Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Security Managment Document

Download as pdf or txt
Download as pdf or txt
You are on page 1of 509

7 July 2021

SECURITY MANAGEMENT

R80.20

Administration Guide
Protected
CHAPTER 1

2018 Check Point Software Technologies Ltd.


All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page https://www.checkpoint.com/copyright/ for a list of our trademarks.
Refer to the Third Party copyright notices
https://www.checkpoint.com/about-us/third-party-trademarks-and-copyrights/ for a list of
relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.

Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page
https://www.checkpoint.com/products-solutions/certified-check-point-solutions/.

Check Point R80.20


For more about this release, see the R80.20 home page
http://supportcontent.checkpoint.com/solutions?id=sk122485.

Latest Version of this Document


Open the latest version of this document in a Web browser
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_
SecurityManagement_AdminGuide/html_frameset.htm.
Download the latest version of this document in PDF format
http://downloads.checkpoint.com/dc/download.htm?ID=65846.

Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Security
Management R80.20 Administration Guide.

Revision History
Date Description
07 July 2021 Added Enabling Gateways to Access Servers at their NATed IP Addresses
(on page 55)
31 December 2020 Updated Limiting Application Traffic (on page 81)
15 April 2019 Updated Sharing Layers (on page 92)
Updated The High Availability Environment (on page 265)
27 December 2018 Added Keyboard Shortcuts for SmartConsole (on page 17)
27 November 2018 Updated High Availability Disaster Recovery (on page 270)
23 October 2018 Updated Initializing Trust (on page 47)
Added Command Line Reference (on page 286)
04 October 2018 Improved formatting and document layout for the HTML guide
26 September 2018 First release of this document
Contents
Important Information................................................................................................... 3
Terms .......................................................................................................................... 13
Welcome ..................................................................................................................... 15
Getting Started ............................................................................................................ 16
Understanding SmartConsole ................................................................................. 16
SmartConsole.................................................................................................................. 16
Keyboard Shortcuts for SmartConsole ........................................................................... 17
Search Engine ................................................................................................................. 18
Access and Threat Tools ................................................................................................. 20
Shared Policies ............................................................................................................... 20
API Command Line Interface .......................................................................................... 21
SmartConsole Toolbars .................................................................................................. 22
Connecting to the Security Management Server through SmartConsole ............... 25
Setting Up for Security Management ...................................................................... 25
Setting up for Team Work ....................................................................................... 26
Managing Security through API and CLI.................................................................. 26
Configuring the API Server ............................................................................................. 27
Management API Settings ............................................................................................... 27
Planning Security Management .............................................................................. 28
Managing Administrator Accounts .............................................................................. 29
Creating and Changing an Administrator Account .................................................. 29
Creating a Certificate for Logging in to SmartConsole ........................................... 30
Configuring Default Expiration for Administrators ................................................. 31
Setting SmartConsole Timeout ............................................................................... 31
Deleting an Administrator ....................................................................................... 32
Revoking Administrator Certificate......................................................................... 32
Assigning Permission Profiles to Administrators ................................................... 32
Changing and Creating Permission Profiles ................................................................... 32
Configuring Customized Permissions ............................................................................. 33
Configuring Permissions for Access Control Layers ...................................................... 34
Configuring Permissions for Access Control and Threat Prevention ............................. 35
Configuring Permissions for Monitoring, Logging, Events, and Reports ........................ 35
Defining Trusted Clients ......................................................................................... 36
Configuring Trusted Clients ............................................................................................ 36
Restricting Administrator Login Attempts .............................................................. 37
Unlocking Administrators ....................................................................................... 37
Session Flow for Administrators............................................................................. 37
Publishing a Session ....................................................................................................... 38
Working in SmartConsole Session View ......................................................................... 38
Administrators Working with Multiple Sessions ............................................................. 39
Configuring Authentication Methods for Administrators ........................................ 41
Configuring Check Point Password Authentication for Administrators.......................... 41
Configuring OS Password Authentication for Administrators ........................................ 42
Configuring a RADIUS Server for Administrators ........................................................... 42
Configuring a SecurID Server for Administrators ........................................................... 43
Configuring a TACACS Server for Administrators .......................................................... 43
Managing Gateways .................................................................................................... 45
Creating a New Security Gateway ........................................................................... 45
Manually Updating the Gateway Topology............................................................... 46
Dynamically Updating the Topology ........................................................................ 46
Secure Internal Communication (SIC) ..................................................................... 47
Initializing Trust .............................................................................................................. 47
SIC Status ........................................................................................................................ 48
Trust State....................................................................................................................... 48
Troubleshooting SIC ........................................................................................................ 48
Understanding the Check Point Internal Certificate Authority (ICA) .............................. 49
ICA Clients ....................................................................................................................... 49
SIC Certificate Management ........................................................................................... 50
Managing Software Blade Licenses ........................................................................ 50
Configuring a Proxy gateway........................................................................................... 51
Viewing Licenses in SmartConsole ................................................................................. 51
Monitoring Licenses in SmartConsole ............................................................................ 52
Enabling Gateways to Access Servers at their NATed IP Addresses ...................... 55
Managing Objects ........................................................................................................ 56
Object Categories .................................................................................................... 56
Working with Objects .............................................................................................. 57
Object Tags .............................................................................................................. 57
Network Object Types ............................................................................................. 58
Networks ......................................................................................................................... 58
Network Groups .............................................................................................................. 58
Check Point Hosts ........................................................................................................... 58
Gateway Cluster .............................................................................................................. 59
Updatable Objects ........................................................................................................... 59
More Network Object Types ............................................................................................ 60
Managing Policies ....................................................................................................... 70
Working with Policy Packages ................................................................................ 70
Creating a New Policy Package ....................................................................................... 72
Adding a Policy Type to an Existing Policy Package ........................................................ 72
Installing a Policy Package ............................................................................................. 73
Installing the User Database ........................................................................................... 73
Uninstalling a Policy Package ......................................................................................... 74
Viewing Rule Logs ................................................................................................... 74
Policy Installation History ....................................................................................... 75
Creating an Access Control Policy .............................................................................. 76
Introducing the Unified Access Control Policy ........................................................ 76
Creating a Basic Access Control Policy ................................................................... 77
Basic Rules ...................................................................................................................... 77
Use Case - Basic Access Control..................................................................................... 77
Use Case - Inline Layer for Each Department ................................................................. 78
Creating Application Control and URL Filtering Rules ............................................ 80
Monitoring Applications .................................................................................................. 80
Blocking Applications and Informing Users .................................................................... 81
Limiting Application Traffic ............................................................................................. 81
Using Identity Awareness Features in Rules .................................................................. 82
Blocking Sites.................................................................................................................. 83
Blocking URL Categories ................................................................................................ 84
Ordered Layers and Inline Layers ........................................................................... 85
The Need for Ordered Layers and Inline Layers ............................................................. 85
Order of Rule Enforcement in Inline Layers ................................................................... 85
Order of Rule Enforcement in Ordered Layers ............................................................... 86
Creating an Inline Layer .................................................................................................. 87
Creating a Ordered Layer ................................................................................................ 87
Enabling Access Control Features .................................................................................. 88
Types of Rules in the Rule Base ...................................................................................... 90
Administrators for Access Control Layers ...................................................................... 92
Sharing Layers ................................................................................................................ 92
Visual Division of the Rule Base with Sections................................................................ 93
Exporting Layer Rules to a .CSV File ............................................................................... 93
Managing Policies and Layers ......................................................................................... 93
The Columns of the Access Control Rule Base ....................................................... 94
Source and Destination Column ...................................................................................... 94
VPN Column .................................................................................................................... 95
Services & Applications Column ..................................................................................... 96
Content Column .............................................................................................................. 99
Actions Column ............................................................................................................. 100
Tracking Column ........................................................................................................... 101
Unified Rule Base Use Cases ................................................................................ 102
Use Case - Application Control and Content Awareness Ordered Layer ...................... 102
Use Case - Inline Layer for Web Traffic ........................................................................ 103
Use Case - Content Awareness Ordered Layer ............................................................. 104
Use Case - Application & URL Filtering Ordered Layer ................................................ 106
Rule Matching in the Access Control Policy .......................................................... 107
Examples of Rule Matching ........................................................................................... 107
Best Practices for Access Control Rules............................................................... 110
Installing the Access Control Policy ...................................................................... 111
Analyzing the Rule Base Hit Count ........................................................................ 112
Enabling or Disabling Hit Count .................................................................................... 112
Configuring the Hit Count Display ................................................................................. 113
Preventing IP Spoofing .......................................................................................... 114
Configuring Anti-Spoofing ............................................................................................. 114
Anti-Spoofing Options ................................................................................................... 116
Multicast Access Control ...................................................................................... 116
Managing Pre-R80.10 Security Gateways ............................................................. 117
Configuring the NAT Policy ................................................................................... 118
Translating IP Addresses (NAT) .................................................................................... 118
NAT Rules...................................................................................................................... 122
Configuring Static and Hide NAT ................................................................................... 123
Configuring Stateful NAT64 (IPv6 to IPv4 translation) .................................................. 129
Configuring Stateless NAT46 (IPv4 to IPv6 translation) ................................................ 140
Advanced NAT Settings ................................................................................................. 150
Site-to-Site VPN .................................................................................................... 159
Sample Site-to-Site VPN Deployment ........................................................................... 159
VPN Communities ......................................................................................................... 160
Sample Star Deployment .............................................................................................. 161
Sample Combination VPN Community .......................................................................... 162
Allowing VPN Connections ............................................................................................ 162
Sample VPN Access Control Rules ............................................................................... 163
To Learn More About Site-to-Site VPN ......................................................................... 163
Remote Access VPN .............................................................................................. 163
VPN Connectivity Modes ................................................................................................ 163
Sample Remote Access VPN Workflow ......................................................................... 164
Configuring the Security Gateway for a Remote Access Community ............................ 165
To Learn More About Remote Access VPN ................................................................... 165
Mobile Access to the Network ............................................................................... 166
Check Point Mobile Access Solutions ........................................................................... 166
Configuring Mobile Access to Network Resources ....................................................... 167
Connecting to a Citrix Server ........................................................................................ 172
Compliance Check ......................................................................................................... 173
Secure Workspace ........................................................................................................ 175
To Learn More About Mobile Access ............................................................................. 175
Creating a Threat Prevention Policy ......................................................................... 176
Threat Prevention Components ............................................................................ 176
IPS ................................................................................................................................. 177
Anti-Bot ......................................................................................................................... 178
Anti-Virus ...................................................................................................................... 179
SandBlast ...................................................................................................................... 180
Assigning Administrators for Threat Prevention .................................................. 182
Analyzing Threats ................................................................................................. 182
Out-of-the-Box Protection from Threats .............................................................. 183
Getting Quickly Up and Running with the Threat Prevention Policy ............................. 183
Enabling the Threat Prevention Software Blades ......................................................... 183
Installing the Threat Prevention Policy ......................................................................... 186
Introducing Profiles ...................................................................................................... 186
Optimized Protection Profile Settings ........................................................................... 187
Predefined Rule ............................................................................................................ 188
The Threat Prevention Policy ................................................................................ 189
Workflow for Creating a Threat Prevention Policy ....................................................... 189
Threat Prevention Policy Layers ................................................................................... 189
Threat Prevention Rule Base ........................................................................................ 192
Creating Threat Prevention Rules......................................................................... 193
Configuring Mail Settings .............................................................................................. 193
Configuring IPS Profile Settings ................................................................................... 197
Configuring Anti-Virus Settings .................................................................................... 198
Configuring Anti-Bot Settings ....................................................................................... 200
Configuring Threat Emulation Settings......................................................................... 203
Configuring Threat Extraction Settings ........................................................................ 206
Configuring a Malware DNS Trap .................................................................................. 208
Exception Rules ............................................................................................................. 209
The Check Point ThreatCloud................................................................................ 211
Threat Prevention Scheduled Updates.................................................................. 212
Introduction to Scheduled Updates ............................................................................... 212
Configuring Threat Prevention Scheduled Updates ...................................................... 212
To Learn More About Threat Prevention ............................................................... 213
Managing User Accounts........................................................................................... 214
Authentication Methods for Users and Administrators......................................... 214
Check Point Password................................................................................................... 214
Operating System Password ......................................................................................... 214
RADIUS .......................................................................................................................... 214
SecurID .......................................................................................................................... 215
TACACS ......................................................................................................................... 215
Configuring Authentication Methods for Users ..................................................... 215
Granting User Access Using RADIUS Server Groups .................................................... 215
Configuring a Security Gateway to use SecurID Authentication ................................... 216
Configuring TACACS+ Authentication ........................................................................... 218
User Database ....................................................................................................... 219
Creating, Modifying, Removing User Accounts ............................................................. 219
Configuring Default Expiration Settings for Users ....................................................... 221
Delete a User................................................................................................................. 222
Managing User Groups .......................................................................................... 222
Adding User Groups ...................................................................................................... 222
LDAP and User Directory ...................................................................................... 222
User Directory and Identity Awareness ........................................................................ 223
User Directory Considerations ...................................................................................... 223
The User Directory Schema .......................................................................................... 223
Check Point Schema for LDAP ...................................................................................... 224
User Directory Profiles ................................................................................................. 231
Microsoft Active Directory ............................................................................................. 241
Retrieving Information from a User Directory Server .................................................. 244
Deploying User Directory .............................................................................................. 245
Enabling User Directory ................................................................................................ 245
Account Units ................................................................................................................ 246
Managing Users on a User Directory Server ................................................................. 251
Access Roles ......................................................................................................... 252
Adding Access Roles ..................................................................................................... 252
Authentication Rules ............................................................................................. 253
Client Certificates for Smartphones and Tablets ...................................................... 254
Managing Client Certificates ................................................................................. 254
Creating Client Certificates ................................................................................... 255
Revoking Certificates ............................................................................................ 255
Creating Templates for Certificate Distribution .................................................... 256
Cloning a Template ............................................................................................... 257
Giving Permissions for Client Certificates ............................................................ 257
Preferences and Management Settings .................................................................... 258
Database Revisions ............................................................................................... 258
Working with Database Revisions ................................................................................. 258
Managing a Crisis Using Database Revisions ................................................................ 259
Setting IP Address Versions of the Environment .................................................. 259
Restoring Window Defaults ................................................................................... 260
Configuring the Login Window .............................................................................. 260
Testing New SmartConsole Features ................................................................... 260
Sync with User Center ........................................................................................... 261
Inspection Settings................................................................................................ 261
Configuring Inspection Settings .................................................................................... 261
SmartConsole Extensions ..................................................................................... 263
Importing Extensions into SmartConsole ..................................................................... 263
Configuring Extension Settings ..................................................................................... 264
Certified Check Point Extensions and Development ..................................................... 264
Management High Availability ................................................................................... 265
Overview of Management High Availability ........................................................... 265
The High Availability Environment ........................................................................ 265
Configuring a Secondary Server in SmartConsole ................................................ 266
Synchronizing Active and Standby Servers ........................................................... 267
Monitoring High Availability .......................................................................................... 267
Changeover Between Active and Standby ............................................................. 268
Changing a Server to Active or Standby ................................................................ 269
Working in Collision Mode............................................................................................. 269
High Availability Troubleshooting ......................................................................... 269
Environments with Endpoint Security ................................................................... 270
High Availability Disaster Recovery ...................................................................... 270
Creating a New Primary Management Server .............................................................. 270
Promoting a Secondary Server to Primary ................................................................... 270
The ICA Management Tool ........................................................................................ 272
Using the ICA Management Tool ........................................................................... 273
Enabling and Connecting to the ICA Management Tool......................................... 273
The ICA Management Tool GUI .............................................................................. 273
User Certificate Management ............................................................................... 274
Modifying the Key Size for User Certificates ................................................................. 274
Performing Multiple Simultaneous Operations .................................................... 275
ICA Administrators with Reduced Privileges ........................................................ 275
Management of SIC Certificates ............................................................................ 275
Management of Gateway VPN Certificates ............................................................ 275
Management of User Certificates in SmartConsole .............................................. 276
Notifying Users about Certificate Initialization ..................................................... 276
Retrieving the ICA Certificate ................................................................................ 276
Searching for a Certificate .................................................................................... 276
Basic Search Parameters ............................................................................................. 277
Advanced Search Attributes .......................................................................................... 277
The Search Results ....................................................................................................... 277
Viewing and Saving Certificate Details .......................................................................... 278
Removing and Revoking Certificates and Sending Email Notifications ................. 278
Submitting a Certificate Request to the CA ........................................................... 278
Initializing Multiple Certificates Simultaneously .................................................. 279
CRL Management .................................................................................................. 280
CRL Operations ..................................................................................................... 281
CA Cleanup ............................................................................................................ 281
Configuring the CA ................................................................................................ 281
CA Data Types and Attributes................................................................................ 281
Certificate Longevity and Statuses ........................................................................ 285
Command Line Reference ......................................................................................... 286
Managing Security through API and CLI................................................................ 287
Configuring the API Server ........................................................................................... 287
API Settings ................................................................................................................... 287
contract_util.......................................................................................................... 289
contract_util check ....................................................................................................... 290
contract_util cpmacro ................................................................................................... 291
contract_util download ................................................................................................. 292
contract_util mgmt ....................................................................................................... 294
contract_util print ......................................................................................................... 295
contract_util summary.................................................................................................. 296
contract_util update ...................................................................................................... 297
contract_util verify ........................................................................................................ 298
cpca_client ............................................................................................................ 299
cpca_client create_cert ................................................................................................ 301
cpca_client double_sign ............................................................................................... 302
cpca_client get_crldp .................................................................................................... 303
cpca_client get_pubkey ................................................................................................ 304
cpca_client init_certs .................................................................................................... 305
cpca_client lscert .......................................................................................................... 306
cpca_client revoke_cert ................................................................................................ 308
cpca_client revoke_non_exist_cert .............................................................................. 310
cpca_client search ........................................................................................................ 311
cpca_client set_mgmt_tool .......................................................................................... 313
cpca_client set_sign_hash ............................................................................................ 315
cp_conf .................................................................................................................. 316
cp_conf admin ............................................................................................................... 317
cp_conf auto .................................................................................................................. 319
cp_conf ca ..................................................................................................................... 320
cp_conf client ................................................................................................................ 321
cp_conf finger ............................................................................................................... 324
cp_conf lic ..................................................................................................................... 325
cpca_create........................................................................................................... 326
cpconfig ................................................................................................................. 327
cpinfo .................................................................................................................... 329
cplic ....................................................................................................................... 330
cplic check ..................................................................................................................... 332
cplic contract ................................................................................................................. 334
cplic db_add .................................................................................................................. 335
cplic db_print ................................................................................................................ 336
cplic db_rm ................................................................................................................... 337
cplic del ......................................................................................................................... 338
cplic del <object name> ................................................................................................. 339
cplic get ......................................................................................................................... 340
cplic print ...................................................................................................................... 341
cplic put ......................................................................................................................... 342
cplic put <object name> ................................................................................................ 344
cplic upgrade ................................................................................................................. 346
cppkg..................................................................................................................... 348
cppkg add ...................................................................................................................... 349
cppkg delete .................................................................................................................. 350
cppkg get ....................................................................................................................... 352
cppkg getroot ................................................................................................................ 353
cppkg print .................................................................................................................... 354
cppkg setroot ................................................................................................................ 355
cpprod_util ............................................................................................................ 356
cprid ...................................................................................................................... 359
cpridstart....................................................................................................................... 359
cpridstop ....................................................................................................................... 359
run_cprid_restart ......................................................................................................... 359
cprinstall ............................................................................................................... 360
cprinstall boot ............................................................................................................... 362
cprinstall cprestart ....................................................................................................... 363
cprinstall cpstart ........................................................................................................... 364
cprinstall cpstop............................................................................................................ 365
cprinstall delete ............................................................................................................ 366
cprinstall get ................................................................................................................. 367
cprinstall install ............................................................................................................ 368
cprinstall revert ............................................................................................................ 370
cprinstall show .............................................................................................................. 371
cprinstall snapshot ....................................................................................................... 372
cprinstall transfer ......................................................................................................... 373
cprinstall uninstall ........................................................................................................ 374
cprinstall verify ............................................................................................................. 376
cpstart ................................................................................................................... 378
cpstat .................................................................................................................... 379
cpstop .................................................................................................................... 386
cpview ................................................................................................................... 387
Overview of CPView ....................................................................................................... 387
CPView User Interface .................................................................................................. 387
Using CPView ................................................................................................................ 387
cpwd_admin .......................................................................................................... 389
cpwd_admin config ....................................................................................................... 391
cpwd_admin del ............................................................................................................ 394
cpwd_admin detach ...................................................................................................... 395
cpwd_admin exist ......................................................................................................... 396
cpwd_admin flist ........................................................................................................... 397
cpwd_admin getpid ....................................................................................................... 398
cpwd_admin kill ............................................................................................................ 399
cpwd_admin list ............................................................................................................ 400
cpwd_admin exist ......................................................................................................... 402
cpwd_admin start ......................................................................................................... 403
cpwd_admin start_monitor........................................................................................... 405
cpwd_admin stop .......................................................................................................... 406
cpwd_admin stop_monitor ........................................................................................... 408
dbedit .................................................................................................................... 409
fw .......................................................................................................................... 420
fw fetchlogs ................................................................................................................... 422
fw hastat ........................................................................................................................ 424
fw kill ............................................................................................................................. 426
fw log ............................................................................................................................. 427
fw logswitch .................................................................................................................. 435
fw lslogs ........................................................................................................................ 439
fw mergefiles ................................................................................................................ 442
fw repairlog ................................................................................................................... 444
fw sam ........................................................................................................................... 445
'fw sam_policy' and 'fw6 sam_policy' ........................................................................... 452
fwm ....................................................................................................................... 454
fwm dbload .................................................................................................................... 456
fwm exportcert .............................................................................................................. 457
fwm fetchfile ................................................................................................................. 458
fwm fingerprint ............................................................................................................. 459
fwm getpcap .................................................................................................................. 460
fwm ikecrypt.................................................................................................................. 461
fwm load ........................................................................................................................ 462
fwm logexport ............................................................................................................... 463
fwm mds ........................................................................................................................ 467
fwm printcert ................................................................................................................ 468
fwm sic_reset ................................................................................................................ 472
fwm snmp_trap ............................................................................................................. 473
fwm unload .................................................................................................................... 475
fwm ver ......................................................................................................................... 478
fwm verify ...................................................................................................................... 479
inet_alert .............................................................................................................. 480
ldapcmd ................................................................................................................ 483
ldapcompare ......................................................................................................... 485
ldapmemberconvert.............................................................................................. 488
ldapmodify ............................................................................................................ 492
ldapsearch ............................................................................................................ 494
mgmt_cli ............................................................................................................... 496
migrate.................................................................................................................. 497
queryDB_util ......................................................................................................... 500
rs_db_tool ............................................................................................................. 501
sam_alert .............................................................................................................. 502
threshold_config ................................................................................................... 505
Package

Terms
Group of files, and data about those files,
delivered as one software archive (usually
TGZ or RPM), for distribution and installation.
Administrator
Permissions Profile
A SmartConsole user with permissions to
A set of access, and feature-based roles for
manage Check Point security products and
SmartConsole administrators.
the network environment.
Policy
DAIP Gateway
A collection of rules that control network
A Dynamically Assigned IP (DAIP) Security
traffic and enforce organization guidelines
Gateway is a Security Gateway where the IP
for data protection and access to resources
address of the external interface is assigned
with packet inspection.
dynamically by the ISP.
Rule Base
Database
The database that contains the rules in a
The Check Point database includes all
security policy and defines the sequence, in
objects, including network objects, users,
which they are enforced.
services, servers, and protection profiles.
Security Gateway
External Users
A computer that runs Check Point software
Users defined on external servers. External
to inspect traffic and enforces Security
users are not defined in the Security
Policies for connected network resources.
Management Server database or on an LDAP
server. External user profiles tell the system
Security Management Server
how to identify and authenticate externally
defined users. A computer that runs Check Point software
to manage the objects and policies in Check
Identity Awareness Point environment.
Lets you enforce network access and audit
SIC
data based on network location, the identity
of the user, and the identity of the computer. Secure Internal Communication. The Check
Point proprietary mechanism with which
LDAP Check Point computers that run Check Point
software authenticate each other over SSL,
Lightweight Directory Access Protocol. An
for secure communication. This
open industry standard for user and device
authentication is based on the certificates
data storage and directory-access.
issued by the ICA on a Check Point
LDAP Groups Management Server.

Groups of users defined on an LDAP account SmartConsole


unit.
A Check Point GUI application used to
Log Server manage Security Policies, monitor products
and events, install updates, provision new
Physical server that hosts Check Point devices and appliances, and manage a
product log files. multi-domain environment and each domain.
Management Server SmartDashboard
A Check Point Security Management Server
A legacy Check Point GUI client used to
or a Multi-Domain Server.
create and manage the security policy in
R77.30 and below.
Software Blade
A software blade is a security solution based
on specific business needs.
Each blade is independent, modular and
centrally managed. To extend security,
additional blades can be quickly added.

User Database
Check Point internal database that contains
all users defined and managed in
SmartConsole.

User Groups
Named groups of users with related
responsibilities.

User Template
Property set that defines a type of user on
which a security policy will be enforced.

Users
Personnel authorized to use network
resources and applications.
Welcome

Welcome
Check Point offers effective Security Management solutions to help you keep up with constantly
growing needs and challenges of your organizational network. This Administration Guide focuses
on the basic Security Management Server deployment.
If you are interested in deployments for organizations with multiple sites, refer to the R80.20
Multi-Domain Security Management Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Multi-Doma
inSecurityManagement_AdminGuide/html_frameset.htm.
These are the basic components of Check Point security architecture.

Item Description
1 SmartConsole - Check Point Graphical User Interface for connection to and management
of Security Management Servers.
2 Security Management Server - Manages Security Gateways with defined security policies
and monitors security events on the network.
3 Security Gateway - Placed at the perimeter of the network topology, to protect your
environment through enforcement of the security policies.

4 Your environment to protect.

Security Management Administration Guide R80.20 | 15


CHAPTER 2

Getting Started
In This Section:
Understanding SmartConsole................................................................................... 16
Connecting to the Security Management Server through SmartConsole................ 25
Setting Up for Security Management ........................................................................ 25
Setting up for Team Work ......................................................................................... 26
Managing Security through API and CLI ................................................................... 26
Planning Security Management ................................................................................ 28

Before you begin deploying a Check Point security solution, familiarize yourself with:
• Check Point SmartConsole
• Basic setup of a Check Point Security Management Server
• Basic setup of Check Point Security Gateways
• Administrative task delegation
• Security management in a non-GUI environment

Understanding SmartConsole
Check Point SmartConsole makes it easy to manage security for complex networks. Before you
start to configure your cyber security environment and policies, become familiar with Check Point
SmartConsole.

