CP R81 Quantum SecurityGateway AdminGuide
CP R81 Quantum SecurityGateway AdminGuide
CP R81 Quantum SecurityGateway AdminGuide
QUANTUM SECURITY
GATEWAY
R81
Administration Guide
Check Point Copyright Notice
© 2020 - 2023 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
Important Information
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the
latest functional improvements, stability fixes, security enhancements and protection against
new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
26 October Updated:
2023
n "Command Line Reference" on page 164 - removed all commands from this chapter
(refer to the R81 CLI Reference Guide)
23 October Updated:
2022
n "Generic Workflow for HSM" on page 50
n "Working with FutureX HSM" on page 67
n "Disabling Communication from the Security Gateway to the HSM Server" on
page 81
n "SecureXL Kernel Parameters" on page 190
n "Kernel Debug Procedure" on page 215
n "Kernel Debug Modules and Debug Flags" on page 224
14 July Updated:
2021
n "Controlling ISP Redundancy from CLI" on page 117
17 April Updated:
2021
n "Firewall Kernel Parameters" on page 167
Table of Contents
Check Point Quantum Security Gateway Solution 10
Security Policy 11
Access Control Policy 11
Threat Prevention Policy 15
HTTPS Inspection Policy 16
Data Loss Prevention Policy 17
Geo Policy 18
Mobile Access Policy 19
Firewall Software Blade 20
IPsec VPN Software Blade 21
Remote Access VPN 22
Threat Prevention 23
Anti-Bot Software Blade 24
Anti-Virus Software Blade 25
Threat Extraction Software Blade 26
Threat Emulation Software Blade 27
Mail Transfer Agent (MTA) 28
IPS Software Blade 29
Identity Awareness Software Blade 30
Content Awareness Software Blade 31
Mobile Access Software Blade 32
Application Control Software Blade 33
URL Filtering Software Blade 34
Data Loss Prevention Software Blade 35
Anti-Spam & Email Security Software Blade 36
UserCheck 37
ClusterXL Software Blade 38
QoS Software Blade 39
VSX 40
Example Physical Network Topology 40
Example VSX Virtual Network Topology 41
SecureXL 42
CoreXL 43
Multi-Queue 44
ICAP 45
HTTPS Inspection 46
HTTP/HTTPS Proxy 47
Hardware Security Module (HSM) 48
Why Use an HSM? 48
The Check Point Environment with an HSM 49
Generic Workflow for HSM 50
Workflow for Configuring a Check Point Security Gateway to Work with HSM 50
Workflow for Configuring an HSM Client Workstation 54
Working with Gemalto HSM 55
Configuration Steps 55
Additional Actions for a Gemalto HSM Server 65
Working with FutureX HSM 67
Prerequisites 67
Configuration Steps 67
Disabling Communication from the Security Gateway to the HSM Server 81
Monitoring HTTPS Inspection When Security Gateway Works with HSM 82
Monitoring HTTPS Inspection with HSM in SmartConsole Logs 83
Monitoring HTTPS Inspection with HSM over SNMP 87
Monitoring HTTPS Inspection with HSM in CLI 96
ISP Redundancy on a Security Gateway 104
Introduction 104
ISP Redundancy Modes 108
Outgoing Connections 109
Incoming Connections 110
Configuring ISP Redundancy on a Security Gateway 111
ISP Redundancy and VPN 116
Controlling ISP Redundancy from CLI 117
Force ISP Link State 117
The ISP Redundancy Script 117
Mirror and Decrypt 118
Mirror and Decrypt Requirements 120
Configuring Mirror and Decrypt in Gateway mode 121
Preparing the Security Gateway or each Cluster Member 122
Item Description
1 SmartConsole
5 Internal network
Security Policy
In This Section:
Security Policy is a collection of rules and settings that control network traffic and enforce organization
guidelines for data protection and access to resources with packet inspection.
Check Point solution provides several types of Security Policies.
For more information, see the R81 Security Management Administration Guide.
In addition, see sk120964 - ATRG: Unified Policy.
Contains unified simple and granular rules to control access from specified sources to specified
destinations over specified protocols.
If you enable Identity Awareness Software Blade on your Security Gateways, you can also use
Access Role objects as the source and destination in a rule. This lets you easily make rules for
individuals or different groups of users.
Rule structure:
Services
Nam Sourc Destinat & Actio Tim Insta
No VPN Track
e e ion Applicati n e ll On
ons
# Your Specific Specific Specific or Specific or All Accept Any Log Policy
Rule Source Destination All VPN Service objects or or (with Target
Name objects objects Communit Specific or All Drop Specifi Account s
ies Application or c Time ing)
objects Reject object or
or Alert
User or
Auth None
or
Client
Auth
For more information, see the R81 Security Management Administration Guide.
Contains automatic and manual rules for Network Address Translation (NAT).
Rule structure:
Prerequisites:
1. In the Security Gateway (Cluster) object, enable the IPsec VPN and the Policy Server
Software Blades.
2. In the Policy Package, enable the Desktop Security.
This policy is installed on the Security Management Server. Remote Access Clients download
this policy when a VPN Site update is performed. Once downloaded, this policy determines
access control on the Remote Access Client machines.
Rule structure:
For more information, see the R81 Threat Prevention Administration Guide.
Determines how the system inspects connections for bots and viruses. The primary component of the
policy is the Rule Base. The rules use the Malware database and network objects.
If you enable Identity Awareness Software Blade on your Security Gateways, you can also use Access
Role objects as the scope in a rule. This lets you easily make rules for individuals or different groups of
users.
Rule structure:
Protecti
Protec on/ Inst
N Na Sour Destina Servic Actio Comme
ted Site/ Track all
o me ce tion es n nts
Scope File/ On
Blade
# Your Specific Specific Specific N/A Any Basic None Polic Your
Rule objects Source Destination (or your or or or y Comment
Name objects objects specific Specific Optimi Log Targe
objects in an Service zed or ts
exception objects or Alert or
rule) Strict In Specifi
or addition: c
Your Packet Securit
Profile Captur y
e Gatew
Forens ay and
ics Cluster
objects
For more information, see the R81 Security Management Administration Guide.
Lets you inspect the HTTP / HTTPS traffic on these Software Blades:
n Anti-Bot
n Anti-Virus
n Application Control
n Content Awareness (Data Awareness)
n Data Loss Prevention
n IPS
n Threat Emulation
n URL Filtering
Security Gateways cannot inspect HTTPS traffic because it is encrypted. You can enable the HTTPS
Inspection feature to let the Security Gateways create new SSL connections with the external site or
server. The Security Gateways are then able to decrypt and inspect HTTPS traffic that uses the new SSL
connections.
Rule structure:
Catego
ry/
Inst
N Na Sour Destin Servi Custo Acti Tra Bla Certifi Comm
all
o me ce ation ces m on ck de cate ent
On
Applic
ation
# Your Any APPI_ TLS Any Inspe None All Polic Outbound Your
Rule global_ default or ct or or y TLS Certific Comment
Name obj_ service Specific or Log Specifi Targe ate
Internet s objects Bypas or c ts or
or or s Alert Blade or Your
Specific Specific Specifi Certificate
Destination Service c for Inbound
objects objects Securit Inspection
y
Gatew
ay and
Cluster
objects
For more information, see the R81 Data Loss Prevention Administration Guide.
Prevents unintentional data leaks by catching protected data before it leaves your organization.
Rule structure:
Category Name(Y-Z)
No Your Spe My Outside Any Shows: Dete Ema Low DLP Any None Your
Flag Rule cific Organi My Org or none ct il or Bla or Comme
or Nam Dat zation or E- or or or Mediu des Specific nt
Foll e a or Specific mail The Info Log m Catego
ow Typ Specific Destinati or number rm or or ry
Up e Source on FTP of User Ale High
or objects objects or exceptio or rt or
Impr HTTP ns added Ask and Criti
ove for this User how cal
Accu rule or to
racy (double- Prev store
click this ent an
cell) or incid
Wate ent
rmar
k
Geo Policy
Description
For more information, see the R81 Security Management Administration Guide.
Creates a policy for traffic to or from specific geographical or political locations.
Rule structure:
Specific Country object From and To Country Accept None Your Comment
or or or
From Country Drop Log
or or
To Country Alert
For more information, see the R81 Mobile Access Administration Guide.
Controls which user groups have access to which applications, when connecting through a Mobile
Access Security Gateway.
Rule structure:
Threat Prevention
To challenge today's malware landscape, Check Point's comprehensive Threat Prevention solution offers a
multi-layered, pre- and post-infection defense approach and a consolidated platform that enables enterprise
security to detect and block modern malware.
For more information, see the R81 Threat Prevention Administration Guide.
These Software Blades provide Threat Prevention:
n "Anti-Bot Software Blade" on page 24
n "Anti-Virus Software Blade" on page 25
n "Threat Extraction Software Blade" on page 26
n "Threat Emulation Software Blade" on page 27
n "IPS Software Blade" on page 29
UserCheck
This feature gives users a warning when there is a potential risk of data loss or security violation.
This helps users to prevent security incidents and to learn about the organizational security policy.
These Software Blades require the UserCheck feature:
n "Threat Emulation Software Blade" on page 27
n "Threat Extraction Software Blade" on page 26
n "Anti-Bot Software Blade" on page 24
n "Anti-Virus Software Blade" on page 25
n "Data Loss Prevention Software Blade" on page 35
n "Application Control Software Blade" on page 33
n "URL Filtering Software Blade" on page 34
For more information, see:
n The R81 Security Management Administration Guide > Chapter Creating an Access Control Policy >
Section The Columns of the Access Control Rule Base
n sk83700 - How to customize and localize the UserCheck portal
Item Description
1 Internal network
5 Internet
Item Description
1 SmartConsole
3 QoS Policy
5 Internet
6 Internal network
QoS leverages the industry's most advanced traffic inspection and bandwidth control technologies. Check
Point patented Stateful Inspection technology captures and dynamically updates detailed state information
on all network traffic. This state information is used to classify traffic by service or application. After traffic
has been classified, QoS applies an innovative, hierarchical, Weighted Fair Queuing (WFQ) algorithm to
accurately control bandwidth allocation.
For more information, see the R81 QoS Administration Guide.
VSX
Virtual System eXtension product runs several virtual firewalls on the same hardware.
Each Virtual System works as a Security Gateway, typically protecting a specified network. When packets
arrive at the VSX Gateway, it sends traffic to the Virtual System protecting the destination network. The
Virtual System inspects all traffic and allows or rejects it according to rules defined in the security policy.
In order to better understand how virtual networks work, it is important to compare physical network
environments with their virtual (VSX) counterparts. While physical networks consist of many hardware
components, VSX virtual networks reside on a single configurable VSX Gateway or cluster that defines and
protects multiple independent networks, together with their virtual components.
Item Description
1 Internet
2 Router
3 Security Gateways
4 Network
Item Description
1 Internet
2 Router
3 VSX Gateway.
Each Virtual System in a VSX environment is a Security Gateway, with the same security and
networking functionality as a physical gateway.
Each handles packet traffic to and from the one network it protects.
4 Warp Links.
Virtual interfaces and network cables connect the Virtual Systems and the Virtual Switch.
5 Virtual Switch.
Connects all the Virtual Systems to the Internet router.
6 Networks
SecureXL
This feature accelerates traffic that passes through a Security Gateway.
For more information, see:
n R81 Performance Tuning Administration Guide
n sk153832 - ATRG: SecureXL for R80.20 and above (requires Advanced access to Check Point
Support Center)
n sk98348 - Best Practices - Security Gateway Performance
CoreXL
CoreXL is a performance-enhancing technology for Security Gateways on multi-core platforms.
CoreXL makes it possible for the CPU cores to perform multiple tasks concurrently. This enhances the
Security Gateway performance.
CoreXL provides almost linear scalability of performance, according to the number of processing cores on a
single machine. The increase in performance does not require changes to management or to network
topology.
On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times.
Each replicated copy of the Firewall kernel, or CoreXL Firewall instance, runs on one CPU core.
These CoreXL Firewall instances handle traffic concurrently, and each CoreXL Firewall instance is a
complete and independent Firewall inspection kernel. When CoreXL is enabled, all the Firewall kernel
instances in the Security Gateway process traffic through the same interfaces and apply the same security
policy.
CoreXL Firewall instances work with SecureXL instances.
For more information. see:
n R81 Performance Tuning Administration Guide
n sk98737 - ATRG: CoreXL (requires Advanced access to Check Point Support Center)
n sk98348 - Best Practices - Security Gateway Performance
Multi-Queue
By default, each network interface has one traffic queue handled by one CPU.
You cannot use more CPU cores for acceleration than the number of interfaces handling traffic.
Multi-Queue configures more than one traffic queue for each network interface.
For each interface, more than one CPU core is used for acceleration.
ICAP
The Internet Content Adaptation Protocol (ICAP) is a lightweight HTTP-like protocol (request and
response protocol), which is used to extend transparent proxy servers. This frees up resources and
standardizes the way in which new features are implemented. ICAP is usually used to implement virus
scanning and content filters in transparent HTTP proxy caches.
The ICAP allows ICAP Clients to pass HTTP / HTTPS messages to ICAP Servers for content adaptation.
The ICAP Server executes its transformation service on these HTTP / HTTPS messages and sends
responses to the ICAP Client, usually with modified HTTP / HTTPS messages. The adapted HTTP / HTTPS
messages can be HTTP / HTTPS requests, or HTTP / HTTPS responses.
You can configure a Check Point Security Gateway as:
n ICAP Client - To send the HTTP / HTTPS messages to ICAP Servers for content adaptation.
n ICAP Server - To perform content adaptation in the HTTP / HTTPS messages received from ICAP
Clients.
n Both ICAP Client and ICAP Server at the same time.
Check Point Security Gateway configured for ICAP can work with third party ICAP devices without changing
the network topology.
For more information, see the R81 Threat Prevention Administration Guide.
HTTPS Inspection
Lets you inspect the HTTP / HTTPS traffic on these Software Blades:
n Anti-Bot
n Anti-Virus
n Application Control
n Content Awareness (Data Awareness)
n Data Loss Prevention
n IPS
n Threat Emulation
n URL Filtering
Security Gateways cannot inspect HTTPS traffic because it is encrypted. You can enable the HTTPS
Inspection feature to let the Security Gateways create new SSL connections with the external site or server.
The Security Gateways are then able to decrypt and inspect HTTPS traffic that uses the new SSL
connections.
For more information, see:
n R81 Threat Prevention Administration Guide > Chapter HTTPS Inspection.
n sk108202 - Best Practices - HTTPS Inspection
n sk65123 - HTTPS Inspection FAQ
HTTP/HTTPS Proxy
You can configure a Security Gateway to act as an HTTP/HTTPS Proxy on your network.
In such configuration, the Security Gateway becomes an intermediary between hosts that communicate with
each other through the Security Gateway. It does not allow a direct connection between these hosts.
Each successful connection creates two different connections:
n One connection between the client in the organization and the proxy (Security Gateway).
n One connection between the proxy (Security Gateway) and the actual destination.
These proxy modes are supported:
n Transparent - All HTTP traffic on specified ports and interfaces is intercepted and processed by the
Proxy code in the Security Gateway. No configuration is required on the clients.
n Non Transparent - All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and
processed by the Proxy code in the Security Gateway. Configuration of the proxy address and port is
required on client machines.
For more information, see:
n SmartDashboard built-in help
n sk110013 - How to configure Check Point Security Gateway as HTTP/HTTPS Proxy (requires
Advanced access to Check Point Support Center)
n sk92482 - Performance impact from enabling HTTP/HTTPS Proxy functionality (requires Advanced
access to Check Point Support Center)
Note - For other HSM vendors that use PKCS#11 API, contact Check Point Solution Center
through a local Check Point Office.
