description
Retrieves all licenses from managed Security Gateways and Cluster Members into the license repository on
the Management Server.
This command helps synchronize the license repository with the managed Security Gateways and Cluster
Members.
When you run this command, it updates the license repository with all local changes.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-all Retrieves licenses from all Security Gateways and Cluster Members in the managed
network.
<IP The IP address of the Security Gateway / Cluster Member, from which licenses are to
Address> be retrieved.
<Host The name of the Security Gateway / Cluster Member object as defined in
Name> SmartConsole, from which licenses are to be retrieved.
Example
If the Security Gateway with the object name MyGW contains four Local licenses, and the license repository
contains two other Local licenses, the command "cplic get MyGW" produces output similar to this:
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member / Scalable Platform Security Group, this
command prints all installed licenses (both Local and Central).
Syntax
cplic [-d] print[{-n | -noheader}] [-x] [{-t | -type}] [-F <Output File>]
[{-p | -preatures}] [-D]
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
{-o | - On a Security Gateway / Cluster Member / Scalable Platform Security Group, this
overwrite} command erases only the local licenses, but not central licenses that are installed
remotely.
{-c | -check- Verifies the license. Checks if the IP of the license matches the Check Point
only} computer and if the signature is valid.
{-s | -select} Selects only the local license whose IP address matches the IP address of the
Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the Check Point
boot} computer.
Use of this option will prevent certain error messages.
Parameter Description
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
Syntax
cplic [-d] put <Object Name> [-ip<Dynamic IP Address> ] [-F <Output File>]
-l <License File> [<Host>] [<Expiration Date>] [<Signature>]
[<SKU/Feature>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
<Object Name> The name of the Security Gateway / Cluster Member object, as defined in
SmartConsole.
-ip <Dynamic IP Installs the license on the Security Gateway with the specified IP address.
Address> This parameter is used to install a license on a Security Gateway with
dynamically assigned IP address (DAIP).
Note - If you use this parameter, then the object name must be that
of a DAIP Security Gateway.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in the specified license file.
Note - You get this license file in the Check Point User Center.
Syntax
Parameters
Parameter Description
-l <Input Upgrades the licenses in the license repository and Check Point Security Gateways /
File> Cluster Members to match the licenses in the specified file.
Example
This example explains the procedure to upgrade the licenses in the license repository.
There are two Software Blade licenses in the input file:
n One license does not match any license on a remote managed Security Gateway.
n The other license matches an NGX-version license on a managed Security Gateway that has to be
upgraded.
Workflow in this example:
1. Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the Security
Gateways with the previous product versions.
2. Import all licenses into the license repository.
You can also do this after you upgrade the products on the remote Security Gateways.
3. Run this command:
Example:
Example:
5. In the Check Point User Center, view the licenses for the products that were upgraded from version
NGX to a Software Blades license.
You can also create new upgraded licenses.
6. Download a file containing the upgraded licenses.
Only download licenses for the products that were upgraded from version NGX to Software Blades.
7. If you did not import the version NGX licenses into the repository, import the version NGX licenses
now.
Use this command:
n The licenses in the downloaded license file and in the license repository are compared.
n If the certificate keys and features match, the old licenses in the repository and in the remote
Security Gateways are updated with the new licenses.
n A report of the results of the license upgrade is printed.
cppkg
Description
Manages the SmartUpdate software packages repository on the Security Management Server.
Important - Installing software packages with the SmartUpdate is not supported for
Security Gateways running on Gaia OS.
Syntax
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).
Parameters
Parameter Description
get Updates the list of the SmartUpdate software packages in the repository.
See "cppkg get" on page 528.
getroot Shows the path to the root directory of the repository (the value of the
environment variable $SUROOT).
See "cppkg getroot" on page 529.
setroot <options> Configures the path to the root directory of the repository.
See "cppkg setroot" on page 531.
cppkg add
Description
Adds a SmartUpdate software package to the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS
(run the mdsenv command).
n This command does not overwrite existing packages. To overwrite an existing
package, you must first delete the existing package.
n You get the SmartUpdate software packages from the Check Point Support
Center.
Syntax
Parameters
Parameter Description
<Full Path to Specifies the full local path on the computer to the SmartUpdate software
Package> package.
Example - Adding R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances
ppkg delete
Description
Deletes SmartUpdate software packages from the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS
(run the mdsenv command).
Syntax
Parameters
Parameter Description
del | When you do not specify optional parameters, the command runs in the interactive
delete mode. The command shows the menu with applicable options.
Notes:
n To see the values for the optional parameters, run the "cppkg print" on page 530
command.
n You must specify all optional parameters, or no parameters.
Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20
(e) Exit
You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y
[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#
cppkg get
Description
Updates the list of the SmartUpdate software packages in the SmartUpdate software packages repository
based on the real content of the repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS
(run the mdsenv command).
Syntax
cppkg get
Example
cppkg getroot
Description
Shows the path to the root directory of the SmartUpdate software packages repository (the value of the
environment variable $SUROOT)
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS
(run the mdsenv command).
Syntax
cppkg getroot
Example
cppkg print
Description
Prints the list of SmartUpdate software packages in the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS
(run the mdsenv command).
Syntax
cppkg print
cppkg setroot
Description
Configures the path to the root directory of the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS
(run the mdsenv command).
n The default path is: /var/log/cpupgrade/suroot
n When changing repository root directory:
l This command copies the software packages from the old repository to the
Syntax
Example
cpprod_util
Description
This utility works with Check Point Registry ($CPDIR/registry/HKLM_registry.data) without
manually opening it:
n Shows which Check Point products and features are enabled on this Check Point computer.
n Enables and disables Check Point products and features on this Check Point computer.
cpprod_util -dump
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter>"
"<Value>" Specifies the value of the configuration parameter for the specified product or feature:
n One of these integers: 0, 1, 4
n A string
Notes
n If you run the "cpprod_util" command without parameters, it prints:
l The list of all available products and features (for example, "FwIsFirewallMgmt",
"FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the "cpprod_util" command, it is necessary to redirect the stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade is
enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade is
enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
cprid
Description
Manages the Check Point Remote Installation Daemon (cprid).
This daemon is used for remote upgrade and installation of Check Point products on the managed Security
Gateways.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run these commands in the context of the
MDS (run mdsenv).
Commands
Syntax Description
run_cprid_restart Stops and then starts the Check Point Remote Installation Daemon (cprid).
cprinstall
Description
Performs installation of Check Point product packages and associated operations on remote managed
Security Gateways.
Important - Installing software packages with this command is not supported for
Security Gateways that run on Gaia OS.
Notes:
n This command requires a license for SmartUpdate.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On the remote Security Gateways these are required:
l SIC Trust must be established between the Security Management Server
Syntax
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>
Parameters
Parameter Description
Parameter Description
get n Gets details of the products and the operating system installed on the managed
<options> Security Gateway.
n Updates the management database on the Security Management Server.
See "cprinstall get" on page 543.
revert Restores the managed Security Gateway that runs on SecurePlatform OS from a
<options> snapshot saved on that Security Gateway.
See "cprinstall revert" on page 546.
show Displays all snapshot (backup) files on the managed Security Gateway that runs on
<options> SecurePlatform OS.
See "cprinstall show" on page 547.
snapshot Creates a snapshot on the managed Security Gateway that runs on SecurePlatform
<options> OS and saves it on that Security Gateway.
See "cprinstall snapshot" on page 548.
transfer Transfers a software package from the repository to the managed Security Gateway
<options> without installing the package.
See "cprinstall transfer" on page 549.
cprinstall boot
Description
Reboots the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall boot MyGW
cprinstall cprestart
Description
Runs the cprestart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT:0]# cprinstall cprestart MyGW
cprinstall cpstart
Description
Runs the cpstart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall cpstart MyGW
cprinstall cpstop
Description
Runs the cpstop command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
-proc Kills the Check Point daemons and Security Servers, while it maintains the active
Security Policy running in the Check Point kernel.
Rules with generic Allow, Drop or Reject action based on services, continue to work.
-nopolicy Kills the Check Point daemons and Security Servers and unloads the Security Policy
from the Check Point kernel.
Example
[Expert@MGMT]# cprinstall cpstop -proc MyGW
cprinstall delete
Description
Deletes a snapshot (backup) file on the managed Security Gateway that runs on SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
<Snapshot File> Specifies the name of the snapshot (backup) on SecurePlatform OS.
Example
[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017
cprinstall get
Description
n Gets details of the products and the operating system installed on the managed Security Gateway.
n Updates the management database on the Security Management Server.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example:
cprinstall install
Description
Installs Check Point products on the managed Security Gateway.
Important - Installing software packages with this command is not supported for
Security Gateways that run Gaia OS.
Notes:
n Before transferring the software package, this command runs the "cprinstall
verify" on page 552 command.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 530
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is canceled
in certain scenarios.
-backup Creates a snapshot on the managed Security Gateway before installing the
package.
Note - Only on Security Gateways that runs on SecurePlatform OS.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
cprinstall revert
Description
Restores the managed Security Gateway that runs on SecurePlatform OS from a snapshot saved on that
Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
cprinstall show
Description
Displays all snapshot (backup) files on the managed Security Gateway that runs on SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
cprinstall snapshot
Description
Creates a snapshot on the managed Security Gateway that runs on SecurePlatform OS and saves it on that
Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
cprinstall transfer
Description
Transfers a software package from the repository to the managed Security Gateway without installing the
package.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 530
command.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
"<Major Version>" Specifies the package major version. Enclose in double quotes.