SmartConsole

Security Management Administration Guide R80.20 | 16


Getting Started

Item Description Item Description


1 Global Toolbar 5 Objects Bar (F11)
2 Session Management Toolbar 6 Validations pane
3 Navigation Toolbar 7 Command line interface button
4 System Information Area

Keyboard Shortcuts for SmartConsole


From R80.20, there are additional keyboard shortcuts that you can use to navigate between the
different SmartConsole fields:

Keyboard shortcut Description


Ctrl+S Publish session
Ctrl+Alt+S Discard session
Shift+Alt+Enter Install policy
F10 Show/hide task details
F11 Show/hide Object Explorer
Ctrl+O Manage policies and layers
Ctrl+E Open Object Explorer
Ctrl+F3 Switch to high-contrast theme
Alt+Space System menu
F1 Open the relevant online help
Alt+F4 Close SmartConsole

Shortcuts for the specific views that support them:

Keyboard shortcut Description


Ctrl+T Open new tab
Ctrl+W or Ctrl+F4 Close current tab
Ctrl+Tab Move to the next tab
Ctrl+Shift+Tab Move to the previous tab
Delete Delete the currently selected item
Ctrl+A Select all elements
Esc Cancel operation to close window
Enter or mouse double-click Edit item

Shortcuts for views that contain a Rule Base:

Keyboard shortcut Description


Ctrl+G Go to rule (in the Access Control Rule Base)
Ctrl+X Cut rule

Security Management Administration Guide R80.20 | 17


Getting Started

Keyboard shortcut Description


Ctrl+C Copy rule
Ctrl+V Paste rule below the selected rule
Delete Remove a used item from a rule cell
Ctrl+F Open Rule Base search
F3 Navigate to the next Rule Base search result
Ctrl+arrow up Go to the first rule in the Rule Base
Ctrl+arrow down Go to the last rule in the Rule Base
Space or + Open drop-down menu for the current cell in the Rule Base
Shift+arrow up/down Move between objects in the Rule Base

Shortcuts for the Logs & Monitor view:

Keyboard shortcut Description


Ctrl+G Switch to grid view (in the Logs and Audit Logs views)
Ctrl+L Switch to table view (in the Logs and Audit Logs views)
Ctrl+R Resolve objects
F5 Refresh query
F6 Enable auto-refresh
Ctrl+D Add to favorites
Ctrl+S Organize favorites

Search Engine
In each view you can search the Security Management Server database for information relevant to
the view. For example:
• Gateway, by name or IP address
• Access Control rule
• NAT rule
• Threat Prevention profile
• Specific threat or a threat category
• Object tags

IP Search
You can run an advanced search for an IP address, network, or port. It returns direct and indirect
matches for your search criteria.
• IP address: xxx.xxx.xxx.xxx
• Network: xxx.xxx.0.0/16 or xxx.xxx
• Port: svc:<xxx>

Security Management Administration Guide R80.20 | 18


Getting Started

These are the different IP search modes:


• General – (Default). Returns direct matched results and indirect results in IP ranges,
networks, groups, groups with exclusion, and rules that contain these objects.
• Packet – Matches rules as if a packet with your IP address arrives at the gateway.

General IP Search
This is the default search mode. Use it to search in Rule Bases and in objects. If you enter a string
that is not a valid IP or network, the search engine treats it as text.
When you enter a valid IP address or network, an advanced search is done and on these objects
and rules:
• Objects that have the IP address as a text value for example, in a comment
• Objects that have an IP address property (direct results)
• Groups, networks, and address ranges that contain objects with the text value or address value
• Rules that contain those objects

Packet Search
A Packet Search matches rules as if a packet with your IP address arrives at the gateway. It
matches rules that have:
• The IP address in a column of the rule
• "Any"
• A Group-with-exclusion or negated field with the IP address in its declaration

To run a Packet Search:


1. Click the search box.
The search window opens.
2. Click Packet or enter: "mode:Packet"
3. To search a specific rule column, enter: ColumnName:Criteria

Rule Base Results


When you enter search criteria and view the matched results, the value that matched the criteria
in a rule is highlighted.

If there is... This is highlighted


A direct match on an object Only the specific matched characters
name or on textual columns
A direct match on object The entire object name
properties
A negated column The negated label
A match on "Any" "Any"

Known Limitation:
• Packet search does not support IPv6.

Security Management Administration Guide R80.20 | 19


Getting Started

Access and Threat Tools


The Access Tools section in the Security Policies Access Control view and the Threat Tools
section in the Security Policies Threat Prevention view give you more management and data
collection tools.
Access Tools in the Security Policies Access Control view:

Tool Description
VPN Communities Create, edit, or delete VPN Communities.

Updates Update the Application & URL Filtering database, schedule updates, and
configure updates.
UserCheck Configure UserCheck interaction objects for Access Control policy
actions.
Client Certificates Create and distribute client certificates that allow users to authenticate
to the Gateway from handheld devices.
Application Wiki Browse to the Check Point AppWiki. Search and filter the Web 2.0
Applications Database, to use Check Point security research in your
policy rules for actions on applications, apps, and widgets.
Installation History See the Policy installation history for each Gateway, and who made the
changes. See the revisions that were made during each installation, and
who made them. Install a specific version of the Policy.

Threat Tools in the Security Policies Threat Prevention view:

Tool Description
Profiles Create, edit, or delete profiles.
IPS Protections Edit IPS protections per profile.
Protections See statistics on different protections
Whitelist Files Configure Whitelist Files list
Indicators Configure indicators of malicious activity and how to handle it
Updates Configure updates to the Malware database, Threat Emulation engine
and images, and the IPS database.
UserCheck Configure UserCheck interaction objects for Threat Prevention policy
actions.
Threat Wiki Browse to the Check Point ThreatWiki. Search and filter Check Point's
Malware Database, to use Check Point security research to block
malware before it enters your environment, and to best respond if it does
get in.
Installation History See the Policy installation history for each Gateway, and who made the
changes. See the revisions that were made during each installation, and
who made them. Install a specific version of the Policy.

Shared Policies
The Shared Policies section in the Security Policies shows the policies that are not in a Policy
package. They are shared between all Policy packages.
Security Management Administration Guide R80.20 | 20
Getting Started

Shared policies are installed with the Access Control Policy.

Software Blade Description


Mobile Access Launch Mobile Access policy in a SmartConsole. Configure how your
remote users access internal resources, such as their email accounts,
when they are mobile.

DLP Launch Data Loss Prevention policy in a SmartConsole. Configure


advanced tools to automatically identify data that must not go outside
the network, to block the leak, and to educate users.

Geo Policy Create a policy for traffic to or from specific geographical or political
locations.
HTTPS Inspection The HTTPS Policy allows the Security Gateway to inspect HTTPS traffic
to prevent security risks related to the SSL protocol. The HTTPS Policy
shows if HTTPS Inspection is enabled on one or more Gateways.
Inspection Settings You can configure Inspection Settings (on page 261) for the Firewall:
• Deep packet inspection settings
• Protocol parsing inspection settings
• VoIP packet inspection settings

API Command Line Interface


You can also configure objects and rules through the API command line interface, which you can
access from SmartConsole.

Click to open the command line interface.

Click to open the API reference (in the command line interface).
Use the Command Line Reference to learn about Session management commands,
Host commands, Network commands, and Rule commands.

In addition to the command line interface, you can create and run API scripts to manage
configuration and operations on the Security Management Server (on page 26).

Security Management Administration Guide R80.20 | 21


Getting Started

SmartConsole Toolbars
Global Toolbar (top of SmartConsole)
Description
The main SmartConsole Menu. When SmartConsole is connected to a Security
Management Server, this includes:
• Manage policies and layers
• Open Object Explorer
• New object (opens menu to create a new object)
• Publish session
• Discard session
• Session details
• Install policy
• Verify Access Control Policy
• Install Database
• Uninstall Threat Prevention policy
• Management High Availability
• Manage Licenses and Packages
• Global Properties
• View (opens menu to select a View to open)
Create new objects or open the Object Explorer

Install policy on managed gateways

Session Management Toolbar (top of SmartConsole)


Description
Discard changes made during the session

Enter session details and see the number of changes made in the session.

Publish changes, to make them visible to other administrators, and ready to


install on gateways.
Note - When the policy is installed, published changes are installed on the
gateways and enforced.

Security Management Administration Guide R80.20 | 22


Getting Started

Navigation Toolbar (left side of SmartConsole)


Keyboard Description
Shortcut
Ctrl+1 Gateways & Servers configuration view:
• Manage Security Gateways
• Activate Software Blades
• Add, edit, or delete gateways and clusters (including virtual
clusters)
• Run scripts
• Backup and restore gateways
• Open a command line interface on the gateway
• View gateway status
Ctrl+2 Security Policies Access Control view:
• Manage Access Control: Content Awareness, VPN, Application
& URL Filtering, and Mobile Access
• Edit multiple policies at the same time
• Add, edit, or delete NAT rules
• Use the Access Tools
Security Policies Threat Prevention view:
• Manage Threat Prevention: IPS, Anti-Bot, Anti-Virus, Threat
Emulation
• Edit the unified threat Rule Base
• Configure threat profiles
• Add, edit, or delete exceptions and exception groups
• Use the Threat Tools
Shared Policies Views:
• Manage Mobile Access, DLP, Geo Policy and inspection
Settings
Ctrl+3 Logs & Monitor view:
• See high level graphs and plots
• Search through logs
• Schedule customized reports
• Monitor gateways
• See compliance information

Security Management Administration Guide R80.20 | 23


Getting Started

Keyboard Description
Shortcut
Ctrl+4 Manage & Settings view - review and configure the Security
Management Server settings:
• Administrators
• Permissions profiles
• Trusted clients
• Administrator sessions, and session settings
• Blades
• Revisions
• Preferences
• Sync with User Center

Command Line Interface Button (left bottom corner of SmartConsole)


Keyboard Description
Shortcut
F9 Open a command line interface for management scripting and API

For more SmartConsole shortcuts, see Keyboard Shortcuts for SmartConsole (on page 17).

Objects Bar (right side of SmartConsole)


Description
Objects Manage security and network objects

Validations Pane (right side of SmartConsole)


Description
Validations See validation errors

System Information Area (bottom of SmartConsole)


Description
Task List See management tasks in progress and expand to see recent tasks

Server Details See the IP address of the server to which SmartConsole is connected. If
Management High Availability is configured, click to see the details.
Session Status See the number of changes made in the session and the session status.

Connected See connected administrators: Yourself and others.


administrators

Security Management Administration Guide R80.20 | 24


Getting Started

Connecting to the Security Management Server through


SmartConsole
To log in to a Security Management Server through Check Point SmartConsole, you must have an
administrator account configured on the Security Management Server. When installing the
Security Management Server, you create one administrator in the First Time Configuration Wizard.
After that, you can create additional administrators accounts with SmartConsole, or using the Gaia
Portal.

To log in to the Security Management Server through SmartConsole:


1. Launch the SmartConsole application.
2. Enter your administrator authentication credentials. These can be a username, or a certificate
file, or a CAPI certificate.
Logging in with a username:
• Enter the Username and Password.
Logging in with a certificate file:
• From the drop-down list, select Certificate File.
• Browse to the file.
• Enter the password of the certificate file.
Logging in with a certificate in the CAPI repository:
• From the drop-down list, select CAPI Certificate.
• Select the certificate from drop-down list.
3. Enter the name or the IP address of the Security Management Server.
4. Click Login.
The SmartConsole authenticates the Security Management Server. The first time you connect,
SmartConsole shows the fingerprint.
5. Confirm the fingerprint.
The fingerprint and the IP address of the Security Management Server are saved to the user
settings in Windows.

Setting Up for Security Management


To start setting up your security environment, configure the Security Management Server and the
Security Gateways. The Security Gateways enforce the security policy that you define on the
Security Management Server.

To configure the Security Management Server in SmartConsole:


1. In the Gateways & Servers view, find the Security Management Server object.
You can search for it by name or IP address in the Search box at the top of the view.
When you select the Security Management Server object, the Summary tab at the bottom of
the pane shows the Software Blades that are enabled on it.
2. Open the object properties window, and enable the Management Software Blades, as
necessary:
• Network Policy Management - Manage a comprehensive security policy, unified for all
security functionalities. This is automatically enabled.
Security Management Administration Guide R80.20 | 25
Getting Started

• Endpoint Policy Management - Manage security and data on end-user computers and
hand-held devices. Enable this Software Blade if you have or will install an Endpoint
Security Management Server.
• Logging & Status - Monitor security events and status of gateways, VPNs, users, and more,
with advanced visuals and data management features.
• Identity Logging - Add user identities, and data of their computers and devices, from Active
Directory domains, to log entries.
• User Directory - Populate your security scope with user accounts from the LDAP servers in
your environment.
• Compliance - Optimize your security settings and comply with regulatory requirements
• SmartEvent - Manage and correlate security events in real-time.

To configure the Security Gateways in SmartConsole:


1. From the navigation toolbar, select Gateways & Servers.
2. Click New, and select Gateway.
3. In the Check Point Security Gateway Creation window that opens, select a configuration
mode:
• Wizard Mode - run the configuration wizard
• Classic Mode - configure the gateway in classic mode (on page 45)

Setting up for Team Work


As an administrator, you can delegate tasks, such as defining objects and users, to other
administrators. Make sure to create administrator accounts (on page 29) with the privileges that
are required to accomplish those tasks.
If you are the only administrator, we recommend that you create a second administrator account
with Read Only permissions, which is useful for troubleshooting, consultation, or auditing.

Managing Security through API and CLI


You can configure and control the Management Server with the new command line tools and
through web services. You must first configure the API server.
The API server runs scripts that automate daily tasks and integrate the Check Point solutions with
third party systems such as virtualization servers, ticketing systems, and change management
systems.
You can use these tools to run API scripts on the Management Server:
• Standalone management tool, included with SmartConsole. You can copy this tool to
computers that run Windows or Gaia operating system.
• mgmt_cli.exe (for Windows operating system)
• mgmt_cli (for Gaia operating system)
• Web Services API that allows communication and data exchange between the clients and the
Management Server over the HTTP protocol. It also lets other Check Point processes
communicate with the Management Server over the HTTPS protocol.
All API clients use the same port as the Gaia Portal.

Security Management Administration Guide R80.20 | 26


Getting Started

To learn more about the management APIs, to see code samples, and to take advantage of user
forums, see:
• The Online Check Point Management API Reference Guide
https://sc1.checkpoint.com/documents/latest/APIs/index.html.
• The Developers Network section of CheckMates https://community.checkpoint.com.

Configuring the API Server


To configure the API Server:
1. In SmartConsole, go to Manage & Settings > Blades.
2. In the Management API section, click Advanced Settings.
The Management API Settings window opens.
3. Configure the Startup Settings and the Access Settings.

Management API Settings


• Startup Settings
• Select Automatic start to automatically start the API server when the Security
Management Server starts.
In these environments, Automatic start is selected by default:
 Distributed Security Management Servers (without gateway functionality) with at least
4GB of RAM
 Standalone Security Management Servers (with gateway functionality) with at least 8GB
of RAM
In other environments, to reduce the memory consumption on the management server,
Automatic start is not selected by default.
• Access Settings
Configure IP addresses from which the API server accepts requests:
• Management server only (default) - API server will accept scripts and web service
requests only from the Security Management Server. You must open a command line
interface on the server and use the mgmt_cli utility to send API requests.
• All IP addresses that can be used for GUI clients - API server will accept scripts and web
service requests from the same devices that are allowed access to the Security
Management Server.
• All IP addresses - API server will accept scripts and web-service requests from any device.
To apply changes, you must publish the session, and run the api restart command on the
Security Management Server.

Security Management Administration Guide R80.20 | 27


Getting Started

Planning Security Management


After installing the Security Management Server and the Security Gateways, you can continue with
cyber security configuration for your environment.

Define your organization's topology


Network topology consists of network components, both physical and logical, such as physical and
virtual Security Gateways, hosts, hand-held devices, CA servers, third-party servers, services,
resources, networks, address ranges, and groups. Each of these components corresponds to an
object in your Check Point security management configuration. Configure those objects (on page
58) in SmartConsole.

Define users and user groups that your security environment protects
You can add users (on page 219) and groups (on page 222) to the database manually, through
LDAP and User Directory (on page 222), or with the help of Active Directory (on page 241).

Define access rules for protection of your organization's resources


Configure access rules and group them in policies that are enforced on the Security Gateways. You
can define access policies (on page 70) based on traffic, applications, Web sites, and data. Set up
preventative actions against known threats with Check Point Anti-Virus and Anti-Malware.
Educate users about the validity and security of the operations they attempt with the help of
UserCheck. Track network traffic and events through logging and monitoring.

Enforce access policies


Configure the Security Gateways. Make sure to activate the appropriate Software Blades. Then,
install your policies on the Security Gateways.

Security Management Administration Guide R80.20 | 28


CHAPTER 3

Managing Administrator Accounts


In This Section:
Creating and Changing an Administrator Account ................................................... 29
Creating a Certificate for Logging in to SmartConsole ............................................ 30
Configuring Default Expiration for Administrators .................................................. 31
Setting SmartConsole Timeout ................................................................................. 31
Deleting an Administrator ......................................................................................... 32
Revoking Administrator Certificate .......................................................................... 32
Assigning Permission Profiles to Administrators .................................................... 32
Defining Trusted Clients............................................................................................ 36
Restricting Administrator Login Attempts ............................................................... 37
Unlocking Administrators ......................................................................................... 37
Session Flow for Administrators .............................................................................. 37
Configuring Authentication Methods for Administrators ......................................... 41

Creating and Changing an Administrator Account


To successfully manage security for a large network, we recommend that you first set up your
administrative team, and delegate tasks.
We recommend that you create administrator accounts in SmartConsole, with the procedure
below or with the First Time Configuration Wizard.
If you create it through the SmartConsole, you can choose one of these authentication methods:
• Check Point Password (on page 214)
• OS Password (on page 214)
• RADIUS (on page 214)
• SecurID (on page 215)
• TACACS (on page 215)

To create an administrator account using SmartConsole:


1. Click Manage & Settings > Permissions and Administrators.
The Administrators pane shows by default.
2. Click New Administrator.
The New Administrators window opens.
3. Enter a unique name for the administrator account.
Note - This parameter is case-sensitive.
4. Set the Authentication Method, or create a certificate, or the two of them.
Note - If you do not do this, the administrator will not be able to log in to SmartConsole.
To define an Authentication Method:
In the Authentication Method section, select a method and follow the instructions in
Configuring Authentication Methods for Administrators (on page 41).

Security Management Administration Guide R80.20 | 29


Managing Administrator Accounts

To create a Certificate - If you want to use a certificate to log in:


In the Certificate Information section, click Create, and follow the instructions in Configuring
Certificates for Administrators (on page 30).
5. Select a Permissions profile for this administrator, or create a new one (on page 32).
6. Set the account Expiration date:
• For a permanent administrator - select Never
• For a temporary administrator - select an Expire At date from the calendar
The default expiration date shows, as defined in the Default Expiration Settings (on page 221).
After the expiration date, the account is no longer authorized to access network resources and
applications.
7. Optional: Configure Additional Info - Contact Details, Email and Phone Number of the
administrator.
8. Click OK.

To change an existing administrator account:


1. Click Manage & Settings > Permissions and Administrators.
2. Double-click an administrator account.
The Administrators properties window opens.

Creating an administrator with cpconfig


We do not recommend creating an administrator with cpconfig, the Check Point Configuration
Tool. Use it only if there is no access to SmartConsole or the Gaia Portal. If you use cpconfig to
create an administrator:
• You must restart Check Point Services to activate the administrator.
• It does not show the other administrators
• Check Point Password is automatically configured as the authentication method.

Creating a Certificate for Logging in to SmartConsole


When you define an administrator, you must configure the authentication credentials for the
administrator.
The authentication credentials for the administrator can be one of the supported authentication
methods, or a certificate, or the two of them.
You can create a certificate file in SmartConsole. The administrator can use this file to log in to
SmartConsole using the Certificate File option. The administrator must provide the password for
the certificate file.
You can import the certificate file to the CryptoAPI (CAPI) certificate repository on the Microsoft
Windows SmartConsole computer. The administrator can use this stored certificate to log in to
SmartConsole using the CAPI Certificate option. The SmartConsole administrator does not need to
provide a password.

To create a certificate file:


1. In the New Administrator window, in the Certificate Information section, click Create.
2. Enter a password.
3. Click OK.
Security Management Administration Guide R80.20 | 30
Managing Administrator Accounts

4. Save the certificate file to a secure location on the SmartConsole computer.


The certificate file is in the PKCS #12 format, and has a .p12 extension.
Note - Give the certificate file and the password to the SmartConsole administrators. The
administrator must provide this password when logging in to SmartConsole with the Certificate
File option.

To Import the certificate file to the CAPI repository:


1. On the Microsoft Windows SmartConsole computer, double-click the certificate file.
2. Follow the instructions.

Configuring Default Expiration for Administrators


If you want to use the same expiration settings for multiple accounts, you can set the default
expiration for administrator accounts. You can also choose to show notifications about the
approaching expiration date at the time when an administrator logs into SmartConsole or one of
the SmartConsole clients. The remaining number of days, during which the account will be alive,
shows in the status bar.

To configure the default expiration settings:


1. Click Manage & Settings > Permissions and Administrators > Advanced.
2. Click Advanced.
3. In the Default Expiration Date section, select a setting:
• Never expires
• Expire at - Select the expiration date from the calendar control
• Expire after - Enter the number of days, months, or years (from the day the account is
made) before administrator accounts expire
4. In the Expiration notifications section, select Show 'about to expire' indication in
administrators view and select the number of days in advance to show the message about the
approaching expiration date.
5. Click Publish.

Setting SmartConsole Timeout


Use the SmartConsole in a secure manner, and enforce secure usage for all administrators.
Setting a SmartConsole timeout is a basic requirement for secure usage. When an administrator
is not using the SmartConsole, it logs out.

To set the SmartConsole timeout:


1. Click Manage & Settings.
2. Select Permissions & Administrators > Advanced.
3. In the Idle Timeout area, select Perform logout after being idle.
4. Enter a number of minutes.
When a SmartConsole is idle after this number of minutes, the SmartConsole automatically
logs out the connected administrator, but all changes are preserved.

Security Management Administration Guide R80.20 | 31


Managing Administrator Accounts

Deleting an Administrator
To make sure your environment is secure, the best practice is to delete administrator accounts
when personnel leave or transfer.

To remove an administrator account:


1. Click Manage & Settings > Permissions and Administrators.
The Administrators pane shows by default.
2. Select an administrator account and click Delete.
3. Click Yes in the confirmation window that opens.

Revoking Administrator Certificate


If an administrator that authenticates through a certificate is temporarily unable to fulfill
administrator duties, you can revoke the certificate for the account. The administrator account
remains, but no one can authenticate to the Security Management Server with the certificate.
However, if the account has an additional authentication method (a password, for example), that
method can be used to authenticate to the account.

To revoke an administrator certificate:


1. Click Manage & Settings > Permissions and Administrators.
2. Select an administrator account and click Edit.
3. In General > Authentication, click Revoke.

Assigning Permission Profiles to Administrators


A permission profile is a predefined set of Security Management Server and SmartConsole
administrative permissions that you can assign to administrators. You can assign a permission
profile to more than one administrator. Only Security Management Server administrators with the
Manage Administrators permission in the profile can create and manage permission profiles.
To learn about permission profiles for Multi-Domain Security Management administrators, see
the R80.20 Multi-Domain Security Management Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Multi-Doma
inSecurityManagement_AdminGuide/html_frameset.htm.

Changing and Creating Permission Profiles


Administrators with Super User permissions can edit, create, or delete permission profiles.
These are the predefined, default permission profiles. You cannot change or delete the default
permission profiles. You can clone them, and change the clones:
• Read Only All - Full Read Permissions. No Write permissions.
• Read Write All - Full Read and Write Permissions.
• Super User - Full Read and Write Permissions, including managing administrators and
sessions.

Security Management Administration Guide R80.20 | 32


Managing Administrator Accounts

To change the permission profile of an administrator:


1. Click Manage & Settings > Permissions and Administrators.
2. Double-click the administrator account.
The Administrators properties window opens.
3. In the Permissions section, select another Permission Profile from the list.
4. Click OK.

To change a permission profile:


1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission
Profiles.
2. Double-click the profile to change.
3. In the Profile configuration window that opens change the settings as needed.
4. Click Close.

To create a new permission profile:


1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission
Profiles.
2. Click New Profile.
The New Profile window opens.
3. Enter a unique name for the profile.
4. Select a profile type:
• Read/Write All - Administrators can make changes to all features
• Auditor (Read Only All) - Administrators can see all information but cannot make changes
• Customized - Configure custom settings (on page 33)
5. Click OK.

To delete a permission profile:


1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission
Profiles.
2. Select a profile and click Delete.
You cannot delete a profile that is assigned to an administrator. To see which administrators
use a profile, in the error message, click Where Used.
If the profile is not assigned to administrators, a confirmation window opens.
3. Click Yes to confirm.

Configuring Customized Permissions


Configure administrator permissions for Gateways, Access Control, Threat Prevention, Others,
Monitoring and Logging, Events and Reports, Management. For each resource, define if
administrators that are configured with this profile can configure the feature or only see it.

Permissions:
• Selected - The administrator has this feature.
• Not selected - The administrator does not have this feature.
Note - If you cannot clear a feature selection, the administrator access to it is mandatory.

Security Management Administration Guide R80.20 | 33


Managing Administrator Accounts

Some features have Read and Write Options. If the feature is selected:
• Read - The administrator has the feature but cannot make changes.
• Write - The administrator has the feature and can make changes.

To configure customized permissions:


1. In the Profile object, in the Overview > Permissions section, select Customized.
2. Configure permissions in these pages of the Profile object:
• Gateways - configure the Provisioning and the Scripts permissions.
• Access Control - configure Access Control Policy permissions (on page 35).
• Threat Prevention - configure Threat Prevention Policy permissions (on page 35).
• Others - configure permissions for Common Objects, user databases, HTTPS Inspection
features, and Client Certificates.
• Monitoring and Logging - configure permissions to generate and see logs and to use
monitoring features (on page 35).
• Events and Reports - configure permissions for SmartEvent features (on page 35).
3. In the Management section, configure this profile with permissions to:
• Manage Administrators - Manage other administrator accounts.
• Manage Sessions - Lets the administrator configure the session management settings
(single or multiple sessions)
• the session mode for single or multiple sessions
• High Availability Operations -Configure and work with High Availability.
• Management API Login - Log in with the management API.
4. Click OK.

Configuring Permissions for Access Control Layers


You can simplify the management of the Access Control Policy by delegating ownership of
different Layers to different administrators.
To do this, assign a permission profile to the Layer. The permission Profile must have this
permission: Edit Layer by the selected profiles in a layer editor.
An administrator that has a permission profile with this permission can manage the Layer.
Workflow:
1. Give Layer permissions to an administrator profile.
2. Assign the permission profile to the Layer.

To give Layer permissions to an administrator profile:


1. In the Profile object, in the Access Control > Policy section, select Edit Layer by the selected
profiles in a layer editor.
2. Click OK.

To assign a permission profile to a Layer:


1. In SmartConsole, click Menu > Manage policies and layers.
2. In the left pane, click Layers.
3. Select a Layer.

Security Management Administration Guide R80.20 | 34


Managing Administrator Accounts

4. Click Edit.
5. In the left pane, select Permissions.
6. Click +
7. Select a profile with Layer permissions.
8. Click OK.
9. Click Close.
10. Publish the session.