Item Description
1 Internal computers that connect to HTTPS web sites through the Check Point Security
Gateway.
4 Check Point Security Management Server that manages the Check Point Security Gateway.
5 Interconnecting Network.
6 HSM Server that stores and serves the SSL keys and certificates to the Check Point Security
Gateway.
7 HSM Client workstation used to create a Certificate Authority (CA) certificate on the HSM
Server.
Note - Check Point Security Gateway uses the HSM Server only for outbound HTTPS Inspection.
Workflow for Configuring a Check Point Security Gateway to Work with HSM 50
Workflow for Configuring an HSM Client Workstation 54
Note - Instructions for specific HSM vendors are located in the corresponding sections.
Generic Step 1 of 3: Configure the HTTPS Inspection to work without the HSM Server
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of each Virtual System
(on the VSX Gateway or each VSX Cluster Member).
Step Instructions
2 On the Security Gateway / each Cluster Member, disable the HSM in the
$FWDIR/conf/hsm_configuration.C file.
a. Connect to the command line.
b. Log in to the Expert mode.
c. Edit the file:
vi $FWDIR/conf/hsm_configuration.C
d. Configure the value "no" for the parameter "enabled":
:enabled ("no")
e. Save the changes in the file and exit the editor.
3 On the Security Gateway / each Cluster Member / Security Group, restart Check Point
services:
cprestart
Important - Traffic does not flow through until the services start.
Step Instructions
4 Make sure that HTTPS Inspection works correctly without the HSM Server:
a. From an internal computer, connect to any HTTPS web site.
b. On the internal computer, in the web browser, you must receive the signed CA
certificate from the Security Gateway (Cluster).
Generic Step 2 of 3: Install and configure the PKCS#11 library supplied by the HSM vendor
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the VSX Gateway or
each VSX Cluster Member (context of VS 0).
n You must get the HSM Client package from the HSM vendor.
Step Instructions
1 Unpack and install the HSM Client package supplied by the HSM vendor.
3 Transfer other tools or files supplied by the HSM vendor that are required to configure the
PKCS#11 library.
4 Configure the required connection or trust between with the HSM Server.
5 Optional: Make sure there is a trusted link with the HSM Server that is based on the
PKCS#11 library.
Note - Use the applicable tool supplied by the HSM vendor. You can also examine the
trust with the Check Point command "cpstat").
Generic Step 3 of 3: Configure the HTTPS Inspection to work with the HSM Server for Outbound
HTTPS Inspection
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of each Virtual System
(on the VSX Gateway or each VSX Cluster Member).
Notes:
n In this step, you configure the $FWDIR/conf/hsm_configuration.C file on the
Security Gateway / each Cluster Member.
n After you apply the HSM configuration for the first time, you can get an HSM connection
error.
Most common scenario is when you configure several Security Gateways (Cluster
Members) to use the same HSM Server, and they access it at the same time.
In this case:
a. Run the "cprestart" command on the Security Gateway / Cluster Member /
Security Group that has an HSM connection issue.
In a VSX environment, run this command in the context of the problematic VSX
Virtual System.
b. When you see "HSM on" on the screen, continue to configure the next Security
Gateway, Cluster Member, or VSX Virtual System.
n After any change in the $FWDIR/conf/hsm_configuration.C file, you must do one
of these:
l Fetch the local policy with the "fw fetch local" command.
l In SmartConsole install the policy on the Security Gateway / Cluster / VSX Virtual
System object.
n If the HSM Server is not available when you fetch the local policy or install the policy in
SmartConsole, the HTTPS Inspection cannot inspect the Outbound HTTPS traffic. As a
result, internal computers behind the Security Gateway / Cluster / VSX Virtual System
cannot access HTTPS web sites.
In addition, see "Disabling Communication from the Security Gateway to the HSM
Server" on page 81.
Configuration steps:
Step Instructions
1 Connect to the command line on the Security Gateway / each Cluster Member.
Step Instructions
Notes:
n The ":enabled ()" attribute must have the value of either "yes" (to enable the
HSM), or "no" (to disable the HSM).
n The ":hsm_vendor_name ()" attribute must contain the required name of the
HSM vendor.
n The ":lib_filename ()" attribute must contain the name of the PKCS#11 library
of your HSM vendor (located in the /usr/lib/hsm_client/ directory).
n The ":CA_cert_<XXX> ()" attributes must have the required values of handles.
n The ":token_id ()" attribute must contain the password for the partition on the
HSM Server.
Example:
(:enabled ("yes")
:hsm_vendor_name ("FutureX HSM")
:lib_filename ("libfxpkcs11.so")
:CA_cert_public_key_handle (2)
:CA_cert_private_key_handle (1)
:CA_cert_buffer_handle (3)
:token_id ("safest")
)
6 To apply the new configuration, restart all Check Point services with this command:
cprestart
Important - This blocks all traffic until all services restart. In a cluster, this can cause a
failover.
7 Make sure that the Security Gateway / each Cluster Member can connect to the HSM
Server and that HTTPS Inspection is activated successfully on the outbound traffic.
Run this command:
cpstat https_inspection -f all
The output must show:
n HSM partition access (Accessible/Not Accessible): Accessible
n Outbound status (HSM on/HSM off/HSM error): HSM on
For more information, see "Monitoring HTTPS Inspection with HSM in CLI" on page 96.
Important - You must get the HSM Client package from the HSM vendor.
Configuration Steps 55
Additional Actions for a Gemalto HSM Server 65
Configuration Steps
Use this workflow to configure a Check Point Security Gateway / ClusterXL to work with the Gemalto HSM
Server.
Step 1 of 5: Extracting the Gemalto Help Package
Use the Gemalto configuration documents to configure the Gemalto HSM environment.
Step Instructions
Step 2 of 5: Configuring the Gemalto HSM Server to Work with Security Gateway / ClusterXL
Use the Gemalto Help documents to install and configure the Gemalto HSM Server.
Step Instructions
2 Do the initial configuration of the Gemalto HSM Appliance and the Gemalto HSM Server.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > follow from [Step 1] to [Step 6].
3 Run the "sysconf recenCert" command in LunaSH to generate a new certificate for the
Gemalto HSM Server (server.pem).
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with
each other.
4 Complete the configuration of the Gemalto HSM Server to work with the Check Point
Security Gateway / ClusterXL:
a. Set the applicable partition to be active and auto-activated.
Run these commands in LunaSH:
lunash:> partition showPolicies -partition <Partition
Name>
Note - If you do not set the partition to stay auto-activated, the partition does
not stay activated when the machine is shut down for more than two hours.
b. Disable the validation of the client source IP address by NTLS upon an NTLA client
connection.
Run this command in LunaSH:
lunash:> ntls ipcheck disable
Note - This allows the HSM Server to accept traffic from Check Point Cluster
Members that hide this traffic behind a Cluster VIP address, and from a Check
Point Security Gateway hidden behind NAT.
You use the Gemalto HSM Client workstation to create a CA Certificate on the Gemalto HSM Server.
Check Point Security Gateway / ClusterXL uses this CA Certificate for HTTPS Inspection to store and to
access SSL keys on the Gemalto HSM Server.
Note - You can also use Check Point Security Gateway / ClusterXL with the installed HSM
Client package as an HSM Client workstation.
Step Instructions
4 Establish a Trust Link between the Gemalto HSM Client Workstation and the Gemalto
HSM Server.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with
each other.
On the Gemalto HSM Client Workstation, run in LunaCM:
lunacm:> clientconfig deploy -c <IP Address of HSM Client
Workstation> -n <IP Address of HSM Server> -par <Partition
Name> -pw <Partition Password>
Step Instructions
1 On the Gemalto HSM Client workstation, open a command prompt or a terminal window.
3 When prompted, enter the password for the partition on Gemalto HSM Server (you
configured it in "Step 2 of 5: Configuring the Gemalto HSM Server to Work with Security
Gateway / ClusterXL" on page 56).
Example:
Enter a password for the token in slot 0:
6 Use the handle numbers from the previous step to create the CA certificate.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities
Reference Guide > Certificate Management Utility (CMU) > cmu selfsigncertificate
Example:
# ./cmu selfsigncertificate -privatehandle=17
CN="www.gemltoHSM.cp" -sha256WithRSA -startDate 20190720 -
endDate 20240720 -serialNum=111aaa -keyusage
digitalsignature,keycertsign,crlsign -
basicconstraints=critical,ca:true
Step Instructions
Step 5 of 5: Configuring the Security Gateway / ClusterXL to Work with the Gemalto HSM Server
Step Instructions
2 On the Security Gateway (each Cluster Member), disable the HSM in the
$FWDIR/conf/hsm_configuration.C file.
a. Connect to the command line.
b. Log in to the Expert mode.
c. Edit the file:
vi $FWDIR/conf/hsm_configuration.C
d. Configure the value "no" for the parameter "enabled":
:enabled ("no")
e. Save the changes in the file and exit the editor.
3 In SmartConsole, install the applicable Access Control Policy on the Security Gateway /
ClusterXL object.
4 Make sure that HTTPS Inspection works correctly without the HSM Server:
a. From an internal computer, connect to any HTTPS web site.
b. On the internal computer, in the web browser, you should receive the signed CA
certificate from the Security Gateway / ClusterXL.
Sub-Step 5-B: Installing the Gemalto HSM Simplified Client Software Packages on the
Security Gateway (Cluster Members)
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the VSX Gateway
or each VSX Cluster Member (context of VS 0).
Notes:
n For more information, see the Gemalto SafeNet Network HSM 6.2.2 Product
Documentation.
For information about establishing a Trust Link, go to the Appliance Administration
Guide > Configuration without One-step NTLS > [Step 7] Create a Network Trust Link
Between the Client and the Appliance.
n If you need to establish new Trust Link, you have to delete the current Trust Link.
See "Deleting a Trust Link with the HSM Server" on page 65.
Step Instructions
1 Open the Gemalto HSM Client package you received from Gemalto:
610-012382-017_SW_Client_HSM_6.2.2_RevA
Go to this directory: linux > 32
3 In the Expert mode, copy the libCryptoki2.so file to the /usr/lib/hsm_client/ directory:
cp -v /usr/safenet/lunaclient/lib/libCryptoki2.so
/usr/lib/hsm_client/
Important - For security reasons, only the root user has permissions to access this
directory.
You must copy the physical file into this directory. Do not create a symbolic link.
4 Establish a Trust Link between the Gemalto HSM Client on the Security Gateway / each
Cluster Member and the Gemalto HSM Server.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance
with each other.
On the Security Gateway / each Cluster Member, run in LunaCM:
lunacm:> clientconfig deploy -c <IP Address of Security
Gateway or Cluster Member> -n <IP Address of HSM Server> -par
<Partition Name> -pw <Partition Password>
5 Examine the partition access on the Security Gateway / each Cluster Member:
# /usr/safenet/lunaclient/bin/vtl verify
Sub-Step 5-C: Configuring HTTPS Inspection on the Security Gateway / Cluster Members to
work with the Gemalto HSM Server
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the VSX Gateway
or each VSX Cluster Member (context of VS 0).
Notes:
n After you apply the HSM configuration for the first time, you may get an HSM
connection error.
Most common scenario is when you configure several Security Gateways (Cluster
Members) to use the same HSM Server, and they access it at the same time.
In this case:
a. Run the "fw fetch local" command on the Security Gateway (Cluster
Member) that has an HSM connection issue.
In a VSX environment, run this command in the context of the problematic
VSX Virtual System.
b. Wait until you see "HSM on".
c. Continue to configure the next Security Gateway, Cluster Member, or VSX
Virtual System.
n After any change in the $FWDIR/conf/hsm_configuration.C file, you must do
one of these:
l Fetch the local policy with the "fw fetch local" command
Step Instructions
1 Connect to the command line on the Security Gateway / each Cluster Member.
Step Instructions
Notes:
n The ":enabled ()" attribute must have the value of either "yes" (to enable the
HSM), or "no" (to disable the HSM).
n The ":hsm_vendor_name ()" attribute must contain the string "Luna
Gemalto HSM" (or must be empty).
n The ":lib_filename ()" attribute must contain the name of the PKCS#11
library of the Gemalto HSM vendor (located in the /usr/lib/hsm_client/
directory on the Security Gateway / each Cluster Member.
n The ":CA_cert_<XXX> ()" attributes must have the required values of
handles from the output of the "cmu list" command on the Gemalto HSM
Server.
See "Step 4 of 5: Creating the CA Certificate on the Gemalto HSM Server"
on page 58.
n The ":token_id ()" attribute must have the contain the password for the
partition on the Gemalto HSM Server.
See "Step 2 of 5: Configuring the Gemalto HSM Server to Work with
Security Gateway / ClusterXL" on page 56.
Example:
(
:enabled ("yes")
:hsm_vendor_name ("Gemalto HSM")
:lib_filename ("libCryptoki2.so")
:CA_cert_public_key_handle (17)
:CA_cert_private_key_handle (18)
:CA_cert_buffer_handle (13)
:token_id ("p@ssw0rd")
)
Step Instructions
Important - This blocks all traffic until all services restart. In a cluster, this
can cause a failover.
n If you did not define the value of the ":hsm_vendor_name ()" attribute (it is
empty), then fetch the local policy with this command:
fw fetch local
7 Make sure that the Security Gateway / each Cluster Member can connect to the HSM
Server and that HTTPS Inspection is activated successfully on the outbound traffic.
Run this command:
cpstat https_inspection -f all
The output must show:
n HSM partition access (Accessible/Not Accessible):
Accessible
n Outbound status (HSM on/HSM off/HSM error): HSM on
For more information, see "Monitoring HTTPS Inspection with HSM in CLI" on page 96.
If you need to establish new Trust Link between a Check Point Security Gateway and an HSM Server,
you have to delete the current Trust Link.
Use Case: When you replace or reconfigure a Check Point Security Gateway, or an HSM Server.
Step Instructions
1 Delete the current Trust Link on the Check Point Security Gateway / each Cluster Member:
a. Connect to the command line.
b. Log in to the Expert mode.
c. Go to the SafeNet HSM Simplified Client installation directory:
cd /usr/safenet/lunaclient/bin/
d. Delete the old Trust Link:
./vtl deleteServer -n <IP Address of HSM Server>
Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2 Product
Documentation.
Step Instructions
Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2 Product
Documentation > LunaSH Command Reference Guide > LunaSH Commands.
Prerequisites
FutureX Software Packages
FutureX CLI n fxcl-hsm- Contains the FutureX CLI Utility to manage keys and
Utility windows- certificates.
1.2.4.2- Install on the FutureX HSM Client Workstation.
37a8.zip
n fxcl-hsm-
redhat-
1.2.4.2-
37a8.tar
n fxcl-hsm-
linux-1.2.4.2-
37a8.tar
n fxcl-hsm-mac-
1.2.4.2-
37a8.tar
n fxcli-hsm-
commands.txt
Configuration Steps
Use this workflow to configure a Check Point Security Gateway / ClusterXL to work with the FutureX HSM
Server.
Step Instructions
2 Transfer the applicable FutureX PKCS #11 Library package to the FutureX HSM Client
Workstation.
n For Windows OS:
fxpkcs11-windows-<BUILD>.zip
n For Red Hat Linux OS:
fxpkcs11-redhat-<BUILD>.tar
n For Ubuntu and Debian Linux OS:
fxpkcs11-linux-<BUILD>.tar
n For macOS:
fxpkcs11-mac-<BUILD>.tar
Important - Make sure to transfer the file in the binary mode.
3 Extract the contents of the FutureX PKCS #11 Library package to some directory on the
FutureX HSM Client Workstation.
In the instructions below, we show this directory as: <PKCS#11 Dir>.