"<Minor Version>" Specifies the package minor version. Enclose in double quotes.
cprinstall uninstall
Description
Uninstalls Check Point products on the managed Security Gateway.
Important - Uninstalling software packages with this command is not supported for
Security Gateways running on Gaia OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n Before uninstalling product packages, this command runs the "cprinstall verify"
on page 552 command.
n After uninstalling a product package, you must run the "cprinstall get" on
page 543 command.
n To see the values for the package attributes, run the "cppkg print" on page 530
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after uninstalling the package.
Note - Reboot is canceled in certain scenarios.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
"<Major Version>" Specifies the package major version. Enclose in double quotes.
"<Minor Version>" Specifies the package minor version. Enclose in double quotes.
Example
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get
cprinstall verify
Description
Confirms these operations were successful:
n If a specific product can be installed on the managed Security Gateway.
n That the operating system and currently installed products the managed Security Gateway are
appropriate for the software package.
n That there is enough disk space to install the product the managed Security Gateway.
n That there is a CPRID connection with the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 530
command.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
"<Major Version>" Specifies the package major version. Enclose in double quotes.
"<Minor Version>" Specifies the package minor version. Enclose in double quotes.
This parameter is optional.
cpstart
Description
Manually starts all Check Point processes and applications.
Notes:
n For the cprid daemon, use the "cprid" on page 535
command.
n For manually starting specific Check Point processes, see
sk97638.
Syntax
cpstart
cpstat
Description
Shows the status and statistics information for Check Point applications.
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o
<Polling Interval> [-c <Count>] [-e <Period>]] <Application Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
The output shows the SNMP queries and SNMP responses for the applicable
SNMP OIDs.
-h <Host> Optional.
When you run this command on a Management Server, this parameter specifies the
managed Security Gateway / ClusterXL object.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object name.
The default is localhost.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s <SICname> Optional.
Secure Internal Communication (SIC) name of the Application Monitoring (AMON)
server.
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor in the
<Application Flag>. To see all flavors, run the cpstat command without any
parameters.
Parameter Description
-o <Polling Optional.
Interval> Specifies the polling interval (in seconds) - how frequently the command collects
and shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this is the
default value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the "-e
<Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results before it stops.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling Interval>
and then stops.
n 20 - The command shows the results 20 times every <Polling Interval>
and then stops.
n N - The command shows the results N times every <Polling Interval>
and then stops.
Example:
cpstat os -f perf -o 2 -c 2
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the statistics.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
You can use this parameter together with the "-c <Count>" parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
<Application Mandatory.
Flag> See the table below with flavors for the application flags.
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway / ClusterXL, and some flags are supported only
by a Management Server.
Feature or
Flag Flavors
Software Blade
List of enabled blades fw, ips, av, urlf, vpn, cvpn, aspm, dlp,
Software Blades appi, anti_bot, default, content_
awareness, threat-emulation, default
Anti-Virus ci default
Feature or
Flag Flavors
Software Blade
QoS fg all
Feature or
Flag Flavors
Software Blade
Provisioning PA default
Agent
Examples
Example - CPU utilization
[Expert@HostName:0]# cpstat -f cpu os
CPU User Time (%): 1
CPU System Time (%): 0
CPU Idle Time (%): 99
CPU Usage (%): 1
CPU Queue Length: -
CPU Interrupts/Sec: 172
CPUs Number: 8
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cpstop
Description
Manually stops all Check Point processes and applications.
Notes:
n For the cprid daemon, use the "cprid" on page 535
command.
n For manually stopping specific Check Point processes, see
sk97638.
Syntax
cpstop
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk
space) and information for different Software Blades (only on a Security Gateway / ClusterXL / Scalable
Platform Security Group).
The CPView continuously updates the data in easy to access views.
On a Security Gateway / ClusterXL / Scalable Platform Security Group, you can use this statistical data to
monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the capture>
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes such as Check
Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products and Software
Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log file.
The cpwd_admin utility shows the status of the monitored processes, and configures the Check Point
WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates abnormally.
In the output of the cpwd_admin list command, the MON column shows N for
passively monitored processes.
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
del Temporarily deletes a monitored process from the WatchDog database of monitored
<options> processes.
See "cpwd_admin del" on page 569.
start_ Starts the active WatchDog monitoring - WatchDog monitors the predefined
monitor processes actively.
See "cpwd_admin start_monitor" on page 580.
stop_monitor Stops the active WatchDog monitoring - WatchDog monitors all processes only
passively.
See "cpwd_admin stop_monitor" on page 583.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the "cpstop" and "cpstart" commands (which restart all
Check Point processes).
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration
Accepted Values Description
Parameter
no_limit n Range: -1, If rerun_mode=1, specifies the maximal number of times the
0, >0 WatchDog tries to restart a process.
n Default: 5 n -1 - Always tries to restart
n 0 - Never tries to restart
n >0 - Tries this number of times
reset_ n Range: > 0 Configures the time (in seconds) the WatchDog waits after the
startups n Default: process starts and before the WatchDog resets the process's
3600 startup_counter to 0.
To see the process's startup counter, in the output of the cpwd_
admin list command, refer to the #START column.
stop_timeout n Range: > 0 Configures the time (in seconds) the WatchDog waits for a
n Default: 60 process stop command to complete.
zero_timeout n Range: > 0 After failing no_limit times to restart a process, the
n Default: WatchDog waits zero_timeout seconds before it tries again.
7200 The value of the zero_timeout must be greater than the
value of the timeout.
The WatchDog saves the user defined configuration parameters in the $CPDIR/registry/HKLM_
registry.data file in the ": (Wd_Config" section:
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 575 command does not show the deleted process
anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 554 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of the "cpwd_
Name> admin list" on page 575 command in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 575 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 554 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of the "cpwd_
Name> admin list" on page 575 command in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
cpwd_admin exist
Example
cpwd_admin flist
Description
Saves the status of all WatchDog monitored processes to a file.
Parameters
Parameter Description
Output
Column Description
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 566).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 564):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of the "cpwd_
Name> admin list" on page 575 command in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 561 and "cpstart" on page 554 commands.
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
Output
Column Description
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 566).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 564):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
Example - Default output on a Management Server
[Expert@HostName:0]# cpwd_admin list
APP PID STAT #START START_TIME MON COMMAND
CPVIEWD 19738 E 1 [17:50:44] 31/5/2019 N cpviewd
HISTORYD 0 T 0 [17:54:44] 31/5/2019 N cpview_historyd
CPD 19730 E 1 [17:54:45] 31/5/2019 Y cpd
SOLR 19935 E 1 [17:50:55] 31/5/2019 N java_solr /opt/CPrt-R81.20/conf/jetty.xml
RFL 19951 E 1 [17:50:55] 31/5/2019 N LogCore
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2019 N SmartView
INDEXER 20032 E 1 [17:50:55] 31/5/2019 N /opt/CPrt-R81.20/log_indexer/log_indexer
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2019 N /opt/CPSmartLog-R81.20/smartlog_server
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2019 N cp3dlogd
EPM 20251 E 1 [17:50:56] 31/5/2019 N startEngine
DASERVICE 20404 E 1 [17:50:59] 31/5/2019 N DAService_script
[Expert@HostName:0]#
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 564.
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name <Application Name, under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-path "<Full Path The full path (with or without Check Point environment variables) to the
to Executable>" executable including the executable name.
Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R81.20/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd"
n For CPM: "/opt/CPsuite-R81.20/fw1/scripts/cpm.sh"
n For SICTUNNEL: "/opt/CPshrd-R81.20/bin/cptnl"
Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the specified
environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes actively.
See the explanation for the "cpwd_admin" on page 564 command.
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-path "<Full Path to The full path (with or without Check Point environment variables) to the
Executable>" executable including the executable name.
Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R81.20/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
-env {inherit | <Env_ Configures whether to inherit the environment variables from the shell.
Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 564 command.
cpwd_admin stop_monitor
Example
dbedit
Description
Edits the management database - the $FWDIR/conf/objects_5_0.C file - on the Security Management
Server or Domain Management Server. See skI3301.
Important - Do NOT run this command, unless explicitly instructed by Check Point
Support or R&D to do so. Otherwise, you can corrupt settings in the management
database.
Syntax
dbedit -help
Parameters
Parameter Description
-globallock When you work with the dbedit utility, it partially locks the management database. If
a user configures objects in SmartConsole at the same time, it causes problems in
the management database.
This option does not let SmartConsole, or a dbedit user to make changes in the
management database.
When you specify this option, the dbedit commands run on a copy of the
management database. After you make the changes with the dbedit commands
and run the savedb command, the dbedit utility saves and commits your changes
to the actual management database.
Parameter Description
-u <Username> Specifies the username, with which the dbedit utility connects to the Security
Management Server.
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.
-c Specifies the user's certificate file, with which the dbedit utility connects to the
<Certificate> Security Management Server.
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.
-p <Password> Specifies the user's password, with which the dbedit utility connects to the Security
Management Server.
Mandatory parameter when you specify the "-s <Management_Server>" and "-
u <Username>" parameters.
-f <File_ Specifies the file that contains the applicable dbedit internal commands (see the
Name> section "dbedit Internal Commands" below):
n create <object_type> <object_name>
n modify <table_name> <object_name> <field_name> <value>
n update <table_name> <object_name>
n delete <table_name> <object_name>
n print <table_name> <object_name>
n quit
ignore_ Continues to execute the dbedit internal commands in the file and ignores errors.
script_ You can use it when you specify the "-f <File_Name>" parameter.
failure
-continue_ Continues to update the modified objects, even if the operation fails for some of the
updating objects (ignores the errors and runs the update_all command at the end of the
script).