Configuring Permissions for Access Control and Threat Prevention


In the Profile object, select the features and the Read or Write administrator permissions for
them.
Access Control
To edit a Layer, a user must have permissions for all Software Blades in the Layer.
• Actions
• Install Policy - Install the Access Control Policy on Security Gateways.
• Application & URL Filtering Update - Download and install new packages of applications
and websites, to use in access rules.
Threat Prevention
• Actions
• Install Policy - Install the Threat Prevention Policy on Security Gateways.
• IPS Update - Download and install new packages for IPS protections.

Configuring Permissions for Monitoring, Logging, Events, and


Reports
In the Profile object, select the features and the Read or Write administrator permissions for
them.

Monitoring and Logging Features


These are some of the available features:
• Monitoring
• Management Logs
• Track Logs
• Application and URL Filtering Logs

Events and Reports Features


These are the permissions for SmartEvent:
• SmartEvent
• Events - views in SmartConsole > Logs & Monitor
• Policy - SmartEvent Policy and Settings on SmartEvent GUI.
• Reports - in SmartConsole > Logs & Monitor
• SmartEvent Application & URL Filtering reports only

Security Management Administration Guide R80.20 | 35


Managing Administrator Accounts

Defining Trusted Clients


By default, any authenticated administrator can connect to the Security Management Server from
any computer. To limit the access to a specified list of hosts, can configure Trusted Clients. You
can configure Trusted Clients in these ways:
• Any - All hosts (default)
• IPv4 Address - A single host with specified IPv4 address
• IPv4 Address Range - Hosts with IPv4 addresses in the specified range
• IPv4 Netmask - Hosts with IPv4 addresses in the subnet defined by the specified IPv4 address
and netmask
• IPv6 Address - A single host with specified IPv6 address
• IPv6 Address Range - Hosts with IPv6 addresses in the specified range
• IPv6 Netmask - Hosts with IPv6 addresses in the subnet defined by the specified IPv6 address
and netmask
• Name - A host with the specified name
• Wild cards (IP only) - Hosts with IP addresses described by the specified regular expression

Configuring Trusted Clients


Administrators with Super User permissions can add, edit, or delete trusted clients.

To add a new trusted client:


1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Trusted
Clients.
2. Click New.
The New Trusted Client window opens.
3. Enter a unique name for the client.
4. Select a client type and configure corresponding values:
• Any - No values to configure
• IPv4 Address - Enter an IPv4 address of a host
• IPv4 Address Range - Enter the first and the last address of an IPv4 address range
• IPv4 Netmask - Enter the IPv4 address and the netmask
• IPv6 Address - Enter an IPv6 address of a host
• IPv6 Address Range - Enter the first and the last address of an IPv6 address range
• IPv6 Netmask - Enter the IPv6 address and the netmask
• Name - Enter a host name
• Wild cards (IP only) - Enter a regular expression that describes a set of IP addresses
5. Click OK.

To change trusted client settings:


1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Trusted
Clients.
2. Double-click the client you want to edit.
3. In the Trusted Client configuration window that opens, change the settings as needed.
Security Management Administration Guide R80.20 | 36
Managing Administrator Accounts

4. Click OK.

To delete a trusted client:


1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Trusted
Clients.
2. Select a trusted client and click Delete.
The confirmation window opens.
3. Click Yes to confirm.

Restricting Administrator Login Attempts


For administrators that login to the Security Management Server using a Check Point password,
you can configure these login restrictions:
• The number of login attempts before SmartConsole automatically locks an administrator.
• The number of minutes before SmartConsole unlocks the administrator's account after it was
locked.

To configure login restrictions:


1. Go to the Manage & Settings view or to the Multi-Domain view.
2. Go to Permissions & Administrators > Advanced > Login Restrictions.
Note - these restrictions apply only to administrators that authenticate to the Security
Management Server using a Check Point password.

Unlocking Administrators
An administrator who has the Manage Administrators permission can unlock another
administrator if the locked administrator authenticates to the Security Management Server using
a Check Point password.

To unlock an administrator:
1. Go to the Manage & Settings view or to the Multi-Domain view.
2. Right-click the locked administrator and select Unlock Administrator.
Or:
Use the unlock administrator API command
https://sc1.checkpoint.com/documents/R80/APIs/#gui-cli/unlock-administrator%20.
Note - the Unlock Administrator feature does not apply to administrators using other
authentication methods.

Session Flow for Administrators


In SmartConsole, administrators work with sessions. A session is created each time an
administrator logs into SmartConsole. Changes made in the session are saved automatically.
These changes are private and available only to the administrator. To avoid configuration conflicts,
other administrators see a lock icon on objects and rules that are being edited in other sessions.

Security Management Administration Guide R80.20 | 37


Managing Administrator Accounts

Administrators can publish or discard their private changes. To include private changes in the
policy installation, sessions containing these private changes must be published. This is also true
if you want to make your private changes available to other administrators. Unpublished changes
from other sessions are not included in the policy installation.
Before you publish a session, we recommend that you give the session a name and add a brief
description that documents the work process.

Publishing a Session
The validations pane in SmartConsole shows configuration error messages. Examples of errors
are object names that are not unique, or the use of objects that are not valid in the Rule Base.
Make sure you correct these errors before publishing.

To publish a session:
On the SmartConsole toolbar, click Publish. When a session is published, a new database version
is created and shows in the list of database revisions.

To add a name or description to a session:


1. In the SmartConsole toolbar, click Session.
The Session Details window opens.
2. Enter a name for the database version.
3. Enter a description.
4. Click OK.

To discard a session:
In the SmartConsole toolbar, click Discard.

Working in SmartConsole Session View


The Session view shows all unpublished sessions in the system. The view shows the sessions of
the current administrator, sessions of other administrators and sessions from other applications.
The columns in the view can be customized and show the session owner, name, description,
connection mode, number of private changes, number of locks, application and other values.
To see session information, click Manage & Settings > Sessions > View Sessions.
Actions available to administrators on private sessions are determined by the Manage Sessions
permission on their profile.

Security Management Administration Guide R80.20 | 38


Managing Administrator Accounts

Administrators without the Manage Administrators with the Manage Session Permission
Session permission can: can:
• Publish and discard their own sessions • Publish and discard their own sessions
• See sessions opened by other • See sessions opened by other administrators, the
administrators, the number the locks number the locks they have and number changes
they have and number of changes they they have made
have made
• Publish & Disconnect the private sessions of
• Take over sessions created by other administrators
applications, for example sessions
• Disconnect & Discard the private sessions of
created by the API command line tool
other administrators
• Disconnect another administrator's private
session
• Take over sessions created by applications, for
example sessions created by the API command
line tool
• Take over the private sessions of other
administrators.
Note: If you want to keep changes made in your
own private session, publish these changes
before you take over the session of another
administrator. If you do not publish your changes,
you will lose them. When you take over, you
disconnect the other administrator's
SmartConsole session.
• Publish & Disconnect the private sessions of
other administrators. The action applies to both
SmartConsole sessions and command line API
sessions.
• Disconnect the private session of other
administrators
• Discard & Disconnect the private session of other
administrators

Administrators Working with Multiple Sessions


Administrators working with multiple sessions can open multiple new private sessions without
publishing changes made in their current private session.
Use Case
Suppose you are making changes in a private session and are asked to solve some immediate
problem. The task involves making a change and publishing it. You do not wish to publish or
discard your current private session.
You open a new private session, make the change required resolve the issue, publish the change,
then return to your previous private session.
To do this, you need to work with multiple sessions. To switch on multiple sessions, you need the
Manage Sessions permission selected on your administrator profile.

Security Management Administration Guide R80.20 | 39


Managing Administrator Accounts

To enable working in multiple sessions:


1. Open the relevant permission profile.
2. Make sure the Manage Sessions permission is selected on the Management page.
3. Open SmartConsole > Manage & Settings View > Sessions > Advanced.
4. Select Each administrator can manage multiple SmartConsole sessions at the same time.
5. Publish the change.
When working with multiple sessions, you can:
• Open and manage multiple sessions to the Security Management Server using the same
administrator account
• Switch between the active session and previously saved sessions
• Publish, discard and disconnect other sessions
• Take over other sessions

The SmartConsole Session menu


After multiple sessions are enabled, the SmartConsole Session menu has these new options:

Option Description
Edit sessions details Lets you change the session name and description.
Create new session In the current window
Opens a new session in the current SmartConsole
In a new window
Opens a new session in a new SmartConsole
Recent Shows a list of recent sessions. Selecting a session opens the
session in the current SmartConsole
More Opens the Open Session window that shows sessions that you
previously created and saved.
• Sessions shown in this window are owned by the current
user in the current domain.
• The Open Session > Actions menu has options to open a
saved session in the current SmartConsole or open the
session in a new SmartConsole.

The SmartConsole Session View


When multiple sessions are enabled, you can perform these additional actions:

Action You can:


For sessions that you own • Discard and Disconnect
• Publish and Disconnect
• Disconnect
• Open an older session

Security Management Administration Guide R80.20 | 40


Managing Administrator Accounts

Action You can:


For sessions owned by other administrators that • Publish and Disconnect their changes
have made private changes
• Discard and Disconnect
• Disconnect
• Take over their changes
For sessions owned by other administrators that • Disconnect
have not made private sessions
• Take over
Notes:
• When working in single session, you need to publish or discard your changes before taking
over another session. In multiple sessions, you do not have to publish or discard your session
before taking over the session of another administrator.
• In multiple sessions, an administrator connecting from another desktop to an already
connected session can still take over the connected session by default.

Switching between Multiple and Single Session


If the session management settings switch from multiple SmartConsole sessions to allow only a
single SmartConsole session at a time:
• Administrators can still publish, discard and open sessions that they own.
• Cannot create new sessions until they have published or discarded all their unpublished
sessions with private sessions
• Cannot take over the sessions of other administrators or applications (for example sessions
created with API commands in the mgmt_cli utility) until they have published or discarded all
their previously saved private sessions.

Configuring Authentication Methods for Administrators


These instructions show how to configure authentication methods for administrators. For users,
see Configuring Authentication Methods for Users (on page 215).
For background information about the authentication methods, see Authentication Methods for
Users and Administrators (on page 214).

Configuring Check Point Password Authentication for


Administrators
These instructions show how to configure Check Point Password (on page 214) authentication for
administrators.

To configure a Check Point password for a SmartConsole administrator:


1. Go to Manage & Settings > Permissions & Administrators > Administrators.
2. Click New.
3. The New Administrator window opens.
4. Give the administrator a name.
5. In Authentication method, select Check Point Password.

Security Management Administration Guide R80.20 | 41


Managing Administrator Accounts

6. Click Set New Password, type the Password, and Confirm it.
7. Assign a Permission Profile.
8. Click OK.
9. Click Publish.

Configuring OS Password Authentication for Administrators


These instructions show how to configure OS Password Authentication (on page 214) for
administrators.

To configure an OS password for a SmartConsole administrator:


1. Go to Manage & Settings > Permissions & Administrators > Administrators.
2. Click New.
3. The New Administrator window opens.
4. Give the administrator a name.
5. In Authentication method, select OS Password.
6. Assign a Permission Profile.
7. Click OK.
8. Click Publish.

Configuring a RADIUS Server for Administrators


These instructions show how to configure a RADIUS (on page 214) server for SmartConsole
administrators. To learn how to configure a RADIUS server, refer to the vendor documentation.

To configure a RADIUS Server for a SmartConsole administrator:


1. In SmartConsole, click Objects > More Object Types > Server > More > New RADIUS.
2. Configure the RADIUS Server Properties:
a) Give the server a Name. It can be any name.
b) Click New and create a New Host with the IP address of the RADIUS server.
c) Click OK.
d) Make sure that this host shows in the Host field of the Radius Server Properties window.
e) In the Shared Secret field, type the secret key that you defined previously on the RADIUS
server.
f) Click OK.
g) Click Publish.
3. Add a new administrator:
a) Go to Manage & Settings > Permissions & Administrators > Administrators.
b) Click New.
The New Administrator window opens.
c) Give the administrator the name that is defined on the RADIUS server.
d) Assign a Permission Profile.
e) In Authentication method, select RADIUS.
Security Management Administration Guide R80.20 | 42
Managing Administrator Accounts

f) Select the RADIUS Server defined earlier.


g) Click OK.
4. Click Publish.

Configuring a SecurID Server for Administrators


These instructions show how to configure a SecurID (on page 215) server for SmartConsole
administrators. To learn how to configure a SecurID server, refer to the vendor documentation.

To configure the Security Management Server for SecurID:


1. Connect to the Security Management Server.
2. Copy the sdconf.rec file to the /var/ace/ folder
If the folder does not exist, create the folder.
3. Give the sdconf.rec file full permissions. Run:
chmod 777 sdconf.rec

To configure a SecurID Server for a SmartConsole administrator:


1. In SmartConsole, click Objects > More Object Types > Server > More > New SecurID.
2. Configure the SecurID Properties:
a) Give the server a Name. It can be any name.
b) Click Browse and select the sdconf.rec file. This must be a copy of the file that is on the
Security Management Server.
c) Click OK.
3. Add a new administrator:
a) Go to Manage & Settings > Permissions & Administrators > Administrators.
b) Click New.
The New Administrator window opens.
c) Give the administrator a name.
d) Assign a Permission Profile.
e) In Authentication method, select SecurID.
4. In the SmartConsole Menu, click Install Database.

Configuring a TACACS Server for Administrators


These instructions show how to configure a TACACS (on page 215) server for SmartConsole
administrators. To learn how to configure a TACACS server, refer to the vendor documentation.

To configure a TACACS Server for a SmartConsole administrator:


1. In SmartConsole, click Objects > More Object Types > Server > More > New TACACS.
2. Configure the TACACS Server Properties:
a) Give the server a Name. It can be any name.
b) Click New and create a New Host with the IP address of the TACACS server.
c) Click OK.
Security Management Administration Guide R80.20 | 43
Managing Administrator Accounts

d) Make sure that this host shows in the Host field of the TACACS Server Properties window.
e) In the Shared Secret field, type the secret key that you defined previously on the TACACS
server.
f) Click OK.
g) Click Publish.
3. Add a new administrator:
a) Go to Manage & Settings > Permissions & Administrators > Administrators.
b) Click New.
The New Administrator window opens.
c) Give the administrator the name that is defined on the TACACS server.
d) Assign a Permission Profile.
e) In Authentication method, select TACACS.
f) Select the TACACS Server defined earlier.
g) Click OK.
4. Click Publish.

Security Management Administration Guide R80.20 | 44


Managing Gateways
CHAPTER 4

Managing Gateways
In This Section:
Creating a New Security Gateway ............................................................................. 45
Manually Updating the Gateway Topology ................................................................ 46
Dynamically Updating the Topology .......................................................................... 46
Secure Internal Communication (SIC) ...................................................................... 47
Managing Software Blade Licenses .......................................................................... 50
Enabling Gateways to Access Servers at their NATed IP Addresses ....................... 55

Creating a New Security Gateway


A Security Gateway enforces security policies configured on the Security Management Server.
To install security policies on the Security Gateways, configure the gateway objects in
SmartConsole.

To define a new Security Gateway object:


1. From the navigation toolbar, select Gateways & Servers.
2. Click New, and select Gateway.
The Check Point Security Gateway Creation window opens.
3. Click Classic Mode.
The Check Point Gateway properties window opens and shows the General Properties screen.
4. Enter the host Name and the IPv4 Address or IPv6 Address.
5. Click Communication.
The Trusted Communication window opens.
6. Select a Platform.
7. In the Authentication section, enter and confirm the One-time password.
If you selected Small Office Appliance platform, make sure Initiate trusted communication
automatically when the Gateway connects to the Security Management Server for the first
time is selected.
8. Click Initialize to establish trusted communication with the gateway (on page 47).
If trust fails to establish, click OK to continue configuring the gateway.
9. Click OK.
10. The Get Topology Results window that opens, shows interfaces successfully configured on the
gateway.
11. Click Close.
12. In the Platform section, select the Hardware, the Version, and the OS.
If trust is established between the server and the gateway, click Get to automatically retrieve
the information from the gateway.
13. Select the Software Blades to enable on the Security Gateway.
For some of the Software Blades a first-time setup wizard will open. You can run the wizard
now or later. For more on the setup wizards, see the relevant Administration Guide.

Security Management Administration Guide R80.20 | 45


Managing Gateways

Manually Updating the Gateway Topology


As the network changes, you must update the gateway topology.

To update the gateway topology:


1. In SmartConsole, click Gateways & Servers.
2. Double-click the gateway object.
The gateway property window opens.
3. Click Network Management.
4. Click Get Interfaces.
A warning window asks if you want to overwrite the existing Topology and Anti-spoofing
settings.
5. Click Yes.
6. The Get Topology Results window opens.
7. Click Accept.
8. Click OK.

Dynamically Updating the Topology


This feature is supported only for Security Gateways R77.20 and above. Once selected, the range
of IP addresses behind the internal interface is automatically calculated every second (default
value) without the need for the administrator to click Get Interfaces and install a policy.

To configure dynamic topology updates:


1. Open Gateway Properties > Network Management.
2. Select an interface and click Edit.
3. In the Topology section, click Modify.
4. In the Leads To section, select Network defined by routes.
5. Click OK.
This default update value is configured in SmartConsole > Preferences and set to one second. The
value set here applies to all internal interfaces for all gateways in the domain.

To set the update value for a specific interface:


1. Open Gateway Properties > Network Management.
2. Select an interface and click Actions > Settings.
3. Select Use custom update time (seconds) and set the desired update time.
4. Click OK.

Dynamic Anti-Spoofing
When Anti-Spoofing is selected and you click Get interfaces, the Security Gateway generates a list
of valid IP addresses based on the IP address and netmask of the interface and the routes
assigned to the interface.
Anti-Spoofing drops packets with a source IP address that does not belong to the network behind
the packet’s interface. For example, packets with an internal IP address that comes from an
external interface.

Security Management Administration Guide R80.20 | 46


Managing Gateways

When the Network defined by routes option is selected along with Perform Anti-Spoofing based
on interface topology, you get Dynamic Anti-Spoofing. The valid IP addresses range is
automatically calculated without the administrator having to do click Get Interfaces or install a
policy.

Secure Internal Communication (SIC)


Check Point platforms and products authenticate each other through one of these Secure Internal
Communication (SIC) methods:
• Certificates.
• Standards-based TLS 1.2 for the creation of secure channels.
• 3DES or AES128 for encryption.
Gateways above R71 use AES128 for SIC. If one of the gateways is below R71, the gateways use
3DES. The strongest common cypher is used.
SIC creates trusted connections between gateways, management servers and other Check Point
components. Trust is required to install polices on gateways and to send logs between gateways
and management servers.

Initializing Trust
To establish the initial trust, a gateway and a Security Management Server use a one-time
password. After the initial trust is established, further communication is based on security
certificates.
Note - Make sure the clocks of the gateway and Security Management Server are synchronized,
before you initialize trust between them. This is necessary for SIC to succeed. To set the time
settings of the gateway and Security Management Server, go to the Gaia Portal > System
Management > Time.

To initialize Trust:
1. In SmartConsole, open the gateway network object.
2. In the General Properties page of the gateway, click Communication.
3. In the Communication window, enter the Activation Key that you created during installation of
the gateway.
4. Click Initialize.
The ICA signs and issues a certificate to the gateway.
Trust state is Initialized but not trusted. The Internal Certificate Authority (ICA) issues a
certificate for the gateway, but does not yet deliver it.
The two communicating peers authenticate over SSL with the shared Activation Key. The
certificate is downloaded securely and stored on the gateway. The Activation Key is deleted.
The gateway can communicate with Check Point hosts that have a security certificate signed by
the same ICA.

Security Management Administration Guide R80.20 | 47


Managing Gateways

SIC Status
After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security
Management Server can communicate securely with this gateway:
• Communicating - The secure communication is established.
• Unknown - There is no connection between the gateway and Security Management Server.
• Not Communicating - The Security Management Server can contact the gateway, but cannot
establish SIC. A message shows more information.

Trust State
If the Trust State is compromised (keys were leaked, certificates were lost) or objects changed
(user leaves, open server upgraded to appliance), reset the Trust State. When you reset Trust, the
SIC certificate is revoked.
The Certificate Revocation List (CRL) is updated for the serial number of the revoked certificate.
The ICA signs the updated CRL and issues it to all gateways during the next SIC connection. If two
gateways have different CRLs, they cannot authenticate.

1. In SmartConsole, open the General Properties window of the gateway.


2. Click Communication.
3. In the Trusted Communication window that opens, click Reset.
4. Install Policy on the gateways.
This deploys the updated CRL to all gateways. If you do not have a Rule Base (and therefore
cannot install a policy), you can reset Trust on the gateways.
Important - Before a new trust can be established in SmartConsole, make sure the same
one-time activation password is configured on the gateway.

Troubleshooting SIC
If SIC fails to Initialize:
1. Make sure there is connectivity between the gateway and Security Management Server.
2. Make sure that the Security Management Server and the gateway use the same SIC activation
key (one-time password).
3. If the Security Management Server is behind a gateway, make sure there are rules that allow
connections between the Security Management Server and the remote gateway. Make sure
Anti-spoofing settings are correct.
4. Make sure the name and the IP address of the Security Management Server are in the
/etc/hosts file on the gateway.
If the IP address of the Security Management Server mapped through static NAT by its local
gateway, add the public IP address of the Security Management Server to the /etc/hosts file
on the remote gateway. Make sure the IP address resolves to the server's hostname.
5. Make sure the date and the time settings of the operating systems are correct. If the Security
Management Server and remote the gateway reside in different time zones, the remote
gateway may have to wait for the certificate to become valid.
6. Remove the security policy on the gateway to let all the traffic through: In the command line
interface of the gateway, type: fw unloadlocal
7. Try to establish SIC again.

Security Management Administration Guide R80.20 | 48


Managing Gateways

Remote User access to resources and Mobile Access


If you install a certificate on a gateway that has the Mobile Access Software Blade already
enabled, you must install the policy again. Otherwise, remote users will not be able to reach
network resources.

To establish a new trust state for a gateway:


1. Open the command line interface on the gateway.
2. Enter: cpconfig
3. Enter the number for Secure Internal Communication and press Enter.
4. Enter y to confirm.
5. Enter and confirm the activation key.
6. When done, enter the number for Exit.
7. Wait for Check Point processes to stop and automatically restart.

In SmartConsole:
1. In the General Properties window of the gateway, click Communication.
2. In the Trusted Communication window, enter the one-time password (activation key) that you
entered on the gateway.
3. Click Initialize.
4. Wait for the Certificate State field to show Trust established.
5. Click OK.

Understanding the Check Point Internal Certificate Authority (ICA)


The ICA (Internal Certificate Authority) is created on the Security Management Server when you
configure it for the first time. The ICA issues certificates for authentication:
• Secure Internal Communication (SIC) - Authenticates communication between Security
Management Servers, and between gateways and Security Management Servers.
• VPN certificates for gateways - Authentication between members of the VPN community, to
create the VPN tunnel.
• Users - For strong methods to authenticate user access according to authorization and
permissions.

ICA Clients
In most cases, certificates are handled as part of the object configuration. To control the ICA and
certificates in a more granular manner, you can use one of these ICA clients:
• The Check Point configuration utility - This is the cpconfig CLI utility. One of the options
creates the ICA, which issues a SIC certificate for the Security Management Server.
• SmartConsole - SIC certificates for Security Gateways and administrators, VPN certificates,
and user certificates.
• ICA Management tool - VPN certificates for users and advanced ICA operations (on page 272).
See audit logs of the ICA in SmartConsole Logs & Monitor > New Tab > Open Audit Logs View.

Security Management Administration Guide R80.20 | 49


Managing Gateways

SIC Certificate Management


Manage SIC certificates in the
• Communication tab of the gateway properties window.
• ICA Management Tool (on page 274).
Certificates have these configurable attributes:

Attributes Default Comments


validity 5 years
key size 2048 bits
KeyUsage 5 Digital Signature and Key encipherment
ExtendedKeyUsage 0 (no KeyUsage) VPN certificates only

To learn more about key size values, see RSA key lengths
http://supportcontent.checkpoint.com/solutions?id=sk96591.

Managing Software Blade Licenses


After an administrator runs the First Time Configuration Wizard on a Security Management
Server, and the Security Management Server connects to the Internet, it automatically activates its
license and synchronizes with the Check Point User Center. If the Security Management Server
loses Internet connectivity before the license is activated, it tries again, on an interval.
If the administrator makes changes to Management Software Blade licenses of a Security
Management Server in the Check Point User Center, these changes are automatically
synchronized with that Security Management Server.
Notes:
• Automatic activation is supported on Check Point appliances only.
• Automatic synchronization is supported on all R80.20 servers.
To make sure that your environment is synchronized with the User Center, even when the Security
Management Server is not connected to the Internet, we recommend that you configure a Check
Point server with Internet connectivity as a proxy.
In SmartConsole, you can see this information for most Software Blade licenses:
• License status
• Alerts
• Check Point User Center details
See the R80.20 Release Notes
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_RN/html_fr
ameset.htm for a list of supported Software Blades

Security Management Administration Guide R80.20 | 50


Managing Gateways

Configuring a Proxy gateway


To configure a proxy on a Check Point server:
1. On the Security Management Server, add these lines to $CPDIR/tmp/.CPprofile.sh:
• _cpprof_add HTTP_CLIENT_PROXY_SICNAME "<proxy server sic name>" 0 0
• _cpprof_add HTTP_CLIENT_PROXY_IP "<proxy server IP>" 0 0
2. Reboot the Security Management Server.

Viewing Licenses in SmartConsole


To view license information:
Step Description
1 In SmartConsole, from the left navigation panel, click Gateways & Servers.

2 From the Columns drop-down list, select Licenses.

You can see these columns:

Column Description
License Status The general state of the Software Blade licenses:
• OK - All the blade licenses are valid.
• Not Activated - Blade licenses are not installed. This is only possible in
the first 15 days after the establishment of the SIC with the Security
Management Server. After the initial 15 days, the absence of licenses
will result in the blade error message.
• Error with <number> blade(s) - The specified number of blade licenses
are not installed or not valid.
• Warning with <number> blade(s) - The specified number of blade
licenses have warnings.
• N/A - No available information.
CK Unique Certificate Key of the license instance.
SKU Catalog ID from the Check Point User Center.
Account ID User's account ID.
Support Level Check Point level of support.
Support Expiration Date when the Check Point support contract expires.

Security Management Administration Guide R80.20 | 51


Managing Gateways

To view license information for each Software Blade:


Step Description
1 Select a Security Gateway or a Security Management Server.

2 In the Summary tab below, click the object's License Status (for example: OK).
The Device & License Information window opens. It shows basic object information and
License Status, license Expiration Date, and important quota information (in the
Additional Info column) for each Software Blade.
Notes:
• Quota information, quota-dependent license statuses, and blade information messages
are only supported for R80.
• The tooltip of the SKU is the product name.
The possible values for the Software Blade License Status are:

Status Description
Active The Software Blade is active and the license is valid.
Available The Software Blade is not active, but the license is valid.