Important:
n The FutureX PKCS #11 Library package (fxpkcs11-<OS>-<BUILD>) contains
the nested directory called "fxpkcs11".
You must extract the contents of this nested directory "fxpkcs11" into the
<PKCS#11 Dir> directory.
n The nested directory "fxpkcs11" contains the nested directories called "x64"
(for 64-bit OS) and "x86" (for 32-bit OS).
You must extract the contents of the applicable nested directory "x64" or "x86"
into the <PKCS#11 Dir> directory.
4 Transfer the certificates you received from the FutureX vendor to some directory on the
FutureX HSM Client Workstation.
Step Instructions
libfxpkcs11.so
n On Windows OS:
fxpkcs11.dll
c. Make sure the configuration file fxpkcs11.cfg is located in the applicable directory:
n On Linux OS:
Transfer this file from the <PKCS#11 Dir> directory to the /etc/ directory
(you must edit the copied file in the /etc/ directory).
n On Windows OS:
Step Instructions
7 For more information about the configuration of PKCS#11 on the FutureX HSM Client
Workstation:
a. Log in to the FutureX portal.
b. Go to:
DEVELOPER DOCUMENTATION >
GENERAL PURPOSE >
General Purpose Technical Reference >
PKCS #11 Technical Reference
8 Transfer the applicable FutureX CLI Utility package to the FutureX HSM Client
Workstation.
n For Windows OS:
fxcl-hsm-windows-<BUILD>.zip
n For Red Hat Linux OS:
fxcl-hsm-redhat-<BUILD>.tar
n For Ubuntu and Debian Linux OS:
fxcl-hsm-linux-<BUILD>.tar
n For macOS:
fxcl-hsm-mac-<BUILD>.tar
Important - Make sure to transfer the file in the binary mode.
Step Instructions
9 Extract the contents of the FutureX CLI Utility package to some directory on the FutureX
HSM Client Workstation.
In the instructions below, we show this directory as: <CLI Dir>.
Important:
n The FutureX CLI Utility package (fxcl-hsm-<OS>-<BUILD>) contains the
nested directory called "fxcl".
n The nested directory fxcl contains the nested directories called "x64" (for 64-bit
OS) and "x86" (for 32-bit OS).
n The nested directories x64 and x86 contain the nested directories called
"OpenSSL-1.0.x" and "OpenSSL-1.1.x".
You must extract the contents of the applicable nested directory "OpenSSL-
1.0.x" or "OpenSSL-1.1.x" into the <CLI Dir> directory.
Administrator decides, which version of the OpenSSL to use (for more
information, contact the FutureX vendor).
10 Transfer these certificates to the <CLI Dir> directory on the FutureX HSM Client
Workstation:
n The Client certificate (denoted below as <Client Certificate>)
n The CA certificate (denoted below as <CA Certificate>)
11 Establish a connection between the FutureX HSM Client and the FutureX HSM Server:
a. Go to the <CLI Dir> directory.
b. Start the shell:
fxcli-hsm
c. Run these commands in the order they are listed:
tls pki -f <Client Certificate> -p safest
exit
Step Instructions
12 You can use these tools on the FutureX HSM Client Workstation to manage keys and
certificates that are stored on the FutureX HSM Server:
a. PKCS11Manager
n Run this command from the <PKCS#11 Dir> directory.
n This tool can create keys and browse the content of the HSM partition (that
stores keys and certificates).
n Follow the tool's menu to see the available options.
b. fxcli-hsm
n Run this command from the <CLI Dir> directory.
n To see all available commands in this shell, run: help
n To see all available options for a command in this shell, either run only the
command, or the command with the "-h" option.
Step Instructions
1 On the FutureX HSM Client Workstation, open the FutureX CLI utility.
keytable reload
Important - Do not use the "... slot next" option, because it can override keys
for a fake certificate the Check Point Security Gateway / ClusterXL created.
Step Instructions
Important - Do not use the "... slot next" option, because it can override keys
for a fake certificate the Check Point Security Gateway / ClusterXL created.
5 Get the list of slots used for the CA certificate and CA certificate's key pair.
Run one of these commands:
keytable list
keytable reload
Note - The command "keytable list" shows the slot numbers as the PKCS#11
handles plus one. For example, it shows slot 0 as handle 1, slot 1 as handle 2, and so
on.
Step 3 of 3: Configuring the Security Gateway / ClusterXL to Work with the FutureX HSM Server
Step Instructions
2 On the Security Gateway / each Cluster Member, disable the HSM in the
$FWDIR/conf/hsm_configuration.C file.
a. Connect to the command line.
b. Log in to the Expert mode.
c. Edit the file:
vi $FWDIR/conf/hsm_configuration.C
d. Configure the value "no" for the parameter "enabled":
:enabled ("no")
e. Save the changes in the file and exit the editor.
3 In SmartConsole, install the applicable Access Control Policy on the Security Gateway /
ClusterXL object.
4 Make sure that HTTPS Inspection works correctly without the HSM Server:
a. From an internal computer, connect to any HTTPS web site.
b. On the internal computer, in the web browser, you must receive the signed CA
certificate from the Security Gateway / ClusterXL.
Sub-Step 3-B: Installing the required software packages on the Security Gateway (Cluster
Members)
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the VSX Gateway
or each VSX Cluster Member (context of VS 0).
Step Instructions
1 Transfer the FutureX PKCS #11 binary files to the Security Gateway / each Cluster
Member:
a. Open the FutureX PKCS#11 Library package.
b. Go to this folder:
fxpkcs11-linux-<BUILD> > fxpkcs11 > x86 > OpenSSL-1.1.x
c. Transfer these files to the Security Gateway (each Cluster Member) to the
/usr/lib/hsm_client/ directory:
n libfxpkcs11.so
n configTest
2 Transfer the FutureX PKCS #11 configuration file to the Security Gateway / each
Cluster Member:
a. Open the FutureX PKCS#11 Library package.
b. Go to this folder:
fxpkcs11-linux-<BUILD> > fxpkcs11
c. Transfer this file to the Security Gateway / each Cluster Member to the /etc/
directory:
fxpkcs11.cfg
Sub-Step 3-C: Configuring a connection between the Security Gateway / Cluster Members
and the FutureX HSM Server
To establish a connection between a Check PointSecurity Gateway (HSM client) to a FutureX HSM
server, you must create certificate files for the TLS authentication between the Check PointSecurity
Gateway and the FutureX HSM server. These are the options to create the required certificate files:
n Create the certificates on the HSM (the most common method).
n Get the certificates from the FutureX vendor.
n Enabling the "Anonymous" setting on the HSM server, so that mutual authentication is not
required (see the FutureX Integration Guide).
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the VSX Gateway
or each VSX Cluster Member (context of VS 0).
Step Instructions
1 Transfer the FutureX certificate files you received from the FutureX vendor to the
Security Gateway / each Cluster Member to the /usr/futurex/ directory.
2 Connect to the command line on the Security Gateway / each Cluster Member.
Step Instructions
<LOG-FILE> /var/log/fxpkcs11.log
Sub-Step 3-D: Configuring HTTPS Inspection on the Security Gateway / Cluster Members to
work with the FutureX HSM Server
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the VSX Gateway
or each VSX Cluster Member (context of VS 0).
Notes:
n After you apply the HSM configuration for the first time, you can get an HSM
connection error.
Most common scenario is when you configure several Security Gateways / Cluster
Members to use the same HSM Server, and they access it at the same time.
In this case:
a. Run the "fw fetch local" command on the Security Gateway / Cluster
Member that has an HSM connection issue.
In a VSX environment, run this command in the context of the problematic
VSX Virtual System.
b. When you see "HSM on" on the screen, continue to configure the next Security
Gateway / each Cluster Member / VSX Virtual System.
n After any change in the $FWDIR/conf/hsm_configuration.C file, you must do
one of these:
l Fetch the local policy with the "fw fetch local" command
Step Instructions
1 Connect to the command line on the Security Gateway / each Cluster Member.
Step Instructions
Notes:
n The ":enabled ()" attribute must have the value of either "yes" (to enable the
HSM), or "no" (to disable the HSM).
n The ":hsm_vendor_name ()" attribute must contain the string "FutureX
HSM".
n The ":lib_filename ()" attribute must contain the full path to the file
libfxpkcs11.so (from the FutureX PKCS #11 Library) on the Security
Gateway / each Cluster Member.
You must configure this full path explicitly, if this file is not located at the
default path: /usr/lib/libfxpkcs11.so
n The ":CA_cert_<XXX> ()" attributes must have the required values of
handles from the output of the "keytable" command on the FutureX HSM
Server.
See "Step 2 of 3: Creating the CA Certificate on the FutureX HSM Server"
on page 72.
n The ":token_id ()" attribute must have the contain the password for the
partition on the FutureX HSM Server.
Example:
(:enabled ("yes")
:hsm_vendor_name ("FutureX HSM")
:lib_filename ("")
:CA_cert_public_key_handle (1)
:CA_cert_private_key_handle (2)
:CA_cert_buffer_handle (3)
:token_id ("p@ssw0rd")
)
Step Instructions
Important - This blocks all traffic until all services restart. In a cluster, this
can cause a failover.
n If the value of the ":hsm_vendor_name ()" attribute already contained the string
"FutureX HSM", then fetch the local policy with this command:
fw fetch local
7 Make sure that the Security Gateway / each Cluster Member can connect to the HSM
Server and that HTTPS Inspection is activated successfully on the outbound traffic.
Run this command:
cpstat https_inspection -f all
The output must show:
n HSM partition access (Accessible/Not Accessible):
Accessible
n Outbound status (HSM on/HSM off/HSM error): HSM on
For more information, see "Monitoring HTTPS Inspection with HSM in CLI" on page 96.
Note - If there is a connectivity issue from the Check Point Security Gateway / Cluster
Member to the FutureX HSM Server, then perform these steps on the Security Gateway /
Cluster Member:
1. Examine the /var/log/fxpkcs11.log file.
If you do not see a root cause in this log file, continue to the next step to configure
verbose logs.
2. Configure these logging settings in the /etc/fxpkcs11.cfg file to see more information
in the log file:
n LOG-TRAFFIC: YES
n LOG-MODE: INFO
or
LOG-MODE: ERROR
Step Instructions
1 Connect to the command line on the Security Gateway / each Cluster Member.
6 On the Security Gateway / each Cluster Member / Security Group, restart Check Point
services:
cprestart
Important - Traffic does not flow through until the services start.
Note - To see detailed information about wstlsd initialization, follow sk105559: How to debug
WSTLSD daemon.
Step Instructions
1 From the left navigation panel, click Logs & Monitor > Logs.
Log Additional
Log Description Explanation
Information
Log Additional
Log Description Explanation
Information
Log Additional
Log Description Explanation
Information
Outbound HTTPS One of these strings: See the section Log Additional Information in
inspection is off the log.
due to HSM error
n HSM
configuration
file is
corrupted
n Loading HSM
library failed
n There is no
trust or no
connectivity
with HSM server
n Login to HSM
partition
failed
n Error importing
CA certificate
from HSM server
n Error
generating key
pair on HSM
server
Example:
.iso.org.dod.internet.private.enterprises.checkpoint.products.httpsIns
pection
.1.3.6.1.4.1.2620.1.54
Returned
SNMP OID Explanation
strings
To get the HTTPS Inspection status description, query this SNMP object:
Returned
SNMP OID Explanation
strings
Returned
SNMP OID Explanation
strings
To get the HSM configuration status description, query this SNMP object:
Returned
SNMP OID Explanation
strings
To get the HSM partition access status, query this SNMP object:
Returned
SNMP OID Explanation
strings
To get the HSM partition access status description, query this SNMP object:
Returned
SNMP OID Explanation
strings
To get the Outbound HTTPS Inspection status, query this SNMP object:
Returned
SNMP OID Explanation
strings
Note - The conditions for the returned strings are calculated on the Security Gateway / Cluster
Member during the start of the HTTPS Inspection daemon wstlsd, or during policy
installation. For example, you can get "hsmStatus.hsmEnabled = HSM enabled" and
"hsmStatus.outboundStatus = HSM off", because when the wstlsd daemon started,
or during last policy installation, the HSM configuration was disabled.
To get the Outbound HTTPS Inspection status description, query this SNMP object:
Note - The conditions for the returned strings are calculated on the Security Gateway / Cluster
Member during the start of the HTTPS Inspection daemon wstlsd, or during policy
installation. For example, you can get "hsmStatus.hsmEnabledDescription = HSM is
enabled for HTTPS inspection with <HSM Vendor>" and
"hsmStatus.outboundStatusDescription = Outbound HTTPS inspection
works without HSM", because when the wstlsd daemon started, or during last policy
installation, the HSM configuration was disabled.
Examples
# snmpwalk -m $CPDIR/lib/snmp/chkpnt.mib -On -v 2c -c public localhost 1.3.6.1.4.1.2620.1.54
.1.3.6.1.4.1.2620.1.54.1.0 = STRING: On
.1.3.6.1.4.1.2620.1.54.2.0 = STRING: HTTPS Inspection is on
.1.3.6.1.4.1.2620.1.54.3.1.0 = STRING: Enabled
.1.3.6.1.4.1.2620.1.54.3.2.0 = STRING: HSM is enabled for HTTPS inspection with Gemalto HSM
.1.3.6.1.4.1.2620.1.54.3.3.0 = STRING: Accessible
.1.3.6.1.4.1.2620.1.54.3.4.0 = STRING: Gateway can access HSM partition for HTTPS inspection
.1.3.6.1.4.1.2620.1.54.3.5.0 = STRING: HSM on
.1.3.6.1.4.1.2620.1.54.3.6.0 = STRING: Outbound HTTPS inspection works with HSM
CHECKPOINT-MIB::httpsInspectionStatus.0 = STRING: On
CHECKPOINT-MIB::httpsInspectionStatusDescription.0 = STRING: HTTPS Inspection is on
CHECKPOINT-MIB::hsmEnabled.0 = STRING: Enabled
CHECKPOINT-MIB::hsmEnabledDescription.0 = STRING: HSM is enabled for HTTPS inspection with Gemalto HSM
CHECKPOINT-MIB::hsmPartitionAccess.0 = STRING: Accessible
CHECKPOINT-MIB::hsmPartitionAccessDescription.0 = STRING: Gateway can access HSM partition for HTTPS
inspection
CHECKPOINT-MIB::outboundStatus.0 = STRING: HSM on
CHECKPOINT-MIB::outboundStatusDescription.0 = STRING: Outbound HTTPS inspection works with HSM
For more information about SNMP on Gaia OS, see the R81 Gaia Administration Guide > Chapter System
Management > Section SNMP.
Syntax
cpstat -h
For more information about this command, see the R81 CLI Reference Guide > Chapter Security Gateway
Commands > Section cpstat.
Example outputs
[Expert@GW:0]# cpstat https_inspection -f default
[Expert@GW:0]#
[Expert@GW:0]#
[Expert@GW:0]#
Possible
Item returned Explanation
strings
Possible
Item Explanation
returned strings
Possible
Item returned Explanation
strings
HSM enabled Enabled The value of the :enabled() attribute is set to "yes" in
(Enabled/Disabled) the $FWDIR/conf/hsm_configuration.C file on
the Security Gateway / Cluster Member.
Possible returned
Item Explanation
strings
HSM enabled HSM is enabled n The value of the :enabled() attribute is set to
description for HTTPS "yes" in the $FWDIR/conf/hsm_
inspection with configuration.C file on the Security Gateway
<HSM Vendor> / Cluster Member.
n The <HSM Vendor> is the value of the ":hsm_
vendor_name ()" attribute in the
$FWDIR/conf/hsm_configuration.C file on
the Security Gateway / Cluster Member.