You can use it when you specify the "-f <File_Name>" parameter.
-r "<Open_ Specifies the reason for opening the database in read-write mode (default mode).
Reason_Text>"
-d <Database_ Specifies the name of the database, to which the dbedit utility should connect (for
Name> example, mdsdb).
-listen The dbedit utility "listens" for changes (use this mode for advanced troubleshooting
with the assistance of Check Point Support).
The dbedit utility prints its internal messages when a change occurs in the
management database.
Note - To see the available tables, class names (object types), attributes and values,
connect to Management Server with Database Tool (GuiDBEdit Tool) (see sk13009).
-h Description:
Prints the general help.
Syntax:
dbedit> -h
-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q
update Description:
Saves the specified object in the specified table (for example, "network_
objects", "services", "users").
Syntax:
dbedit> update <table_name> <object_name>
Example:
Save the object My_Service in the table services:
dbedit> update services My_Service
update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all
_print_set Description:
Prints the specified object from the specified table (for example, "network_
objects", "services", "users") as it appears in the $FWDIR/conf/objects_
5_0.C file (sets of attributes).
Syntax:
dbedit> _print_set <table_name> <object_name>
Example:
Print the object My_Obj from the table network_objects:
dbedit> print network_objects My_Obj
print Description:
Prints the list of attributes of the specified object from the specified table (for
example, "network_objects", "properties", "services", "users").
Syntax:
dbedit> print <table_name> <object_name>
Examples:
n Print the object My_Obj from the table network_objects (in "Network
Objects"):
dbedit> print network_objects my_obj
n Print the object firewall_properties from the table properties (in "Global
Properties"):
dbedit> print properties firewall_properties
printxml Description:
Prints in XML format the list of attributes of the specified object from the specified
table (for example, "network_objects", "properties", "services", "users").
You can export the settings from a Management Server to an XML file that you can
use later with external automation systems.
Syntax:
dbedit> printxml <table_name> [<object_name>]
Examples:
n Print the object My_Obj from the table network_objects:
dbedit> printxml network_objects my_obj
n Print the object firewall_properties from the table properties (in "Global
Properties"):
dbedit> printxml properties firewall_properties
printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as "chkpf_uid
({...})").
Syntax:
dbedit> printbyuid {object_id}
Example:
Print the attributes of the object with the specified UID:
dbedit> printbyuid {D3833F1D-0A58-AA42-865F-39BFE3C126F1}
query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value - query is
separated by a comma after "query <table_name>" (spaces are not allowed
between the <attribute> and '<value>').
Syntax:
dbedit> query <table_name> [ , <attribute>='<value>' ]
Examples:
n Print all objects in the table users:
dbedit> query users
n Print all objects in the table network_objects that are defined as Management
Servers:
dbedit> query network_objects, management='true'
n Print all objects in the table services with the name ssh:
command_sdbedit> query services, name='ssh'
n Print all objects in the table services with the port 22:
dbedit> query services, port='22'
n Print all objects with the IP address 10.10.10.10:
dbedit> query network_objects, ipaddr='10.10.10.10'
whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant information
about each such place.
Syntax:
dbedit> whereused <table_name> <object_name>
Example:
Check where the object My_Obj is used:
dbedit> whereused network_objects My_Obj
create Description:
Creates an object of specified type (with its default values) in the database.
Restrictions apply to the object's name:
n Object names can have a maximum of 100 characters.
n Objects names can contain only ASCII letters, numbers, and dashes.
n Reserved words will be blocked by the Management Server (refer to
sk40179).
Syntax:
dbedit> create <object_type> <object_name>
Example:
Create the service object My_Service of the type tcp_service (with its default
values):
dbedit> create tcp_service my_service
delete Description:
Deletes an object from the specified table.
Syntax:
dbedit> delete <table_name> <object_name>
Example:
Delete the service object My_Service from the table services:
dbedit> delete services my_service
modify Description:
Modifies the value of specified attribute in the specified object in the specified table
(for example, "network_objects", "services", "users") in the management
database.
Syntax:
dbedit> modify <table_name> <object_name> <field_name>
<value>
Examples:
n Modify the color to red in the object My_Service in the table services:
dbedit> modify services My_Service color red
n Add a comment to the object MyObj:
dbedit> modify network_objects MyObj comments
"Created by fwadmin with dbedit"
n Set the value of the global property ike_use_largest_possible_subnets in the
table properties to false:
dbedit> modify properties firewall_properties ike_
use_largest_possible_subnets false
n Create a new interface on the Security Gateway My_FW and modify its
attributes - set the IP address / Mask and enable Anti-Spoofing on interface
with "Element Index"=3 (check the attributes of the object My_FW in
Database Tool (GuiDBEdit Tool) (see sk13009)):
dbedit> addelement network_objects My_FW interfaces
interface
dbedit> modify network_objects My_FW
interfaces:3:officialname NAME_OF_INTERFACE
dbedit> modify network_objects My_FW
interfaces:3:ipaddr IP_ADDRESS
dbedit> modify network_objects My_FW
interfaces:3:netmask NETWORK_MASK
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:access specific
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:allowed network_
objects:group_name
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:perform_anti_spoofing
true
dbedit> modify network_objects MyObj FieldA LINKSYS
n In the Owned Object MyObj change the value of FieldB to NewVal:
dbedit> modify network_objects MyObj FieldA:FieldB
NewVal
n In the Linked Object MyObj change the value of FieldA from B to C:
dbedit> modify network_objects MyObj FieldA B:C
lock Description:
Locks the specified object (by administrator) in the specified table (for example,
"network_objects", "services", "users") from being modified by other users.
For example, if you connect from a remote computer to this Management Server
with admin1 and lock an object, you are be able to connect with admin2, but are not
able to modify the locked object, until admin1 releases the lock.
Syntax:
dbedit> lock <table_name> <object_name>
Example:
Lock the object My_Service_Obj in the table services in the database:
dbedit> lock services My_Service_Obj
addelement Description:
Adds a specified multiple field / container (with specified value) to a specified object
in specified table.
Syntax:
dbedit> addelement <table_name> <object_name> <field_name>
<value>
Examples:
n Add the element BranchObjectClass with the value Organization to a multiple
field Read in the object My_Obj in the table ldap:
dbedit> addelement ldap My_Obj Read:BranchObjectClass
Organization
n Add the service MyService to the group of services MyServicesGroup in the
table services:
dbedit> addelement services MyServicesGroup ''
services:MyService
n Add the network MyNetwork to the group of networks MyNetworksGroup in
the table network_objects:
dbedit> addelement network_objects MyNetworksGroup ''
network_objects:MyNetwork
rmelement Description:
Removes a specified multiple field / container (with specified value) from a specified
object in specified table.
Syntax:
dbedit> rmelement <table_name> <object_name> <field_name>
<value>
Examples:
n Remove the service MyService from the group of services MyServicesGroup
from the table services:
dbedit> rmelement services MyServicesGroup ''
services:MyService
n Remove the network MyNetwork from the group of networks
MyNetworksGroup from the table network_objects:
dbedit> rmelement network_objects MyNetworksGroup ''
network_objects:MyNetwork
n Remove the element BranchObjectClass with the value Organization from
the multiple field Read in the object My_Obj in the table ldap:
dbedit> rmelement ldap my_obj Read:BranchObjectClass
Organization
rename Description:
Renames the specified object in specified table.
Syntax:
dbedit> rename <table_name> <object_name> <new_object_
name>
Example:
Rename the network object london to chicago in the table network_objects:
dbedit> rename network_objects london chicago
rmbyindex Description:
Removes an element from a container by element's index.
Syntax:
dbedit> rmbyindex <table_name> <object_name> <field_name>
<index_number>
Example:
Remove the element backup_log_servers from the container log_servers by
element index 1 in the table network_objects:
dbedit> rmbyindex network_objects g log_servers:backup_
log_servers 1
add_owned_ Description:
remove_name Adds an owned object (and removes its name) to a specified owned object field (or
container).
Syntax:
dbedit> add_owned_remove_name <table_name> <object_name>
<field_name> <value>
Example:
Add the owned object My_Gateway (and remove its name) to the owned object field
(or container) my_external_products:
dbedit> add_owned_remove_name network_objects My_Gateway
additional_products owned:my_external_products
is_delete_ Description:
allowed Checks if the specified object can be deleted from the specified table (object cannot
be deleted if it is used by other objects).
Syntax:
dbedit> is_delete_allowed <table_name> <object_name>
Example:
dbedit> is_delete_allowed network_objects MyObj
Check if the object MyObj can be deleted from the table network_objects:
set_pass Description:
Sets specified password for specified user.
Notes:
n The password must contain at least 4 characters and no more than 50
characters.
n This command cannot change the administrator's password.
Syntax:
dbedit> set_pass <Username> <Password>
Example:
Set the password 1234 for the user abcd:
dbedit> set_pass abcd 1234
savedb Description:
Saves the database. You can run this command only when the database is locked
globally (when you start the dbedit utility with the "dbedit -globallock"
command).
Syntax:
dbedit> savedb
savesession Description:
Saves the session. You can run this command only when you start the dbedit utility
in session mode (with the "dbedit -session" command).
Syntax:
dbedit> savesession
fw
Description
n Performs various operations on Security or Audit log files.
n Kills the specified Check Point processes.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
Syntax
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
fetchlogs Fetches the specified Check Point log files - Security ($FWDIR/log/*.log*) or
<options> Audit ($FWDIR/log/*.adtlog*), from the specified Check Point computer.