No License The Software Blade is active but the license is not valid.
Expired The Software Blade is active, but the license expired.
About to Expire The Software Blade is active, but the license will expire in thirty days
(default) or less (7 days or less for an evaluation license).
Quota Exceeded The Software Blade is active, and the license is valid, but the quota of
related objects (gateways, files, virtual systems, and so on, depending on the
blade) is exceeded.
Quota Warning The Software Blade is active, and the license is valid, but the number of
objects of this blade is 90% (default) or more of the licensed quota.
N/A The license information is not available.

Monitoring Licenses in SmartConsole


To keep track of license issues, you can use these options:

Option Description
License Status view To see and export license information for Software Blades on each
specific Security Management Server, gateway, or Log Server object.
License Status report To see, filter and export license status information for all configured
Security Management Server, gateway, or Log Server objects.
License Inventory To see, filter and export license information for Software Blades on all
report configured Security Management Server, gateway, or Log Server
objects.

The SmartEvent Software Blade lets you customize the License Status and License Inventory
information from the Logs & Monitor view of SmartConsole.
It is also possible to view license information from the Gateways & Servers view of SmartConsole
without enabling the SmartEvent blade on Security Management Server.
Security Management Administration Guide R80.20 | 52
Managing Gateways

The Gateways & Servers view in SmartConsole lets you see and export the License
Inventory report.
Step Description
1 To see the License Inventory report from the Gateways & Servers view:
a) In SmartConsole, from the left navigation panel, click Gateways & Servers.
b) From the top toolbar, click Actions > License Report.
c) Wait for the SmartView to load and show this report.
By default, this report contains:
 Inventory page: Blade Names, Devices Names, License Statuses
 License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date

2 To export the License Inventory report from the Gateways & Servers view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.

The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Status report.
Step Description
1 To see the License Status report from the Logs & Monitor view:
a) In SmartConsole, from the left navigation panel, click Logs & Monitor
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Views.
d) In the list of reports, double-click License Status.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
 Names of the configured objects, License status for each object, CK, SKU,
Account ID, Support Level, Next Expiration Date

Security Management Administration Guide R80.20 | 53


Managing Gateways

Step Description
2 To filter the License Status report in the Logs & Monitor view:
a) In the top right corner, click the Options button > View Filter.
The Edit View Filter window opens.
b) Select a Field to filter results. For example, Device Name, License Status, Account
ID.
c) Select the logical operator - Equals, Not Equals, or Contains.
d) Select or enter a filter value.
Note - Click the X icon to delete a filter.
e) Optional: Click the + icon to configure additional filters.
f) Click OK to apply the configured filters.
The report is filtered based on the configured filters.

3 To export the License Status report in the Logs & Monitor view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.

The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Inventory report.
Step Description
1 To see the License Inventory report from the Logs & Monitor view:
a) In SmartConsole, from the left navigation panel, click Logs & Monitor
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Reports.
d) In the list of reports, double-click License Inventory.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
 Inventory page: Blade Names, Devices Names, License Statuses
 License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date

Security Management Administration Guide R80.20 | 54


Managing Gateways

Step Description
2 To filter the License Inventory report in the Logs & Monitor view:
a) In the top right corner, click the Options button > Report Filter.
The Edit Report Filter window opens.
b) Select a Field to filter results. For example, Blade Name, Device Name, License
Overall Status, Account ID.
c) Select the logical operator - Equals, Not Equals, or Contains.
d) Select or enter a filter value.
Note - Click the X icon to delete a filter.
e) Optional: Click the + icon to configure additional filters.
f) Click OK to apply the configured filters.
The report is filtered based on the configured filters.

3 To export the License Inventory report in the Logs & Monitor view:
a) In the top right corner, click the Options button.
b) Select the applicable export option - Export to Excel, or Export to PDF.

Enabling Gateways to Access Servers at their NATed IP


Addresses
The R80.20 Jumbo Hotfix Accumulator
http://supportcontent.checkpoint.com/solutions?id=sk137592 Take 190 added the ability to force a
Security Gateway to access the Security Management Server/Log Server at the server's NATed IP
address for fetching policy or sending logs.
This diagram describes the flow of this process:

To enable this feature, run this command on the Security Gateway in the Expert mode:
ckp_regedit -a SOFTWARE CheckPoint FW1 FORCE_NATTED_IP -n 1

Notes:
• This change survives reboot.
• In a Cluster, you must configure all the Cluster Members in the same way.

Security Management Administration Guide R80.20 | 55


CHAPTER 5

Managing Objects
In This Section:
Object Categories ...................................................................................................... 56
Working with Objects................................................................................................. 57
Object Tags ................................................................................................................ 57
Network Object Types ............................................................................................... 58

Network Objects, defined in SmartConsole and stored in the proprietary Check Point object
database, represent physical and virtual network components (such as gateways, servers, and
users), and logical components (such as IP address ranges and Dynamic Objects). Before you
create Network Objects, analyze the needs of your organization:
• What are the physical components of your network: devices, hosts, gateways and their active
Software Blades?
• What are the logical components: services, resources, applications, ranges?
• Who are the users? How should you group them, and with what permissions?

Object Categories
Objects in SmartConsole represent networks, devices, protocols and resources. SmartConsole
divides objects into these categories:

Icon Object Type Examples


Network Objects Gateways, hosts, networks, address ranges, dynamic
objects, security zones
Services Services, Service groups

Custom Applications/Sites Applications, Categories, Mobile applications

VPN Communities Site to Site or Remote Access communities

Users Users, user groups, and user templates

Data Types International Bank Account Number - IBAN, HIPAA -


Medical Record Number - MRN, Source Code.
Servers Trusted Certificate Authorities, RADIUS, TACACS

Time Objects Time, Time groups

UserCheck Interactions Message windows: Ask, Cancel, Certificate Template,


Inform, and Drop
Limit Download and upload bandwidth

Security Management Administration Guide R80.20 | 56


Managing Objects

Working with Objects


You can add, edit, delete, and clone objects. A clone is a copy of the original object, with a different
name. You can also replace one object in the Policy with another object.
Note - Do not create two objects with the same name. You will see a validation error when you try
to publish. To resolve, change one of the object names.
To work with objects, right-click the object in the object tree or in the Object Explorer, and select
the action.
You can delete objects that are not used, and you can find out where an object is used.

To clone an object:
1. In the object tree or in the Object Explorer, right-click the object and select Clone.
The Clone Object window opens.
2. Enter a name for the cloned object.
3. Click OK.

To find out where an object is used:


In the object tree or in the Object Explorer, right-click the object and select Where Used.

To replace an object with a different object:


1. In the object tree or in the Object Explorer, right-click the object and select Where Used.
2. Click the Replace icon.
3. From the Replace with list, select an item.
4. Click Replace.

To delete all instances of an object:


1. In the object tree or in the Object Explorer, right-click the object and select Where Used.
2. Click the Replace icon.
3. From the Replace with list, select None (remove item).
4. Click Replace.

Object Tags
Object tags are keywords or labels that you can assign to the network objects or groups of objects
for search purposes. These are the types of tags you can assign:
• User tags - Assigned manually to individual objects or groups of objects
• System tags - Predefined keywords, such as "application"
Each tag has a name and a value. The value can be static, or dynamically filled by detection
engines.

To add a tag to an object:


1. Open the network object for editing.
2. In the Add Tag field, enter the label to associate with this object.
3. Press Enter.

Security Management Administration Guide R80.20 | 57


Managing Objects

The new tag shows to the right of the Add Tag field.
4. Click OK.

Network Object Types


In This Section:
Networks ................................................................................................................... 58
Network Groups ........................................................................................................ 58
Check Point Hosts ..................................................................................................... 58
Gateway Cluster ........................................................................................................ 59
Updatable Objects ..................................................................................................... 59
More Network Object Types ...................................................................................... 60

Networks
A Network is a group of IP addresses defined by a network address and a net mask. The net mask
indicates the size of the network.
A Broadcast IP address is an IP address which is destined for all hosts on the specified network. If
this address is included, the Broadcast IP address will be considered as part of the network.

Network Groups
A network group is a collection of hosts, gateways, networks or other groups.
Groups are used where you cannot work with single objects, e.g. when working with VPN domains
or with topology definitions.
Groups facilitate and simplify network management. Modifications are applied to the group
instead of each member of the group.

To create a group of network objects:


1. In the Objects tree, click New > Network Group.
The New Network Group window opens.
2. Enter a name for the group
3. Set optional parameters:
• Object comment
• Color
• Tag (as custom search criteria)
4. For each network object or a group of network objects, click the [+] sign and select it from the
list that shows.
5. Click OK.

Check Point Hosts


A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that
receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic
between its multiple interfaces.) For example, if you have two unconnected networks that share a

Security Management Administration Guide R80.20 | 58


Managing Objects

common Security Management Server and Log Server, configure the common server as a Check
Point Host object.
A Check Point Host has one or more Software Blades installed. But if the Firewall blade is
installed on the Check Point Host, it cannot function as a firewall. The Host requires SIC and other
features provided by the actual firewall.
A Check Point Host has no routing mechanism, is not capable of IP forwarding, and cannot be
used to implement Anti-spoofing. If the host must do any of these, convert it to be a Security
Gateway.
The Security Management Server object is a Check Point Host.
Note - When you upgrade to R80.20 from R77.30 or earlier versions, Node objects are converted to
Host objects.

Gateway Cluster
A gateway cluster is a group of Security Gateways with Cluster software installed: ClusterXL, or
another Clustering solution. Clustered gateways add redundancy through High Availability or Load
Sharing.

Updatable Objects
An updatable object is a network object which represents an external service, such as Office 365,
AWS, GEO locations and more. External services providers publish lists of IP addresses or
Domains or both to allow access to their services. These lists are dynamically updated. Updatable
objects derive their contents from these published lists of the providers, which Check Point
uploads to the Check Point cloud. The updatable objects are updated automatically on the Security
Gateway each time the provider changes a list. There is no need to install policy for the updates to
take effect. You can use an updatable object in the Access Control policy as a source or a
destination.
These are the currently supported external services for updatable objects:
• Online services - Office 365, Azure, and AWS
• GEO locations - The GEO database provides mapping of location data to IP addresses. For each
location, there is a network object you can import to SmartConsole. You can block or allow
access to and from specific locations based on their IP addresses.
Note - This feature is only supported for R80.20 and above gateways.

Use Case - Adding an Updatable Object to the Security Policy


A customer uses Office365 and wants to allow access to Microsoft Exchange services.

To add the Microsoft Exchange Updatable Object to the Security Gateway:


1. Make sure the Security Management Server and the Security Gateway have access to the
Check Point cloud.
2. Go to SmartConsole > Security Policies > Access Control > Policy.
3. Create a new rule.
4. In the Destination column, click the + sign and select Import > Updatable Objects.
The Updatable Objects window opens.
5. Select the objects to add. For this use case, select the Exchange Services object.

Security Management Administration Guide R80.20 | 59


Managing Objects

Note - You can also add objects to the Source column.


6. Click OK.
7. Install policy.
The Exchange Services object is added to the Rule Base.

No Name Source Destination VPN Services & Action Track


Applications
1 Accept Exchange WirelessZone Exchange Any Any Accept Log
Services

2 Accept Exchange Exchange WirelessZone Any Any Accept Log


Services

You can monitor the updates in the Logs & Monitor Logs view.

To monitor the updates:


1. Go to SmartConsole > Logs & Monitor.
2. From the search bar, enter Updatable Objects.
3. Double-click the relevant log.
The Log Details window shows.
4. Succeeded shows in the Status field when the update is successful.

More Network Object Types


Address Ranges
An address range is a range of IP addresses on the network, defined by the lowest and the highest
IP addresses. Use an Address Range object when you cannot define a range of IP addresses by a
network IP and a net mask. The Address Range objects are also necessary for the implementation
of NAT and VPN.

Using Wildcard Objects


Wildcard objects let you define IP address objects that share a common pattern that can be
permitted or denied access in a security policy.
Note - This feature is only supported for R80.20 and above gateways.

To create a new wildcard object:


1. Open Object Explorer > New > More > Network Object > Wildcard object.
2. Enter the Wildcard IP address and Wildcard Netmask in IPv4 or IPv6 Format.
3. Click OK.

Understanding Wildcard Objects


The wildcard object contains a wildcard IP address and a wildcard netmask.
The wildcard netmask is the mask of bits that indicate which parts of the IP address must match
and which do not have to match. For example:

Wildcard IP: 194. 29. 0. 1

Wildcard Netmask: 0. 0. 3. 0

Security Management Administration Guide R80.20 | 60


Managing Objects

The third octet represents the mask of bits. If we convert the 3 to binary, we get 00000011. The 0
parts of the mask must match the equivalent bits of the IP address. The 1 parts of the mask do not
have to match, and can be any value.

0 0 0 0 0 0 1 1

Must match the equivalent bits in the IP address Do not have to match

The binary netmask produces these possible decimal values:

128 64 32 16 8 4 2 1

Decimal
Binary

0 0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 1 1

0 0 0 0 0 0 1 0 2

0 0 0 0 0 0 1 1 3

The netmask permits only these IP addresses:


• 194.29.0.1
• 194.29.1.1
• 192.29.2.1
• 194.29.3.1
Use Cases

Scenario One
A supermarket chain has all of its cash registers on subnet 194.29.x.1, where x defines the region.
In this use case, all the cash registers in this region must have access to the database server at
194.30.1.1.
Instead of defining 256 hosts (194.29.0.1, 194.29.1.1, 194.29.2.1....194.29.255.1), the administrator
creates a wildcard object that represents all the cash registers in the region:

Wildcard IP: 194. 29. 0. 1

Wildcard Mask: 0. 0. 255. 0

The wildcard object can now be added to the access control policy.

Source Destination Action Track


Wildcard Object Database server object Accept Log

Security Management Administration Guide R80.20 | 61


Managing Objects

Scenario Two
In this use case, a supermarket chain has stores in Europe and Asia.
The 192.30.0-255.1 network contains both the Asian and European regions, and the stores within
those regions.

Item Description
1 Database Server for Europe
2 Database Server for Asia
3 European and Asia network

The administrator wants stores in the European and Asia regions to access different database
servers. In this topology, the third octet of the European and Asia network's IP address will be
subject to a wildcard. The first four bits of the wildcard will represent the region and the last four
bits will represent the store number.

Bits that represent the region Bits that represent the store number

0000 0000

In the Wildcard IP:


• The Asia region is represented by 0001xxxx (Region 1 in decimal)
• The European region is represented by 0010xxxx (Region 2 in decimal)
In binary:

Binary Decimal

Region Store

0001 0000 16 - Asia Region

0010 0000 32 - European Region

Security Management Administration Guide R80.20 | 62


Managing Objects

To include all the stores of a particular region, the last four bits of the wildcard mask must be set
to 1 (15 in Decimal):

Binary Decimal

Region Store

xxxx 1111 15 - all Asian stores

xxxx 1111 15 - all European stores

A wildcard object that represents all the Asian stores will look like this:

Wildcard IP address 192.30.16.1 (The region)

Wildcard netmask 0.0.15.0 (for stores in the region)

For this range of IP addresses: 192.30.16-31.1


A wildcard object that represents all the European stores will look like this:

Wildcard IP address 192.30.32.1 (the region)

Wildcard netmask 0.0.15.0 (for stores in the region)

For this range of IP addresses: 192.30.32-47.1


The administrator can now use these wildcard objects in the access control policy:

Source Destination Action Track


Asian Stores Wildcard Database Server for Asia Accept Log
European Stores Wildcard Database Server for Europe Accept Log

Scenario Three
In this scenario, the netmask bits are not consecutive.

Wildcard IP 1 1 0 1

Wildcard mask 0 0 5 0

Wildcard IP 00000001.00000001.00000000.00000001

Wildcard Mask 00000000.00000000.00000101.00000000

Mask:

0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0

Security Management Administration Guide R80.20 | 63


Managing Objects

Which will match only these IP addresses:

IP Address Binary Comment


1.1.0.1 00000001.00000001.00000000.000000 The IP address itself
01
1.1.1.1 00000001.00000001.00000001.000000 The equivalent bit at position 23 does not
01 matter
1.1.4.1 00000001.00000001.00000100.000000 The equivalent bit at position 21 does not
01 matter
1.1.5.1 00000001.00000001.00000101.000000 The equivalent bits at positions 21 and 23 do
01 not matter

IPv6
The same principles apply to IPv6 addresses. For example, if the wildcard object has these values:

IPv6 Address 2001::1:10:0:1:41

Wildcard netmask 0::ff:0:0

The wildcard will match: 2001::1:10:0-255:1:41

Domains
A Domain object lets you define a host or DNS domain by its name only. It is not necessary to have
the IP address of the site.
You can use the Domain object in the source and destination columns of an Access Control Policy.
You can configure a Domain object in two ways:
• Select FQDN
In the object name, use the Fully Qualified Domain Name (FQDN). Use the format .x.y.z (with
a dot "." before the FQDN). For example, if you use .www.example.com then the Gateway
matches www.example.com
This option is supported for R80.10 and higher, and is the default. It is more accurate and
faster than the non-FQDN option.
The Security Gateway looks up the FQDN with a direct DNS query, and uses the result in the
Rule Base.
This option supports SecureXL Accept templates. Using domain objects with this option in a
rule has no effect on the performance of the rule, or of the rules that come after it.
• Clear FQDN
This option enforces the domain and its sub-domains. In the object name, use the format .x.y
for the name. For example, use .example.com or .example.co.uk for the name. If you use
.example.com, then the Gateway matches www.example.com and support.example.com
The Gateway does the name resolution using DNS reverse lookups, which can be inaccurate.
The Gateway uses the result in the Rule Base, and caches the result to use again.
When upgrading from R77, this option is enforced.

Security Management Administration Guide R80.20 | 64


Managing Objects

Dynamic Objects
A dynamic object is a "logical" object where the IP address is resolved differently for each Security
Gateway, using the dynamic_objects command.
For R80.10 Security Gateways and higher, dynamic objects support SecureXL Accept templates.
Therefore, there is no performance impact on a rule that uses a dynamic object, or on rules that
come after it.
Dynamic Objects are predefined for LocalMachine-all-interfaces. The DAIP computer interfaces
(static and dynamic) are resolved into this object.

Security Zones
Security Zones let you to create a strong Access Control Policy that controls the traffic between
parts of the network.
A Security Zone object represents a part of the network (for example, the internal network or the
external network). You assign a network interface of a Security Gateway to a Security Zone. You
can then use the Security Zone objects in the Source and Destination columns of the Rule Base.
Use Security Zones to:
• Simplify the Policy. Apply the same rule to many Gateways.
• Add networks to Gateways interfaces without changing the Rule Base.
For example, in the diagram, we have three Security Zones for a typical network: ExternalZone (1),
DMZZone (2) and InternalZone (3).
• Gateway (4) has three interfaces. One interface is assigned to ExternalZone (1), one interface is
assigned to DMZZone (2), and one interface is assigned to InternalZone (3).
• Gateway (5) has two interfaces. One interface is assigned to ExternalZone (1) and one interface
is assigned to InternalZone (3).

A Security Gateway interface can belong to only one Security Zone. Interfaces to different
networks can be in the same Security Zone.

Workflow
1. Define Security Zone objects. Or, use the predefined Security Zones (on page 66).
2. Assign Gateway interfaces to Security Zones (on page 66).

Security Management Administration Guide R80.20 | 65


Managing Objects

3. Use the Security Zone objects in the Source and Destination of a rule. For example:
Source Destination VPN Service Action

InternalZone ExternalZone Any Traffic Any Accept

1. Install the Access Control Policy (on page 111).

Creating and Assigning Security Zones


Before you can use Security Zones in the Rule Base, you must assign Gateway interfaces to
Security Zones.

To create a Security Zone:


1. In the Objects bar (F11), click New > More > Network Object > Security Zone.
The Security Zone window opens.
2. Enter a name for the Security Zone.
3. Enter an optional comment or tag.
4. Click OK.

To assign an interface to a Security Zone


1. In the Gateways & Servers view, right-click a Security Gateway object and select Edit.
The Gateway Properties window opens.
2. In the Network Management pane, right-click an interface and select Edit.
The Interface window opens. The Topology area of the General pane shows the Security Zone
to which the interface is already bound. By default, the Security Zone is calculated according to
where the interface Leads To.
3. Click Modify.
The Topology Settings window opens.
4. In the Security Zone area, click User Defined and select Specify Security Zone.
5. From the drop-down box, select a Security Zone.
Or click New to create a new one.
6. Click OK.

Predefined Security Zones


These are the predefined security zones, and their intended purposes:
• WirelessZone - Networks that can be accessed by users and applications with a wireless
connection.
• ExternalZone - Networks that are not secure, such as the Internet and other external
networks.
• DMZZone - A DMZ (demilitarized zone) is sometimes referred to as a perimeter network. It
contains company servers that can be accessed from external sources.
A DMZ lets external users and applications access specific internal servers, but prevents the
external users accessing secure company networks. Add rules to the firewall Rule Base that
allow traffic to the company DMZ. For example, a rule that allows HTTP and HTTPs traffic to
your web server in the DMZ.
• InternalZone - Company networks with sensitive data that must be protected and used only by
authenticated users.

Security Management Administration Guide R80.20 | 66


Managing Objects

Externally Managed Gateways/Hosts


An Externally Managed Security Gateway or a Host is a gateway or a Host which has Check Point
software installed on it. This Externally Managed gateway is managed by an external Security
Management Server. While it does not receive the Check Point Security Policy, it can participate in
Check Point VPN communities and solutions.

Interoperable Devices
An Interoperable Device is a device that has no Check Point Software Blades installed. The
Interoperable Device:
• Cannot have a policy installed on it
• Can participate in Check Point VPN communities and solutions.

VoIP Domains
There are five types of VoIP Domain objects:
• VoIP Domain SIP Proxy
• VoIP Domain H.323 Gatekeeper
• VoIP Domain H.323 Gateway
• VoIP Domain MGCP Call Agent
• VoIP Domain SCCP CallManager
In many VoIP networks, the control signals follow a different route through the network than the
media. This is the case when the call is managed by a signal routing device. Signal routing is done
in SIP by the Redirect Server, Registrar, and/or Proxy. In SIP, signal routing is done by the
Gatekeeper and/or gateway.
Enforcing signal routing locations is an important aspect of VoIP security. It is possible to specify
the endpoints that the signal routing device is allowed to manage. This set of locations is called a
VoIP Domain. For more information refer to the R80.20 VoIP Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_VoIP_Admin
Guide/html_frameset.htm.

Logical Servers
A Logical Server is a group of machines that provides the same services. The workload of this
group is distributed between all its members.
When a Server group is stipulated in the Servers group field, the client is bound to this physical
server. In Persistent server mode the client and the physical server are bound for the duration of
the session.
• Persistency by Service — once a client is connected to a physical server for a specified service,
subsequent connection to the same Logical Server and the same service will be redirected to
the same physical server for the duration of the session.
• Persistency by Server — once a client is connected to a physical server, subsequent
connections to the same Logical Server (for any service) will be redirected to the same
physical server for the duration of the session.

Security Management Administration Guide R80.20 | 67


Managing Objects

Balance Method
The load balancing algorithm stipulates how the traffic is balanced between the servers. There are
several types of balancing methods:
• Server Load — The Security Gateway determines which Security Management Server is best
equipped to handle the new connection.
• Round Trip Time — On the basis of the shortest round trip time between Security Gateway and
the servers, executed by a simple ping, the Security Gateway determines which Security
Management Server is best equipped to handle the new connection.
• Round Robin — the new connection is assigned to the first available server.
• Random — the new connection is assigned to a server at random.
• Domain — the new connection is assigned to a server based on domain names.

Open Security Extension (OSE) Devices


The Open Security Extension features let you manage third-party devices with the Check Point
SmartConsole. The number of managed devices, both hardware and software packets, depends on
your license. OSE devices commonly include hardware security devices for routing or dedicated
Network Address Translation and Authentication appliances. Security devices are managed in the
Security Policy as Embedded Devices.
The Security Management Server generates Access Lists from the Security Policy and downloads
them to selected routers and open security device. Check Point supports these devices:

OSE Device Supported Versions


Cisco Systems 9.x, 10.x, 11.x, 12.x

The Check Point Rule Base must not have these objects. If it does, the Security Management
Server will not generate Access Lists.
• Drop (in the Action column)
• Encrypt (Action)
• Alert (Action)
• RPC (Service)
• ACE (Service)
• Authentication Rules
• Negate Cell
Defining OSE Device Interfaces
OSE devices report their network interfaces and setup at boot time. Each OSE device has a
different command to list its configuration. You must define at least one interface for each device,
or Install Policy will fail.

To define an OSE Device:


1. From the Object Explorer, click New > More.
2. Click Network Object > More > OSE Device.
3. Enter the general properties (on page 69).
We recommend that you also add the OSE device to the host lists on other servers: hosts
(Linus) and lmhosts (Windows).
Security Management Administration Guide R80.20 | 68
Managing Objects

4. Open the Topology tab and add the interfaces of the device.
You can enable Anti-Spoofing on the external interfaces of the device. Double-click the
interface. In the Interface Properties window > Topology tab, select External and Perform
Anti-Spoofing.
5. Open the Setup tab and define the OSE device and its administrator credentials (on page 69).

OSE Device Properties Window — General Tab


• Name — The name of the OSE device, as it appears in the system database on the server.
• IP Address — The device's IP address.
• Get Address — Click this button to resolve the name to an address.
• Comment — Text to show on the bottom of the Network Object window when this object is
selected.
• Color — Select a color from the drop-down list. The OSE device will be represented in the
selected color in SmartConsole, for easier tracking and management.
• Type — Select from the list of supported vendors.
Anti-Spoofing Parameters and OSE Devices Setup (Cisco)
For Cisco (Version 10.x and higher) devices, you must specify the direction of the filter rules
generated from anti-spoofing parameters. The direction of enforcement is specified in the Setup
tab of each router.
For Cisco routers, the direction of enforcement is defined by the Spoof Rules Interface Direction
property.
Access List No — The number of Cisco access lists enforced. Cisco routers Version 12x and below
support an ACL number range from 101-200. Cisco routers Version 12x and above support an ACL
range number from 101-200 and also an ACL number range from 2000-2699. Inputting this ACL
number range enables the support of more interfaces.
For each credential, select an option:
• None — Credential is not needed.
• Known — The administrator must enter the credentials.
• Prompt — The administrator will be prompted for the credentials.
Username — The name required to logon to the OSE device.
Password — The Administrator password (Read only) as defined on the router.
Enable Username — The user name required to install Access Lists.
Enable Password — The password required to install Access Lists.
Version — The Cisco OSE device version (9.x, 10.x, 11.x, 12.x).
OSE Device Interface Direction — Installed rules are enforced on data packets traveling in this
direction on all interfaces.
Spoof Rules Interface Direction — The spoof tracking rules are enforced on data packets
traveling in this direction on all interfaces.

Security Management Administration Guide R80.20 | 69


Managing Policies
CHAPTER 6

Managing Policies
In This Section:
Working with Policy Packages .................................................................................. 70
Viewing Rule Logs ..................................................................................................... 74
Policy Installation History ......................................................................................... 75

SmartConsole offers a number of tools that address policy management tasks, both at the
definition stage and for maintenance.
At the definition stage:
• Policy Packages let you group different types of policies, to be installed together on the same
installation targets.
• Predefined Installation Targets let you associate each package with a set of gateways. You do
not have to repeat the gateway selection process each time you install a Policy Package.
At the maintenance level:
• Search gives versatile search capabilities for network objects and the rules in the Rule Base.
• Database version control lets you track past changes to the database.