Possible
Item Explanation
returned strings
HSM partition access N/A Security Gateway / Cluster Member could not
(Accessible/Not check the access to its partition on the HSM
Accessible) Server.
HSM partition HSM partition access Security Gateway / Cluster Member could not
access cannot be checked check the access to its partition on the HSM
description Server.
Most probably, because HSM configuration is
disabled on the Security Gateway / Cluster
Member.
Possible
Item returned Explanation
strings
Note - The conditions for the returned strings are calculated on the Security Gateway / Cluster
Member during the start of the HTTPS Inspection daemon wstlsd, or during policy
installation. For example, you can get "HSM enabled (Enabled/Disabled) = Enabled"
and "Outbound status (HSM on/HSM off/HSM error) = HSM off", because when
the wstlsd daemon started, or during last policy installation, the HSM configuration was
disabled.
Note - The conditions for the returned strings are calculated on the Security Gateway / Cluster
Member during the start of the HTTPS Inspection daemon wstlsd, or during policy
installation. For example, you can get "HSM enabled (Enabled/Disabled) = Enabled"
and "Outbound status description = Outbound HTTPS inspection works
without HSM", because when the wstlsd daemon started, or during last policy installation,
the HSM configuration was disabled.
Introduction 104
ISP Redundancy Modes 108
Outgoing Connections 109
Incoming Connections 110
Important - ISP Redundancy is not supported if Dynamic Routing is configured (Known Limitation
PMTR-68991).
Note - For information about ISP Redundancy on a Cluster, see the R81 ClusterXL Administration
Guide.
Introduction
ISP Redundancy connects a Security Gateway to the Internet through redundant Internet Service Provider
(ISP) links.
ISP Redundancy monitors the ISP links and chooses the best current link.
Notes:
n R81 supports two ISPs.
n ISP Redundancy is intended to traffic that originates on your internal networks and goes to
the Internet.
Item Description
1 Internal network
2 Security Gateway
3 ISP
4 Internet
Example of a typical deployment with two dedicated physical interfaces for two ISP links
Best Practice - We recommend this deployment, because it is simpler than deployment with one
> dedicated physical interface.
Item Description
1 Internal network
2 Security Gateway
3 ISP A
4 ISP B
5 Internet
Example of a typical deployment with one dedicated physical interface for two ISP links
If only one external interface is available on the Security Gateway, you can configure two subnets on the
same external interface.
(See the R81 Gaia Administration Guide > Chapter Network Management > Section Network Interfaces >
Section Aliases.)
Both ISP links are then connected to the same Security Gateway interface, but to different next hop routers,
usually through a switch.
Item Description
1 Internal network
2 Security Gateway
3 Switch
4 ISP A
5 ISP B
6 Internet
Mode Description
Best Practice:
n If both ISPs are basically the same, use the Load Sharing mode to ensure that you are
making the best use of both ISPs.
n You may prefer to use one of your two ISPs that is more cost-effective in terms of price and
reliability. In that case, use Primary/Backup mode and set the more cost-effective ISP as
the Primary ISP link.
Outgoing Connections
n In ISP Redundancy Load Sharing mode, outgoing traffic that exits the Security Gateway on its way to
the Internet is distributed between the ISP Links. You can set a relative weight for how much you want
each of the ISP Links to be used.
For example, if one link is faster, it can be configured to route more traffic across that ISP link than the
other.
n In ISP Redundancy Primary/Backup mode, outgoing traffic uses an active primary link.
Hide NAT is used to change the source address of outgoing packets to the address of the interface,
through which the packet leaves the Security Gateway. This allows return packets to be automatically
routed through the same ISP link, because their destination address is the address of the correct link.
Hide NAT is configured by the administrator.
Incoming Connections
For external users to make incoming connections, the administrator must give each application server two
routable IP addresses, one for each ISP. The administrator must also configure Static NAT to translate the
routable addresses to the real server address.
If the servers handle different services (for example, HTTP and FTP), you can use NAT to employ only two
routable IP addresses for all the publicly available servers.
External clients use one of the two addresses. In order to connect, the clients must be able to resolve the
DNS name of the server to the correct IP address.
Note - In the following example, the subnets 172.16.0.0/24 and 192.168.0.0/24 represent public
routable addresses.
In the following example, the Web server www.example.com is assigned an IP address from each ISP:
n 192.168.1.2 from ISP A
n 172.16.2.2 from ISP B
If the ISP Link A is down, then IP address 192.168.1.2 becomes unavailable, and the clients must be able
to resolve the URL www.example.com to the IP address 172.16.2.2.
An incoming connection is established, based on this example, in the following sequence:
1. When an external client on the Internet contacts www.example.com, the client sends a DNS query
for the IP address of this URL.
The DNS query reaches the Security Gateway. The Security Gateway has a built-in mini-DNS server
that can be configured to intercept DNS queries (of Type A) for servers in its domain.
2. A DNS query arriving at an interface that belongs to one of the ISP links, is intercepted by the Security
Gateway.
3. If the Security Gateway recognizes the name of the host, it sends one of the following replies:
n In ISP Redundancy Primary/Backup mode, the Security Gateway replies only with the IP
addresses associated with the Primary ISP link, as long as the Primary ISP link is active.
n In ISP Redundancy Load Sharing mode, the Security Gateway replies with two IP addresses,
alternating their order.
4. If the Security Gateway is unable to handle DNS requests (for example, it may not recognize the host
name), it passes the DNS query to its original destination or the DNS server of the domain
example.com.
5. When the external client receives the reply to its DNS query, it opens a connection. Once the packets
reach the Security Gateway, the Security Gateway uses Static NAT to translate the destination IP
address 192.168.1.2 or 172.16.2.2 to the real server IP address 10.0.0.2.
6. The Security Gateway routes the reply packets from the server to the client through the same ISP link
that was used to initiate the connection.
Make sure you have the ISP data - the speed of the link and next hop IP address.
Automatic vs Manual configuration:
n If the Security Gateway object has two interfaces with Topology "External" in the Network
Management page, you can configure the ISP links automatically.
Configuring ISP links automatically
n If the Security Gateway object only one interface with Topology "External" in the Network
Management page, you must configure the ISP links manually.
Configuring ISP links manually
The Security Gateway, or a DNS server behind it, must respond to DNS queries.
It resolves IP addresses of servers in the DMZ (or another internal network).
Note - If the servers use different services (for example, HTTP and FTP), you can
use NAT for only two public IP addresses.
Services &
Destinatio Install
Name Source VPN Application Action Track
n On
s
DNS Proxy Applicable Applicable DNS Any domain_udp Accept None Policy
sources Servers Targets
The Access Control Policy must allow connections through the ISP links, with Automatic Hide NAT
on network objects that start outgoing connections.
a. In the properties of the object for an internal network, select NAT > Add Automatic Address
Translation Rules.
b. Select Hide behind the gateway.
c. Click OK.
d. Define rules for publicly reachable servers (Web servers, DNS servers, DMZ servers).
n If you have one public IP address from each ISP for the Security Gateway, define
Static NAT.
Allow specific services for specific servers.
For example, make NAT rules, so that incoming HTTP connections from the two ISPs
reach a Web server, and DNS traffic from the ISP reach the DNS server.
Example: Manual Static Rules for a Web Server and a DNS Server
n If you have a public IP address from each ISP for each publicly reachable server (in
addition to the Security Gateway), define NAT rules:
i. Give each server a private IP address.
ii. Use the public IP addresses in the Original Destination.
iii. Use the private IP address in the Translated Destination.
iv. Select Any as the Original Service.
Note - If you use Manual NAT, then automatic ARP does not work for the IP addresses
behind NAT. You must configure the local.arp file as described in sk30197.
10. Install the Access Control Policy on this Security Gateway object.
When ISP Redundancy is enabled, VPN encrypted connections survive a failure of an ISP link.
The settings in the ISP Redundancy page override settings in the IPsec VPN > Link Selection page.
Configuring ISP Redundancy for VPN with a Check Point peer
Step Instructions
7 Make sure that Use ongoing probing. Link redundancy mode shows the mode of the ISP
Redundancy:
High Availability (for Primary/Backup) or Load Sharing.
The VPN Link Selection now only probes the ISP configured in ISP Redundancy.
If the VPN peer is not a Check Point Security Gateway, the VPN may fail, or the third-party device may
continue to encrypt traffic to a failed ISP link.
n Make sure the third-party VPN peer recognizes encrypted traffic from the secondary ISP link as
coming from the Check Point cluster.
n Change the configuration of ISP Redundancy to not use these Check Point technologies:
l Use Probing - Makes sure that Link Selection uses another option.
l The options Load Sharing, Service Based Link Selection, and Route based probing work
only on Check Point Security Gateways and Clusters.
If used, the Security Gateway or Cluster Members use one link to connect to the third-party
VPN peer.
The link with the highest prefix length and lowest metric is used.
For more information, see the R81 CLI Reference Guide > Chapter Security Gateway Commands - Section
fw - Section fw isp_link.
Warning - We do not recommend that you make any changes in this script.
Action Description
Only mirror of all Your Security Gateway or Cluster clones all traffic (including HTTPS without
traffic decryption) that passes through it, and sends it out of the designated physical
interface.
Mirror and Your Security Gateway or Cluster clones all HTTPS traffic that passes through it,
Decrypt of decrypts it, and sends it in clear-text out of the designated physical interface.
HTTPS traffic Note - If you wish to decrypt the HTTPS traffic, you must enable and configure
the HTTPS Inspection on your Security Gateway, or Cluster.
You can add a third-party Recorder or Packet-Broker in your environment and forward to it the traffic that
passes through your Security Gateway, or Cluster.
This Recorder or Packet-Broker must work in monitor (promiscuous) mode to accept the decrypted and
mirrored traffic from your Security Gateway, or Cluster.
Security Gateway, or Cluster works only with one Recorder, which is directly connected to a designated
physical network interface (NIC) on the Check Point Gateway, or Cluster Members.
Item Description
1 First network that sends and receives traffic through the Security Gateway (2).
2 Security Gateway, through which networks (1) and (3) send and receive their traffic.
3 Second network that sends and receives traffic through the Security Gateway (2).
A Traffic flow between the first network (1) and the Security Gateway (2).
B Traffic flow between the second network (3) and the Security Gateway (2).
C Flow of the decrypted and mirrored traffic from the Security Gateway (2) to the Recorder, or
Packet-Broker (5).
Mirror only of all traffic MAC address of the designated physical interface.
2 Maximum Transmission Unit (MTU) on the Mirror and Decrypt designated physical interface:
n MTU value has to be 1500 (default), or at least the maximum MTU value from other
interfaces on the Security Gateway.
Item Description
1 Security Gateway, through which your networks send and receive their traffic.
3 Flow of the decrypted and mirrored traffic from the Security Gateway (1) to the Recorder, or
Packet-Broker (2).
Step Instructions
1 Read and follow the "Mirror and Decrypt Requirements" on page 120.
3 Configure the Mirror and Decrypt in the Security Gateway, or Cluster object in SmartConsole.
See "Configuring Mirror and Decrypt in SmartConsole for Gateway Mode" on page 123.
1 Select a designated physical interface for Mirror and Decrypt on the Security Gateway, or
each cluster member.
Important - On cluster members, you must select an interface with the same name (for
example, eth3 on each cluster member).
3 Configure the required Maximum Transmission Unit (MTU) on this designated physical
interface.
MTU has to be the default 1500, or at least the maximal MTU value from other interfaces on
the Security Gateway.
For instructions about configuring an MTU on a physical interface, see the R81 Gaia
Administration Guide - Chapter Network Management - Section Network Interfaces - Section
Physical Interfaces.
4 Important - On cluster members, you must configure this designated physical interface in
the $FWDIR/conf/discntd.if file on each Cluster Member.
Step Instructions
g Click OK.
2. Configure the HTTPS Inspection Rule Base (for decrypting the HTTPS traffic).
Procedure
Step Instructions
3. Activate the Mirror and Decrypt in the object of your Security Gateway, or Cluster.
Procedure
Step Instructions
Step Instructions
e Make sure the interface designated for Mirror and Decrypt is listed with the dummy
IP address.
f Select the interface designated for Mirror and Decrypt and click Edit.
m Click OK to save the changes and close the Topology Settings window.
p In the Mirror gateway traffic to interface field, select the designated physical
interface.
q Click OK to save the changes and close the Security Gateway, or Cluster properties
window.
4. Configure the Mirror and Decrypt rules in the Access Control Policy for the traffic you wish to mirror
and decrypt.
Procedure
Best Practice - We recommend you to configure a new separate Access Control Layer
to contain Mirror and Decrypt rules. Alternatively, you can configure the Mirror and
>
Decrypt rules in the regular Rule Base.
Important - When you configure the Mirror and Decrypt rules, these limitations apply:
n In the Mirror and Decrypt rules, you must not select Content criteria, such as
Application, URL Filtering, Service matched by IP Protocol, Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules that
contain Content criteria, such as Application, URL Filtering, Service matched by
IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an excluded
destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings: <M&D>, <M&d>,
<m&D>, or <m&d>.
The procedure below describes how to configure the Mirror and Decrypt rules in a separate
Access Control Layer in SmartConsole:
Step Instructions
c In SmartConsole top left corner, click Menu > Manage policies and layers.
d Select the existing policy and click Edit (the pencil icon).
Alternatively, create a new policy.
f In the Policy Types section, make sure you select only the Access Control.
g In Access Control section, click on the + (plus) icon. A pop up window opens.
h In the top right corner of this pop up window, click New Layer.
The Layer Editor window opens.
i From the navigation tree of the Layer Editor window, click General.
j In the Blades section, make sure you select only the Firewall.
k On other pages of the Layer Editor window, configure additional applicable settings.
Click OK.
l In the Access Control section, you see the Network Layer and the new Access
Control Layer.
Step Instructions
o In the Access Control section, click the new Access Control Layer.
In the default rule, you must change the Action column from Drop to Accept to
not affect the policy enforcement:
n Name - Your text
p Above the existing Cleanup rule, add the applicable rules for the traffic you wish to
Mirror and Decrypt.
You must configure the Mirror and Decrypt rules as follows:
n Name - Must contain one of these strings (the angle brackets <> are
mandatory):
l <M&D>
l <M&d>
l <m&D>
l <m&d>
higher
Important:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules
that contain Content criteria, such as Application, URL Filtering, Service
matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an excluded
destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings: <M&D>,
<M&d>, <m&D>, or <m&d>.
Step Instructions
s If in a Mirror and Decrypt rule you set the Track to Log, then you can filter the logs for
this rule by the Access Rule Name, which contains the configured string:
<M&D>, <M&d>, <m&D>, or <m&d>.
Item Description
1 VSX Gateway.
3 Virtual System, through which your networks send and receive their traffic.
4 Flow of the decrypted and mirrored traffic from the VSX Gateway (1) to the Recorder, or
Packet-Broker (2).
Item Description
1 VSX Gateway.
2 First Virtual System, through which your networks send and receive their traffic.
3 Second Virtual System, through which your networks send and receive their traffic.
4 Flow of the decrypted and mirrored traffic from the VSX Gateway (1) to the Recorder, or
Packet-Broker (5).
5 Recorder, or Packet-Broker.
wrp128 One of the virtual interfaces on the Virtual Systems (2 and 3).
Important - It is not supported to change the designated physical interface with the "vsx_util
change_interfaces" command. For information about this command, see the R81 VSX
Administration Guide.
Step Instructions
1 Read and follow the "Mirror and Decrypt Requirements" on page 120.
3 Configure the Mirror and Decrypt in the Virtual System object in SmartConsole.
See:
n "Configuring Mirror and Decrypt in SmartConsole for One Virtual System" on
page 132.
n "Configuring Mirror and Decrypt in SmartConsole for Several Virtual Systems" on
page 137.