See "fw fetchlogs" on page 597.
hastat Shows information about Check Point computers in High Availability configuration
<options> and their states.
See "fw hastat" on page 599.
log Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog).
See "fw log" on page 601.
Parameter Description
logswitch Switches the current active Check Point log file - Security ($FWDIR/log/fw.log) or
<options> Audit ($FWDIR/log/fw.adtlog).
See "fw logswitch" on page 609.
lslogs Shows a list of Check Point log files - Security ($FWDIR/log/*.log*) or Audit
<options> ($FWDIR/log/*.adtlog*), located on the local computer or a remote computer.
See "fw lslogs" on page 612.
mergefiles Merges several Check Point log files - Security ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog), into a single log file.
See "fw mergefiles" on page 615.
repairlog Rebuilds pointer files for Check Point log files - Security ($FWDIR/log/*.log) or
<options> Audit ($FWDIR/log/*.adtlog).
See "fw repairlog" on page 618.
sam_policy Manages the Suspicious Activity Policy editor that works with these type of rules:
<options>
n Suspicious Activity Monitoring (SAM) rules.
or
samp
n Rate Limiting rules.
<options> See "fw sam_policy" on page 625.
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]... [-
f <Name of Log File N>] <Target>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log Notes:
File N>
n If you do not specify the log file name explicitly, the command transfers all
Security log files ($FWDIR/log/*.log*) and all Audit log files
($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for example, 2017-
0?-*.log).
If you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check Point computer
has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main IP
address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the specified Check
Point computer. Meaning, it deletes the specified log files on the specified Check Point computer after
it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local Check Point
computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or $FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer. The new log
file name is the concatenation of the Check Point computer's name (as configured in SmartConsole),
two underscore (_) characters, and the original log file name (for example: MyGW__2019-06-01_
000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R81.20/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R81.20/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R81.20/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R81.20/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their states.
Syntax
Parameters
Parameter Description
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
Example
fw kill fwd
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
fw [-d] log [-a] [-b "<Start Timestamp>" "<End Timestamp>"] [-c <Action>]
[{-f | -t}] [-g] [-H] [-h <Origin>] [-i] [-k {<Alert Name> | all}] [-l] [-m
{initial | semi | raw}] [-n] [-o] [-p] [-q] [-S] [-s "<Start Timestamp>"]
[-e "<End Timestamp>"] [-u <Unification Scheme File>] [-w] [-x <Start Entry
Number>] [-y <End Entry Number>] [-z] [-#] [<Log File>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-b "<Start Shows only entries that were logged between the specified start and end times.
Timestamp>"
"<End
n The <Start Timestamp> and <End Timestamp> may be a date, a
Timestamp>" time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End Timestamp> in single
or double quotes (-b 'XX' 'YY", or -b "XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-e"
parameters.
n See the date and time format below.
Parameter Description
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>" Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e '...',
or -e "...").
n You cannot use the "-e" parameter together with the "-b" parameter.
n See the date and time format below.
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-h <Origin> Shows only logs that were generated by the Security Gateway with the specified
IP address or object name (as configured in SmartConsole).
Parameter Description
l mail
l snmp_trap
l spoof
l user_alert
l user_auth
n all - Show entries that match all alert types (this is the default).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries, and then
specify the time for each log entry.
-n Does not perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-o Shows detailed log chains - shows all the log segments in the log entry.
-p Does not perform resolution of the port numbers in the log file (this is the default
behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>" Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current date.
n Enclose the <Start Timestamp> in single or double quotes (-s
'...', or -s "...").
n You cannot use the "-s" parameter together with the "-b" parameter.
n See the date and time format below.
Parameter Description
-t This parameter:
1. Does not show the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-u <Unification Specifies the path and name of the log unification scheme file.
Scheme File> The default log unification scheme file is:
$FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the "nature" of
the log - for example, control, audit, accounting, complementary, and so on).
-x <Start Entry Shows only entries from the specified log entry number and below, counting
Number> from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from the
Number> beginning of the log file.
-z In case of an error (for example, wrong field value), continues to show log
entries.
The default behavior is to stop.
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x;
fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_name: Host Redirect; fg-1_server_out_rule_name: ;
ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone:
Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_
table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc:
ftp; sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone:
Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_
table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc:
ftp; sport_svc: 64933; ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x;
description: Contracts; reason: Could not reach "https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on
the gateway.; Severity: 2; status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292; Action: drop; Origin:
MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone:
Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_
table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc:
ftp; sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
Parameter Description
+ Specifies to copy the active log from the remote computer to the local computer.
Notes:
n If you specify the name of the switched log file, you must write it immediately
after this + (plus) parameter.
n The command copies the active log from the remote computer and saves it in
the $FWDIR/log/ directory on the local computer.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the saved log
file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command copies the log file from the remote computer, it compresses
the file.
- Specifies to transfer the active log from the remote computer to the local computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/ directory on
the local computer and then deletes the switched log file on the remote
computer.
n If you specify the name of the switched log file, you must write it immediately
after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the saved log
file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 597 command.
Compression
When this command transfers the log files from the remote computer, it compresses the file with the gzip
command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77 method. The
compression ratio varies with the content of the log file and is difficult to predict. Binary data are not
compressed. Text data, such as user names and URLs, are compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying the
switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R81.20/fw1/log/fw.log
/opt/CPsuite-R81.20/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R81.20/fw1/log/fw.log
/opt/CPsuite-R81.20/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog)
residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ... [-f
<Name of Log File N>] [-e] [-r] [-s {name | size | stime | etime}]
[<Target>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-f <Name of Specifies the name of the log file to show. Need to specify name only.
Log File> Notes:
n If the log file name is not specified explicitly, the command shows all Security
log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-0?-*). If you
enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command. You must use the "-f"
parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2> ... -f
<Name of Log File N>
-e Shows an extended file list. It includes the following information for each log file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
-s {name | Specifies the sort order of the log files using one of the following sort options:
size |
stime |
n name - The file name
etime} n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
Parameter Description
<Target> Specifies the remote Check Point computer, with which this local Check Point
computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main
IP address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse order
Example 6 - Showing only log files specified by the patterns, from a managed Security Gateway with
main IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw logswitch" on
page 609 command) and only then merge it with other Security switched log files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw logswitch" on
page 609 command) and only then merge it with other Audit switched log files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list of
merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Warning: The size of the files you have chosen to merge
is greater than 2GB. The merge will produce two or more
files.
The names of merged files are:
l <Name of Merged Log File>.log
l <Name of Merged Log File>_1.log
l <Name of Merged Log File>_2.log
l ... ...
Syntax
fw [-d] mergefiles [-r] [-s] [-t <Time Conversion File>] <Name of Log File
1> <Name of Log File 2> ... <Name of Log File N> <Name of Merged Log File>
Parameters
Parameter Description
Parameter Description
-t <Time Conversion File> Specifies a full path and name of a file that instructs this
command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
<IP Address of Log Server #1> <Signed Date
Time #1 in Seconds>
<IP Address of Log Server #2> <Signed Date
Time #2 in Seconds>
... ...
Notes
n You must specify the absolute path and the file
name.
n The name of the time conversion file cannot
exceed 230 characters.
<Name of Log File 1> ... Specifies the log files to merge.
<Name of Log File N> Notes:
n You must specify the absolute path and the
name of the input log files.
n The name of the input log file cannot exceed
230 characters.
<Name of Merged Log File> Specifies the output merged log file.
Notes:
n The name of the merged log file cannot exceed
230 characters.
n If a file with the specified name already exists,
the command stops and asks you to remove the
existing file, or to specify another name.
n The size of the merged log file cannot exceed 2
GB. In such scenario, the command creates
several merged log files, each not exceeding the
size limit.
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log $FWDIR/2019-
09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog) are
databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this command can
rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block connections
to and from IP addresses without the need to change or reinstall the Security Policy. For more information,
see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" on page 625 and "sam_alert" on page 708 commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - The SAM Policy rules consume some CPU resources
on Security Gateway. Set an expiration for rules that gives you time to
investigate, but does not affect performance. Keep only the required
SAM Policy rules. If you confirm that an activity is risky, edit the
Security Policy, educate users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches 100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security Gateway
in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f
<Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e <key=val>]+
[-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f
<Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f
<Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>] [-f
<Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of the
Server> Security Gateway that enforces the command.
The default is localhost.
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected that the
Name of SAM SAM server has this SIC name, otherwise the connection fails.
Server> Notes:
n If you do not explicitly specify the SIC name, the connection continues
without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC API
Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command to
show the SIC name for the applicable Virtual System.
Parameter Description
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam command
with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
-C Cancels the fw sam command to inhibit connections with the specified parameters.
Notes:
n These connections are no longer inhibited (no longer rejected or
dropped).
n The command parameters must match the parameters in the original
fw sam command, except for the -t <Timeout> parameter.
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout> The default is forever, or until you cancel the fw sam command.
Parameter Description
-e Specifies rule information based on the keys and the provided values.
<key=val>+ Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
-I Inhibits (drops or rejects) new connections with the specified parameters, and closes
all existing connections with the specified parameters.
Notes:
n Matching connections are rejected.
n Each inhibited connection is logged according to the log type.
-J Inhibits new connections with the specified parameters, and closes all existing
connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> <Port> Matches the specific Source IP address, Destination IP
<Protocol> address, Service (port number) and Protocol.
subsrv <Src IP> <Netmask> <Dest Matches the specific Source IP address, Destination IP
IP> <Netmask> <Port> <Protocol> address, Service (port number) and Protocol.