Working with Policy Packages


A policy package is a collection of different types of policies. After installation, the Security
Gateway enforces all the policies in the package. A policy package can have one or more of these
policy types:
• Access Control - consists of these types of rules:
• Firewall
• NAT
• Application & URL Filtering
• Content Awareness
• QoS - Quality of Service rules for bandwidth management
• Desktop Security - the Firewall policy for endpoint computers that have the Endpoint Security
VPN remote access client installed as a standalone client.
• Threat Prevention - consists of:
• IPS - IPS protections continually updated by IPS Services
• Anti-Bot - Detects bot-infected machines, prevents bot damage by blocking bot commands
and Control (C&C) communications
• Anti-Virus - Includes heuristic analysis, stops viruses, worms, and other malware at the
gateway
• Threat Emulation - Detects zero-day and advanced polymorphic attacks by opening
suspicious files in a sandbox
• Threat Extraction - Extracts potentially malicious content from e-mail attachments before
they enter the corporate network
Security Management Administration Guide R80.20 | 70
Managing Policies

The installation process:


• Runs a heuristic verification on rules to make sure they are consistent and that there are no
redundant rules.
If there are verification errors, the policy is not installed. If there are verification warnings (for
example, if anti-spoofing is not enabled for a Security Gateway with multiple interfaces), the
policy package is installed with a warning.
• Makes sure that each of the Security Gateways enforces at least one of the rules. If none of the
rules are enforced, the default drop rule is enforced.
• Distributes the user database and object database to the selected installation targets.
You can create different policy packages for different types of sites in an organization.

Example:
An organization has four sites, each with its own requirements. Each site has a different set of
Software Blades installed on the Security Gateways:

Item Security Gateway Installed Software Blades


1 Sales California Firewall, VPN
2 Sales Alaska Firewall, VPN, IPS, DLP
3 Executive management Firewall, VPN, QoS, and Mobile Access
4 Server farm Firewall
5 Internet

To manage these different types of sites efficiently, you need to create three different Policy
Packages. Each Package includes a combination of policy types that correspond to the Software
Blades installed on the site's gateway. For example:
• A policy package that includes the Access Control policy type. The Access Control policy type
controls the firewall, NAT, Application & URL Filtering, and Content Awareness Software
Blades. This package also determines the VPN configuration.
Install the Access Control policy package on all Security Gateways.
Security Management Administration Guide R80.20 | 71
Managing Policies

• A policy package that includes the QoS policy type for the QoS blade on gateway that manages
bandwidth.
Install this policy package on the executive management Gateway.
• A policy package that includes the Desktop Security Policy type for the gateway that handles
Mobile Access.
Install this policy package on the executive management Gateway.

Creating a New Policy Package


1. From the Menu, select Manage policies and layers.
The Manage policies and layers window opens.
2. Click New.
The New Policy window opens.
3. Enter a name for the policy package.
4. In the General page > Policy types section, select one or more of these policy types:
• Access Control
• Threat Prevention
• QoS, select Recommended or Express
• Desktop Security
To see the QoS, and Desktop Security policy types, enable them on one or more Gateways:
Go to gateway editor > General Properties > Network Security tab:
• For QoS, select QoS
• For Desktop Security, select IPSec VPN and Policy Server
5. On the Installation targets page, select the gateways the policy will be installed on:
• All gateways
• Specific gateways - For each gateway, click the [+] sign and select it from the list.
To install Policy Packages correctly and eliminate errors, each Policy Package is associated
with a set of appropriate installation targets.
6. Click OK.
7. Click Close.
The new policy shows on the Security Policies page.

Adding a Policy Type to an Existing Policy Package


1. From the Menu, select Manage policies and layers.
The Manage policies and layers window opens.
2. Select a policy package and click the Edit button.
3. The New Policy package window opens.
4. On the General > Policy types page, select the policy type to add:
• Access Control
• Threat Prevention
• QoS, select Recommended or Express
• Desktop Security
5. Click OK.

Security Management Administration Guide R80.20 | 72


Managing Policies

Installing a Policy Package


1. On the Global Toolbar, click Install Policy.
The Install Policy window opens showing the installation targets (Security Gateways).
2. From the Select a policy menu, select a policy package.
3. Select one or more policy types that are available in the package.
4. Select the Install Mode:
• Install on each selected gateway independently - Install the policy on each target gateway
independently of others, so that if the installation fails on one of them, it doesn't affect the
installation on the rest of the target gateways.
Note - If you select For Gateway clusters install on all the members, if fails do not install
at all, the Security Management Server makes sure that it can install the policy on all
cluster members before it begins the installation. If the policy cannot be installed on one of
the members, policy installation fails for all of them.
• Install on all selected gateways, if it fails do not install on gateways of the same version -
Install the policy on all the target gateways. If the policy fails to install on one of the
gateways, the policy is not installed on other target gateways.
5. Click Install.

Installing the User Database


When you make changes to user definitions through SmartConsole, they are saved to the user
database on the Security Management Server. User authentication methods and encryption keys
are also saved in this database. The user database does not contain information about users
defined externally to the Security Gateway (such as users in external User Directory groups), but it
does contain information about the external groups themselves (for example, on which Account
Unit the external group is defined). Changes to external groups take effect only after the policy is
installed, or the user database is downloaded from the Security Management Server.
You must choose to install the policy or the user database, based on the changes you made:
• Install the policy (on page 73), if you modified additional components of the Policy Package (for
example, added new Security Policy rules) that are used by the installation targets
• Install the user database, if you only changed the user definitions or the administrator
definitions - From the Menu, select Install Database
The user database is installed on:
• Security Gateways - during policy installation
• Check Point hosts with one or more Management Software Blades enabled - during database
installation
You can also install the user database on Security Gateways and on a remote server, such as a Log
Server, from the command line interface on the Security Management Server.

To install user database from the command line interface:


On the Security Management Server, run: fwm dbload <host name>
Note - Check Point hosts that do not have active Management Software Blades do not get the user
database installed on them.

Security Management Administration Guide R80.20 | 73


Managing Policies

Uninstalling a Policy Package


You can uninstall a policy package through a command line interface on the gateway.

To uninstall a policy package:


1. Open a command prompt on the Security Gateway.
2. Run: fw unloadlocal.
Warning -
• The fw unloadlocal command prevents all traffic from passing through the Security
Gateway, because it disables the IP Forwarding in the Linux kernel.
• The fw unloadlocal command removes all policies from the Security Gateway. This means
that the Security Gateway accepts all incoming connections destined to all active interfaces
without any filtering or protection enabled.

Viewing Rule Logs


You can search for the logs that are generated by a specific rule, from the Security Policy or from
the Logs & Monitor > Logs tab.

To see logs generated by a rule (from the Security Policy):


1. In SmartConsole, go to the Security Policies view.
2. In the Access Control Policy or Threat Prevention Policy, select a rule.
3. In the bottom pane, click one of these tabs to see:
• Logs - By default, shows the logs for the Current Rule. You can filter them by Source,
Destination, Blade, Action, Service, Port, Source Port, Rule (Current rule is the default),
Origin, User, or Other Fields.
• History (Access Control Policy only) - List of rule operations (Audit logs) related to the rule
in chronological order, with the information about the rule type and the administrator that
made the change.

To see logs generated by a rule (by Searching the Logs):


1. In SmartConsole, go to the Security Policies view.
2. In the Access Control Policy or Threat Prevention Policy, select a rule.
3. Right-click the rule number and select Copy Rule UID.
4. In the Logs & Monitor > Logs tab, search for the logs in one of these ways:
• Paste the Rule UID into the query search bar and press Enter.
• For faster results, use this syntax in the query search bar:
layer_uuid_rule_uuid:*_<UID>
For example, paste this into the query search bar and press Enter:
layer_uuid_rule_uuid:*_46f0ee3b-026d-45b0-b7f0-5d71f6d8eb10

Security Management Administration Guide R80.20 | 74


Managing Policies

Policy Installation History


In the Installation History you can choose a Gateway, a date and time when the Policy was
installed, and:
• See the revisions that were installed on the Gateway and who installed the Policy.
• See the changes that were installed and who made the changes.
• Revert to a specific version, and install the last "good" Policy.

To work with the Policy installation history:


1. In SmartConsole, go to Security Policies.
2. From the Access Tools or the Threat Prevention Tools, select Installation History.
3. In the Gateways section, select a Gateway.
4. In the Policy Installation History section, select an installation date.
5. To see the revisions that were installed and who made them:
Click View installed changes.
To see the changes that were installed and who made them :
Click View.
To revert to a specific version of the Policy:
Click Install specific version.

Security Management Administration Guide R80.20 | 75


CHAPTER 7

Creating an Access Control Policy


In This Section:
Introducing the Unified Access Control Policy ......................................................... 76
Creating a Basic Access Control Policy .................................................................... 77
Creating Application Control and URL Filtering Rules............................................. 80
Ordered Layers and Inline Layers ............................................................................. 85
The Columns of the Access Control Rule Base ........................................................ 94
Unified Rule Base Use Cases ...................................................................................102
Rule Matching in the Access Control Policy ............................................................107
Best Practices for Access Control Rules .................................................................110
Installing the Access Control Policy ........................................................................111
Analyzing the Rule Base Hit Count ..........................................................................112
Preventing IP Spoofing .............................................................................................114
Multicast Access Control .........................................................................................116
Managing Pre-R80.10 Security Gateways ................................................................117
Configuring the NAT Policy ......................................................................................118
Site-to-Site VPN .......................................................................................................159
Remote Access VPN .................................................................................................163
Mobile Access to the Network .................................................................................166

Introducing the Unified Access Control Policy


Define one, unified Access Control Policy. The Access Control Policy lets you create a simple and
granular Rule Base that combines all these Access Control features:
• Firewall - Control access to and from the internal network.
• Application & URL Filtering - Block applications and sites.
• Content Awareness - Restrict the Data Types that users can upload or download.
• IPsec VPN and Mobile Access - Configure secure communication with Site-to-Site and Remote
Access VPNs.
• Identity Awareness - Identify users, computers, and networks.
There is no need to manage separate Rule Bases. For example, you can define one, intuitive rule
that: Allows users in specified networks, to use a specified application, but prevents downloading
files larger than a specified size. You can use all these objects in one rule:
• Security Zones
• Services
• Applications and URLs
• Data Types
• Access Roles
Information about these features is collected in one log:
• Network
Security Management Administration Guide R80.20 | 76
Creating an Access Control Policy

• Protocol
• Application
• User
• Accessed resources
• Data Types

Creating a Basic Access Control Policy


A firewall controls access to computers, clients, servers, and applications using a set of rules that
make up an Access Control Rule Base. You need to configure a Rule Base with secure Access
Control and optimized network performance.
A strong Access Control Rule Base:
• Allows only authorized connections and prevents vulnerabilities in a network.
• Gives authorized users access to the correct internal resources.
• Efficiently inspects connections.

Basic Rules
Best Practice - These are basic Access Control rules we recommend for all Rule Bases:
• Stealth rule that prevents direct access to the Security Gateway
• Cleanup rule that drops all traffic that is not matched by the earlier rules in the policy
Note - If you delete the cleanup rule, there will still be an implicit drop rule that drops all traffic
that did not match all other rules. This rule does not create log entries. If you want to log the
traffic, create an explicit Cleanup rule.

Use Case - Basic Access Control


This use case shows a Rule Base for a simple Access Control security policy. (The Hits, VPN and
Content columns are not shown.)

No Name Source Destination Services & Action Track Install On


Applications
1 Admin Access to Admins (Access Gateways-group Any Accept Log Policy Targets
Gateways Role)

2 Stealth Any Gateways-group Any Drop Alert Policy Targets

3 Critical subnet Internal Finance Any Accept Log CorpGW


HR
R&D

4 Tech support TechSupport Remote1-web HTTP Accept Alert Remote1GW

5 DNS server Any DNS Domain UDP Accept None Policy Targets

6 Mail and Web servers Any DMZ HTTP Accept Log Policy Targets
HTTPS
SMTP

7 SMTP Mail NOT Internal SMTP Accept Log Policy Targets


net group

8 DMZ & Internet IntGroup Any Any Accept Log Policy Targets

Security Management Administration Guide R80.20 | 77


Creating an Access Control Policy

No Name Source Destination Services & Action Track Install On


Applications
9 Cleanup rule Any Any Any Drop Log Policy Targets

Rule Explanation
1 Admin Access to Gateways - SmartConsole administrators are allowed to connect to the
Security Gateways.

2 Stealth - All internal traffic that is NOT from the SmartConsole administrators to one of
the Security Gateways is dropped. When a connection matches the Stealth rule, an alert
window opens in SmartView Monitor.
3 Critical subnet - Traffic from the internal network to the specified resources is logged.
This rule defines three subnets as critical resources: Finance, HR, and R&D.
4 Tech support - Allows the Technical Support server to access the Remote-1 web server
which is behind the Remote-1 Security Gateway. Only HTTP traffic is allowed. When a
packet matches the Tech support rule, the Alert action is done.
5 DNS server - Allows UDP traffic to the external DNS server. This traffic is not logged.
6 Mail and Web servers - Allows incoming traffic to the mail and web servers that are
located in the DMZ. HTTP, HTTPS, and SMTP traffic is allowed.
7 SMTP - Allows outgoing SMTP connections to the mail server. Does not allow SMTP
connections to the internal network, to protect against a compromised mail server.
8 DMZ and Internet - Allows traffic from the internal network to the DMZ and Internet.
9 Cleanup rule - Drops all traffic that does not match one of the earlier rules.

Use Case - Inline Layer for Each Department


This use case shows a basic Access Control Policy with a sub-policy for each department. The
rules for each department are in an Inline Layer. An Inline Layer is independent of the rest of the
Rule Base. You can delegate ownership of different Layers to different administrators.

No Name Source Destination Services & Content Action Track


Applications
1 Critical subnet Internal Finance Any Any Accept Log
HR

2 SMTP Mail NOT internal SMTP Any Accept Log


network (Group)

3 R&D department R&D Roles Any Any Any TechSupport Layer N/A

3.1 R&D servers Any R&D servers Any Any Accept Log
(Group)
QA network

3.2 R&D source control InternalZone Source control ssh, http, https Any Accept Log
servers (Group)

--- --- --- --- --- --- --- ---

3.X Cleanup rule Any Any Any Any Drop Log

4 QA department QA network Any Any Any QA Layer N/A

Security Management Administration Guide R80.20 | 78


Creating an Access Control Policy

4.1 Allow access to Any R&D Servers Web Services Any Accept Log
R&D servers (Group)

---- --- --- --- --- --- --- ---

4.Y Cleanup rule Any Any Any Any Drop Log

5 Allow all users to Any Employee portal Web Services Any Accept None
access employee
portal

--- --- --- --- --- --- --- ---

9 Cleanup rule Any Any Any Any Drop Log

Rules Explanation
1 General rules for the whole organization.
2
3 An Inline Layer for the R&D department.
3.1 Rule 3 is the parent rules of the Inline Layer. The Action is the name of the Inline Layer.
3.2 If a packet does not match on parent rule 3:
---
Matching continues to the next rule outside the Inline Layer (rule 4).
3.X
If a packet matches on parent rule 3:
Matching continues to 3.1, first rule inside the Inline Layer. If a packet matches on this
rule, the rule action is done on the packet.
If a packet does not match on rule 3.1, continue to the next rule inside the Inline Layer,
rule 3.2. If there is no match, continue to the remaining rules in the Inline Layer. ---
means one or more rules.
The packet is matched only inside the inline layer. It never leaves the inline layer,
because the inline layer has an implicit cleanup rule. It is not matched on rules 4, 5 and
the other rules in the Ordered Layer.
Rule 3.X is a cleanup rule. It drops all traffic that does not match one of the earlier rules
in the Inline Layer. This is a default explicit rule. You can change or delete it.
Best Practice - Have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.
4 Another Inline Layer, for the QA department.
4.1
---
4.Y
5 More general rules for the whole organization.
-- One or more rules.
9 Cleanup rule - Drop all traffic that does not match one of the earlier rules in the Ordered
Layer. This is a default explicit rule. You can change or delete it.
Best Practice - Have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.

Security Management Administration Guide R80.20 | 79


Creating an Access Control Policy

Creating Application Control and URL Filtering Rules


Create and manage the Policy for Application Control and URL Filtering in the Access Control
Policy, in the Access Control view of SmartConsole. Application Control and URL Filtering rules
define which users can use specified applications and sites from within your organization and
what application and site usage is recorded in the logs.
To learn which applications and categories have a high risk, look through the Application Wiki in
the Access Tools part of the Security Policies view. Find ideas for applications and categories to
include in your Policy.
To see an overview of your Access Control Policy and traffic, see the Access Control view in Logs
& Monitor > New Tab > Views.

Monitoring Applications
Scenario: I want to monitor all Facebook traffic in my organization. How can I do this?

To monitor all Facebook application traffic:


1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Choose a Layer with Applications and URL Filtering enabled.
3. Click one of the Add rule toolbar buttons to add the rule in the position that you choose in the
Rule Base. The first rule matched is applied.
4. Create a rule that includes these components:
• Name - Give the rule a name, such as Monitor Facebook.
• Source - Keep it as Any so that it applies to all traffic from the organization.
• Destination - Keep it as Internet so that it applies to all traffic going to the internet or DMZ.
• Services & Applications - Click the plus sign to open the Application viewer. Add the
Facebook application to the rule:
 Start to type "face" in the Search field. In the Available list, see the Facebook
application.
 Click each item to see more details in the description pane.
 Select the items to add to the rule.
Note - Applications are matched by default on their Recommended services. You can
change this. (on page 97) Each service runs on a specific port. The recommended Web
Browsing Services are http, https, HTTP_proxy, and HTTPS_proxy.
• Action - Select Accept
• Track - Select Log
• Install On - Keep it as Policy Targets for or all gateways, or choose specific Security
Gateways on which to install the rule
The rule allows all Facebook traffic but logs it. You can see the logs in the Logs & Monitor view, in
the Logs tab. To monitor how people use Facebook in your organization, see the Access Control
view (SmartEvent Server required).

Security Management Administration Guide R80.20 | 80


Creating an Access Control Policy

Blocking Applications and Informing Users


Scenario: I want to block pornographic sites in my organization, and tell the user about the
violation. How can I do this?

To block an application or category of applications and tell the user about the policy
violation:
1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Choose a Layer with Applications and URL Filtering enabled.
3. Create a rule that includes these components:
• Services & Applications - Select the Pornography category.
• Action - Drop, and a UserCheck Blocked Message - Access Control
The message informs users that their actions are against company policy and can include a
link to report if the website is included in an incorrect category.
• Track - Log
Note - This Rule Base example contains only those columns that are applicable to this subject.

Name Source Destination Services & Action Track Install On


Applications
Block Porn Any Internet Pornography Drop Log Policy Targets
(category) Blocked
Message

The rule blocks traffic to pornographic sites and logs attempts to access those sites. Users who
violate the rule receive a UserCheck message that informs them that the application is blocked
according to company security policy. The message can include a link to report if the website is
included in an incorrect category.

Important - A rule that blocks traffic, with the Source and Destination parameters
defined as Any, also blocks traffic to and from the Captive Portal.

Limiting Application Traffic


Scenario: I want to limit my employees' access to streaming media so that it does not impede
business tasks.
If you do not want to block an application or category, there are different ways to set limits for
employee access:
• Add a Limit object to a rule to limit the bandwidth that is permitted for the rule.
• Add one or more Time objects to a rule to make it active only during specified times.
The example rule below:
• Allows access to streaming media during non-peak business hours only.
• Limits the upload throughput for streaming media in the company to 1 Gbps.

To create a rule that allows streaming media with time and bandwidth limits:
1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Choose a Layer with Applications and URL Filtering enabled.

Security Management Administration Guide R80.20 | 81


Creating an Access Control Policy

3. Click one of the Add Rule toolbar buttons to add the rule in the position that you choose in the
Rule Base.
4. Create a rule that includes these components:
• Services & Applications - Media Streams category.
Note - Applications are matched on their Recommended services, where each service runs
on a specific port, such as the default Application Control Web browsing Services: http,
https, HTTP_proxy, and HTTPS_proxy. To change this, see Services & Applications
Column (on page 96).
• Action - Click More and select Action: Accept, and a Limit object.
• Time - Add a Time object that specifies the hours or time period in which the rule is active.
Note - The Time column is not shown by default in the Rule Base table. To see it,
right-click on the table header and select Time.

Name Source Destination Services and Action Track Install Time


Applications On
Limit Any Internet Media Streams Accept Log All Off-Work
Streamin (Category) Upload_1Gb
g Media ps

Note - In ClusterXL Load Sharing modes, the specified bandwidth limit is divided between all
defined cluster members, regardless of the cluster state. For example, if a rule sets 1Gbps limit in
a cluster with three members, each member has a fixed limit of 333 Mbps.

Using Identity Awareness Features in Rules


Scenario: I want to allow a Remote Access application for a specified group of users and block the
same application for other users. I also want to block other Remote Access applications for
everyone. How can I do this?
If you enable Identity Awareness on a Security Gateway, you can use it together with Application
Control to make rules that apply to an access role. Use access role objects to define users,
machines, and network locations as one object.
In this example:
• You have already created an Access Role Identified_Users that represents all identified users
in the organization. You can use this to allow access to applications only for users who are
identified on the Security Gateway.
• You want to allow access to the Radmin Remote Access tool for all identified users.
• You want to block all other Remote Access tools for everyone within your organization. You
also want to block any other application that can establish remote connections or remote
control.

To do this, add two new rules to the Rule Base:


1. Create a rule and include these components:
• Source - The Identified_Users access role
• Destination - Internet
• Services & Applications - Radmin
• Action - Accept

Security Management Administration Guide R80.20 | 82


Creating an Access Control Policy

2. Create another rule below and include these components:


• Source - Any
• Destination - Internet
• Services & Applications - The category: Remote Administration
• Action - Block
Name Source Destination Services & Action Track Install On
Applications
Allow Radmin to Identified_User Internet Radmin Allow Log All
Identified Users s
Block other Any Internet Remote Block Log All
Remote Admins Administration

Notes on these rules:


• Because the rule that allows Radmin is above the rule that blocks other Remote
Administration tools, it is matched first.
• The Source of the first rule is the Identified_Users access role. If you use an access role that
represents the Technical Support department, then only users from the technical support
department are allowed to use Radmin.
• Applications are matched on their Recommended services, where each service runs on a
specific port, such as the default Application Control Web browsing services: http, https,
HTTP_proxy, and HTTPS_proxy. To change this see Changing Services for Applications and
Categories.
For more about Access Roles and Identity Awareness, see the R80.20 Identity Awareness
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwa
reness_AdminGuide/html_frameset.htm.

Blocking Sites
Scenario: I want to block sites that are associated with categories that can cause liability issues.
Most of these categories exist in the Application Database but there is also a custom defined site
that must be included. How can I do this?
You can do this by creating a custom group and adding all applicable categories and the site to it.
If you enable Identity Awareness on a Security Gateway, you can use it together with URL Filtering
to make rules that apply to an access role. Use access role objects to define users, machines, and
network locations as one object.
In this example:
• You have already created
• An Access Role that represents all identified users in the organization (Identified_Users).
• A custom application for a site named FreeMovies.
• You want to block sites that can cause liability issues for everyone within your organization.
• You will create a custom group that includes Application Database categories as well as the
previously defined custom site named FreeMovies.

Security Management Administration Guide R80.20 | 83


Creating an Access Control Policy

To create a custom group:


1. In the Object Explorer, click New > More > Custom Application/Site > Application/Site Group.
2. Give the group a name. For example, Liability_Sites.
3. Click + to add the group members:
• Search for and add the custom application FreeMovies.
• Select Categories, and add the ones you want to block (for example Anonymizer, Critical
Risk, and Gambling)
• Click Close
4. Click OK.
You can now use the Liability_Sites group in the Access Control Rule Base.

In the Rule Base, add a rule similar to this:


In the Security Policies view of SmartConsole, go to the Access Control Policy.
• Source - The Identified_Users access role
• Destination - Internet
• Services & Applications - Liability_Sites
• Action - Drop
Note - Applications are matched on their Recommended services, where each service runs
on a specific port, such as the default Application Control Web Browsing Services: http,
https, HTTP_proxy, and HTTPS_proxy. To change this see Changing Services for
Applications and Categories.

Name Source Destination Services & Action Track


Applications
Block sites that may Identified_Users Internet Liability_Sites Drop Log
cause a liability

Blocking URL Categories


Scenario: I want to block pornographic sites. How can I do this?
You can do this by creating a rule that blocks all sites with pornographic material with the
Pornography category. If you enable Identity Awareness on a Security Gateway, you can use it
together with URL Filtering to make rules that apply to an access role. Use access role objects to
define users, machines, and network locations as one object.
In this example:
• You have already created an Access Role (Identified_Users) that represents all identified users
in the organization.
• You want to block sites related to pornography.
The procedure is similar to Blocking Applications and Informing Users.

In the Rule Base, add a rule similar to this:


• Source - The Identified_Users access role
• Destination - Internet
• Services & Applications - Pornography category
Security Management Administration Guide R80.20 | 84
Creating an Access Control Policy

• Action - Drop
Note - Categories are matched on their Recommended services, where each service runs on a
specific port, such as the default Application Control Web Browsing Services: http, https,
HTTP_proxy, and HTTPS_proxy. To change this see Changing Services for Applications and
Categories.

Ordered Layers and Inline Layers


A policy is a set of rules that the gateway enforces on incoming and outgoing traffic. There are
different policies for Access Control and for Threat Prevention.
You can organize the Access Control rules in more manageable subsets of rules using Ordered
Layers and Inline Layers.

In This Section
The Need for Ordered Layers and Inline Layers ...................................................... 85
Order of Rule Enforcement in Inline Layers ............................................................. 85
Order of Rule Enforcement in Ordered Layers......................................................... 86
Creating an Inline Layer ............................................................................................ 87
Creating a Ordered Layer .......................................................................................... 87
Enabling Access Control Features............................................................................ 88
Types of Rules in the Rule Base................................................................................ 90
Administrators for Access Control Layers ............................................................... 92
Sharing Layers .......................................................................................................... 92
Visual Division of the Rule Base with Sections ......................................................... 93
Exporting Layer Rules to a .CSV File ........................................................................ 93
Managing Policies and Layers .................................................................................. 93

The Need for Ordered Layers and Inline Layers


Ordered Layers and Inline Layers helps you manage your cyber security more efficiently. You can:
• Simplify the Rule Base, or organize parts of it for specific purposes.
• Organize the Policy into a hierarchy, using Inline Layers, rather than having a flat Rule Base.
An Inline Layer is a sub-policy which is independent of the rest of the Rule Base.
• Reuse Ordered Layers in multiple Policy packages, and reuse Inline Layers in multiple Layers.
• Simplify the management of the Policy by delegating ownership of different Layers to different
administrators.
• Improve performance by reducing the number of rules in a Layer.