1 Select a designated physical interface for Mirror and Decrypt on the VSX Gateway, or each
VSX Cluster Member.
Important - On VSX Cluster Members, you must select an interface with the same name
(for example, eth3 on each VSX Cluster Member).
3 Configure the required Maximum Transmission Unit (MTU) on this designated physical
interface.
MTU has to be the default 1500, or at least the maximal MTU value from other interfaces on
the VSX Gateway, or VSX Cluster Member.
For instructions about configuring an MTU on a physical interface, see R81 Gaia
Administration Guide - Chapter Network Management - Section Network Interfaces - Section
Physical Interfaces.
4 Important - In VSX Cluster, you must configure this designated physical interface in the
$FWDIR/conf/discntd.if file on each VSX Cluster Member.
Step Instructions
g Click OK.
2. Configure the HTTPS Inspection Rule Base (for decrypting the HTTPS traffic).
Procedure
Step Instructions
3. Add the designated physical interface in the object of the Virtual System.
Procedure
Step Instructions
Step Instructions
4. Activate the Mirror and Decrypt in the object of the Virtual System.
Procedure
Step Instructions
c From the left tree, click the [+] near the Other and click Mirror and Decrypt.
e In the Mirror gateway traffic to interface field, select the designated physical
interface.
f Click OK to save the changes and close the Virtual System properties window.
5. Configure the Mirror and Decrypt rules in the Access Control Policy for the traffic you wish to mirror
and decrypt.
Procedure
Best Practice - We recommend you to configure a new separate Access Control Layer
to contain Mirror and Decrypt rules. Alternatively, you can configure the Mirror and
>
Decrypt rules in the regular Rule Base.
Important - When you configure the Mirror and Decrypt rules, these limitations apply:
n In the Mirror and Decrypt rules, you must not select Content criteria, such as
Application, URL Filtering, Service matched by IP Protocol, Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules that
contain Content criteria, such as Application, URL Filtering, Service matched by
IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an excluded
destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings: <M&D>, <M&d>,
<m&D>, or <m&d>.
The procedure below describes how to configure the Mirror and Decrypt rules in a separate
Access Control Layer in SmartConsole:
Step Instructions
c In SmartConsole top left corner, click Menu > Manage policies and layers.
d Select the existing policy and click Edit (the pencil icon).
Alternatively, create a new policy.
f In the Policy Types section, make sure you select only the Access Control.
g In Access Control section, click on the + (plus) icon. A pop up window opens.
h In the top right corner of this pop up window, click New Layer.
The Layer Editor window opens.
i From the navigation tree of the Layer Editor window, click General.
j In the Blades section, make sure you select only the Firewall.
k On other pages of the Layer Editor window, configure additional applicable settings.
Click OK.
l In the Access Control section, you see the Network Layer and the new Access
Control Layer.
Step Instructions
o In the Access Control section, click the new Access Control Layer.
In the default rule, you must change the Action column from Drop to Accept to
not affect the policy enforcement:
n Name - Your text
p Above the existing Cleanup rule, add the applicable rules for the traffic you wish to
Mirror and Decrypt.
You must configure the Mirror and Decrypt rules as follows:
n Name - Must contain one of these strings (the angle brackets <> are
mandatory):
l <M&D>
l <M&d>
l <m&D>
l <m&d>
higher
Important:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules
that contain Content criteria, such as Application, URL Filtering, Service
matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an excluded
destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings: <M&D>,
<M&d>, <m&D>, or <m&d>.
Step Instructions
s If in a Mirror and Decrypt rule you set the Track to Log, then you can filter the logs for
this rule by the Access Rule Name, which contains the configured string:
<M&D>, <M&d>, <m&D>, or <m&d>.
Step Instructions
g Click OK.
2. Configure the HTTPS Inspection Rule Base (for decrypting the HTTPS traffic).
Procedure
Step Instructions
3. Define the designated physical interface as VLAN Trunk in the object of the VSX Gateway, or VSX
Cluster.
Procedure
Note - If the Recorder or Packet-Broker connects to the VSX Gateway, or VSX Cluster
members through a Switch, configure a VLAN Trunk on the applicable Switch port. The
VLAN Trunk port on the Switch must accept all VLAN IDs that you configure in the
applicable Virtual Systems.
Step Instructions
3 Check the box VLAN Trunk near the designated physical interface.
4 Click OK.
4. Add the designated physical interface in the object of each applicable Virtual System.
Procedure
Step Instructions
5. Activate the Mirror and Decrypt in the object of each applicable Virtual System.
Procedure
Step Instructions
c From the left tree, click the [+] near the Other and click Mirror and Decrypt.
Step Instructions
e In the Mirror gateway traffic to interface field, select the designated physical
interface.
f Click OK to save the changes and close the Virtual System properties window.
6. Configure the Mirror and Decrypt rules in the Access Control Policy for the traffic you wish to mirror
and decrypt.
Procedure
Best Practice - We recommend you to configure a new separate Access Control Layer
to contain Mirror and Decrypt rules. Alternatively, you can configure the Mirror and
>
Decrypt rules in the regular Rule Base.
Important - When you configure the Mirror and Decrypt rules, these limitations apply:
n In the Mirror and Decrypt rules, you must not select Content criteria, such as
Application, URL Filtering, Service matched by IP Protocol, Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules that
contain Content criteria, such as Application, URL Filtering, Service matched by
IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an excluded
destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings: <M&D>, <M&d>,
<m&D>, or <m&d>.
The procedure below describes how to configure the Mirror and Decrypt rules in a separate
Access Control Layer in SmartConsole:
Step Instructions
c In SmartConsole top left corner, click Menu > Manage policies and layers.
d Select the existing policy and click Edit (the pencil icon).
Alternatively, create a new policy.
f In the Policy Types section, make sure you select only the Access Control.
g In Access Control section, click on the + (plus) icon. A pop up window opens.
Step Instructions
h In the top right corner of this pop up window, click New Layer.
The Layer Editor window opens.
i From the navigation tree of the Layer Editor window, click General.
j In the Blades section, make sure you select only the Firewall.
k On other pages of the Layer Editor window, configure additional applicable settings.
Click OK.
l In the Access Control section, you see the Network Layer and the new Access
Control Layer.
o In the Access Control section, click the new Access Control Layer.
In the default rule, you must change the Action column from Drop to Accept to
not affect the policy enforcement:
n Name - Your text
Step Instructions
p Above the existing Cleanup rule, add the applicable rules for the traffic you wish to
Mirror and Decrypt.
You must configure the Mirror and Decrypt rules as follows:
n Name - Must contain one of these strings (the angle brackets <> are
mandatory):
l <M&D>
l <M&d>
l <m&D>
l <m&d>
higher
Important:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules
that contain Content criteria, such as Application, URL Filtering, Service
matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an excluded
destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings: <M&D>,
<M&d>, <m&D>, or <m&d>.
s If in a Mirror and Decrypt rule you set the Track to Log, then you can filter the logs for
this rule by the Access Rule Name, which contains the configured string:
<M&D>, <M&d>, <m&D>, or <m&d>.
Item Description
2 From the left navigation panel, click Logs & Monitor > Logs.
The Mirror and Decrypt logs show this information in the More section > Mirror and Decrypt field:
Action Description
Decrypt and mirror Security Gateway decrypted and mirrored the HTTP / HTTPS traffic
Note - This can be the case even for a clear-text HTTP connection, because the
HTTPS Inspection inspects it first (example is all connections that use proxy
8080).
Partial mirroring Security Gateway started to decrypt the traffic, but stopped later due to a
(HTTPS inspection Bypass rule (for example, a rule with a Category).
Bypass) Therefore, the mirrored connection is not complete.
When a client requests access to an application that is load balanced by ConnectControl, the request goes
through the Security Gateway or Cluster.
Item Description
1 Client request - A client starts a connection with the logical IP address of the application
server (the address assigned to the Logical server).
3 Security Gateway - The service request arrives at the destination public IP address of the
Logical Server, which is on the Security Gateway. The request is matched to the Logical
Server rule in the Rule Base. The Security Gateway directs the request to the internal IP
address of the Logical Server group.
4 Logical Server - ConnectControl determines which server in the Logical Server group is best
for the request, based on the selected load-balancing method.
Note - Make sure that rules that allow traffic for services to ConnectControl Logical Servers and
that server groups are before Access Control Policy rules that allow traffic for those services.
Configuring ConnectControl
This procedure explains the steps to set up ConnectControl in your environment.
Procedure
1. In the SmartConsole, click Objects menu > Object Explorer (or press Ctrl+E).
2. Define a Host object for each of the servers that will be load-balanced.
In the Object Explorer, from the toolbar, click New > Host.
3. Define a Network Group object to contain all Host objects for each of the servers that will be load-
balanced.
Instructions
In the Object Explorer, from the toolbar, click New > Network Group.
a. Name the group (for example, HTTP_Server_Group).
b. Add the Host objects for each of the servers.
a. In the Object Explorer, from the toolbar, click New > Network Object > More > Logical
Server.
b. In the New Logical Server window, enter a name for the ConnectControl Logical Server.
c. Enter a Virtual IP address.
Make sure the IP address is a public IP address.
All traffic to be load-balanced, must be directed through the cluster.
Note for a cluster environment
If the assigned IP address is on the same subnet as a Cluster Virtual IP address, you
also need to configure a Manual ARP proxy entry for this IP address.
i. Click Menu >Global properties > NAT - Network Address Translation.
ii. Select Merge manual proxy ARP configuration.
iii. Click OK.
iv. Configure the $FWDIR/conf/local.arp file as described in sk30197.
v. Install the Access Control Policy on this cluster object.
When you create the Logical server object, configure the server type as HTTP or
Other. This distinction is important. ConnectControl handles the connection to the
client differently for each server type.
n The HTTP server type uses HTTP redirection.
This type supports offsite HTTP servers and form-based applications, but only
works with the HTTP protocol. An HTTP Logical server makes sure that all
HTTP-connection sessions are directed to one server, which is a requirement
for many Web applications. ConnectControl finds the correct physical server,
behind the Security Gateway or offsite, based on the selected load-balancing
method. The session connections continue to go to that one server.
n The Other server type uses NAT (address translation) to send traffic to the
grouped servers.
This Logical server supports all protocols (including HTTP) and gives the most
effectively balanced load. It requires servers to be NATed by the Security
Gateway. ConnectControl mediates each service request and then selects the
server to get that request. It uses NAT to change the destination IP address of
the incoming packet. If a return connection is opened, the connection is
automatically established between the server and the client. The server's
source address in the packet is translated to the IP address of the Logical
server. On the packet's return, the Security Gateway translates the packet's
original address to the IP address of the Logical server.
This setting maintains a client's connection to the server that ConnectControl first
selected.
n Persistency by server is useful for HTTP applications, such as forms, in a load-
balanced environment with multiple Web servers. ConnectControl directs an
HTTP client to one server for all requests. This allows clients to fill forms without
the data loss that occurs if different servers take the requests.
n Persistency by service is useful if you are load balancing multiple services in
your server group. For example, in a redundant environment of two servers,
each running HTTP and FTP, ConnectControl directs traffic from one client to
the server of the correct service. This prevents heavy load on one server, which
can happen with Persistency by server.
Item Description
2 Internet.
3 Security Gateway.
The service requests arrive at the destination public IP address of the
Logical Server, which is on the Security Gateway.
The Security Gateway directs the requests to the internal IP address of
the Logical Server group.
4 Logical Server group with two servers, each with FTP and HTTP
services.
ConnectControl balances the load between the servers.
Method Description
Round The Security Gateway directs service requests to the next server in
Robin the sequence.
This method is a good choice when all the load balanced servers
have similar RAM and CPU and are on the same segment.
h. Click OK.
8. For applications that use HTTP redirection, add a rule to allow the Network Group object (that
contains load-balanced server objects) to communicate directly with the clients:
10. Install the Access Control Policy on this Security Gateway or Cluster object.
Cloud Security
Check Point cloud security protects assets in the cloud from the most sophisticated threats with dynamic
scalability, intelligent provisioning and consistent control across physical and virtual networks.
For more information, see:
n R81 CloudGuard Controller Administration Guide
n https://www.checkpoint.com/products/
Advanced Routing
Gaia OS supports:
n Dynamic Routing protocols - OSPF, BGP, and RIP.
n Dynamic Multicast Routing - PIM Sparse Mode (SM), PIM Dense Mode (DM), PIM Source-Specific
Multicast (SSM), and IGMP.
n Different routing options.
You can configure these routing protocols and options in Gaia Portal and Gaia Clish.
For more information, see the R81 Gaia Advanced Routing Administration Guide.
SNMP
SNMP, as implemented on Check Point platforms, enables an SNMP manager to monitor the device using
GetRequest, GetNextRequest, GetBulkRequest, and a select number of traps.
The Check Point implementation also supports using SetRequest to change these attributes:
sysContact, sysLocation, and sysName. You must configure read-write permissions for set operations
to work.
Check Point Gaia supports SNMP v1, v2, and v3.
For more information, see the R81 Gaia Administration Guide > Chapter System Management > Section
SNMP.
Item Description
1 Switch with a mirror or SPAN port that duplicates all incoming and outgoing packets.
The Security Gateway connects to a mirror or SPAN port on the switch.
2 Servers.
3 Clients.
Item Description
3 Switch that connects the first network segment to one bridged subordinate interface (4) on the
Security Gateway in Bridge Mode.
4 One bridged subordinate interface (for example, eth1) on the Security Gateway in Bridge
Mode.
6 Another bridged subordinate interface (for example, eth2) on the Security Gateway in Bridge
Mode.
7 Dedicated Gaia Management Interface (for example, eth0) on the Security Gateway.
8 Switch that connects the second network segment to the other bridged subordinate interface
(6) on the Security Gateway in Bridge Mode.
Baseline
Name of Policy Description
Security
Initial Policy InitialPolicy Security before a policy is installed for the first time, or when
Security Gateway failed to load the policy.
Important - If you disable the boot security or unload the currently installed policy, you leave your
Security Gateway, or a Cluster Member without protection.
Best Practice - Before you disable the boot security, we recommend to disconnect your
Security Gateway, or a Cluster Member from the network completely.
For additional information, see these commands in the R81 CLI Reference Guide:
Command Description
Boot Security
The Boot Security protects the Security Gateway and its networks, during the boot:
n Disables the IP Forwarding in Linux OS kernel
n Loads the Default Filter Policy
Important - In a Cluster, you must configure all the Cluster Members in the same way.
The Default Filter Policy (defaultfilter) protects the Security Gateway from the time it boots up until
it installs the user-defined Security Policy.
Boot Security disables IP Forwarding and loads the Default Filter Policy.
There are three Default Filters templates on the Security Gateway:
Default Filter
Default Filter Policy File Description
Mode
Default Filter
Default Filter Policy File Description
Mode
Step Instructions
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Instructions
n The new complied Default Filter file for IPv4 traffic is:
$FWDIR/state/default.bin
n The new complied Default Filter file for IPv6 traffic is:
$FWDIR/state/default.bin6
8 Copy new complied Default Filter file to the path of the Default Filter Policy file.
n For IPv4 traffic, run:
cp -v $FWDIR/state/default.bin
/etc/fw.boot/default.bin
n For IPv6 traffic, run:
cp -v $FWDIR/state/default.bin6
/etc/fw.boot/default.bin6
Administrators with Check Point INSPECT language knowledge can define customized Default Filters.
Important - Make sure your customized Default Filter policy does not interfere with the Security
Gateway boot process.