Source and Destination IP addresses are assigned
according to the netmask.
subsrvs <Src IP> <Src Netmask> Matches the specific Source IP address, source netmask,
<Dest IP> <Port> <Protocol> destination netmask, Service (port number) and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination IP,
<Dest Netmask> <Port> destination netmask, Service (port number) and Protocol.
<Protocol>
dstsrv <Dest IP> <Service> Matches specific Destination IP address, Service (port
<Protocol> number) and Protocol.
subdstsrv <Dest IP> <Netmask> Matches specific Destination IP address, Service (port
<Port> <Protocol> number) and Protocol.
Destination IP address is assigned according to the
netmask.
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that works with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 619
n "sam_alert" on page 708
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 641.
fw sam_policy add
Description
The "fw sam_policy add" and "fw6 sam_policy add" commands:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">]
[-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">]
[-z "<Zone>"] ip <IP Filter Arguments>
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">]
[-z "<Zone>"] quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">]
[-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b} Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against the policy
rules.
Note - Rules with action set to Bypass cannot have a log or limit specification.
Bypassed packets and connections do not count towards overall number of
packets and connection for limit enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that matches:
n -r - Generate a regular log
n -a - Generate an alert log
-t <Timeout> Optional.
Specifies the time period (in seconds), during which the rule will be enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be enforced on
all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the rule should
be enforced only on this Security Gateway or Cluster object (the object name
must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be enforced on all
Security Gateways that are members of this Group object (the object name
must be as defined in the SmartConsole).
Parameter Description
-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\ \\"
-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"
-o "<Rule Optional.
Originator>" Specifies the name of the originator for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
"Created\ by\ John\ Doe"
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from the
SAM policy database immediately, add "flush true" in the fw
samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general), when
a rule's limit is violated, the Security Gateway also drops all packets
that match the rule.
The Security Gateway computes new connection rates on a per-
second basis.
At the start of the 1-second timer, the Security Gateway allows all
packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too many
new connections, then the Security Gateway blocks all remaining
packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are reset, and
the process starts over - the Security Gateway allows packets to
pass again up to the point, where the rule’s limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM) rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format - x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format - x.y.z.w).
Mask>
-p <Port> Specifies the port number (see IANA Service Name and Port Number
Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
[source-negated {true | false}] Specifies the source type and its value:
source <Source>
n any
The rule is applied to packets sent from all sources.
n range:<IP Address>
or
range:<IP Address Start>-<IP Address
End>
The rule is applied to packets sent from:
l Specified IPv4 addresses (x.y.z.w)
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the source IP
addresses assigned to this country, based on the
Geo IP database.
The two-letter codes are defined in ISO 3166-1
alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that are
assigned to this organization, based on the Geo IP
database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this country,
based on the Geo IP database.
The two-letter codes are defined in ISO 3166-1
alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses that
are assigned to this organization, based on the Geo
IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: destination-negated false
n The destination-negated true will process
all destination types except the specified type
Argument Description
Argument Description
Examples
Example 1 - Rate Limiting rule with a range
fw sam_policy add -a d -l r -t 3600 quota service any source range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this rule, including
packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second (new-conn-
rate 5) for any traffic (service any) from the source IP addresses in the range 172.16.7.11 -
172.16.7.13 (source range:172.16.7.11-172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the fwaccel dos
config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the Suspicious
Activity Monitoring (SAM) policy database immediately, because this rule includes the "flush
true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete it
explicitly.
n This rule applies to all packets except (service-negated true) the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the country with
specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete it
explicitly.
n This rule applies to packets from the Autonomous System number 64500 (asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120 (cidr:
[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete it
explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 - 172.16.9.121
(range:172.16.8.17-172.16.9.121).
n This rule applies to packets sent to TCP port 80 (service 6/80).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete it
explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP addresses that
are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to 655/65536=~1%
(concurrent-conns-ratio 655) for any traffic (service any) except (service-negated
true) the connections from the source IP addresses that are assigned to the country with
specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that match this rule,
and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
fw sam_policy batch
Description
The "fw sam_policy batch" and "fw6 sam_policy batch" commands:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
1. Start the batch mode
n Enter one "add" or "del" command on each line, on as many lines as necessary.
Start each line with only "add" or "del" parameter (not with "fw samp").
n Use the same set of parameters and values as described in these commands:
l "fw sam_policy add" on page 627
l "fw sam_policy del" on page 641
n Terminate each line with a Return (ASCII 10 - Line Feed) character (press Enter).
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source
range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The "fw sam_policy del" and "fw6 sam_policy del" commands:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle
brackets ('<...>') are
mandatory.
n To see the Rule UID, run the
"fw sam_policy get" on
page 644 command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
Explanation:
The "fw samp del" and "fw6 samp del" commands only remove a rule from the persistent
database. The Security Gateway continues to enforce the deleted rule until the next time you
compiled and load a policy. To force the rule deletion immediately, you must enter a flush-only rule
right after the "fw samp del" and "fw6 samp del" command. This flush-only rule immediately
deletes the rule you specified in the previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The "fw sam_policy get" and "fw6 sam_policy get" commands:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+{-v
'<Value>'}] [-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+{-v
'<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.
Examples
Example 1 - Output in the default format
[Expert@HostName:0]# fw samp get
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fwm
Description
Performs various management operations and shows various management information.
Notes:
n For debug instructions, see the description of the fwm process in sk97638.
n On a Multi-Domain Server, you must run these commands in the context of the
applicable Domain Management Server.
Syntax
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
dbload Downloads the user database and network objects information to the specified
<options> targets
See "fwm dbload" on page 650.
Parameter Description
fetchfile Fetches a specified OPSEC configuration file from the specified source
<options> computer.
See "fwm fetchfile" on page 652.
getpcap Fetches the IPS packet capture data from the specified Security Gateway.
<options> See "fwm getpcap" on page 655.
mds <options> Shows information and performs various operations on Multi-Domain Server.
See "fwm mds" on page 663.
unload Unloads the policy from the specified managed Security Gateways.
<options> See "fwm unload" on page 671.
ver <options> Shows the Check Point version of the Management Server.
See "fwm ver" on page 674.
fwm dbload
Description
Downloads the user database and network objects information to the specified Security Gateways.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
fwm exportcert
Description
Export a SIC certificate of the specified managed object to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file <Output
File> [-withroot] [-pem]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
<Name of Specifies the name of the managed object, whose certificate you wish to export.
Object>
<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish to export.
fwm fetchfile
Description
Fetches a specified OPSEC configuration file from the specified source computer.
This command supports only the fwopsec.conf or fwopsec.v4x files.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Local Path> Specifies the local directory to save the fetched file.
<Source> Specifies the managed remote source computer, from which to fetch the file.
Note - The local and the remote source computers must have
established SIC trust.
Example
fwm fingerprint
Description
Shows the Check Point fingerprint.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
fwm getpcap
Description
Fetches the IPS packet capture data from the specified Security Gateway.
This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory.
This command does not work with other Software Blades, such as Anti-Bot and Anti-Virus that store packet
captures in the $FWDIR/log/blob/ directory on the Security Gateway.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
-g <Security Specifies the main IP address or Name of Security Gateway object as configured in
Gateway> SmartConsole.
-p <Local Specifies the local path to save the specified packet capture file.
Path> If you do not specify the local directory explicitly, the command saves the packet
capture file in the current working directory.
Example
fwm ikecrypt
Description
Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must then be stored in
the LDAP database.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
<Key> Specifies the IKE Key as defined in the LDAP Account Unit properties window on the
Encryption tab.
<Password> Specifies the password for the Endpoint VPN Client user.
Example
fwm load
Description
Loads a policy on a managed Security Gateway.
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 694 command to load a policy on a managed Security Gateway.
fwm logexport
Description
Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog) to an ASCII
file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>] [-i
<Input File>] [-o <Output File>] [{-f | -e}] [-x <Start Entry Number>] [-y
<End Entry Number>] [-z] [-n] [-p] [-a] [-u <Unification Scheme File>] [-m
{initial | semi | raw}]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
Parameter Description
-f After reaching the end of the currently opened log file, specifies to continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-e After reaching the end of the currently opened log file, continue to monitor the log
file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-x <Start Starts exporting the log entries from the specified log entry number and below,
Entry Number> counting from the beginning of the log file.
-y <End Entry Starts exporting the log entries until the specified log entry number, counting from
Number> the beginning of the log file.
-z In case of an error (for example, wrong field value), specifies to continue the export
of log entries.
The default behavior is to stop.
-n Specifies not to perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-p Specifies to not to perform resolution of the port numbers in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
Parameter Description
Step Instructions
3 To include or exclude the log fields from the output, add these lines in the configuration file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_FIELDS>,field100
excluded_fields = field10,field11
Where:
n You can specify only the included_fields parameter, only the excluded_fields
parameter, or both.
n The num field must always appear first. You cannot manipulate this field.
n The <REST_OF_FIELDS> is an optional reserved token that refers to a list of fields.
l If you specify the "-f" parameter, then the <REST_OF_FIELDS> is based on a
fwm mds
Description
n Shows the Check Point version of the Multi-Domain Server.
n Rebuilds status tree for Global VPN Communities.