Order of Rule Enforcement in Inline Layers


The Ordered Layer can contain Inline Layers.
This is an example of an Inline Layer:

No. Source Destination VPN Services Action


1

2 Lab_network Any Any Any Lab_rules

Security Management Administration Guide R80.20 | 85


Creating an Access Control Policy

No. Source Destination VPN Services Action


2.1 Any Any Any https Allow
http

2.2 Any Any Any Any Drop

The Inline Layer has a parent rule (Rule 2 in the example), and sub rules (Rules 2.1 and 2.2). The
Action of the parent rule is the name of the Inline Layer.
If the packet does not match the parent rule of the Inline Layer, the matching continues to the next
rule of the Ordered Layer (Rule 3).
If a packet matches the parent rule of the Inline Layer (Rule 2), the Firewall checks it against the
sub rules:
• If the packet matches a sub rule in the Inline Layer (Rule 2.1), no more rule matching is done.
• If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup Rule is
applied (Rule 2.2). If this rule is missing, the Implicit Cleanup Rule (on page 90) is applied. No
more rule matching is done.
Important - Always add an explicit Cleanup Rule at the end of each Inline Layer, and make sure
that its Action is the same as the Action of the Implicit Cleanup Rule.

Order of Rule Enforcement in Ordered Layers


When a packet arrives at the gateway, the gateway checks it against the rules in the first Ordered
Layer, sequentially from top to bottom, and enforces the first rule that matches a packet.
If the Action of the matching rule is Drop, the gateway stops matching against later rules in the
Policy Rule Base and drops the packet. If the Action is Accept, the gateway continues to check
rules in the next Ordered Layer.

Item Description
1 Ordered Layer 1
2 Ordered Layer 2
3 Ordered Layer 3

If none of the rules in the Ordered Layer match the packet, the explicit Default Cleanup Rule is
applied. If this rule is missing, the Implicit Cleanup Rule (on page 90) is applied.

Security Management Administration Guide R80.20 | 86


Creating an Access Control Policy

Every Ordered Layer has its own implicit cleanup rule. You can configure the rule to Accept or
Drop in the Layer settings (on page 91).
Important - Always add an explicit Cleanup Rule at the end of each Ordered Layer, and make sure
that its Action is the same as the Action of the Implicit Cleanup Rule.

Creating an Inline Layer


An Inline Layer is a sub-policy which is independent of the rest of the Rule Base.
The workflow for making an Inline Layer is:
1. Create a parent rule for the Inline Layer. Make a rule that has one or more properties that are
the same for all the rules in the Inline Layer. For example, rules that have the same source, or
service, or group of users.
2. Create sub-rules for the Inline Layer. These are rules that define in more detail what to do if
the Firewall matches a connection to the parent rule. For example, each sub-rule can apply to
specified hosts, or users, or services, or Data Types.

To create an Inline Layer:


1. Add a rule to the Ordered Layer. This is the parent rule.
2. In the Source, Destination, VPN, and Services & Applications cells, define the match
conditions for the Inline Layer.
3. Click the Action cell of the rule. Instead of selecting a standard action, select Inline Layer >
New Layer.
4. The Layer Editor window opens.
5. Configure the properties of the Inline Layer:
a) Enable one or more of these Blades for the rules of Inline Layer:
 Firewall
 Application & URL Filtering
 Content Awareness
 Mobile Access
b) Optional: It is a best practice to share Layers with other Policy packages when possible. To
enable this select Multiple policies can use this layer.
c) Click Advanced.
d) Configure the Implicit Cleanup Rule to Drop or Accept (on page 90).
e) Click OK.
The name of the Inline Layer shows in the Action cell of the rule.
6. Under the parent rule of the Inline Layer, add sub-rules.
7. Make sure there is an explicit cleanup rule as the last rule of the Inline Layer (on page 90).

Creating a Ordered Layer


To create an Ordered Layer:
1. In SmartConsole, click Menu > Manage Policies and Layers.
2. In the left pane, click Layers.
You will see a list of the Layers. You can select Show only shared Layers.
Security Management Administration Guide R80.20 | 87
Creating an Access Control Policy

3. Click the New icon in the upper toolbar.


4. Configure the settings in the Layer Editor window.
5. Optional: It is a best practice to share Layers with other Policy packages when possible. To
enable this select Multiple policies can use this layer.
6. Click OK.
7. Click Close.
8. Publish the session.
This Ordered Layer is not yet assigned to a Policy Package.

To add an Ordered Layer to the Access Control Policy:


1. In SmartConsole, click Security Policies.
2. Right-click a Layer in the Access Control Policy section and select Edit Policy.
The Policy window opens.
3. In the Access Control section, click the plus sign.
You will see a list of the Layers that you can add. These are Layers that have Multiple policies
can use this layer enabled.
4. Select the Layer.
5. Click OK.
6. Publish the session.

Pre-R80.10 Gateways: To create a Layer for URL Filtering and Application Control:
1. In SmartConsole, click Security Policies.
2. Right-click a Layer in the Access Control Policy section and select Edit Policy.
The Policy window opens.
3. In the Access Control section, click the plus sign.
4. Click New Layer.
The Layer Editor window opens and shows the General view.
5. Enable Application & URL Filtering on the Layer.
a) Enter a name for the Layer.
We recommend the name Application.
b) In the Blades section, select Applications & URL Filtering.
c) Click OK and the Layer Editor window closes.
d) Click OK and the Policy window closes.
6. Publish the session.

Enabling Access Control Features


Before creating the Access Control Policy, you must enable the Access Control features that you
will use in the Policy.
Enable the features on the:
• Security Gateways on which you will install the Policy.
• Ordered Layers and Inline Layers of the Policy. Here you can enable:
• Firewall. This includes VPN (on page 95).
Security Management Administration Guide R80.20 | 88
Creating an Access Control Policy

• Applications & URL Filtering (on page 96)


• Content Awareness (on page 99)
• Mobile Access (on page 95)

Enabling Access Control Features on a Gateway


1. In SmartConsole, go to Gateways & Servers and double-click the gateway object.
The General Properties window of the gateway opens.
2. From the navigation tree, click General Properties.
3. In the Network Security tab, select one or more of these Access Control features:
• IPsec VPN
• Mobile Access
• Application Control
• URL Filtering
• Content Awareness
• Identity Awareness
4. Click OK.

Enabling Access Control Features on a Layer


To enable the Access Control features on an Ordered Layer:
1. In SmartConsole, click Security Policies.
2. Under Access Control, right-click Policy and select Edit Policy.
3. Click options for the Layer.
4. Click Edit Layer.
The Layer Editor window opens and shows the General view.
5. Enable the Blades that you will use in the Ordered Layer:
• Firewall.
• Applications & URL Filtering
• Content Awareness
• Mobile Access
6. Click OK.

To enable the Access Control features on an Inline Layer:


1. In SmartConsole, click Security Policies.
2. Select the Ordered Layer.
3. In the parent rule of the Inline Layer, right-click the Action column, and select Inline Layer >
Edit Layer.
4. Enable the Blades that you will use in the Inline Layer:
• Firewall.
• Applications & URL Filtering
• Content Awareness
• Mobile Access
Note - Do not enable a Blade that is not enabled in the Ordered Layer.

Security Management Administration Guide R80.20 | 89


Creating an Access Control Policy

5. Click OK.

Types of Rules in the Rule Base


There are three types of rules in the Rule Base - explicit, implied and implicit.

Explicit rules
The rules that the administrator configures explicitly, to allow or to block traffic based on
specified criteria.

Important - The default Cleanup rule is an explicit rule that is added by default to every
new layer. You can change or delete the default Cleanup rule. We recommend that you
have an explicit Cleanup rule as the last rule in each layer.

Implied rules
The default rules that are available as part of the Global properties configuration and cannot be
edited. You can only select the implied rules and configure their position in the Rule Base:
• First - Applied first, before all other rules in the Rule Base - explicit or implied
• Last - Applied last, after all other rules in the Rule Base - explicit or implied, but before the
Implicit Cleanup Rule
• Before Last - Applied before the last explicit rule in the Rule Base
Implied rules are configured to allow connections for different services that the Security Gateway
uses. For example, the Accept Control Connections rules allow packets that control these
services:
• Installation of the security policy on a Security Gateway
• Sending logs from a Security Gateway to the Security Management Server
• Connecting to third party application servers, such as RADIUS and TACACS authentication
servers

Implicit cleanup rule


The default "catch-all" rule for the Layer that deals with traffic that does not match any explicit or
implied rules in the Layer. It is made automatically when you create a Layer.
Implicit cleanup rules do not show in the Rule Base.
For R80.10 later version Security Gateways, the default implicit cleanup rule action is Drop. This is
because most Policies have Whitelist rules (the Accept action). If the Layer has Blacklist rules (the
Drop action), you can change the action of the implicit cleanup rule to Accept in the Layer Editor.
For R77.30 or earlier versions Security Gateways, the action of the implicit rule depends on the
Ordered Layer:
• Drop - for the Network Layer
• Accept - for a Layer with Applications and URL Filtering enabled
Note - If you change the default values, the policy installation will fail on R77.30 or earlier
versions Security Gateways.

Security Management Administration Guide R80.20 | 90


Creating an Access Control Policy

Order in which the Firewall Applies the Rules


1. First Implied Rule - No explicit rules can be placed before it.
2. Explicit Rules - These are the rules that you create.
3. Before Last Implied Rules - Applied before the last explicit rule.
4. Last Explicit Rule - We recommend that you use a Cleanup rule as the last explicit rule.
Note - If you use the Cleanup rule as the last explicit rule, the Last Implied Rule and the
Implicit Cleanup Rule are not enforced.
5. Last Implied Rule - Remember that although this rule is applied after all other explicit and
implied rules, the Implicit Cleanup Rule is still applied last.
6. Implicit Cleanup Rule - The default rule that is applied if none of the rules in the Layer match.

Configuring the Implied Rules


Some of the implied rules are enabled by default. You can change the default configuration as
necessary.

To configure the implied rules:


1. In SmartConsole, select the Access Control Policy.
2. From the toolbar above the policy, select Actions > Implied Rules.
The Implied Policy window opens.
3. In the left pane, click Configuration.
4. Select a rule to enable it, or clear a rule to disable it.
5. For the enabled rules, select the position of the rules in the Rule Base: First, Last, or Before
Last (on page 90).
6. Click OK and install the policy.

Showing the Implied Rules


To see the implied rules:
In SmartConsole, from the Security Policies View, select Actions > Implied Rules.
The Implied Policy window opens.
It shows only the implied rules, not the explicit rules.

Configuring the Implicit Cleanup Rule


To configure the Implicit Cleanup Rule:
1. In SmartConsole, click Menu > Manage Policies and Layers.
2. In the left pane, click Layers.
3. Select a Layer and click Edit.
The Layer Editor opens.
4. Click Advanced
5. Configure the Implicit Cleanup Rule to Drop or Accept.
6. Click OK.
7. Click Close.

Security Management Administration Guide R80.20 | 91


Creating an Access Control Policy

8. Publish the session.

Administrators for Access Control Layers


You can create administrator accounts dedicated to the role of Access Control, with their own
installation and SmartConsole Read/Write permissions.
You can also delegate ownership of different Layers to different administrators (on page 34).

Sharing Layers
You may need to use the same rules in different parts of a Policy, or have the same rules in
multiple Policy packages.
There is no need to create the rules multiple times. Define an Ordered Layer or an Inline Layer
one time, and mark it as shared. You can then reuse the Inline Layer or Ordered layer in multiple
policy packages or use the Inline Layer in multiple places in an Ordered Layer. This is useful, for
example, if you are an administrator of a corporation and want to share some of the rules among
multiple branches of the corporation:
• It saves time and prevents mistakes.
• To change a shared rule in all of the corporation's branches, you must only make the change
once.

To mark a Layer as shared:


1. In SmartConsole, click Menu > Manage policies and layers.
2. In the left pane, click Layers.
3. Select a Layer in Access Control or in Threat Prevention.
4. Right-click and select Edit Layer.
5. Configure the settings in the Layer Editor window.
6. In General, select Multiple policies and rules can use this layer.
7. Click OK.
8. Click Close.
9. Publish the session.

To reuse a Threat Prevention Ordered Layer:


1. In SmartConsole, go to Menu > Manage policies and layers > Policies.
2. Right-click the required policy and click Edit. The policy properties window opens.
3. In the Threat Prevention box, click the + sign.
4. Select the layer you want to include in this policy package.
5. Click OK.
6. Close the policy properties window.
7. Install Policy.
8. Repeat this procedure for all policy packages.
For examples of Inline Layers and Ordered Layer, see Unified Rule Base Use Cases (on page 102).

Security Management Administration Guide R80.20 | 92


Creating an Access Control Policy

Visual Division of the Rule Base with Sections


To better manage a policy with a large number of rules, you can use Sections to divide the Rule
Base into smaller, logical components. The division is only visual and does not make it possible to
delegate administration of different Sections to different administrators.

Exporting Layer Rules to a .CSV File


You can export Layer rules to a .csv file. You can open and change the .csv file in a spreadsheet
application such as Microsoft Excel.

To export Layer rules to a .csv file:


1. In SmartConsole, click Menu > Manage Policies and Layers.
The Manage Layers window opens.
2. Click Layers.
3. Select a Layer, and then click Actions > Export selected Layer.
4. Enter a path and file name.

Managing Policies and Layers


To work with Ordered Layers and Inline Layers in the Access Control Policy, select Menu >
Manage policies and layers in SmartConsole.
The Manage policies and layers window shows.

To see the Layer in the policy package and their attributes:


In the Layers pane of the window, you can see:
• Name - Layer name
• Number of Rules - Number of rules in the Layer
• Modifier- The administrator who last changed the Layer configuration.
• Last Modified - Date the Layer was changed.
• Show only Shared Layers - A shared Layer has the Multiple policies and rules can use this
Layer option selected (on page 92).
• Layer Details
• Used in policies - Policy packages that use the Layer
• Mode:
 Ordered - An Ordered Layer. In a Multi-Domain Security Management environment, it
includes global rules and a placeholder for local, Domain rules.
 Inline - An Inline Layer, also known as a Sub-Policy.
 Not in use - A Layer that is not used in a Policy package.

To see the rules in the Layer:


1. Select a Layer.
2. Right-click and select Open layer in policy.

Security Management Administration Guide R80.20 | 93


Creating an Access Control Policy

The Columns of the Access Control Rule Base


These are the columns of the rules in the Access Control policy. Not all of these are shown by
default. To select a column that does not show, right-click on the header of the Rule Base, and
select it.

Column Description
No. Rule number in the Rule Base Layer.
Hits Number of times that connections match a rule (on page 112).
Name Name that the system administrator gives this rule.
Source Network objects (on page 94) that define
• Where the traffic starts
Destination
• The destination of the traffic.
VPN The VPN Community to which the rule applies (on page 95).
Services & Services, Applications, Categories, and Sites (on page 96).
Applications If Application & URL Filtering is not enabled, only Services show.
Content The data asset to protect, for example, credit card numbers or medical
records (on page 99).
You can set the direction of the data to Download Traffic (into the
organization), Upload Traffic (out of the organization), or Any Direction.
Action Action that is done when traffic matches the rule (on page 100). Options
include: Accept, Drop, Ask, Inform (UserCheck message), Inline Layer,
and Reject.
Track Tracking and logging action that is done when traffic matches the rule
(on page 101).
Install On Network objects that will get the rule(s) of the policy (on page 111).
Time Time period that this rule is enforced.
Comment An optional field that lets you summarize the rule.

Source and Destination Column


In the Source and Destination columns of the Access Control Policy Rule Base, you can add
Network objects including groups of all types. Here are some of the network objects you can
include:
• Network
• Host
• Zones (on page 66)
• Dynamic Objects
• Domain Objects
• Access Roles
• Updatable Objects

Security Management Administration Guide R80.20 | 94


Creating an Access Control Policy

To Learn More About Network Objects


You can add network objects (on page 56) to the Source and Destination columns of the Access
Control Policy.

VPN Column
You can configure rules for Site-to-Site VPN, Remote Access VPN, and the Mobile Access portal
and clients.
To make a rule for a VPN Community, add a Site-to-Site Community or a Remote Access VPN
Community object to this column, or select Any to make the rule apply to all VPN Communities.
When you enable Mobile Access on a gateway, the gateway is automatically added to the
RemoteAccess VPN Community. Include that Community in the VPN column of the rule or use Any
to make the rule apply to Mobile Access gateways. If the gateway was removed from the VPN
Community, the VPN column must contain Any.

IPsec VPN
The IPsec VPN solution lets the Security Gateway encrypt and decrypt traffic to and from other
gateways and clients. Use SmartConsole to easily configure VPN connections between Security
Gateways and remote devices.
For Site-to-Site Communities, you can configure Star and Mesh topologies for VPN networks, and
include third-party gateways.
The VPN tunnel guarantees:
• Authenticity - Uses standard authentication methods
• Privacy - All VPN data is encrypted
• Integrity - Uses industry-standard integrity assurance methods

IKE and IPsec


The Check Point VPN solution uses these secure VPN protocols to manage encryption keys, and
send encrypted packets. IKE (Internet Key Exchange) is a standard key management protocol that
is used to create the VPN tunnels. IPsec is protocol that supports secure IP communications that
are authenticated and encrypted on private or public networks.

Mobile Access to the Network


Check Point Mobile Access lets remote users easily and securely use the Internet to connect to
internal networks. Remote users start a standard HTTPS request to the Mobile Access Security
Gateway, and authenticate with one or more secure authentication methods.
The Mobile Access Portal lets mobile and remote workers connect easily and securely to critical
resources over the internet. Check Point Mobile Apps enable secure encrypted communication
from unmanaged smartphones and tablets to your corporate resources. Access can include
internal apps, email, calendar, and contacts.
To include access to Mobile Access applications in the Rule Base, include the Mobile Application
in the Services & Applications column.
To give access to resources through specified remote access clients, create Access Roles for the
clients and include them in the Source column of a rule.

Security Management Administration Guide R80.20 | 95


Creating an Access Control Policy

To Learn More About VPN


To learn more about Site-to-Site VPN and Remote Access VPN, see these guides:
• R80.20 Site-to-Site VPN Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_SitetoSit
eVPN_AdminGuide/html_frameset.htm
• R80.20 Remote Access VPN Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Remote
AccessVPN_AdminGuide/html_frameset.htm
• R80.20 Mobile Access Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_MobileA
ccess_AdminGuide/html_frameset.htm

Services & Applications Column


In the Services & Applications column of the Access Control Rule Base, define the applications,
sites, and services that are included in the rule. A rule can contain one or more:
• Services
• Applications
• Mobile Applications for Mobile Access
• Web sites
• Default categories of Internet traffic
• Custom groups or categories that you create, that are not included in the Check Point
Application Database.

Service Matching
The Firewall identifies (matches) a service according to IP protocol, TCP and UDP port number,
and protocol signature.
To make it possible for the Firewall to match services by protocol signature, you must enable
Applications and URL Filtering on the Gateway and on the Ordered Layer (on page 88).
You can configure TCP and UDP services to be matched by source port.

Application Matching
If an application is allowed in the policy, the rule is matched only on the Recommended services of
the application. This default setting is more secure than allowing the application on all services.
For example: a rule that allows Facebook, allows it only on the Application Control Web Browsing
Services: http, https, HTTP_proxy, and HTTPS_proxy.
If an application is blocked in the policy, it is blocked on all services. It is therefore blocked on all
ports.
You can change the default match settings for applications.

Security Management Administration Guide R80.20 | 96


Creating an Access Control Policy

Configuring Matching for an Allowed Application


You can configure how a rule matches an application or category that is allowed in the policy. You
can configure the rule to match the application in one of these ways:
• On any service
• On a specified service
To do this, change the Match Settings of the application or category. The application or category is
changed everywhere that it is used in the policy.

To change the matched services for an allowed application or category:


1. In a rule which has applications or categories in the Services & Applications column,
double-click an application or category.
2. Select Match Settings.
3. Select an option:
• The default is Recommended services. The defaults for Web services are the Application
Control Web Browsing Services.
• To match the application with all services, click Any.
• To match the application on specified services, click Customize, and add or remove
services.
• To match the application with all services and exclude specified services, click Customize,
add the services to exclude, and select Negate.
4. Click OK.

Configuring Matching for Blocked Applications


By default, if an application is blocked in the policy, it is blocked on all services. It is therefore
blocked on all ports.
You can configure the matching for blocked applications so that they are matched on the
recommended services. For Web applications, the recommended services are the Application
Control Web browsing services.
If the match settings of the application are configured to Customize, the blocked application is
matched on the customized services service. It is not matched on all ports.

To configure matching for blocked applications:


1. In SmartConsole, go to Manage & Settings > Blades > Application & URL Filtering > Advanced
Settings > Application Port Match
2. Configure Match application on ‘Any’ port when used in ‘Block’ rule:
• Selected - This is the default. If an application is blocked in the Rule Base, the application is
matched to Any port.
• Not selected - If an application is blocked in the Rule Base, the application is matched to
the services that are configured in the application object of the application. However, some
applications are still matched on Any. These are applications (Skype, for example) that do
not limit themselves to a standard set of services.

Security Management Administration Guide R80.20 | 97


Creating an Access Control Policy

Summary of Application Matching in a "Block" Rule


Application - Match Setting Checkbox: Match web Blocked Application is Matched
application on 'Any' port when on Service
used in 'Block' rule
Recommended services Selected (default) Any
(default)
Recommended services Not selected Recommended services
(default)
Customize Not relevant Customized
Any Not relevant Any

Adding Services, Applications, and Sites to a rule


You can add services, applications and sites to a rule.
Note - Rules with applications or categories do not apply to connections from or to the Security
Gateway.

To add services, applications or sites to a rule:


1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. To add applications to a rule, select a Layer with Applications and URL Filtering enabled.
3. Right-click the Services & Applications cell for the rule and select Add New Items.
4. Search for the services, sites, applications, or categories.
5. Click the + next to the ones you want to add.

Creating Custom Applications, Categories, and Groups


You can create custom applications, categories or groups, which are not included in the Check
Point Application Database.

To create a new application or site:


1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Select a Layer with Applications and URL Filtering enabled.
3. Right-click the Services & Applications cell for the rule and select Add New Items.
The Application viewer window opens.
4. Click New > Custom Applications/Site > Application/Site.
5. Enter a name for the object.
6. Enter one or more URLs.
If you used a regular expression in the URL, click URLs are defined as Regular Expressions.
Note - If the application or site URL is defined as a regular expression you must use the
correct syntax.
7. Click OK.

To create a custom category:


1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Select a Layer with Applications and URL Filtering enabled.

Security Management Administration Guide R80.20 | 98


Creating an Access Control Policy

3. Right-click the Services & Applications cell for the rule and select Add New Items.
The Application viewer window opens.
4. Click New > Custom Applications/Site > User Category.
5. Enter a name for the object.
6. Enter a description for the object.
7. Click OK.

Services and Applications on R80 and Lower Gateways, and after Upgrade
For R77.xx and lower Gateways:
• The Firewall matches TCP and UDP services by port number. The Firewall cannot match
services by protocol signature.
• The Firewall matches applications by the application signature.
When you upgrade the Security Management Server and the Gateway to R80 and higher, this
change of behavior occurs:
• Applications that were defined in the Application & URL Filtering Rule Base are accepted on
their recommended ports

Content Column
You can add Data Types to the Content column of rules in the Access Control Policy.
To use the Content column, you must enable Content Awareness, in the General Properties page
of the Security Gateway, and on the Layer.
A Data Type is a classification of data. The Firewall classifies incoming and outgoing traffic
according to Data Types, and enforces the Policy accordingly.
You can set the direction of the data in the Policy to Download Traffic (into the organization),
Upload Traffic (out of the organization), or Any Direction.
There are two kinds of Data Types: Content Types (classified by analyzing the file content) and File
Types (classified by analyzing the file ID).
Content Type examples:
• PCI - credit card numbers
• HIPAA - Medical Records Number - MRN
• International Bank Account Numbers - IBAN
• Source Code - JAVA
• U.S. Social Security Numbers - According to SSA
• Salary Survey Terms
File type examples:
• Viewer File - PDF
• Executable file
• Database file
• Document file
• Presentation file

Security Management Administration Guide R80.20 | 99


Creating an Access Control Policy

• Spreadsheet file
Note these limitations:
• Websocket content is not inspected.
• HTTP connections that are not RFC-compliant are not inspected.
To learn more about the Data Types, open the Data Type object in SmartConsole and press the ?
button (or F1) to see the Help.
Note - Content Awareness and Data Loss Prevention (DLP) both use Data Types. However, they
have different features and capabilities. They work independently, and the Security Gateway
enforces them separately.
To learn more about DLP, see the R80.20 Data Loss Prevention Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_DataLossPr
evention_AdminGuide/html_frameset.htm.

Actions Column
Action Meaning
Accept Accepts the traffic
Drop Drops the traffic. The Firewall does not send a response to the originating end of
the connection and the connection eventually does a time-out. If no UserCheck
object is defined for this action, no page is displayed.
Ask Asks the user a question and adds a confirmatory check box, or a reason box.
Uses a UserCheck object.
Inform Sends a message to the user attempting to access the application or the
content. Uses a UserCheck object.

To see these actions, right-click and select More:

Reject Rejects the traffic. The Firewall sends an RST packet to the originating end of
the connection and the connection is closed.
UserCheck Configure how often the user sees the configured message when the action is
Frequency ask, inform, or block.

Confirm Select the action that triggers a UserCheck message:


UserCheck • Per rule - UserCheck message shows only once when traffic matches a rule.
• Per category - UserCheck message shows for each matching category in a
rule.
• Per application/Site - UserCheck message shows for each matching
application/site in a rule.
• Per Data type - UserCheck message shows for each matching data type.
Limit Limits the bandwidth that is permitted for a rule. Add a Limit object to configure
a maximum throughput for uploads and downloads.

Enable Redirects HTTP traffic to an authentication (captive) portal. After the user is
Identity authenticated, new connections from this source are inspected without requiring
Captive Portal authentication.

Security Management Administration Guide R80.20 | 100


Creating an Access Control Policy

Important - A rule that drops traffic, with the Source and Destination parameters
defined as Any, also drops traffic to and from the Captive Portal.

UserCheck Actions
UserCheck lets the Security Gateways send messages to users about possible non-compliant or
dangerous Internet browsing. In the Access Control Policy, it works with URL Filtering, Application
Control, and Content Awareness. (You can also use UserCheck in the Data Loss Prevention Policy,
in SmartConsole). Create UserCheck objects and use them in the Rule Base, to communicate with
the users. These actions use UserCheck objects:
• Inform
• Ask
• Drop

UserCheck on a Security Gateway


When UserCheck is enabled, the user's Internet browser shows the UserCheck messages in a
new window.
You can enable UserCheck on Security Gateways that use:
• Access Control features:
• Application Control
• URL Filtering
• Content Awareness
• Threat Prevention features:
• Anti-Virus
• Anti-Bot
• Threat Emulation
• Threat Extraction
• Data Loss Prevention

UserCheck on a computer
The UserCheck client is installed on endpoint computers. This client:
• Sends messages for applications that are not based on Internet browsers, such as Skype and
iTunes, and Internet browser add-ons and plug-ins.
• Shows a message on the computer when it cannot be shown in the Internet browser.

To Learn More About UserCheck


To learn more about UserCheck, see the R80.20 Next Generation Security Gateway Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_NextGenSec
urityGateway_Guide/html_frameset.htm.