Step Instructions
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Instructions
6 Edit the new Default Filter Policy file to include the applicable INSPECT code.
Important - Your customized Default Filter must not use these functions:
n Logging
n Authentication
n Encryption
n Content Security
n The new complied Default Filter file for IPv4 traffic is:
$FWDIR/state/default.bin
n The new complied Default Filter file for IPv6 traffic is:
$FWDIR/state/default.bin6
Step Instructions
9 Copy new complied Default Filter file to the path of the Default Filter Policy file.
n For IPv4 traffic, run:
cp -v $FWDIR/state/default.bin
/etc/fw.boot/default.bin
n For IPv6 traffic, run:
cp -v $FWDIR/state/default.bin6
/etc/fw.boot/default.bin6
It is sometimes necessary to stop the Security Gateway for maintenance. It is not always practical to
disconnect the Security Gateway from the network (for example, if the Security Gateway is on a remote
site).
To stop the Security Gateway for maintenance and maintain security, you can run:
Command Description
cpstop -
n Shuts down Check Point processes
fwflag - n Loads the Default Filter policy (defaultfilter)
default
cpstop -
n Shuts down Check Point processes
fwflag - n Keeps the currently loaded kernel policy
proc n Maintains the Connections table, so that after you run the cpstart
command, you do not experience dropped packets because they are
"out of state"
Note - Only security rules that do not use user space processes continue
to work.
Note - During a Check Point upgrade, a SIC certificate reset, or license expiration, the Initial
Policy overwrites the user-defined policy.
The sequence of actions during boot of the Security Gateway until a Security Policy is loaded for the first
time:
Step Instructions
2 The Security Gateway disables IP Forwarding and loads the Default Filter policy.
5 The Security Gateway fetches the Initial Policy from the local directory.
6 Administrator installs the user-defined Security Policy from the Management Server.
The Security Gateway enforces the Initial Policy until administrator installs a user-defined policy.
In subsequent boots, the Security Gateway loads the user-defined policy immediately after the Default Filter
policy.
There are different Initial Policies for Standalone and distributed setups:
n In a Standalone configuration, where the Security Management Server and the Security Gateway are
on the same computer, the Initial Policy allows CPMI management communication only.
This permits SmartConsole clients to connect to the Security Management Server.
n In a distributed configuration, where the Security Management Server is on one computer and the
Security Gateway is on a different computer, the Initial Policy:
l Allows the cpd and fwd daemons to communicate for SIC (to establish trust) and for Policy
installation.
l Does not allow CPMI connections through the Security Gateway.
The SmartConsole is not be able to connect to the Security Management Server, if the
SmartConsole must access the Security Management Server through a Security Gateway with
the Initial Policy.
Step Instructions
Type Description
Important:
n In Cluster, you must see and configure the same value for the same kernel parameter on
each Cluster Member.
n In VSX Gateway, the configured values of kernel parameters apply to all existing Virtual
Systems and Virtual Routers.
Security Gateway gets the names and the default values of the kernel parameters from these kernel module
files:
n $FWDIR/boot/modules/fw_kern_64.o
n $FWDIR/boot/modules/fw_kern_64_v6.o
n $PPKDIR/boot/modules/sim_kern_64.o
n $PPKDIR/boot/modules/sim_kern_64_v6.o
Type Name
Integer fw_allow_simultaneous_ping
fw_kdprintf_limit
fw_log_bufsize
send_buf_limit
String simple_debug_filter_addr_1
simple_debug_filter_daddr_1
simple_debug_filter_vpn_1
ws_debug_ip_str
fw_lsp_pair1
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
3 Make sure you can get the list of the available integer kernel parameters and their values
without errors:
Note - The configuration of your Security Gateway might not support all kernel
parameters. As a result, the Security Gateway might fail to get the value of some
kernel parameters.
modinfo -p $FWDIR/boot/modules/fw_kern*.o | sort -u | grep
':int param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n 1
fw ctl get int
4 If in the previous step there were no errors, get the list of the available integer kernel
parameters and their values, and save the list to a file:
modinfo -p $FWDIR/boot/modules/fw_kern*.o | sort -u | grep
':int param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n 1
fw ctl get int 1>> /var/log/fw_integer_kernel_parameters.txt
2>> /var/log/fw_integer_kernel_parameters.txt
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl get int send_buf_limit
send_buf_limit = 80
[Expert@MyGW:0]#
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl set int send_buf_limit 100
Set operation succeeded
[Expert@MyGW:0]#
Example:
[Expert@MyGW:0]# fw ctl get int send_buf_limit
send_buf_limit = 100
[Expert@MyGW:0]#
To make a kernel parameter configuration permanent (to survive reboot), you must edit one of the
applicable configuration files:
n For Firewall kernel parameters:
$FWDIR/boot/modules/fwkern.conf
n For VPN kernel parameters:
$FWDIR/boot/modules/vpnkern.conf
The exact parameters appear in various SK articles in Check Point Support Center, and provided by
Check Point Support.
Short procedure for the "fwkern.conf" file
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
4 Configure the required Firewall kernel parameter with the assigned value in the exact
format specified below.
n On the Security Gateway (each Cluster Member), run:
fw ctl set -f int <Name_of_Integer_Kernel_Parameter>
<Integer_Value>
n On the Scalable Platform Security Group, run one of these commands:
g_fw ctl set -f int <Name_of_Integer_Kernel_Parameter>
<Integer_Value>
Example:
[Expert@MyGW:0]# fw ctl set -f int send_buf_limit 100
"fwkern.conf" was updated successfully
[Expert@MyGW:0]#
Step Instructions
6 Reboot.
n On the Security Gateway / Cluster Member, run:
reboot
7 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
For more information, see sk26202: Changing the kernel global parameters for Check Point Security
Gateway.
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
Step Instructions
ls -l $FWDIR/boot/modules/fwkern.conf
l For VPN kernel parameters, run:
ls -l $FWDIR/boot/modules/vpnkern.conf
n On a Scalable Platform Security Group:
l For Firewall kernel parameters, run:
g_ls -l $FWDIR/boot/modules/fwkern.conf
l For VPN kernel parameters, run:
g_ls -l $FWDIR/boot/modules/vpnkern.conf
touch $FWDIR/boot/modules/fwkern.conf
l For VPN kernel parameters, run:
touch $FWDIR/boot/modules/fwkern.conf
n On a Scalable Platform Security Group:
l For Firewall kernel parameters, run:
cp -v $FWDIR/boot/modules/fwkern.conf{,_BKP}
l For VPN kernel parameters, run:
cp -v $FWDIR/boot/modules/vpnkern.conf{,_BKP}
n On a Scalable Platform Security Group:
l For Firewall kernel parameters, run:
g_cp -v $FWDIR/boot/modules/fwkern.conf{,_BKP}
l For VPN kernel parameters, run:
g_cp -v $FWDIR/boot/modules/vpnkern.conf{,_BKP}
Step Instructions
7 Add the required Firewall kernel parameter with the assigned value in the exact format
specified below.
Important - These configuration files do not support space characters, tabulation
characters, and comments (lines that contain the # character).
<Name_of_Integer_Kernel_Parameter>=<Integer_Value>
9 On the Scalable Platform Security Group, copy the updated configuration file to all other
Security Group Members:
n For Firewall kernel parameters, run:
asg_cp2blades $FWDIR/boot/modules/fwkern.conf
n For VPN kernel parameters, run:
asg_cp2blades $FWDIR/boot/modules/vpnkern.conf
10 Reboot.
n On the Security Gateway / Cluster Member, run:
reboot
11 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
Step Instructions
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
3 Make sure you can get the list of the available integer kernel parameters and their values
without errors:
Note - The configuration of your Security Gateway might not support all kernel
parameters. As a result, the Security Gateway might fail to get the value of some
kernel parameters.
modinfo -p $FWDIR/boot/modules/fw_kern*.o | sort -u | grep
':string param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n
1 fw ctl get str
4 If in the previous step there were no errors, get the list of the available string kernel
parameters and their values, and save the list to a file:
modinfo -p $FWDIR/boot/modules/fw_kern*.o | sort -u | grep
':string param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n
1 fw ctl get str 1>> /var/log/fw_string_kernel_parameters.txt
2>> /var/log/fw_string_kernel_parameters.txt
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl get str fileapp_default_encoding_charset
fileapp_default_encoding_charset = 'UTF-8'
[Expert@MyGW:0]#
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl set str debug_filter_saddr_ip '1.1.1.1'
Set operation succeeded
[Expert@MyGW:0]#
Step Instructions
Example:
[Expert@MyGW:0]# fw ctl get str debug_filter_saddr_ip
debug_filter_saddr_ip = '1.1.1.1'
[Expert@MyGW:0]#
To make a kernel parameter configuration permanent (to survive reboot), you must edit one of the
applicable configuration files:
n For Firewall kernel parameters:
$FWDIR/boot/modules/fwkern.conf
n For VPN kernel parameters:
$FWDIR/boot/modules/vpnkern.conf
The exact parameters appear in various SK articles in Check Point Support Center, and provided by
Check Point Support.
Short procedure for the "fwkern.conf" file
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
Step Instructions
4 Configure the required Firewall kernel parameter with the assigned value in the exact
format specified below.
Note - You must write the value in single quotes, or double quotes. Use one of
these syntax options.
n On a Security Gateway / each Cluster Member, run in Gaia Clish or the Expert
mode:
fw ctl set -f str <Name_of_String_Kernel_Parameter>
'<String_Text>'
or
fw ctl set -f str <Name_of_String_Kernel_Parameter>
"<String_Text>"
n On a Scalable Platform Security Group, run in the Expert mode:
g_fw ctl set -f str <Name_of_String_Kernel_Parameter>
'<String_Text>'
or
g_fw ctl set -f str <Name_of_String_Kernel_Parameter>
"<String_Text>"
Example:
[Expert@MyGW:0]# fw ctl set -f str ws_debug_ip_str '1.1.1.1'
"fwkern.conf" was updated successfully
[Expert@MyGW:0]#
6 Reboot.
n On the Security Gateway / Cluster Member, run:
reboot
7 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
Step Instructions
For more information, see sk26202: Changing the kernel global parameters for Check Point Security
Gateway.
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
ls -l $FWDIR/boot/modules/fwkern.conf
l For VPN kernel parameters, run:
ls -l $FWDIR/boot/modules/vpnkern.conf
n On a Scalable Platform Security Group:
l For Firewall kernel parameters, run:
g_ls -l $FWDIR/boot/modules/fwkern.conf
l For VPN kernel parameters, run:
g_ls -l $FWDIR/boot/modules/vpnkern.conf
Step Instructions
touch $FWDIR/boot/modules/fwkern.conf
l For VPN kernel parameters, run:
touch $FWDIR/boot/modules/fwkern.conf
n On a Scalable Platform Security Group:
l For Firewall kernel parameters, run:
cp -v $FWDIR/boot/modules/fwkern.conf{,_BKP}
l For VPN kernel parameters, run:
cp -v $FWDIR/boot/modules/vpnkern.conf{,_BKP}
n On a Scalable Platform Security Group:
l For Firewall kernel parameters, run:
g_cp -v $FWDIR/boot/modules/fwkern.conf{,_BKP}
l For VPN kernel parameters, run:
g_cp -v $FWDIR/boot/modules/vpnkern.conf{,_BKP}
Step Instructions
7 Add the required kernel parameter with the assigned value in the exact format specified
below.
Important - These configuration files do not support space characters, tabulation
characters, and comments (lines that contain the # character).
Note - You must write the value in single quotes, or double quotes. Use one of
these syntax options.
<Name_of_String_Kernel_Parameter>='<String_Text>'
or
<Name_of_String_Kernel_Parameter>="<String_Text>"
9 On the Scalable Platform Security Group, copy the updated configuration file to all other
Security Group Members:
n For Firewall kernel parameters, run:
asg_cp2blades $FWDIR/boot/modules/fwkern.conf
n For VPN kernel parameters, run:
asg_cp2blades $FWDIR/boot/modules/vpnkern.conf
10 Reboot.
n On the Security Gateway / Cluster Member, run:
reboot
11 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
Step Instructions
Removing the current value from a Firewall string kernel parameter temporarily
Step Instructions
Example:
[Expert@MyGW:0]# fw ctl set str debug_filter_saddr_ip ''
Set operation succeeded
[Expert@MyGW:0]#
Step Instructions
Example:
[Expert@MyGW:0]# fw ctl get str debug_filter_saddr_ip
debug_filter_saddr_ip = ''
[Expert@MyGW:0]#
Type Name
Integer num_of_sxl_devices
sim_ipsec_dont_fragment
tcp_always_keepalive
sim_log_all_frags
simple_debug_filter_dport_1
simple_debug_filter_proto_1
String simple_debug_filter_addr_1
simple_debug_filter_daddr_2
simlinux_excluded_ifs_list
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
3 Make sure you can get the list of the available integer kernel parameters and their values
without errors:
Note - The configuration of your Security Gateway might not support all kernel
parameters. As a result, the Security Gateway might fail to get the value of some
kernel parameters.
modinfo -p $PPKDIR/boot/modules/sim_kern*.o | sort -u | grep
':int param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n 1
fw ctl get int
4 If in the previous step there were no errors, get the list of the available integer kernel
parameters and their values, and save the list to a file:
modinfo -p $PPKDIR/boot/modules/sim_kern*.o | sort -u | grep
':int param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n 1
fw ctl get int 1>> /var/log/sxl_integer_kernel_parameters.txt
2>> /var/log/sxl_integer_kernel_parameters.txt
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl get int sim_ipsec_dont_fragment
sim_ipsec_dont_fragment = 1
[Expert@MyGW:0]#
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl set int sim_ipsec_dont_fragment 0
Set operation succeeded
[Expert@MyGW:0]#
Example:
[Expert@MyGW:0]# fw ctl get int sim_ipsec_dont_fragment
sim_ipsec_dont_fragment = 0
[Expert@MyGW:0]#
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
7 Add the required SecureXL kernel parameter with the assigned value in the exact format
specified below.
Important - This configuration file does not support space characters, tabulation
characters, and comments (lines that contain the # character).
<Name_of_SecureXL_Integer_Kernel_Parameter>=<Integer_Value>
Step Instructions
9 Reboot.
n On the Security Gateway / Cluster Member, run:
reboot
10 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
3 Make sure you can get the list of the available integer kernel parameters and their values
without errors:
Note - The configuration of your Security Gateway might not support all kernel
parameters. As a result, the Security Gateway might fail to get the value of some
kernel parameters.
modinfo -p $PPKDIR/boot/modules/sim_kern*.o | sort -u | grep
':string param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n
1 fw ctl get str
4 If in the previous step there were no errors, get the list of the available string kernel
parameters and their values, and save the list to a file:
modinfo -p $PPKDIR/boot/modules/sim_kern*.o | sort -u | grep
':string param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n
1 fw ctl get str 1>> /var/log/sxl_string_kernel_parameters.txt
2>> /var/log/sxl_string_kernel_parameters.txt
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl get str fwkdebug_print_connkey_on_str
fwkdebug_print_connkey_on_str = ''
[Expert@MyGW:0]#
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Example:
[Expert@MyGW:0]# fw ctl set str fwkdebug_print_connkey_on_str 'Packet accepted'
Set operation succeeded
[Expert@MyGW:0]#
Step Instructions
Example:
[Expert@MyGW:0]# fw ctl get str fwkdebug_print_connkey_on_str
fwkdebug_print_connkey_on_str = 'Packet accepted'
[Expert@MyGW:0]#
Step Instructions
1 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
7 Add the required SecureXL kernel parameter with the assigned value in the exact format
specified below.
Important - This configuration file does not support space characters, tabulation
characters, and comments (lines that contain the # character).
Note - You must write the value in single quotes, or double quotes. Use one of these
syntax options.