Note - On a Multi-Domain Server, you can run this command:
n In the context of the MDS:
mdsenv
n In the context of a Domain Management Server:
mdsenv <IP Address or Name of Domain
Management Server>
Syntax
Parameters
Parameter Description
Example
fwm printcert
Description
Shows a SIC certificate's details.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Item Description
-obj <Name of Object> Specifies the name of the managed object, for which to show the
SIC certificate information.
Examples
Example 1 - Showing the SIC certificate of a Management Server
[Expert@MGMT:0]# fwm printcert -ca internal_ca
Subject: O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Apr 8 13:41:00 2018 Local Time
Not Valid After: Fri Jan 1 05:14:07 2038 Local Time
Serial No.: 1
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint:
is CA
MD5 Fingerprint:
7B:F9:7B:4C:BD:40:B9:1C:AB:2C:AE:CF:66:2E:E7:06
SHA-1 Fingerprints:
1. A6:43:3A:2B:1A:04:7F:A6:36:A6:2C:78:BF:22:D9:BC:F7:7E:4D:73
2. KEYS HEM GERM PIT ABUT ROVE RAW PA IQ FAWN NUT SLAM
[Expert@MGMT:0]#
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
Example 4 - Showing the SIC certificate of a managed Cluster object in verbose mode
[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed. Returning -2
defaultCert:
fwm sic_reset
Description
Resets SIC on the Management Server.
For detailed procedure, see sk65764: How to reset SIC.
Warning:
n Before you run this command, take a Gaia Snapshot and a full backup of the
Management Server.
This command resets SIC between the Management Server and all its
managed objects.
n This operation breaks trust in all Internal CA certificates and SIC trust across
the managed environment.
Therefore, we do not recommend it at all, except for real disaster recovery.
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
fwm snmp_trap
Description
Sends an SNMPv1 Trap to the specified host.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On a Multi-Domain Server, the SNMP Trap packet is sent from the IP address of
the Leading Interface.
Syntax
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s <Specific
Trap Number>] [-p <Source Port>] [-c <SNMP Community>] <Target>
["<Message>"]
Parameters
Parameter Description
-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.
-p <Source Port> Specifies the source port, from which to send the SNMP Trap packets.
<Target> Specifies the managed target host, to which to send the SNMP Trap
packets.
Enter an IP address of a resolvable hostname.
Example - Sending an SNMP Trap from a Management Server and capturing the traffic on the Security
Gateway
fwm unload
Description
Unloads the policy from the specified managed Security Gateways or Cluster Members.
Warning:
1. The fwm unload command prevents all traffic from passing through the Security
Gateway (Cluster Member), because it disables the IP Forwarding in the Linux
kernel on the specified Security Gateway (Cluster Member).
2. The fwm unload command removes all policies from the specified Security
Gateway (Cluster Member).
This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection
enabled.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n If it is necessary to remove the current policy, but keep the Security Gateway
(Cluster Member) protected, then run the "comp_init_policy" command on
the Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of these
commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch"
l "cpstart"
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
<GW1> <GW2> Specifies the managed Security Gateways by their main IP address or Object
... <GWN> Name as configured in SmartConsole.
Example
[Expert@MGMT:0]#
fwm ver
Description
Shows the Check Point version of the Security Management Server.
Note - On a Multi-Domain Server, you can run this command:
n In the context of the MDS:
mdsenv
n In the context of a Domain Management Server:
mdsenv <IP Address or Name of Domain
Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
-f <Output Specifies the name of the output file, in which to save this information.
File>
Example
fwm verify
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 694 command to verify a policy on a managed Security Gateway.
Description
Verifies the specified policy package without installing it.
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
<Policy Name> Specifies the name of the policy package as configured in SmartConsole.
Example
inet_alert
Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under attack. This
command forwards log messages generated by the alert daemon on your Check Point Security Gateway to
an external Management Station. This external Management Station is usually located at the ISP site. The
ISP can then analyze the alert and react accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The Management Station
receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must be
performed between the external Management Station running the ELA Proxy at the ISP site and the Check
Point Security Gateway generating the alert.
Procedure
Step Instructions
3 Click on the [+] near the Log and Alert and click Alerts.
5 Select the next option Run UserDefined script under the above.
6 Enter the applicable inet_alert syntax (see the Syntax section below).
7 Click OK.
Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f <Token>
<Value>] [-m <Alert Type>]
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Parameters
Parameter Description
-s <IP The IPv4 address of the ELA Proxy (usually located at the ISP site).
Address>
-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.
-f <Token> A field to be added to the log, represented by a <Token> <Value> pair as follows:
<Value>
n <Token> - The name of the field to be added to the log. Cannot contain
spaces.
n <Value> - The field's value. Cannot contain spaces.
This option can be used multiple times to add multiple <Token> <Value> pairs to
the log.
Exist Status
Example
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert
ldapcmd
Description
This is an LDAP utility that controls these features:
Feature Description
Cache LDAP cache operations, such as emptying the cache, as well as providing debug
information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-p {<Process Runs on a specified Check Point process, or all supported Check Point
Name> | all} processes.
statistics
l 0 - Stops collecting the statistics
ldapcompare
Description
This is an LDAP utility that performs compare queries and prints a message whether the result returned a
match or not.
This utility opens a connection to an LDAP directory server, binds, and performs the comparison specified
on the command line or from a specified file.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
Compare options
Option Description
-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version is 3.
Common options
Option Description
Option Description
l "chainingRequired"
l "referralsPreferred"
l "referralsRequired"
n [!]manageDSAit
RFC 3296
n [!]noop
n ppolicy
n [!]postread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]preread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]relax
n abandon
SIGINT sends the abandon signal; if critical, does not
wait for SIGINT. Not really controls.
n cancel
SIGINT sends the cancel signal; if critical, does not wait
for SIGINT. Not really controls.
n ignore
SIGINT ignores the response; if critical, does not wait for
SIGINT. Not really controls.
-n Dry run - shows what would be done, but does not actually do
it.
Option Description
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password (for simple
authentication).
ldapmemberconvert
Description
This is an LDAP utility that ports from the "Member" attribute values in LDAP group entries to the
"MemberOf" attribute values in LDAP member (User or Template) entries.
This utility converts the LDAP server data to work in either the "MemberOf" mode, or "Both" mode. The
utility searches through all specified group or template entries that hold one or more "Member" attribute
values and modifies each value. The utility searches through all specified group/template entries and
fetches their "Member" attribute values.
Each value is the DN of a member entry. The entry identified by this DN is added to the "MemberOf"
attribute value of the group/template DN at hand. In addition, the utility delete those "Member" attribute
values from the group/template, unless you run the command in the "Both" mode.
When your run the command, it creates a log file ldapmemberconvert.log in the current working
directory. The command logs all modifications done and errors encountered in that log file.
Important - Back up the LDAP server database before you run this conversion utility.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects to
localhost.
Parameter Description
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-m <Member Attribute Specifies the LDAP attribute name when fetching and (possibly) deleting a
Name> group Member attribute value.
-o <MemberOf Specifies the LDAP attribute name for adding an LDAP "MemberOf"
Attribute Name> attribute value.
-c <Member Specifies the LDAP "ObjectClass" attribute value that defines, which
ObjectClass Value> type of member to modify.
You can specify multiple attribute values with this syntax:
-c <Member Object Class 1> -c <Member Object Class
2> ... -c <Member Object Class N>
-f <File> Specifies the file that contains a list of Group DNs separated by a new line:
<Group DN 1>
<Group DN 2>
...
<Group DN N>
Length of each line is limited to 256 characters.
-L <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout> Default is "never".
-S <Size> Specifies the Server side size limit for LDAP operations, in number of
entries.
Default is "none".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout> Default is "never".
Notes
There are two "GroupMembership" modes. You must keep these modes consistent:
n template-to-groups
n user-to-groups
For example, if you apply conversion on LDAP users to include the "MemberOf" attributes for their groups,
then this conversion has to be applied on LDAP defined templates for their groups.
Troubleshooting
Symptom:
A command fails with an error message stating the connection stopped unexpectedly when you run it with
the parameter -M <Number of Updates>.
Root Cause:
The LDAP server could not handle that many LDAP requests simultaneously and closed the connection.
Solution:
Run the command again with a lower value for the "-M" parameter. The default value should be adequate,
but can also cause a connection failure in extreme situations. Continue to reduce the value until the
command runs normally. Each time you run the command with the same set of groups, the command
continues from where it left off.
Examples
Example 1
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...
...
cn=member1
objectclass=fw1Person
...
and:
...
cn=member2
objectclass=fw1Person
...
Run:
[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer -d cn=admin -w secret -m uniquemember -o memberof -c fw1Person
...
cn=cpGroup
...
...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
and:
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
If you run the same command with the "-B" parameter, it produces the same result, but the group entry is
not modified.
Example 2
If there is another member attribute value for the same group entry:
uniquemember="cn=template1,ou=people, ou=cp,c=us"
cn=member1
objectclass=fw1Template
Then after running the same command, the template entry stays intact, because of the parameter "-c
fw1Person", but the object class of "template1" is "fw1Template".
ldapmodify
Description
This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF format.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server Port>] [-
D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b] [-c] [-F] [-k] [-n]
[-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f <Input File> .ldif | <
<Entry>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects to
localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
Parameter Description
-n Specifies to print the LDAP "add" operations, but do not actually perform
them.