Tracking Column
These are some of the Tracking options:
• None - Do not generate a log.

Security Management Administration Guide R80.20 | 101


Creating an Access Control Policy

• Log - This is the default Track option. It shows all the information that the Security Gateway
used to match the connection.
• Accounting - Select this to update the log at 10 minute intervals, to show how much data has
passed in the connection: Upload bytes, Download bytes, and browse time.

To Learn More About Tracking


To learn more about Tracking options, see the R80.20 Logging and Monitoring Administration
Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_LoggingAnd
Monitoring_AdminGuide/html_frameset.htm.

Unified Rule Base Use Cases


Here are some use cases that show examples of rules that you can define for the Access Control
Policy.

Use Cases In this section:


Use Case - Application Control and Content Awareness Ordered Layer................102
Use Case - Inline Layer for Web Traffic ...................................................................103
Use Case - Content Awareness Ordered Layer .......................................................104
Use Case - Application & URL Filtering Ordered Layer ..........................................106

Use Case - Application Control and Content Awareness Ordered


Layer
This use case shows an example unified Access Control Policy. It controls applications and
content in one Ordered Layer.

No. Name Source Destinati VPN Services & Content Action Track
on Applications
General compliance (1)

1 Block Any Internet Any Anonymizer Any Drop Log


categories Critical Risk Block
Message

Block risky executables (2)

2 Block download InternalZone Internet Any Uncategorized Download Drop Log


of executable High Risk Traffic
files from Executable
uncategorized File
and high risk
sites

Credit card data (3-4)

3 Allow uploading Finance Web Servers Any https Upload Accept Log
of credit cards (Access Role) Traffic
numbers, by PCI –
finance, and Credit Card
only over HTTPS Numbers

Security Management Administration Guide R80.20 | 102


Creating an Access Control Policy

4 Block other Any Web Servers Any Any Any Drop Log
credit cards Direction
from company PCI –
Web servers Credit Card
Numbers

Inform about sensitive data over VPN (5)

5 Inform the user Any Any RemoteAccess Any Any Inform Log
about sensitive Direction
data from VPN Salary
sites Survey
Report

cleanup (6)

6 Cleanup rule Any Any Any Any Any Accept Log

Rule Explanation
1 General Compliance section - Block access to unacceptable Web sites and applications.
2 Block risky executables section - Block downloading of high risk executable files.
3-4 Credit card data section - Allow uploading of credit cards numbers only by the finance
department, and only over HTTPS. Block other credit cards.
5 Block sensitive data over VPN section - A remote user that connects over the
organization's VPN sees an informational message.
6 cleanup rule - Accept all traffic that does not match one of the earlier rules.

Use Case - Inline Layer for Web Traffic


This use case shows an example Access Control Policy that controls Web traffic. The Web server
rules are in an Inline Layer.

No Name Source Destination Services & Content Action Track


Applications
1 Headquarter HQ Proxy Web Proxy Any Ask Log
WEB traffic - via Web Access
proxy Policy
Access Noti...
once a day
per applic...

2 Allow Proxy to Proxy Internet Web Any Accept None


the Internet

3 Allow local Local Branch Internet Web Any Ask Log


branch to access Web Access
the internet Policy
directly Access Noti...
once a day
per applic...

4 Web Servers InternalZone Web Servers Web Any Web Servers N/A
protection

4.1 Block browsing Any Any NEGATED Any Drop Log


with unapproved Google Chrome
browsers Internet Explorer 11
Firefox
Safari

Security Management Administration Guide R80.20 | 103


Creating an Access Control Policy

No Name Source Destination Services & Content Action Track


Applications
4.2 Inform user when Any Any https Upload Traffic Inform Log
uploading Credit PCI - Credit Access Noti...
Cards only over Card Numbers once a day
HTTPS per applic...

4.3 Block Credit Any Any Any Any Direction Drop Log
Cards PCI - Credit Block
Card Numbers Message

4.4 Block Any Any Any Download Drop Log


downloading of Traffic
sensitive content HIPAA -
Medical
Record
Headers

4.5 Cleanup rule Any Any Any Any Accept None

5 Ask user when InternalZone Internet PayPal Any Direction Ask Log
sending credit PCI - Credit Company
cards to PayPal Card Numbers Policy
Access Noti...
once a day
per applic...

6 Cleanup rule Any Any Any Any Drop Log

Rule Explanation
4 This is the parent rule of the Inline Layer. The Action is the name of the Inline Layer. If a
packet matches on the parent rule, the matching continues to rule 4.1 of the Inline Layer. If
a packet does not match on the parent rule, the matching continues to rule 5.

4.1 If a packet matches on rule 4.1, the rule action is done on the packet, and no more rule
-4.4 matching is done. If a packet does not match on rule 4.1, continue to rule 4.2. The same
logic applies to the remaining rules in the Inline Layer.

4.5 If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup
Rule is applied. The Cleanup rule is a default explicit rule. You can change or delete it. We
recommend that you have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.

Use Case - Content Awareness Ordered Layer


This use case shows a Policy that controls the upload and download of data from and to the
organization.
There is an explanation of some of the rules below the Rule Base.

No Name Source Destination Services & Content Action Track


Applications
Regulatory compliance

1 Block the InternalZone Internet Any Download Traffic Drop Log


download of Executable file
executable files

Security Management Administration Guide R80.20 | 104


Creating an Access Control Policy

2 Allow uploading Finance Web Servers https Upload Traffic Accept Log
of credit cards (Access Role) PCI – Credit Card
numbers by Numbers
finance users,
only over HTTPS

3 Block other credit InternalZone Web Servers Any Any Direction Drop Log
cards from PCI – Credit Card Block Message
company Web Numbers
servers

Personally Identifiable Information

4 Matches U.S. InternalZone Internet Any Upload Traffic Inform Log


Social Security U.S. Social Security Access Notifi...
Numbers (SSN) Numbers - According once a day
allocated by the to SSA per applicati...
U.S. Social
Security
Administration
(SSA).

5 Block InternalZone Internet Any Download Traffic Drop Log


downloading of HIPAA – Medical Block Message
sensitive medical Records Headers
information

Human Resources

6 Ask user when InternalZone Internet Any Upload Traffic Ask Log
uploading Salary Survey Report Company Policy
documents once a day
containing salary per applicati...
survey reports.

Intellectual Property

7 Matches data InternalZone Internet Any Any Direction Restrict source N/A
containing source Source Code code
code

7.1 Any Any Any Download Traffic Accept Log


Source Code

7.2 Any Any Any Upload Traffic Ask Log


Source Code Company Policy
once a day
per applicati...

7.3 Cleanup Inline Any Any Any Any Drop Log


Layer Block Message

Rule Explanation
1-3 Regulatory Compliance section - Control the upload and download of executable files and
credit cards.
You can set the direction of the Content. In rule 1 it is Download Traffic, in rule 2 it is
Upload Traffic, and in rule 3 it is Any Direction.
Rule 1 controls executable files, which are File Types. The File Type rule is higher in the
Rule Base than rules with Content Types (Rules 2 to 7). This improves the efficiency of the
Rule Base, because File Types are matched sooner than Content Types.
4-5 Personally Identifiable Information section - Controls the upload and download of social
security number and medical records.
The rule Action for rule 4 is Inform. When an internal user uploads a file with a social
security number, the user sees a message.

Security Management Administration Guide R80.20 | 105


Creating an Access Control Policy

6 Human resources section - controls the sending of salary survey information outside of
the organization.
The rule action is Ask. If sensitive content is detected, the user must confirm that the
upload complies with the organization's policy.
7 Intellectual Property section - A group of rules that control how source code leaves the
organization.
Rule 7 is the parent rule of an Inline Layer (on page 85). The Action is the name of the
Inline Layer.
If a packet matches on rule 7.1, matching stops.
If a packet does not match on rule 7.1, continue to rule 7.2. In a similar way, if there is no
match, continue to 7.3. The matching stops on the last rule of the Inline Layer. We
recommend that you have an explicit cleanup rule as the last rule in each Inline Layer

Use Case - Application & URL Filtering Ordered Layer


This use case shows some examples of URL Filtering and Application Control rules for a typical
policy that monitors and controls Internet browsing. (The Hits, VPN and Install On columns are
not shown.)

No. Name Source Destination Services & Action Track Time


Applications
1 Liability sites Any Internet Potential Drop Log Any
liability (group) Blocked Message

2 High risk Any Internet High Risk Drop Log Any


applications iTunes Blocked Message
Anonymizer
(category)

3 Allow IT IT (Access Any Radmin Allow Log Work-


department Remote Role) Hours
Admin

4 Allow Facebook for HR(Access Internet Facebook Allow Log Any


HR Role) Download_1Gbps

5 Block these Any Internet Streaming Media Drop Log Any


categories Protocols Blocked Message
Social Networking
P2P File Sharing
Remote
Administration

6 Log all applications Any Internet Any Allow Log Any

Rule Explanation
1 Liability sites- Blocks traffic to sites and applications in the custom Potential_liability
group. The UserCheck Blocked Message is shown to users and explains why their traffic is
blocked.
2 High risk applications - Blocks traffic to sites and applications in the High Risk category
and blocks the iTunes application. The UserCheck Block Message is shown to users and
explains why their traffic is blocked.

Security Management Administration Guide R80.20 | 106


Creating an Access Control Policy

Rule Explanation
3 Allow IT department Remote Admin - Allows the computers in the IT department
network to use the Radmin application. Traffic that uses Radmin is allowed only during the
Work-Hours (set to 8:00 through 18:30, for example).
4 Allow Facebook for HR - Allows computers in the HR network to use Facebook. The total
traffic downloaded from Facebook is limited to 1 Gbps, there is no upload limit.
5 Block these categories - Blocks traffic to these categories: Streaming Media, Social
Networking, P2P File Sharing, and Remote Administration. The UserCheck Blocked
Message is shown to users and explains why their traffic is blocked.
Note - The Remote Administration category blocks traffic that uses the Radmin
application. If this rule is placed before rule 3, then this rule can also block Radmin for the
IT department.
6 Log all applications- Logs all traffic that matches any of the URL Filtering and Application
Control categories.

Rule Matching in the Access Control Policy


The Firewall determines the rule to apply to a connection. This is called matching a connection.
Understanding how the firewall matches connections will help you:
• Get better performance from the Rule Base.
• Understand the logs that show a matched connection.

Examples of Rule Matching


These example Rule Bases show how the Firewall matches connections.
Note that these Rule Bases intentionally do not follow Best Practices for Access Control Rules (on
page 110). This is to make the explanations of rule matching clearer.

Rule Base Matching - Example 1


For this Rule Base:

No. Source Destination Services & Content Action


Applications
1 InternalZone Internet ftp-pasv Download Drop
executable file

2 Any Any Any Executable file Accept

3 Any Any Gambling (Category) Any Drop

4 Any Any Any Any Accept

Security Management Administration Guide R80.20 | 107


Creating an Access Control Policy

This is the matching procedure for an FTP connection:

Part of Firewall action Inspection result


connection
SYN Run the Rule Base: Final match (drop on rule 1).
Look for the first rule that matches: Shows in the log.
• Rule 1 – Match. The Firewall does not
turn on the inspection
engines for the other rules.

Rule Base Matching - Example 2


For this Rule Base:

No. Source Destination Services & Content Action


Applications
1 InternalZone Internet Any Download Drop
executable file

2 Any Any Gambling (category) Any Drop

3 Any Any ftp Any Drop

4 Any Any Any Any Accept

This is the matching procedure when browsing to a file sharing Web site. Follow the rows from top
to bottom. Follow each row from left to right:

Part of Firewall action Inspection result


connection
SYN Run the Rule Base. Possible match (Continue to
Look for the first rule that matches: inspect the connection).

• Rule 1 - Possible match.


• Rule 2 - Possible match.
• Rule 3 - No match.
• Rule 4 - Match.
HTTP The Firewall turns on inspection engines to examine Application: File sharing
Header the data in the connection. (category).
In this example turn on the: Content: Don’t know yet.
• URL Filtering engine – Is it a gambling site?
• Content Awareness engine - Is it an executable
file?
Optimize the Rule Base matching. Possible match (Continue to
Look for the first rule that matches: inspect the connection).

• Rule 1 - Possible match.


• Rule 2 - No match.
• Rule 3 - No match.
• Rule 4 - Match.
HTTP Body Examine the file. Data: PDF file.

Security Management Administration Guide R80.20 | 108


Creating an Access Control Policy

Optimize the Rule Base matching. Final match (accept on rule


Look for the first rule that matches: 4).
Shows in the log.
• Rule 1 - No match.
• Rule 2 - No match.
• Rule 3 - No match.
• Rule 4 - Match.

Rule Base Matching - Example 3


For this Rule Base:

No. Source Destination Services & Content Action


Applications
1 InternalZone Internet Any Download Drop
executable file
2 Any Any Gambling (Category) Any Drop
3 Any Any Any Any Accept

This is the matching procedure when downloading an executable file from a business Web site.
Follow the rows from top to bottom. Follow each row from left to right:

Part of Firewall action Inspection result


connection
SYN Run the Rule Base. Possible match (Continue to
Look for the first rule that matches: inspect the connection).

• Rule 1 – Possible match.


• Rule 2 – Possible match.
• Rule 3 – Match.
HTTP The Firewall turns on inspection engines to examine Application: Business
Header the content in the connection. (Category).
In this example turn on the: Content: Don’t know yet.
• URL Filtering engine – Is it a gambling site?
• Content Awareness engine - Is it an executable
file?
Optimize the Rule Base matching. Possible match (Continue to
Look for the first rule that matches: inspect the connection).

• Rule 1 – Possible match.


• Rule 2 – No match.
• Rule 3 – Match.
HTTP Body Examine the file. Content: Executable file.

Security Management Administration Guide R80.20 | 109


Creating an Access Control Policy

Optimize the Rule Base matching. Final match (accept on rule


Look for the first rule that matches: 1).
Shows in the log.
• Rule 1 – Match.
• Rule 2 – No match.
• Rule 3 – Match.

The matching examples show that:


• The Firewall sometimes runs the Rule Base more than one time. Each time it runs, the
Firewall optimizes the matching, to find the first rule that applies to the connection.
• If the rule includes an application, or a site, or a service with a protocol signature (in the
Application and Services column), or a Data Type (in the Content column), the Firewall:
• Turns on one or more inspection engines.
• Postpones making the final match decision until it has inspected the body of the
connection.
• The Firewall searches for the first rule that applies to (matches) a connection. If the Firewall
does not have all the information it needs to identify the matching rule, it continues to inspect
the traffic.

Best Practices for Access Control Rules


1. Make sure you have these rules:
• Stealth rule that prevents direct access to the Security Gateway
• Cleanup rule that drops all traffic that is not allowed by the earlier rules in the policy.
2. Use Layers to add structure and hierarchy of rules in the Rule Base.
3. Add all rules that are based only on source and destination IP addresses and ports, in a
Firewall/Network Ordered Layer at the top of the Rule Base.
4. Create Firewall/Network rules to explicitly accept safe traffic, and add an explicit cleanup rule
at the bottom of the Ordered Layer to drop everything else.
5. Create an Application Control Ordered Layer after the Firewall/Network Ordered Layer. Add
rules to explicitly drop unwanted or unsafe traffic. Add an explicit cleanup rule at the bottom of
the Ordered Layer to accept everything else.
Alternatively, put Application Control rules in an Inline Layer as part of the Firewall/Network
rules. In the parent rule of the Inline Layer, define the Source and Destination.
6. Share Ordered Layers and Inline Layers when possible.
7. For R80.10 Gateways and higher: If you have one Ordered Layer for Firewall/Network rules,
and another Ordered Layer for Application Control - Add all rules that examine applications,
Data Type, or Mobile Access elements, to the Application Control Ordered Layer, or to an
Ordered Layer after it.
8. Turn off XFF inspection, unless the gateway is behind a proxy server. For more, see: sk92839
http://supportcontent.checkpoint.com/solutions?id=sk92839.
9. Disable a rule when working on it. Enable the rule when you want to use it. Disabled rules do
not affect the performance of the Gateway. To disable a rule, right click in the No. column of
the rule and select Disable.

Security Management Administration Guide R80.20 | 110


Creating an Access Control Policy

Best Practices for Efficient rule Matching


1. Place rules that check the source, destination, and port (network rules) higher in the Rule
Base.
Reason: Network rules are matched sooner, and turn on fewer inspection engines.
2. Place rules that check applications and content (Data Types) below network rules.
3. Do not define a rule with Any in the Source and in the Destination, and with an Application or a
Data Type. For example these rules are not recommended:
Source Destination Services & Content
Applications
Any Any Facebook

Any Any Credit Card numbers

Instead, define one of these recommended rules:


Source Destination Services & Content
Applications
Any Internet Facebook

Any Server Credit Card numbers

Reason for 2 and 3: Application Control and Content Awareness rules require content
inspection. Therefore, they:
• Allow the connection until the Firewall has inspected connection header and body.
• May affect performance.
4. For rules with Data Types (on page 99): Place rules that check File Types higher in the Rule
Base than rules that check for Content Types.
Reason: File Types are matched sooner than Content Types.
To see examples of some of these best practices, see the Unified Rule Base Use Cases (on page
102) and Creating a Basic Access Control Policy (on page 77).

Installing the Access Control Policy


1. On the Global Toolbar, click Menu > Install Policy.
The Install Policy window opens showing the Security Gateways.
2. If there is more than one Policy package: From the Policy drop-down list, select a policy
package.
3. Select Access Control. You can also select other Policies.
4. If there is more than one gateway: Select the gateways on which to install the Policy.
5. Select the Install Mode:
• Install on each selected gateway independently - Install the policy on each target gateway
independently of others, so that if the installation fails on one of them, it doesn't affect the
installation on the rest of the target gateways.
Note - If you select For Gateway Clusters, if installation on a cluster member fails, do not
install on that cluster, the Security Management Server makes sure that it can install the
policy on all cluster members before it begins the installation. If the policy cannot be
installed on one of the members, policy installation fails for all of them.
• Install on all selected gateways, if it fails do not install on gateways of the same version -
Install the policy on all the target gateways. If the policy fails to install on one of the
gateways, the policy is not installed on other target gateways.
Security Management Administration Guide R80.20 | 111
Creating an Access Control Policy

6. Click Install.

Analyzing the Rule Base Hit Count


Use the Hit Count feature to show the number of connections that each rule matches. Use the Hit
Count data to:
• Analyze a Rule Base - You can delete rules that have no matching connections
Note - If you see a rule with a zero hit count it only means that in the Security Gateways
enabled with Hit Count there were no matching connections. There can be matching
connections on other Security Gateways.
• Better understand the behavior of the Access Control Policy
You can show Hit Count for the rules in these options:
• The percentage of the rule hits from total hits
• The indicator level (very high, high, medium, low, or zero)
These options are configured in the Access Control Policy Rule Base and also changes how Hit
Count is shown in other supported Software Blades.
When you enable Hit Count, the Security Management Server collects the data from supported
Security Gateways (from version R75.40 and up). Hit Count works independently from logging and
tracks the hits even if the Track option is None.

Enabling or Disabling Hit Count


By default, Hit Count is globally enabled for all supported Security Gateways (from R75.40). The
timeframe setting that defines the data collection time range is configured globally. If necessary,
you can disable Hit Count for one or more Security Gateways.
After you enable or disable Hit Count you must install the Policy for the Security Gateway to start
or stop collecting data.

To enable or disable Hit Count globally:


1. In SmartConsole, click Menu > Global properties.
2. Select Hit Count from the tree.
3. Select the options:
• Enable Hit Count - Select to enable or clear to disable all Security Gateways to monitor the
number of connections each rule matches.
• Keep Hit Count data up to - Select one of the time range options. The default is 3 months.
Data is kept in the Security Management Server database for this period and is shown in
the Hits column.
4. Click OK.
5. Install the Policy.

To enable or disable Hit Count on each Security Gateway:


1. From the Gateway Properties for the Security Gateway, select Hit Count from the navigation
tree.
2. Select Enable Hit Count to enable the feature or clear it to disable Hit Count.
3. Click OK.
Security Management Administration Guide R80.20 | 112
Creating an Access Control Policy

4. Install the Policy.

Configuring the Hit Count Display


These are the options you can configure for how matched connection data is shown in the Hits
column:
• Value - Shows the number of matched hits for the rule from supported Security Gateways.
Connection hits are not accumulated in the total hit count for:
• Security Gateways that are not supported
• Security Gateways that have disabled the hit count feature
The values are shown with these letter abbreviations:
• K = 1,000
• M = 1,000,000
• G = 1,000,000,000
• T = 1,000,000,000,000
For example, 259K represents 259 thousand connections and 2M represents 2 million
connections.
• Percentage - Shows the percentage of the number of matched hits for the rule from the total
number of matched connections. The percentage is rounded to a tenth of a percent.
• Level - The hit count level is a label for the range of hits according to the table.
The hit count range = Maximum hit value - Minimum hit value (does not include zero hits)
Hit Count Level Icon Range
Zero 0 hits
Low Less than 10 percent of the hit count range
Medium Between 10 - 70 percent of the hit count range

High Between 70 - 90 percent of the hit count range

Very High Above 90 percent of the hit count range

To show the Hit Count in the Rule Base:


Right-click the heading row of the Rule Base and select Hits.

To configure the Hit Count in a rule:


1. Right-click the rule number of the rule.
2. Select Hit Count and one of these options (you can repeat this action to configure more
options):
• Timeframe - Select All, 1 day, 7 days, 1 month, or 3 months
• Display - Select Percentage, Value, or Level

To update the Hit Count in a rule:


1. Right-click the rule number of the rule.
2. Select Hit Count > Refresh.

Security Management Administration Guide R80.20 | 113


Creating an Access Control Policy

Preventing IP Spoofing
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your
protected network, to execute DoS attacks, or to gain unauthorized access.
Anti-Spoofing detects if a packet with an IP address that is behind a certain interface, arrives from
a different interface. For example, if a packet from an external network has an internal IP
address, Anti-Spoofing blocks that packet.

Example:
The diagram shows a Gateway with interfaces 2 and 3, and 4, and some example networks behind
the interfaces.

For the Gateway, anti-spoofing makes sure that


• All incoming packets to 2 come from the Internet (1)
• All incoming packets to 3 come from 192.168.33.0
• All incoming packets to 4 come from 192.0.2.0 or 10.10.10.0
If an incoming packet to B has a source IP address in network 192.168.33.0, the packet is blocked,
because the source address is spoofed.
When you configure Anti-Spoofing protection on a Check Point Security Gateway interface, the
Anti-Spoofing is done based on the interface topology. The interface topology defines where the
interface Leads To (for example, External (Internet) or Internal), and the Security Zone of
interface.

Configuring Anti-Spoofing
Make sure to configure Anti-Spoofing protection on all the interfaces of the Security Gateway,
including internal interfaces.

To configure Anti-Spoofing for an interface:


1. In SmartConsole, go to Gateways & Servers and double-click the Gateway object.
The Gateway Properties window opens.
2. From the navigation tree, select Network Management.
3. Click Get Interfaces.
4. Click Accept.
The gateway network topology shows. If SmartConsole fails to automatically retrieve the
topology, make sure that the details in the General Properties section are correct and the

Security Management Administration Guide R80.20 | 114


Creating an Access Control Policy

Security Gateway, the Security Management Server, and the SmartConsole can communicate
with each other.
5. Select an interface and click Edit.
The interface properties window opens.
6. From the navigation tree, click General.
7. In the Topology section of the page, click Modify.
The Topology Settings window opens.
8. In the Leads To section, select the type of network, to which this interface leads:
• Internet (External) - This is the default setting. It is automatically calculated from the
topology of the Security Gateway. To update the topology of an internal network after
changes to static routes, click Network Management > Get Interfaces in the Gateway
Properties window.
• Override - Override the default setting.
If you Override the default setting:
• Internet (External) - All external/Internet addresses
• This Network (Internal) -
 Not Defined - All IP addresses behind this interface are considered a part of the
internal network that connects to this interface
 Network defined by the interface IP and Net Mask - Only the network that directly
connects to this internal interface
 Network defined by routes - The Security Gateway dynamically calculates the topology
behind this interface. If the network of this interface changes, there is no need to click
Get Interfaces and install a policy. For more, see the section Dynamically Updating the
Topology (on page 46).
 Specific - A specific object (a Network, a Host, an Address Range, or a Network Group)
behind this internal interface
 Interface leads to DMZ - The DMZ that directly connects to this internal interface
9. Optional: In the Security Zone section, select User defined, check Specify Security Zone and
choose the zone of the interface.
10. Configure Anti-Spoofing options (on page 116). Make sure that Perform Anti-Spoofing based
on interface topology is selected.
11. Select an Anti-Spoofing action:
• Prevent - Drops spoofed packets
• Detect - Allows spoofed packets. To monitor traffic and to learn about the network topology
without dropping packets, select this option together with the Spoof Tracking Log option.
12. Configure Anti-Spoofing exceptions (optional). For example, configure addresses, from which
packets are not inspected by Anti-Spoofing:
a) Select Don't check packets from.
b) Select an object from the drop-down list, or click New to create a new object.
13. Configure Spoof Tracking - select the tracking action that is done when spoofed packets are
detected:
• Log - Create a log entry (default)
• Alert - Show an alert
• None - Do not log or alert
14. Click OK twice to save Anti-Spoofing settings for the interface.

Security Management Administration Guide R80.20 | 115


Creating an Access Control Policy

For each interface, repeat the configuration steps. When finished, install the Access Control
policy.

Anti-Spoofing Options
• Perform Anti-Spoofing based on interface topology - Select this option to enable spoofing
protection on this external interface.
• Anti-Spoofing action is set to - Select this option to define if packets will be rejected (the
Prevent option) or whether the packets will be monitored (the Detect option). The Detect option
is used for monitoring purposes and should be used in conjunction with one of the tracking
options. It serves as a tool for learning the topology of a network without actually preventing
packets from passing.
• Don't check packets from - Select this option to make sure anti-spoofing does not take place
for traffic from internal networks that reaches the external interface. Define a network object
that represents those internal networks with valid addresses, and from the drop-down list,
select that network object. The anti-spoofing enforcement mechanism disregards objects
selected in the Don't check packets from drop-down menu.
• Spoof Tracking - Select a tracking option.

Multicast Access Control


Multicast IP transmits one copy of each datagram (IP packet) to a multicast address, where each
recipient in the group takes their copy. The routers in the network forward the datagrams only to
routers and hosts with access to receive the multicast packets.

To configure multicast access control:


1. Open a gateway object.
2. On the Network Management page, select an interface and click Edit.
3. On Interface > Advanced, click Drop Multicast packets by the following conditions.
4. Select a multicast policy for the interface:
• Drop multicast packets whose destination is in the list
• Drop all multicast packets except those whose destination is in the list
When access is denied to a multicast group on an interface for outbound IGMP packets,
inbound packets are also denied.
If you do not define access restrictions for multicast packets, multicast datagrams to one
interface of the gateway are allowed out of all other interfaces.
5. Click Add.
The Add Object window opens, with the Multicast Address Ranges object selected.
6. Click New > Multicast Address Range.
The Multicast Address Range Properties window opens.
7. Enter a name for this range.
8. Define an IP address Range or a Single IP Address in the range: 224.0.0.0 -
239.255.255.255.
Class D IP addresses are reserved for multicast traffic and are allocated dynamically. The
multicast address range 224.0.0.0 - 239.255.255.255 is used only for the destination
address of IP multicast traffic.