<Name_of_SecureXL_String_Kernel_Parameter>='<String_Text>'
or
<Name_of_SecureXL_String_Kernel_Parameter>="<String_Text>"
Step Instructions
9 Reboot.
n On the Security Gateway / Cluster Member, run:
reboot
10 Connect to the command line on your Security Gateway / each Cluster Member.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Important - In Cluster, you must configure and perform the kernel debug procedure on all cluster
members in the same way.
Note - See the "Kernel Debug Procedure" on page 215, or the "Kernel Debug Procedure with
Connection Life Cycle" on page 219.
1 Configure the applicable In this step, you prepare the kernel debug options:
debug settings:
a. Restore the default debug settings, so that any other
a. Restore the default debug settings do not interfere with the kernel debug.
settings. b. Allocate the kernel debug buffer, in which Security
b. Allocate the debug Gateway holds the applicable debug messages.
buffer.
2 Configure the applicable In this step, you prepare the applicable kernel debug modules
kernel debug modules and and their debug flags, so that Security Gateway collects only
their debug flags. applicable debug messages.
3 Start the collection of the In this step, you configure Security Gateway to write the debug
kernel debug into an output messages from the kernel debug buffer into an output file.
file.
4 Stop the kernel debug. In this step, you configure Security Gateway to stop writing the
debug messages into an output file.
5 Restore the default kernel In this step, you restore the default kernel debug options.
debug settings.
n To reset all debug flags and enable only the default debug flags in all kernel modules:
fw ctl debug 0
n To disable all debug flags including the default flags in all kernel modules:
Best Practice - Do not run this command, because it disables even the basic default
debug messages.
fw ctl debug -x
n General syntax:
Note - The list of kernel modules depends on the Software Blades you enabled on the
Security Gateway.
fw ctl debug -m
fw ctl debug
Parameters
-s "<String to Stop When you specify this parameter, the Security Gateway:
Debug>"
1. Collects the applicable debug messages into the kernel debug
buffer based on the enabled kernel debug modules and their
debug flags.
2. Does not write any of these debug messages from the kernel
debug buffer into the output file.
3. Stops collecting all debug messages when it detects the first
debug message that contains the specified string in the kernel
debug buffer.
4. Writes the entire kernel debug buffer into the output file.
Notes:
n This one string can be any plain text (not a regular
expression) that you see in the debug messages.
n String length is up to 50 characters.
-m <Name of Debug Specifies the name of the kernel debug module, for which you print or
Module> configure the debug flags.
{all | + <List of Specifies which debug flags to enable or disable in the specified kernel
Debug Flags> | - debug module:
<List of Debug
n all
Flags>}
Enables all debug flags in the specified kernel debug module.
n + <List of Debug Flags>
Enables the specified debug flags in the specified kernel debug
module.
You must press the space bar key after the plus (+) character:
+ <Flag1> [<Flag2> ... <FlagN>]
Example: + drop conn
n - <List of Debug Flags>
Disables the specified debug flags in the specified kernel debug
module.
You must press the space bar key after the minus (-) character:
- <Flag1> [<Flag2> ... <FlagN>]
Example: - conn
-p <List of Fields> By default, when the Security Gateway prints the debug messages, the
messages start with the applicable CPU ID and CoreXL Firewall
instance ID.
You can print additional fields in the beginning of each debug
message.
Notes:
n These fields are available:
all, proc, pid, date, mid, type, freq, topic, time,
ticks, tid, text, errno, host, vsid, cpu.
n When you specify the applicable fields, separate them with
commas and without spaces:
Field1,Field2,...,FieldN
n The more fields you specify, the higher the load on the
CPU and on the hard disk.
-f Collects the debug data until you stop the kernel debug in one of these
ways:
n When you press the CTRL+C keys.
n When you run the "fw ctl debug 0" command.
n When you run the "fw ctl debug -x" command.
n When you kill the "fw ctl kdebug" process.
/<Path>/<Name of Specifies the path and the name of the debug output file.
Output File> Best Practice - Always use the largest partition on the disk -
/var/log/. Security Gateway can generate many debug
messages within short time. As a result, the debug output file can
grow to large size very fast.
-o /<Path>/<Name of Saves the collected debug data into cyclic debug output files.
Output File> -m When the size of the current <Name of Output File> reaches the
<Number of Cyclic specified <Size of Each Cyclic File in KB> (more or less),
Files> [-s <Size of the Security Gateway renames the current <Name of Output
Each Cyclic File in File> to <Name of Output File>.0 and creates a new <Name
KB>] of Output File>.
If the <Name of Output File>.0 already exists, the Security
Gateway renames the <Name of Output File>.0 to <Name of
Output File>.1, and so on - until the specified limit <Number of
Cyclic Files>. When the Security Gateway reaches the <Number
of Cyclic Files>, it deletes the oldest files.
The valid values are:
n <Number of Cyclic Files> - from 1 to 999
n <Size of Each Cyclic File in KB> - from 1 to 2097150
n A Security Gateway applies these debug filters to both the non-accelerated and
accelerated traffic.
n A Security Gateway applies these debug filters to "Kernel Debug Procedure with
Connection Life Cycle" on page 219.
Best Practice - It is usually simpler to set the Connection Tuple and Host IP Address filters from
within the "fw ctl debug" command (see the R81 CLI Reference Guide). To filter the kernel
debug by a VPN Peer, use the procedure below.
Notes:
1. <N> is an integer between 1 and 5. This number is an index for the configured kernel
parameters of this type.
2. When you specify IP addresses, you must enclose them in double quotes.
3. When you configure kernel parameters with the same index <N>, the debug filter is a
logical "AND" of these kernel parameters.
In this case, the final filter matches only one direction of the processed connection.
n Example 1 - packets from the source IP address X to the destination IP address Y:
Notes:
1. <N> is an integer between 1 and 3.
This number is an index for the configured kernel parameters of this type.
2. You can configure one, two, or three of these kernel parameters at the same time.
n Example 1:
Usage Example
It is necessary to show in the kernel debug the information about the connection from Source IP address
192.168.20.30 from any Source Port to Destination IP address 172.16.40.50 to Destination Port 80
(192.168.20.30:<Any> --> 172.16.40.50:80).
Run these commands before you start the kernel debug:
Important:
n Debug increases the load on the CPU on the Security Gateway / Cluster
Members / Security Group Members. Schedule a maintenance window.
n We strongly recommend to connect over serial console to your Security
Gateway / each Cluster Member / Scalable Platform Security Group Members.
This is to prevent a possible issue when you cannot work with the CLI because
of a high load on the CPU.
n In Cluster, you must perform these steps on all the Cluster Members in the
same way.
n On Scalable Platforms (Maestro and Chassis), you must connect to the
applicable Security Group.
Step Instructions
1 Connect to the command line on the Security Gateway / each Cluster Member over SSH, or
console.
Note - On Scalable Platforms (Maestro and Chassis), you must connect to the applicable
Security Group.
Step Instructions
6 Allocate the kernel debug buffer for each CoreXL Firewall instance.
n On the Security Gateway / each Cluster Member, run:
fw ctl debug -buf 8200
n On the Scalable Platform Security Group, run:
g_fw ctl debug -buf 8200
9 Examine the list of the debug flags that are enabled in the specified kernel modules.
n On the Security Gateway / each Cluster Member, run:
fw ctl debug -m <module>
n On the Scalable Platform Security Group, run:
g_fw ctl debug -m <module>
Important - The CPU load increases even more at this point because the Firewall starts
to write all debug messages to the output file.
Step Instructions
Important - This stops all CPU load from the kernel debug.
15 Transfer this file from the Security Gateway / each Cluster Member / each Security Group
Member to your computer:
/var/log/kernel_debug.txt
Best Practice - Compress this file with the "tar -zxvf" command and transfer it from
the Security Gateway / each Cluster Member / each Security Group Members to your
computer. If you transfer to an FTP server, do so in the binary mode.
Important - You must use this tool in the Expert mode together with the regular kernel debug flags
(see "Kernel Debug Modules and Debug Flags" on page 224).
Syntax
n To start the debug capture:
n To stop the debug capture and prepare the formatted debug output:
Parameters
Table: Parameters of the 'conn_life_cycle.sh' script
Parameter Description
-a start Mandatory.
-a stop Specifies the action:
n start - Starts the debug capture based on the debug
flags you enabled and debug filters you specified.
n stop - Stops the debug capture, resets the kernel debug
options, resets the kernel debug filters.
-t | -T Optional.
Specifies the resolution of a time stamp in front of each debug
message:
n -t - Prints the time stamp in milliseconds.
n -T - Prints the time stamp in microseconds.
-f "<Filter>" Optional.
Specifies which connections and packets to capture.
For additional information, see "Kernel Debug Filters" on
page 210.
Important - If you do not specify filters, then the tool prints
debug messages for all traffic. This causes high load on the
CPU and increases the time to format the debug output file.
Each filter must contain these five numbers (5-tuple) separated
with commas:
"<Source IP Address>,<Source
Port>,<Destination IP Address>,<Destination
Port>,<Protocol Number>"
Example of capturing traffic from IP 192.168.20.30 from any port
to IP 172.16.40.50 to port 22 over the TCP protocol:
-f "192.168.20.30,0,172.16.40.50,22,6"
Notes:
n The tool supports up to five of such filters.
n The tool treats the value 0 (zero) as "any".
n If you specify two or more filters, the tool performs a
logical "OR" of all the filters on each packet.
If the packet matches at least one filter, the tool prints
the debug messages for this packet.
n "<Source IP Address>" and "<Destination
IP Address>" - IPv4 or IPv6 address
n "<Source Port>" and "<Destination Port>" -
integers from 1 to 65535 (see IANA Service Name
and Port Number Registry)
n <Protocol Number> - integer from 0 to 254 (see
IANA Protocol Numbers)
-o /<Path>/<Name of Mandatory.
Formatted Debug Output Specifies the absolute path and the name of the formatted debug
File> output file (to analyze by an administrator).
Example:
-o /var/log/kernel_debug_formatted.txt
Procedure
Important - In cluster, you must perform these steps on all the Cluster Members in the same way.
Step Instructions
4 Examine the list of the debug flags that are enabled in the specified kernel modules:
fw ctl debug -m <module>
7 Stop the debug capture and prepare the formatted debug output:
conn_life_cycle.sh -a stop -o /var/log/kernel_debug_formatted.txt
8 Transfer the formatted debug output file from your Security Gateway to your desktop or laptop
computer:
/var/log/kernel_debug_formatted.txt
9 Examine the formatted debug output file in an advanced text editor like Notepad++ (click
Language > R > Ruby), or any other Ruby language viewer.
Example
Collecting the kernel debug for TCP connection from IP 172.20.168.15 (any port) to IP
192.168.3.53 and port 22
[Expert@GW:0]# fw ctl debug -m fw + conn drop
Updated kernel's debug variable for module fw
Debug flags updated.
[Expert@GW:0]#
[Expert@GW:0]# fw ctl debug -m fw
Kernel debugging buffer size: 50KB
HOST:
Module: fw
Enabled Kernel debugging options: error warning conn drop
Messaging threshold set to type=Info freq=Common
[Expert@GW:0]#
[Expert@GW:0]# conn_life_cycle.sh -a start -o /var/log/kernel_debug.txt -T -f
"172.20.168.15,0,192.168.3.53,22,6"
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Initialized kernel debugging buffer to size 8192K
Set operation succeeded
Capturing started...
[Expert@GW:0]#
... ... Replicate the issue, or wait for the issue to occur ... ...
[Expert@GW:0]#
[Expert@GW:0]# conn_life_cycle.sh -a stop -o /var/log/kernel_debug_formatted.txt
Set operation succeeded
Defaulting all kernel debugging options
Debug state was reset to default.
Set operation succeeded
doing unification...
Openning host debug file /tmp/tmp.KiWmF18217... OK
New unified debug file: /tmp/tmp.imzMZ18220... OK
prepare unification
performing unification
Done :-)
doing grouping...
wrapping connections and packets...
Some of packets lack description, probably because they were already handled when the feature was enabled.
[Expert@GW:0]#
[Expert@GW:0]# fw ctl debug -m fw
Kernel debugging buffer size: 50KB
HOST:
Module: fw
Enabled Kernel debugging options: error warning
Messaging threshold set to type=Info freq=Common
[Expert@GW:0]
[Expert@GW:0] ls -l /var/log/kernel_debug.*
-rw-rw---- 1 admin root 40960 Nov 26 13:02 /var/log/kernel_debug.txt
-rw-rw---- 1 admin root 24406 Nov 26 13:02 /var/log/kernel_debug_formatted.txt
[Expert@GW:0]
Everything is collapsed:
Opened the second hierarchy level to see the packets of this connection:
fw ctl debug -m
Flag Description
Flag Description
Flag Description
module Operations in the Application Control module (initialization, module loading, calls to
the module, policy loading, and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Flag Description
stat Statistics
Flag Description
av Anti-Virus inspection
module Operations in the Content Inspection module (initialization, module loading, calls to the
module, policy loading, and so on)
profile Basic information about the Content Inspection module (initialization, destroying,
freeing)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
track Use only for very limited important debug prints, so it can be used in a loaded
environment -
Content-Disposition, Content-Type, extension validation, extension matching
Notes:
n To print all synchronization operations in Check Point cluster in the debug output, enable
these debug flags:
l The debug flag "sync" in "Module 'fw' (Firewall)" on page 252
l The debug flag "sync" in "Module 'CPAS' (Check Point Active Streaming)" on
page 238
n To print the contents of the packets in HEX format in the debug output (as "FW-1: fwha_
print_packet: Buffer ..."), before you start the kernel debug, set this kernel
parameter on each Cluster Member / the applicable Scalable Platform Security Group:
l On the Security Gateway / each Cluster Member, run in the Expert mode:
Flag Description
Flag Description
drop Connections dropped by the cluster Decision Function (DF) module (does not include
CCP packets)
forward Forwarding Layer messages (when Cluster Members send and receive a forwarded
packet)
if Interface tracking and validation (all the operations and checks on interfaces)
Note - In addition, enable the debug flags "conf" and "if" in this debug module
mmagic Operations on "MAC magic" (getting, setting, updating, initializing, dropping, and so
on)
subs Subscriber module (set of APIs, which enable user space processes to be aware of
the current state of the ClusterXL state machine and other clustering configuration
parameters)
Flag Description
trap Sending trap messages from the cluster kernel to the RouteD daemon about Master
change
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Flag Description
Flag Description
Syntax
n On the Security Gateway / each Cluster Member, run in the Expert mode:
Important - Also enable the debug flag "cpsshi" in "Module 'fw' (Firewall)" on page 252.
Flag Description
Flag Description
Flag Description
Flag Description
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Flag Description
module Initiation / removal of the Data Loss Prevention User Space modules' infrastructure
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
module Operations in the Domain Objects module (initialization, module loading, calls to the
module, policy loading, and so on)
Flag Description
chain Tracing each packet through FloodGate-1 stages in the cookie chain
chainq Internal Chain Queue mechanism - holding and releasing of packets during critical
actions (policy installation and uninstall)
dropsv Dropped packets due to WFRED policy - with additional debug information (verbose)
Flag Description
rates Rule and connection rates (IQ Engine behavior and status)
Note - In addition, see "Module 'RTM' (Real Time Monitoring)" on page 277.
Note - Also see "Module 'WSIS' (Web Intelligence Infrastructure)" on page 298.