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout> Default is "never".
ldapsearch
Description
This is an LDAP utility that queries an LDAP directory and returns the results.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>] [-D <LDAP
Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b <Base DN>] [-F
<Separator>] [-l <LDAP Server Timeout>] [-s <Scope>] [-S <Sort Attribute>]
[-t] [-T <LDAP Client Timeout>] [-u] [-z <Number of Search Entries>] [-Z]
<Filter> [<Attributes>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects to
localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-b <Base DN> Specifies the Base Distinguished Name (DN) for search.
-F <Separator> Specifies the print separator character between attribute names and their
values.
The default separator is the equal sign (=).
Parameter Description
-l <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout> Default is "never".
-S <Sort Attribute> Specifies to sort the results by the values of this attribute.
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout> Default is never.
-z <Number of Search Specifies the maximal number of entries to search on the LDAP Server.
Entries>
Example
[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass
mgmt_cli
Description
The mgmt_cli tool works directly with the management database on your Management Server.
cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>
cd /d "%ProgramFiles(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>
Notes
n For a complete list of the mgmt_cli options, enter the mgmt_cli (mgmt_cli.exe) command and
press Enter.
n For more information, see the Check Point Management API Reference.
migrate
Important - This command is used to migrate the management database from R80.10
and lower versions.
For more information, see the R81.20 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Backing up and restoring in Management High Availability environment:
n To back up and restore a consistent environment, make sure to collect and
restore the backups and snapshots from all servers in the High Availability
environment at the same time.
n Make sure other administrators do not make changes in SmartConsole until the
backup operation is completed.
For more information:
n About Gaia Backup and Gaia Snapshot, see the R81.20 Gaia Administration
Guide.
n About Virtual Machine Snapshots, see the vendor documentation.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/bin/upgrade_tools/
directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate utility from the
migration tools package created specifically for that higher software version. See
the Installation and Upgrade Guide for that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R81.20/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R81.20/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R81.20/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# ./migrate -h
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full Path>/<Name
of Exported File> &
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full Path>/<Name
of Exported File>.tgz &
Parameters
Parameter Description
export Exports the management database and applicable Check Point configuration.
import Imports the management database and applicable Check Point configuration
that were exported from another Management Server.
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Important:
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and Log
Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs and indexes).
-n Runs silently (non-interactive mode) and uses the default options for each
setting.
Important:
n If you export a management database in this mode and the
specified name of the exported file matches the name of an
existing file, the command overwrites the existing file without
prompting.
n If you import a management database in this mode, the
"migrate import" command runs the "cpstop" command
automatically.
--exclude-uepm- n During the export operation, does not back up the PostgreSQL database
postgres-db from the Endpoint Security Management Server.
n During the import operation, does not restore the PostgreSQL database
on the Endpoint Security Management Server.
--include-uepm- n During the export operation, backs up the MSI files from the Endpoint
msi-files Security Management Server.
n During the import operation, restores the MSI files on the Endpoint
Security Management Server.
<Name of n During the export operation, specifies the name of the output file.
Exported File> The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R81.20/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_server
Important - This command is used to migrate the management database from
R80.20.M1, R80.20, R80.20.M2, R80.30, and higher versions.
For more information, see:
n sk135172 - Upgrade Tools
n The R81.20 Installation and Upgrade Guide
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Backing up and restoring in Management High Availability environment:
n To back up and restore a consistent environment, make sure to collect and
restore the backups and snapshots from all servers in the High Availability
environment at the same time.
n Make sure other administrators do not make changes in SmartConsole until the
backup operation is completed.
For more information:
n About Gaia Backup and Gaia Snapshot, see the R81.20 Gaia Administration
Guide.
n About Virtual Machine Snapshots, see the vendor documentation.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/scripts/ directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate_server utility
from the migration tools package created specifically for that higher software
version. See the Installation and Upgrade Guide for that higher software
version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R81.20/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R81.20/migrate-2022.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R81.20/log/migrate-2022 - 2023.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server -h
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server verify -v R81.20 [-skip_upgrade_
tools_check]
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export -v R81.20 [-skip_upgrade_
tools_check] [-l | -x] [--include-uepm-msi-files] [--exclude-uepm-
postgres-db] [--ignore_warnings] /<Full Path>/<Name of Exported File>
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server import -v R81.20 [-skip_upgrade_
tools_check] [-l | -x] [/var/log/mdss.json] [--include-uepm-msi-files]
[--exclude-uepm-postgres-db] /<Full Path>/<Name of Exported File>.tgz
n To import the Domain Management Server database and configuration on a Security Management
Server:
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server migrate_import_domain -v R81.20 [-
skip_upgrade_tools_check] [-l | -x] [/var/log/mdss.json] [--include-
uepm-msi-files] [--exclude-uepm-postgres-db] /<Full Path>/<Name of
Exported File>.tgz
Parameters
Parameter Description
export Exports the management database and applicable Check Point configuration.
Parameter Description
import Imports the management database and applicable Check Point configuration that
were exported from another Management Server.
Important:
n This command automatically restarts Check Point services (runs the
"cpstop" and "cpstart" commands).
n This note applies to a Multi-Domain Security Management environment, if at
least one of the servers changes its IPv4 address comparing to the source
server, from which you exported its database.
You must do these steps before you start the upgrade and import:
1. You must create a special JSON configuration file with the new IPv4
address(es).
Syntax:
[{"name":"<Name of Server 1 Object in
SmartConsole>","newIpAddress4":"<New IPv4
Address of Server 1>"},
{"name":"<Name of Server 2 Object in
SmartConsole>","newIpAddress4":"<New IPv4
Address of Server 2>"}]
Example:
[{"name":"MyPrimaryMultiDomainServer","newIpAddr
ess4":"172.30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAdd
ress4":"172.30.40.52"}]
2. You must call this file: mdss.json
3. You must put this file on all servers in this directory: /var/log/
verify Verifies the management database and applicable Check Point configuration that
were exported from another Management Server.
-skip_ Does not try to connect to Check Point Cloud to check for a more recent version of
upgrade_ the Upgrade Tools.
tools_check
Best Practice - Use this parameter on the Management Server that is not
connected to the Internet.
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the $FWDIR/log/
directory.
Important:
n The command can export only closed logs (to which the information
is not currently written).
n If you use this parameter, it can take the command a long time to
complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the $FWDIR/log/
directory.
Important:
n Before you use this parameter, it is necessary to make sure all log
indexes are closed and saved.
Run this command in the Expert mode and wait for the output to
show "Solr stopped":
$RTDIR/scripts/stopSolr.sh
n This parameter only supports Management Servers and Log
Servers R80.10 and higher.
n The command can export only closed logs (to which the information
is not currently written).
n If you use this parameter, it can take the command a long time to
complete (depends on the number of logs and indexes).
/var/log/mds Specifies the absolute path to the special JSON configuration file with new IPv4
s.json addresses.
The path and filename are mandatory.
This file is mandatory during an upgrade of a Multi-Domain Security Management
environment.
Even if only one of the servers migrates to a new IP address, all the other servers
must get this configuration file for the import process.
Syntax:
[{"name":"<Name of Server 1 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address of
Server 1>"},
{"name":"<Name of Server 2 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address of
Server 2>"}]
Example:
[{"name":"MyPrimaryMultiDomainServer","newIpAddress4":"172
.30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAddress4":"17
2.30.40.52"}]
--include- n During the export operation, backs up the MSI files from the Endpoint Security
uepm-msi- Management Server.
files n During the import operation, restores the MSI files on the Endpoint Security
Management Server.
Parameter Description
--exclude- n During the export operation, does not back up the PostgreSQL database from
uepm- the Endpoint Security Management Server.
postgres-db n During the import operation, does not restore the PostgreSQL database on the
Endpoint Security Management Server.
--ignore_ If during an upgrade procedure, the Pre-Upgrade Verifier shows warnings, you can
warnings use this parameter to ignore warnings and continue the upgrade.
or
-ivw Important - To prevent issues during and after upgrade, we strongly
recommend to resolve all issues and not use this parameter.
--exclude- n During the export operation, does not back up the licenses from the
licenses Management Server.
n During the import operation, does not restore the license on the Management
Server.
/<Full Specifies the absolute path to the exported database file. This path must exist.
Path>/<Name
of Exported
n During the export operation, specifies the name of the output file.
File> The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R81.20/migrate-2022 - 2023.06.14_11.03.46.log
[Expert@MGMT:0]#
queryDB_util
Description
Searches in the management database for objects or policy rules.
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 694 command to search in the management database for objects or policy rules
according to search parameters.
rs_db_tool
Description
Manages Dynamically Assigned IP address (DAIP) gateways in a DAIP database.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
n To add an entry to the DAIP database:
Note - You must run this command from the Expert mode.
Parameters
Parameter Description
-ip <IPv4 Address> Specifies the IPv4 address of the DAIP object
-TTL <Time-To- Specifies the relative time interval (in seconds), during which the entry is
Live> valid.
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the information
received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined Alerts
mechanism.
Important:
n You must run this command on the Management Server.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam" on page 619 and "fw sam_policy" on page 625 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security Gateway>]
[-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with pipes in a
CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The default is
forever.
-f Specifies the Security Gateway / Cluster object, on which to run the operation.
<Security
Gateway> Important - If you do not specify the target Security Gateway / Cluster
object explicitly, this command applies to all managed Security Gateways
and Clusters.
Parameter Description
-n Specifies to notify every time a connection, which matches the specified criteria,
passes through the Security Gateway / ClusterXL / Security Group.
-I Inhibits (drops or rejects) connections that match the specified criteria and closes
all existing connections that match the specified criteria.
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r | a}] -a
{d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to use with
pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The
default is forever.
-f <Security Specifies the Security Gateway / Cluster object, on which to run the
Gateway> operation.