Flag Description
Flag Description
module Operations in the FILEAPP module (initialization, module loading, calls to the module,
and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
acct Accounting data in logs for Application Control (in addition, enable the debug of
"Module 'APPI' (Application Control Inspection)" on page 228)
advp Advanced Patterns (signatures over port ranges) - runs under ASPII and CMI
caf Mirror and Decrypt feature - only mirror operations on all traffic
context Operations on Memory context and CPU context in "Module 'kiss' (Kernel
Infrastructure)" on page 264
Flag Description
cookie Virtual de-fragmentation , cookie issues (cookies in the data structure that holds the
packets)
cptls CRYPTO-PRO Transport Layer Security (HTTPS Inspection) - Russian VPN GOST
crypt Encryption and decryption of packets (algorithms and keys are printed in clear text
and cipher text)
dfilter Operations in the debug filters (see "Kernel Debug Filters" on page 210)
driver Check Point kernel attachment (access to kernel is shown as log entries)
filter Packet filtering performed by the Check Point kernel and all data loaded into kernel
ftp Processing of FTP Data connections (used to call applications over FTP Data - i.e.,
Anti-Virus)
Flag Description
highavail Cluster configuration - changes in the configuration and information about interfaces
during
traffic processing
install Driver installation - NIC attachment (actions performed by the "fw ctl install"
and "fw ctl uninstall" commands)
ioctl IOCTL control messages (communication between kernel and daemons, loading and
unloading of the FireWall)
kbuf Kernel-buffer memory pool (for example, encryption keys use these memory
allocations)
Warning - Security Gateway can freeze or hang due to very high CPU load!.
Warning - Security Gateway can freeze or hang due to very high CPU load!.
Flag Description
misc Miscellaneous helpful information (not shown with other debug flags)
monitor Prints output similar to the "fw monitor" command (see the R81 CLI Reference
Guide > section "fw monitor")
monitorall Prints output similar to the "fw monitor -p all" command (see the R81 CLI
Reference Guide > section "fw monitor")
mrtsync Synchronization between cluster members of Multicast Routes that are added when
working with Dynamic Routing Multicast protocols
Flag Description
nat_sync NAT issues - NAT port allocation operations in Check Point cluster
nat64 NAT issues - 6in4 tunnels (IPv6 over IPv4) and 4in6 tunnels (IPv4 over IPv6)
rad Resource Advisor policy (for Application Control, URL Filtering, and others)
Flag Description
te Prints the name of an interface for incoming connection from Threat Emulation
Machine
user User Space communication with Kernel Space (most useful for configuration and
VSX debug)
Flag Description
Flag Description
Flag Description
h225 H225 call signaling messages (SETUP, CONNECT, RELEASE COMPLETE, and so on)
h245 H245 control signaling messages (OPEN LOGICAL CHANNEL, END SESSION COMMAND,
and so on)
Flag Description
Note - Also see "Module 'CPAS' (Check Point Active Streaming)" on page 238.
daf_cmi Mirror and Decrypt of HTTPS traffic - operations related to the Context Management
Interface / Infrastructure Loader
Note - Also see "Module 'cmi_loader' (Context Management Interface /
Infrastructure Loader)" on page 236.
daf_module Mirror and Decrypt of HTTPS traffic - operations related to the ICAP Client module
daf_policy Mirror and Decrypt of HTTPS traffic - operations related to policy installation
daf_tcp Mirror and Decrypt of HTTPS traffic - internal processing of TCP connections
module Operations in the ICAP Client module (initialization, module loading, calls to the
module, and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
data Portal, IP address matching for Terminal Servers Identity Agent, session handling
module Removal of the Identity Awareness API debug module's infrastructure, failure to
convert to Base64, failure to append Source to Destination, and so on
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Note - In addition, see "Module 'kissflow' (Kernel Infrastructure Flow)" on page 267.
Flag Description
cookie Virtual de-fragmentation , cookie issues (cookies in the data structure that holds the
packets)
dbg_filter Information about the configured Debug Filters - "Kernel Debug Filters" on page 210
Flag Description
ioctl IOCTL control messages (communication between the kernel and daemons)
memprof Memory allocation operations in the Memory Profiler (when the kernel parameter fw_
conn_mem_prof_enabled=1)
rem Regular Expression Matcher - Pattern Matcher 2nd tier (slow path)
thread Kernel thread that supplies low level APIs to the kernel thread
Flag Description
Flag Description
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Notes:
n When you enable the debug flag 'multik' in the "Module 'fw' (Firewall)" on page 252, it
enables all the debug flags in this debug module, except for the debug flag 'packet'.
n In a cluster, enable the debug flag "multik" in the "Module 'cluster' (ClusterXL)" on
page 233.
n If you use the IPsec VPN Software Blade, enable the debug flag "multik" in the "Module
'VPN' (Site-to-Site VPN and Remote Access VPN)" on page 290.
n If you use the QoS Software Blade, enable the debug flag "multik" in the "Module 'fg'
(FloodGate-1 - QoS)" on page 248.
Flag Description
lock Obtaining and releasing the fw_lock on multiple CoreXL Firewall instances
message Cross-instance messages (used for local sync and port scanning)
packet For each packet, shows the CoreXL SND dispatching decision (CoreXL Firewall instance
and reason)
packet_ Invalid packets, for CoreXL SND could not make a dispatching decision
err
Flag Description
Syntax
n On the Security Gateway / each Cluster Member, run in the Expert mode:
Flag Description
misc Miscellaneous helpful information (not shown with other debug flags)
Note - Also see "Module 'PSL' (Passive Streaming Library)" on page 275.
tol Test Object List algorithm (to determine whether an application is malicious or not)
Flag Description
ws Web Intelligence
Flag Description
Note - Also see "Module 'APPI' (Application Control Inspection)" on page 228.
module Operations in the NRB module (initialization, module loading, calls to the module,
contexts, and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Note - Also see "Module 'MUX' (Multiplexer for Applications Traffic)" on page 271.
Flag Description
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
accel Prints SecureXL information about the accelerated packets, connections, and so on
chain Prints information about chain registration and about the E2E (Virtual Link) chain
function actions
Note - This important debug flag helps you know, whether the E2E identifies
the Virtual Link packets
con_conn Prints messages for each connection (when a new connection is handled by the
RTM module)
The same debug flags as 'per_conn'
driver Check Point kernel attachment (access to kernel is shown as log entries)
import Importing of the data from other kernel modules (FireWall, QoS)
netmasks Information about how the RTM handles netmasks, if you are monitoring an object
of type Network
per_conn Prints messages for each connection (when a new connection is handled by the
RTM module)
The same debug flags as 'con_conn'
per_pckt Prints messages for each packet (when a new packet arrives)
Warning - Prints many messages, which increases the load on the CPU
policy Prints messages about loading and unloading on the FireWall module (indicates
that the RTM module received the FireWall callback)
Flag Description
special Information about how the E2E modifies the E2ECP protocol packets
wd WebDefense views
Flag Description
Flag Description
Flag Description
Syntax
n On the Security Gateway / each Cluster Member, run in the Expert mode:
Flag Description
Flag Description
module Operations in the TPUTILS module (initialization, module loading, calls to the module,
policy loading, and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
module Operations in the UserCheck module (initialization, UserCheck table hits, finding User
ID in cache, removal of UserCheck debug module's infrastructure)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
module Operations in the Unified Policy module (initialization, module loading, calls to the
module, and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Flag Description
module Operations in the Unified Policy Infrastructure module (initialization, module loading,
calls to the module, and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
topo Information about topology and Anti-Spoofing of interfaces; about Address Range
objects
Flag Description
driver Check Point kernel attachment (access to kernel is shown as log entries)
err Errors that should not happen, or errors that critical to the working of the VPN module
Note - Also see "Module 'gtp' (GPRS Tunneling Protocol)" on page 258
ifnotify Notifications about the changes in interface status - up or down (as received from OS)
ike Enables all IKE kernel debug in respect to moving the IKE to the interface, where it will
eventually leave and the modification of the source IP of the IKE packet, depending on
the configuration
init Initializes the VPN kernel and kernel data structures, when kernel is up, or when policy
is installed (it will also print the values of the flags that are set using the CPSET upon
policy reload)
Flag Description
nat NAT issues , cluster IP manipulation (Cluster Virtual IP address <=> Member IP
address)
packet Events that can happen for every packet, unless covered by more specific debug flags
policy Events that can happen only for a special packet in a connection, usually related to
policy decisions or logs / traps
ref Reference counting for MSA / MSPI, when storing or deleting Security Associations
(SAs)
resolver VPN Link Selection table and Certificate Revocation List (CRL), which is also part of
the peer resolving mechanism
tagging Sets the VPN policy of a connection according to VPN communities, VPN Policy
related information
tcpt Information related to TCP Tunnel (Visitor mode - FireWall traversal on TCP port 443)
Flag Description
Notes:
n In addition, see "Module 'WSIS' (Web Intelligence Infrastructure)" on page 298.
n To print information for all Virtual Systems in the debug output, before you start the kernel
debug, set this kernel parameter on the VSX Gateway or each VSX Cluster Member (this is
the default behavior):
# fw ctl set int ws_debug_vs 0
n To print information for a specific Virtual System in the debug output, before you start the
kernel debug, set this kernel parameter on the VSX Gateway or each VSX Cluster Member:
# fw ctl set int ws_debug_vs <VSID>
n To print information for all IPv4 addresses in the debug output, before you start the kernel
debug, set this kernel parameter on the VSX Gateway or each VSX Cluster Member (this is
the default behavior):
# fw ctl set int ws_debug_ip 0
n To print information for a specific IPv4 address in the debug output, before you start the
kernel debug, set this kernel parameter on the VSX Gateway or each VSX Cluster Member:
# fw ctl set int ws_debug_ip <XXX.XXX.XXX.XXX>
Flag Description
event Events
Flag Description
ioctl IOCTL control messages (communication between the kernel and daemons, loading
and unloading of the FireWall)
module Operations in the Web Intelligence module (initialization, module loading, calls to the
module, policy loading, and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Flag Description
event Events
ioctl IOCTL control messages (communication between the kernel and daemons, loading
and unloading of the FireWall)
module Operations in the Web Intelligence VoIP SIP Parser module (initialization, module
loading, calls to the module, policy loading, and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
decoder Decoder for the content transfer encoding (UUEncode, UTF-8, HTML encoding &#)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Glossary
A
Anti-Bot
Check Point Software Blade on a Security Gateway that blocks botnet behavior and
communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.
Anti-Spam
Check Point Software Blade on a Security Gateway that provides comprehensive
protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS,
ASPAM.
Anti-Virus
Check Point Software Blade on a Security Gateway that uses real-time virus signatures
and anomaly-based protections from ThreatCloud to detect and block malware at the
Security Gateway before users are affected. Acronym: AV.
Application Control
Check Point Software Blade on a Security Gateway that allows granular control over
specific web-enabled applications by using deep packet inspection. Acronym: APPI.
Audit Log
Log that contains administrator actions on a Management Server (login and logout,
creation or modification of an object, installation of a policy, and so on).
Bridge Mode
Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
Security Gateway that is part of a cluster.
Compliance
Check Point Software Blade on a Management Server to view and apply the Security
Best Practices to the managed Security Gateways. This Software Blade includes a
library of Check Point-defined Security Best Practices to use as a baseline for good
Security Gateway and Policy configuration.
Content Awareness
Check Point Software Blade on a Security Gateway that provides data visibility and
enforcement. See sk119715. Acronym: CTNT.
CoreXL
Performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to stick
to a particular FWK daemon is done at the first packet of connection on a very high level,
before anything else. Depending on the SecureXL settings, and in most of the cases, the
SecureXL can be offloading decryption calculations. However, in some other cases,
such as with Route-Based VPN, it is done by FWK daemon.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can
automatically update Check Point products for the Gaia OS, and the Gaia OS itself. For
details, see sk92449.
DAIP Gateway
Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway, on which the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
Classification of data in a Check Point Security Policy for the Content Awareness
Software Blade.
Distributed Deployment
Configuration in which the Check Point Security Gateway and the Security Management
Server products are installed on different computers.
Dynamic Object
Special object type, whose IP address is not known in advance. The Security Gateway
resolves the IP address of this object in real time.
Expert Mode
The name of the elevated command line shell that gives full system root permissions in
the Check Point Gaia operating system.
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restricted shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for the Check Point Gaia operating system.
Hotfix
Software package installed on top of the current software version to fix a wrong or
undesired behavior, and to add a new behavior.
HTTPS Inspection
Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets
Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection.
Acronyms: HTTPSI, HTTPSi.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and
audits data based on network location, the identity of the user, and the identity of the
computer. Acronym: IDA.
Identity Logging
Check Point Software Blade on a Management Server to view Identity Logs from the
managed Security Gateways with enabled Identity Awareness Software Blade.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets
and data for numerous types of risks (Intrusion Prevention System).
IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and
Remote Access VPN access.
Kerberos
An authentication server for Microsoft Windows Active Directory Federation Services
(ADFS).
Log Server
Dedicated Check Point server that runs Check Point software to store and process logs.
Management Interface
(1) Interface on a Gaia Security Gateway or Cluster member, through which
Management Server connects to the Security Gateway or Cluster member. (2) Interface
on Gaia computer, through which users connect to Gaia Portal or CLI.
Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security
Management Server.
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN
access for managed and unmanaged clients. Acronym: MAB.
Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security
Management Servers called Domain Management Servers. Synonym: Multi-Domain
Security Management Server. Acronym: MDS.
Network Object
Logical object that represents different parts of corporate topology - computers, IP
addresses, traffic protocols, and so on. Administrators use these objects in Security
Policies.
Open Server
Physical computer manufactured and distributed by a company, other than Check Point.
Provisioning
Check Point Software Blade on a Management Server that manages large-scale
deployments of Check Point Security Gateways using configuration profiles. Synonyms:
SmartProvisioning, SmartLSM, Large-Scale Management, LSM.
QoS
Check Point Software Blade on a Security Gateway that provides policy-based traffic
bandwidth management to prioritize business-critical traffic and guarantee bandwidth
and control latency.
Rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause
specified actions to be taken for a communication session.
Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase.
SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that
passes through a Security Gateway.
Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and
enforce Security Policies for connected network resources.
Security Policy
Collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over SSL,
for secure communication. This authentication is based on the certificates issued by the
ICA on a Check Point Management Server.
SmartConsole
Check Point GUI application used to manage a Check Point environment - configure
Security Policies, configure devices, monitor products and events, install updates, and
so on.
SmartDashboard
Legacy Check Point GUI client used to create and manage the security settings in
versions R77.30 and lower. In versions R80.X and higher is still used to configure
specific legacy settings.
SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is
"Provisioning") that manages large-scale deployments of Check Point Security
Gateways using configuration profiles. Synonyms: Large-Scale Management,
SmartLSM, LSM.
SmartUpdate
Legacy Check Point GUI client used to manage licenses and contracts in a Check Point
environment.
Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade
inspects specific characteristics of the traffic (2) On a Management Server, each
Software Blade enables different management capabilities.
Standalone
Configuration in which the Security Gateway and the Security Management Server
products are installed and configured on the same server.
Threat Emulation
Check Point Software Blade on a Security Gateway that monitors the behavior of files in
a sandbox to determine whether or not they are malicious. Acronym: TE.
Threat Extraction
Check Point Software Blade on a Security Gateway that removes malicious content from
files. Acronym: TEX.
Updatable Object
Network object that represents an external service, such as Microsoft 365, AWS, Geo
locations, and more.
URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over
which web sites can be accessed by a given group of users, computers or networks.
Acronym: URLF.
User Directory
Check Point Software Blade on a Management Server that integrates LDAP and other
external user management servers with Check Point products and security solutions.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer
or cluster with virtual abstractions of Check Point Security Gateways and other network
devices. These Virtual Devices provide the same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide
the functionality of physical network devices. It holds at least one Virtual System, which
is called VS0.
Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides
real-time phishing prevention based on URLs. Acronym: ZPH.