Important - If you do not specify the target Security Gateway /
Cluster object explicitly, this command applies to all managed
Security Gateways and Clusters.
-l {r | a} Specifies the log type for connections that match the specified criteria:
n r - Regular
n a - Alert
Default is None.
Parameter Description
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug purposes - to
make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Notes:
n These Regular OIDs are specified in the SNMP MIB files.
n For Check Point MIB files, see sk90470.
Notes:
n These Statistical OIDs take some time to "initialize".
n For example, to calculate an average, it is necessary to collect enough samples.
n Check Point statistical OIDs are registered in the $CPDIR/conf/statistical_oid.conf file.
Parameters
Parameter Description
Parameter Description
threshold_config
Description
You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts.
You can use these thresholds to monitor many system components automatically without requesting
information from each object or device.
You configure these SNMP Monitoring Thresholds only on the Security Management Server, Multi-Domain
Server, or Domain Management Server.
During policy installation, the managed a Security Gateway and Clusters receive and apply these thresholds
as part of their policy.
For more information, see sk90860: How to configure SNMP on Gaia OS.
Procedure
Step Instructions
Step Instructions
11 In SmartConsole, install the Access Control Policy on Security Gateways and Clusters.
(1) Show policy Shows the name of the current configured threshold policy.
name
(2) Set policy Configures the name for the threshold policy.
name If you do not specify it explicitly, then the default name is "Default
Profile".
(3) Save policy Saves the changes in the current threshold policy.
(7) Configure Configures the SNMP Network Management System (NMS), to which the
alert managed Security Gateways and Cluster Members send their SNMP alerts.
destinations
Configure Alert Destinations Options:
-------------------------------------
(1) View alert destinations
(2) Add SNMP NMS
(3) Remove SNMP NMS
(4) Edit SNMP NMS
(8) View Shows a list of all available thresholds and their current settings. These
thresholds include:
overview
n Name
n Category (see the next option "(9)")
n State (disabled or enabled)
n Threshold (threshold point, if applicable)
n Description
Thresholds Categories
Category Sub-Categories
Category Sub-Categories
(3) Local Logging Mode Status Local Logging Mode Status Thresholds:
-------------------------------------
(1) Local Logging Mode
Notes:
n If you run the threshold_config command locally on a Security Gateway or
Cluster Members to configure the SNMP Monitoring Thresholds, then each policy
installation erases these local SNMP threshold settings and reverts them to the
global SNMP threshold settings configured on the Management Server that
manages this Security Gateway or Cluster.
n On a Security Gateway and Cluster Members, you can save the local Threshold
Engine Configuration settings to a file and load it locally later.
n The Threshold Engine Configuration is stored in the
$FWDIR/conf/thresholds.conf file.
n In a Multi-Domain Security Management environment:
l You can configure the SNMP thresholds in the context of Multi-Domain
Server are for that Domain Management Server and its managed Security
Gateway and Clusters.
l If an SNMP threshold applies both to the Multi-Domain Server and a
Glossary
A
Anti-Bot
Check Point Software Blade on a Security Gateway that blocks botnet behavior and
communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.
Anti-Spam
Check Point Software Blade on a Security Gateway that provides comprehensive
protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS,
ASPAM.
Anti-Virus
Check Point Software Blade on a Security Gateway that uses real-time virus signatures
and anomaly-based protections from ThreatCloud to detect and block malware at the
Security Gateway before users are affected. Acronym: AV.
Application Control
Check Point Software Blade on a Security Gateway that allows granular control over
specific web-enabled applications by using deep packet inspection. Acronym: APPI.
Audit Log
Log that contains administrator actions on a Management Server (login and logout,
creation or modification of an object, installation of a policy, and so on).
Bridge Mode
Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
Security Gateway that is part of a cluster.
Compliance
Check Point Software Blade on a Management Server to view and apply the Security
Best Practices to the managed Security Gateways. This Software Blade includes a
library of Check Point-defined Security Best Practices to use as a baseline for good
Security Gateway and Policy configuration.
Content Awareness
Check Point Software Blade on a Security Gateway that provides data visibility and
enforcement. See sk119715. Acronym: CTNT.
CoreXL
Performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to stick
to a particular FWK daemon is done at the first packet of connection on a very high level,
before anything else. Depending on the SecureXL settings, and in most of the cases, the
SecureXL can be offloading decryption calculations. However, in some other cases,
such as with Route-Based VPN, it is done by FWK daemon.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can
automatically update Check Point products for the Gaia OS, and the Gaia OS itself. For
details, see sk92449.
DAIP Gateway
Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway, on which the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
Classification of data in a Check Point Security Policy for the Content Awareness
Software Blade.
Distributed Deployment
Configuration in which the Check Point Security Gateway and the Security Management
Server products are installed on different computers.
Dynamic Object
Special object type, whose IP address is not known in advance. The Security Gateway
resolves the IP address of this object in real time.
Expert Mode
The name of the elevated command line shell that gives full system root permissions in
the Check Point Gaia operating system.
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restricted shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for the Check Point Gaia operating system.
Hotfix
Software package installed on top of the current software version to fix a wrong or
undesired behavior, and to add a new behavior.
HTTPS Inspection
Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets
Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection.
Acronyms: HTTPSI, HTTPSi.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and
audits data based on network location, the identity of the user, and the identity of the
computer. Acronym: IDA.
Identity Logging
Check Point Software Blade on a Management Server to view Identity Logs from the
managed Security Gateways with enabled Identity Awareness Software Blade.
Inline Layer
Set of rules used in another rule in Security Policy.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets
and data for numerous types of risks (Intrusion Prevention System).
IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and
Remote Access VPN access.
Kerberos
An authentication server for Microsoft Windows Active Directory Federation Services
(ADFS).
Log Server
Dedicated Check Point server that runs Check Point software to store and process logs.
Management Interface
(1) Interface on a Gaia Security Gateway or Cluster member, through which
Management Server connects to the Security Gateway or Cluster member. (2) Interface
on Gaia computer, through which users connect to Gaia Portal or CLI.
Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security
Management Server.
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN
access for managed and unmanaged clients. Acronym: MAB.
Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security
Management Servers called Domain Management Servers. Synonym: Multi-Domain
Security Management Server. Acronym: MDS.
Network Object
Logical object that represents different parts of corporate topology - computers, IP
addresses, traffic protocols, and so on. Administrators use these objects in Security
Policies.
Open Server
Physical computer manufactured and distributed by a company, other than Check Point.
Package Repository
Collection of software packages that were uploaded to the Management Server. You can
easily install these packages in SmartConsole on the managed Security Gateways.
Permission Profile
Predefined group of SmartConsole access permissions assigned to Domains and
administrators. With this feature you can configure complex permissions for many
administrators with one definition.
Policy Layer
Layer (set of rules) in a Security Policy.
Policy Package
Collection of different types of Security Policies, such as Access Control, Threat
Prevention, QoS, and Desktop Security. After installation, Security Gateways enforce all
Policies in the Policy Package.
Provisioning
Check Point Software Blade on a Management Server that manages large-scale
deployments of Check Point Security Gateways using configuration profiles. Synonyms:
SmartProvisioning, SmartLSM, Large-Scale Management, LSM.
QoS
Check Point Software Blade on a Security Gateway that provides policy-based traffic
bandwidth management to prioritize business-critical traffic and guarantee bandwidth
and control latency.
Rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause
specified actions to be taken for a communication session.
Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase.
SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that
passes through a Security Gateway.
Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and
enforce Security Policies for connected network resources.
Security Policy
Collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over SSL,
for secure communication. This authentication is based on the certificates issued by the
ICA on a Check Point Management Server.
SmartConsole
Check Point GUI application used to manage a Check Point environment - configure
Security Policies, configure devices, monitor products and events, install updates, and
so on.
SmartDashboard
Legacy Check Point GUI client used to create and manage the security settings in
versions R77.30 and lower. In versions R80.X and higher is still used to configure
specific legacy settings.
SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is
"Provisioning") that manages large-scale deployments of Check Point Security
Gateways using configuration profiles. Synonyms: Large-Scale Management,
SmartLSM, LSM.
SmartUpdate
Legacy Check Point GUI client used to manage licenses and contracts in a Check Point
environment.
Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade
inspects specific characteristics of the traffic (2) On a Management Server, each
Software Blade enables different management capabilities.
Standalone
Configuration in which the Security Gateway and the Security Management Server
products are installed and configured on the same server.
Threat Emulation
Check Point Software Blade on a Security Gateway that monitors the behavior of files in
a sandbox to determine whether or not they are malicious. Acronym: TE.
Threat Extraction
Check Point Software Blade on a Security Gateway that removes malicious content from
files. Acronym: TEX.
Updatable Object
Network object that represents an external service, such as Microsoft 365, AWS, Geo
locations, and more.
URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over
which web sites can be accessed by a given group of users, computers or networks.
Acronym: URLF.
User Database
Check Point internal database that contains all users defined and managed in
SmartConsole.
User Directory
Check Point Software Blade on a Management Server that integrates LDAP and other
external user management servers with Check Point products and security solutions.
User Group
Named group of users with related responsibilities.
User Template
Property set that defines a type of user on which a security policy will be enforced.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer
or cluster with virtual abstractions of Check Point Security Gateways and other network
devices. These Virtual Devices provide the same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide
the functionality of physical network devices. It holds at least one Virtual System, which
is called VS0.
Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides
real-time phishing prevention based on URLs. Acronym: ZPH.