Security Management Administration Guide R80.20 | 116


Creating an Access Control Policy

Every IP datagram whose destination address starts with 1110 is an IP multicast datagram.
The remaining 28 bits of the multicast address range identify the group to which the datagram
is sent.
The 224.0.0.0 - 224.0.0.255 range is reserved for LAN applications that are never
forwarded by a router. These addresses are permanent host groups. For example: an ICMP
request to 224.0.0.1 is answered by all multicast capable hosts on the network,
224.0.0.2 is answered by all routers with multicast interfaces, and 224.0.0.13 is
answered by all PIM routers. To learn more, see the IANA website
(http://www.iana.org/assignments/multicast-addresses).
The source address for multicast datagrams is always the unicast source address.
9. Click OK.
10. In the Add Object window, click OK.
11. In the Interface Properties window, click OK.
12. In the gateway window, click OK.
13. In the Rule Base, add a rule that allows the multicast address range as the Destination.
14. In the Services of the rule, add the multicast protocols.
• Multicast routing protocols - For example: Protocol-Independent Multicast (PIM),
Distance Vector Multicast Routing Protocol (DVMRP), and Multicast Extensions to OSPF
(MOSPF).
• Dynamic registration - Hosts use the Internet Group Management Protocol (IGMP) to let
the nearest multicast router know they want to belong to a specified multicast group. Hosts
can leave or join the group at any time.
15. Install the policy.

Managing Pre-R80.10 Security Gateways


When you upgrade a pre-R80 Security Management Server that manages pre-R80.10 Security
Gateways to R80 or higher, the existing Access Control policies are converted in this way:
• The pre-R80 Firewall policy is converted into the Network Policy Layer of the R80 Access
Control Policy. The implicit cleanup rule for it is set to Drop all traffic that is not matched by
any rule in this Layer.
• The pre-R80 Application & URL Filtering policy is converted into the Application Policy Layer,
which is the second Layer of the R80 Access Control Policy. The implicit cleanup rule for it is
set to Accept all traffic that is not matched by any rule in this Layer.
Important – After upgrade, do not change the Action of the implicit cleanup rules, or the order of
the Policy Layers. If you do, the policy installation will fail.

New Access Control Policy for pre-R80 Security Gateways on an R80 Security
Management Server must have this structure:
1. The first Policy Layer is the Network Layer (with the Firewall blade enabled on it).
2. The second Policy Layer is the Application & URL Filtering Layer (with the Application & URL
Filtering blade enabled on it).
3. There are no other Policy Layers.
If the Access Control Policy has a different structure, the policy will fail to install.
You can change the names of the Layers, for example, to make them more descriptive.

Security Management Administration Guide R80.20 | 117


Creating an Access Control Policy

Each new Policy Layer will have the explicit default rule, added automatically and set to Drop all
the traffic that does not match any rule in that Policy Layer. We recommend that the Action is set
to Drop for the Network Policy Layer and Accept for the Application Control Policy Layer.
If you remove the default rule, the Implicit Cleanup Rule will be enforced. The Implicit Cleanup
Rule is configured in the Policy configuration window and is not visible in the Rule Base table.
Make sure the Implicit Cleanup Rule is configured to Drop the unmatched traffic for the Network
Policy Layer and to Accept the unmatched traffic for the Application Control Policy Layer.
CHAPTER 8

Configuring the NAT Policy


In This Section:
Translating IP Addresses (NAT) ...............................................................................118
NAT Rules .................................................................................................................122
Configuring Static and Hide NAT .............................................................................123
Configuring Stateful NAT64 (IPv6 to IPv4 translation).............................................129
Configuring Stateless NAT46 (IPv4 to IPv6 translation) ..........................................140
Advanced NAT Settings ............................................................................................150

Translating IP Addresses (NAT)


NAT (Network Address Translation) is a feature of the Firewall Software Blade and replaces IPv4
and IPv6 addresses to add more security. You can enable NAT for all SmartConsole objects to help
manage network traffic. NAT protects the identity of a network and does not show internal IP
addresses to the Internet. You can also use NAT to supply more IPv4 addresses for the network.
The Firewall can change both the source and destination IP addresses in a packet. For example,
when an internal computer sends a packet to an external computer, the Firewall translates the
source IP address to a new one. The packet comes back from the external computer; the Firewall
translates the new IP address back to the original IP address. The packet from the external
computer goes to the correct internal computer.
SmartConsole gives you the flexibility to make necessary configurations for your network:
• Easily enable the Firewall to translate all traffic that goes to the internal network.
• SmartConsole can automatically create Static and Hide NAT rules that translate the applicable
traffic.
• You can manually create NAT rules for different configurations and deployments.

How Security Gateways Translate Traffic


A Security Gateway can use these procedures to translate IP addresses in your network:
• Static NAT - Each internal IP address is translated to a different public IP address. The
Firewall can allow external traffic to access internal resources.
The configuration of static NAT on a range results in the translation of the IP addresses in the
range into a range of the same size, starting with the IP address specified.
• Hide NAT - The Firewall uses port numbers to translate all specified internal IP addresses to a
single public IP address and hides the internal IP structure. Connections can only start from

Security Management Administration Guide R80.20 | 118


Creating an Access Control Policy

internal computers; external computers CANNOT access internal servers. The Firewall can
translate up to 50,000 connections at the same time from external computers and servers.
• Hide NAT with Port Translation - Use one IP address and let external users access multiple
application servers in a hidden network. The Firewall uses the requested service (or
destination port) to send the traffic to the correct server. A typical configuration can use these
ports: FTP server (port 21), SMTP server (port 25) and an HTTP server (port 80). It is necessary
to create manual NAT rules (on page 122) to use Port Translation.

Using Hide NAT


For each SmartConsole object, you can configure the IP address that is used to translate
addresses for Hide NAT mode:
• Use the IP address of the external Security Gateway interface
• Enter an IP address for the object
Hide NAT uses dynamically assigned port numbers to identify the original IP addresses. There are
two pools of port numbers: 600 to 1023, and 10,000 to 60,000. Port numbers are usually assigned
from the second pool. The first pool is used for these services:
• rlogin (destination port 512)
• rshell (destination port 513)
• rexec (destination port 514)
If the connection uses one of these services, and the source port number is below 1024, then a
port number is assigned from the first pool.
You cannot use Hide NAT for these configurations:
• Traffic that uses protocols where the port number cannot be changed
• An external server that uses IP addresses to identify different computers and clients

Sample NAT Deployments


Static NAT
Firewalls that do Static NAT, translate each internal IP address to a different external IP address.

Item Description
3 External computers and servers in the Internet
2 Security Gateway - Firewall is configured with Static NAT
1 Internal computers

Sample Static NAT Workflow


An external computer in the Internet sends a packet to 192.0.2.5. The Firewall translates the IP
address to 10.10.0.26 and sends the packet to internal computer A. Internal computer A sends
Security Management Administration Guide R80.20 | 119
Creating an Access Control Policy

back a packet to the external computer. The Firewall intercepts the packet and translates the
source IP address to 192.0.2.5.
Internal computer B (10.10.0.37) sends a packet to an external computer. The Firewall intercepts
the packet translates the source IP address to 192.0.2.16.

Internet sends packet to Firewall translates this Internal computer A


192.0.2.5 address to 10.10.0.26 receives packet

Internal computer A
Firewall translates this Internet receives packet
(10.10.0.26) sends packet
address to 192.0.2.5 from 192.0.2.5
to Internet

Internal computer B
Firewall translates this Internet receives packet
(10.10.0.37) sends packet
address to 192.0.2.16 from 192.0.2.16
to Internet

Hide NAT
Firewalls that do Hide NAT use different port numbers to translate internal IP address to one
external IP address. External computers cannot start a connection to an internal computer.

Item Description
1 Internal computers
2 Security Gateway - Firewall is configured with Hide NAT
3 External computers and servers in the Internet

Sample Hide NAT Workflow


Internal computer A (10.10.0.26) sends a packet to an external computer. The Firewall intercepts
the packet and translates the source IP address to 192.0.2.1 port 11000. The external computer
sends back a packet to 192.0.2.1 port 11000. The Firewall translates the packet to 10.10.0.26 and
sends it to internal computer A.

Internal computer A Firewall translates this Internet receives packet


(10.10.0.26) sends packet address to 192.0.2.1 port from 192.0.2.1
to Internet 11000 port 11000

Internet sends back


Firewall translates this Internal computer A
packet to 192.0.2.1
address to 10.10.0.26 receives packet
port 11000
Security Management Administration Guide R80.20 | 120
Creating an Access Control Policy

Security Management Administration Guide R80.20 | 121


Creating an Access Control Policy

NAT Rules
The NAT Rule Base has two sections that specify how the IP addresses are translated:
• Original Packet
• Translated Packet
Each section in the NAT Rule Base is divided into cells that define the Source, Destination, and
Service for the traffic.

Automatic and Manual NAT Rules


There are two types of NAT rules for network objects:
• Rules that SmartConsole automatically creates and adds to the NAT Rule Base
• Rules that you manually create and then add to the NAT Rule Base
When you create manual NAT rules, it can be necessary to create the translated NAT objects for
the rule.

Using Automatic Rules


You can enable automatic NAT rules for these SmartConsole objects:
• Security Gateways
• Hosts
• Networks
• Address Ranges
SmartConsole creates two automatic rules for Static NAT, to translate the source and the
destination of the packets.
For Hide NAT, one rule is created to translate the source of the packets.
For network and address range objects, SmartConsole creates a different rule to NOT translate
intranet traffic. IP addresses for computers on the same object are not translated.
This table summarizes the NAT automatic rules:

Type of Traffic Static NAT Hide NAT


Internal to external Rule translates source IP address Rule translates source IP address
External to internal Rule translates destination IP N/A (External connections are not
address allowed)
Intranet (for network Rule does not translate IP address Rule does not translate IP address
and address range
objects)

Security Management Administration Guide R80.20 | 122


Creating an Access Control Policy

Order of NAT Rule Enforcement


The Firewall enforces the NAT Rule Base in a sequential manner. Automatic and manual rules are
enforced differently. Automatic rules can use bidirectional NAT to let two rules be enforced for a
connection.
• Manual rules - The first manual NAT rule that matches a connection is enforced. The Firewall
does not enforce a different NAT rule that can be more applicable.
• Automatic rules - Two automatic NAT rules that match a connection, one rule for the Source
and one for the Destination can be enforced. When a connection matches two automatic rules,
those rules are enforced.
SmartConsole organizes the automatic NAT rules in this order:
1. Static NAT rules for Firewall, or host (computer or server) objects
2. Hide NAT rules for Firewall, or host objects
3. Static NAT rules for network or address range objects
4. Hide NAT rules for network or address range objects

Sample Automatic Rules


Here are some sample automatic rules.

Static NAT for a Network Object


1. Intranet connections in the HR network are not translated. The Firewall does not translate a
connection between two computers that are part of the HR object.
The Firewall does not apply rules 2 and 3 to traffic that matches rule 1.
2. Connections from IP addresses from the HR network to any IP address (usually external
computers) are translated to the Static NAT IP address.
3. Connections from any IP address (usually external computers) to the HR are translated to the
Static NAT IP address.

Hide NAT for Address Range


1. Intranet connections in the Sales address range are not translated. The Firewall does not
translate a connection between two computers that use IP addresses that are included in the
Sales object.
The Firewall does not apply rule 2 to traffic that matches rule 1.
2. Connections from IP addresses from the Sales address range to any IP address (usually
external computers) are translated to the Hide NAT IP address.

Configuring Static and Hide NAT


You can enable and configure NAT for SmartConsole objects.

Configuring Static NAT


When you enable Static NAT, each object is translated to a different IP address. SmartConsole can
automatically create the NAT rules, or you can create them manually.

Security Management Administration Guide R80.20 | 123


Creating an Access Control Policy

Configuring Hide NAT


Hide NAT uses different port numbers to identify the internal IP addresses. When you enable Hide
NAT mode, the Firewall can translates the IP address to:
• The IP address of the external Security Gateway interface
• The IP address for the object
Note - You cannot use Hide NAT for these configurations:
• Traffic that uses protocols where the port number cannot be changed
• An external server that uses IP addresses to identify different computers and clients

Enabling Automatic NAT


SmartConsole can automatically create and configure the NAT rules for a network. Enable
automatic NAT for every object, for which you are translating the IP address. Then configure the
Access Control Rule Base to allow traffic to the applicable objects.

To enable automatic NAT:


1. In SmartConsole, go to Gateways & Servers and double-click the gateway object.
The General Properties window of the gateway opens.
2. From the navigation tree, select NAT > Advanced.
3. Select Add automatic address translation rules to hide this Gateway behind another
Gateway.
4. Select the Translation method: Hide or Static.
5. Configure the NAT IP address for the object.
• Hide behind Gateway - Use the IP address of the Security Gateway
• Hide behind IP address - Enter the IP address.
6. Click Install on Gateway and select All or the Security Gateway that translates the IP address.
7. Click OK.
After you enable and configure NAT on all applicable gateways, install the policy.

Automatic Hide NAT to External Networks


For large and complex networks, it can be impractical to configure the Hide NAT settings for all
the internal IP addresses. An easy alternative is to enable a Firewall to automatically Hide NAT for
all traffic with external networks. The Firewall translates all traffic that goes through an external
interface to the valid IP address of that interface.
In this sample configuration, computers in internal networks open connections to external servers
on the Internet. The source IP addresses of internal clients are translated to the IP address of an
external interface.

Security Management Administration Guide R80.20 | 124


Creating an Access Control Policy

Item Description
1 Internal networks
2 Security Gateway - Firewall is configured with automatic Hide NAT.
2A and 2B Two external interfaces 192.0.2.1 and 192.0.2.100.
1 -->3 External computers and servers on the Internet

Source IP addresses are translated to the applicable external interface IP address: 192.0.2.1 or
192.0.2.100.
Note - If a connection matches a regular NAT rule and a NAT-for-internal-networks rule, the
regular NAT rule takes precedence.

To enable automatic Hide NAT:


1. In SmartConsole, go to Gateways & Servers and double-click the gateway object.
The General Properties window of the gateway opens.
2. From the navigation tree, select NAT.
3. Select Hide internal networks behind the Gateway's external IP.
4. Click OK.
5. Install the policy.

Enabling Manual NAT


For some deployments, it is necessary to manually define the NAT rules. Create SmartConsole
objects that use the valid (NATed) IP addresses. Create NAT rules to translate the original IP
addresses of the objects to valid IP addresses. Then configure the Firewall Rule Base to allow
traffic to the applicable translated objects with these valid IP addresses.
Note - For manual NAT rules, it is necessary to configure Proxy ARP entries to associate the
translated IP address (on page 150).
These are some situations that must use manual NAT rules:
• Rules that are restricted to specified destination IP addresses and to specified source IP
addresses
• Translate both source and destination IP addresses in the same packet.
Security Management Administration Guide R80.20 | 125
Creating an Access Control Policy

• Static NAT in only one direction


• Translate services (destination ports)
• Rules that only use specified services (ports)
• Translate IP addresses for dynamic objects
This procedure explains how to configure manual Static NAT for a web server. You can also
configure manual Hide NAT for SmartConsole objects (on page 128).
To enable manual Static NAT, follow this workflow:
1. Create a clone from the network object, for example, the Web server.
2. Add a NAT rule that maps the original object to the NATed one.
3. Add Access Control rules that allow traffic to the new NATed objects.

To create a clone network object:


1. In SmartConsole, right-click the object and select Clone.
The General Properties window of the new object opens.
2. Enter the Name. We recommend that you name the object <name>_valid_address.
3. Enter the NATed IP address.
4. Click OK.

To add a NAT rule to the Rule Base:


1. In SmartConsole, go to Security Policies > Access Control > NAT.
2. Add a manual rule above the automatic NAT rules.
3. Configure the manual rule to translate the IP address. For example:
• Original Source - WebServer
• Translated Source - WebServer_valid_address

To add Access Control rules:


1. In SmartConsole, go to Security Policies > Access Control > Policy.
2. Add rules that allow traffic to the applicable NATed objects.
These objects are the cloned objects that are called <name>_valid_address.
3. Install the policy.

Sample Deployment (Static and Hide NAT)


The goal for this sample deployment is to configure:
• Static NAT for the SMTP and the HTTP servers on the internal network. These servers can be
accessed from the Internet using public addresses.
• Hide NAT for the users on the internal network that gives them Internet access. This network
cannot be accessed from the Internet.

Security Management Administration Guide R80.20 | 126


Creating an Access Control Policy

Item Description
1 Internal computers (Alaska_LAN 2001:db8::/64)
2 Web server (Alaska.Web 2001:db8:0:10::5 translated to 2001:db8:0:a::5)
3 Mail server (Alaska.Mail 2001:db8:0:10::6 translated to 2001:db8:0:a::6)
4 Security Gateway (External interface 2001:db8:0:a::1)
5 External computers and servers in the Internet

To configure NAT for the network:


1. Enable automatic Static NAT for the web server.
a) Double-click the Alaska.Web object and select NAT.
b) Select Add Automatic Address Translation Rules.
c) In Translation method, select Static.
d) Select Hide behind IP Address and enter 2001:db8:0:a::5.
e) Click OK.
2. Enable automatic Static NAT for the mail server.
a) Double-click the Alaska.Mail object and select NAT.
b) Select Add Automatic Address Translation Rules.
c) In Translation method, select Static.
d) Select Hide behind IP Address and enter 2001:db8:0:a::6.
e) Click OK.
3. Enable automatic Hide NAT for the internal computers.
a) Double-click the Alaska_LAN object and select NAT.
b) Select Add Automatic Address Translation Rules.
c) In Translation method, select Hide.
d) Select Hide behind Gateway.
4. Click OK and then install the policy.

Security Management Administration Guide R80.20 | 127


Creating an Access Control Policy

Sample Deployment (Manual Rules for Port Translation)


The goal for this sample configuration is to let external computers access a web and mail server
in a DMZ network from one IP address. Configure Hide NAT for the DMZ network object and create
manual NAT rules for the servers.

Item Description
1 External computers and servers in the Internet
2 Security Gateway (Alaska_GW external interface 2001:db8:0:c::1)
3 DMZ network (Alaska_DMZ 2001:db8:a::/128)
4 Web server (Alaska_DMZ_Web 2001:db8:a::35:5 translated to 2001:db8:0:c::1)
5 Mail server (Alaska_DMZ_Mail 2001:db8:a::35:6 translated to 2001:db8:0:c::1)

To configure NAT for the DMZ servers:


1. Enable automatic Hide NAT for the DMZ network.
a) Double-click the Alaska_DMZ object and select NAT.
b) Select Add Automatic Address Translation Rules.
c) In Translation method, select Hide.
d) Select Hide behind Gateway.
e) Click OK.
2. Create a manual NAT rule that translates HTTP traffic from the Security Gateway to the web
server.
a) In SmartConsole, go to Security Policies > Access Control > NAT.
b) Add a rule below the automatic rules.
c) Right-click the cell and select Add new items to configure these settings:
 Original Destination - Alaska_GW
 Original Service - HTTP
 Translated Destination - Alaska_DMZ_Web
3. Create a manual NAT rule that translates SMTP traffic from the Security Gateway to the mail
server.
a) Add a rule below the automatic rules.
b) Right-click the cell and select Add new items to configure these settings:
 Original Destination - Alaska_GW
 Original Service - SMTP

Security Management Administration Guide R80.20 | 128


Creating an Access Control Policy

 Translated Destination - Alaska_DMZ_Web


4. Create a rule in the Firewall Rule Base that allows traffic to the servers.
a) In SmartConsole, go to Security Policies > Access Control > NAT.
b) Add a rule to the Rule Base.
c) Right-click the cell and select Add new items to configure these settings:
 Destination - Alaska_DMZ
 Service - HTTP, SMTP
 Action - Allow
5. Install the policy.
NAT Rule Base for Manual Rules for Port Translation Sample Deployment

No. Original Original Original Translate Translated Translate Install On Comment


Source Destination Services d Source Destination d s
Services
Alaska_DM Alaska_DMZ Any Original Original Original All Automatic
1 Z rule

2 Alaska_DM Any Any H Alaska_DMZ Original Original All Automatic


Z (Hiding rule
Address)

3 Any Alaska_GW http Original S Original Policy


Alaska_DMZ_Web Targets

4 Any Alaska_GW smtp Original S Original Policy


Alaska_DMZ_Mail Targets

Configuring Stateful NAT64 (IPv6 to IPv4 translation)


R80.20 supports NAT64 rules.
Background:
NAT64 translation (RFC 6146 https://tools.ietf.org/html/rfc6146) lets IPv6-only client
communicate with IPv4-only server using unicast UDP, TCP, or ICMP.
IPv6-only client is one of these:
• A host with a networking stack that implements only IPv6.
• A host with a networking stack that implements both IPv4 and IPv6 protocols, but with only
IPv6 connectivity.
• A host that runs an IPv6-only client application.
IPv4-only server is one of these:
• A host with a networking stack that implements only IPv4.
• A host with a networking stack that implements both IPv4 and IPv6 protocols, but with only
IPv4 connectivity.
• A host that runs an IPv4-only server application.
The translation of IP addresses is done by translating the packet headers according to the
IP/ICMP Translation Algorithm defined in RFC 6145 https://tools.ietf.org/html/rfc6145. The IPv4
addresses of IPv4 hosts are translated to and from IPv6 addresses using the algorithm defined in
Security Management Administration Guide R80.20 | 129
Creating an Access Control Policy

RFC 6052 https://tools.ietf.org/html/rfc6052, and an IPv6 prefix assigned to the stateful NAT64 for
this specific purpose.
Note - For information about DNS64, see RFC 6147 https://tools.ietf.org/html/rfc6147.
Properties of Stateful NAT64:
• Performs N:M translation:
• N must be greater than M
• If M=1, performs a Hide NAT behind a single IPv4 address.
• If M>1, performs a Hide NAT behind a range of IPv4 addresses.
• Gives good IPv4 address preservation (multiplexed using ports).
• Saves connection states and binding.
• There are no requirements on the assignment of IPv6 addresses to IPv6 clients. Any mode of
IPv6 address assignment is legitimate (Manual, DHCP6, SLAAC).
• It is a scalable solution.
NAT64 use case scenarios:
• [IPv6 Network] --- (Internet) --- [Security Gateway] --- [internal IPv4 Network]
Common use case for Content Providers. DNS64 is not needed.
• [internal IPv6 Network] --- [Security Gateway] --- (Internet) --- [IPv4 Network]
Common use case for Carriers, ISPs, Enterprises. DNS64 is required.
• [IPv6 Network] --- [Security Gateway] --- [IPv4 Network]
Common use case for Enterprises. DNS64 is required.
R80.20 supports these standards for NAT64:
• RFC 6144 https://tools.ietf.org/html/rfc6146 - Framework for IPv4/IPv6 Translation
• RFC 6146 https://tools.ietf.org/html/rfc6146 - Stateful NAT64: Network Address and Protocol
Translation from IPv6 Clients to IPv4 Servers
• RFC 6052 https://tools.ietf.org/html/rfc6052 - IPv6 Addressing of IPv4/IPv6 Translators
• RFC 6145 https://tools.ietf.org/html/rfc6145 - IP/ICMP Translation Algorithm
• RFC 2428 https://tools.ietf.org/html/rfc2428 - FTP Extensions for IPv6 and NATs
• RFC 6384 https://tools.ietf.org/html/rfc6384 - An FTP Application Layer Gateway (ALG) for
IPv6-to-IPv4 Translation
R80.20 does not support these features for NAT64:
• VoIP traffic.
• HTTPS Inspection.
• SSL de-multiplexer.
• Security Gateway in HTTP Proxy mode.
• IPS protection "HTTP Header Spoofing".

Workflow for configuring NAT64 rules:


1. Prepare your Security Gateway for NAT64 (on page 131).
2. Define the NAT64 rules (on page 132).
3. Configure the additional settings for NAT64 (on page 137).
Security Management Administration Guide R80.20 | 130
Creating an Access Control Policy

Preparing Security Gateway for NAT64


To prepare a Security Gateway for NAT64:
Note - In cluster, do these steps on each cluster member.

Step Instructions
1 Make sure that an IPv6 address is assigned to the interface that connects to the
destination IPv4 network, and the IPv6 network prefix length is equal to, or less than 96.
Note - This can be any valid IPv6 address with the IPv6 network prefix length equal to,
or less than 96.
• In Gaia Portal:
Click Network Management > Network Interfaces.
• In Gaia Clish:
Run: show interface <Name of Interface> ipv6-address
If such IPv6 address is not assigned yet, assign it now. For details, see R80.20 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_G
aia_AdminGuide/html_frameset.htm - Chapter Network Management - Section
Network Interfaces - Section Physical Interfaces.
2 Make sure that the IPv6 routing is configured to send the traffic that is destined to the
NATed IPv6 addresses (defined in the Original Destination column in the NAT64 rule)
through the interface that connects to the destination IPv4 network.
• In Gaia Portal:
Click Advanced Routing > Routing Monitor.
• In Gaia Clish:
Run: show ipv6 route
If such route does not already exist, add it in Gaia Clish. For details, see R80.20 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_G
aia_AdminGuide/html_frameset.htm. Run these commands in Gaia Clish:
1. set ipv6 static-route <NATed Destination IPv6 Addresses>/<96 or less>
nexthop gateway <Any IPv6 Address from the IPv6 subnet of the Interface that
connects to the destination real IPv4 network> on
Example topology:
[IPv6 Client] --- (NATed IPv6 of IPv4 side are 1111:2222::/96) [Security Gateway]
(eth3 with IPv6 3333:4444::1) --- [IPv4 Server]
In such case, configure the IPv6 route using this command:
set ipv6 static-route 1111:2222::/96 nexthop gateway
3333:4444::10 on
2. save config

Security Management Administration Guide R80.20 | 131


Creating an Access Control Policy

Step Instructions
3 Make sure that the number of IPv6 CoreXL FW instances is equal to the number of IPv4
CoreXL FW instances.
1. Connect to the command line on the Security Gateway.
2. Log in to Gaia Clish, or Expert mode.
3. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
4. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
5. If the number of IPv6 CoreXL FW instances is less than the number of IPv4 CoreXL
FW instances, then do these steps:
a) Run:
cpconfig
b) Select Check Point CoreXL
c) Select Change the number of IPv6 firewall instances
d) Configure the number of IPv6 CoreXL FW instances to be the same as the
number of IPv4 CoreXL FW instances
e) Select Exit
f) Reboot the Security Gateway
6. Connect to the command line on the Security Gateway.
7. Log in to Gaia Clish, or Expert mode.
8. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
9. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
Example output:
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#
[Expert@GW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#

Defining NAT64 Rules


Define NAT64 rules as Manual NAT rules in the Access Policy. Make sure that you add access
rules that allow this NAT traffic.

Do these steps in SmartConsole to define NAT64 rules:


1. Define a source IPv6 Network object.
This object represents the source IPv6 addresses, which you translate to source IPv4
addresses.

Security Management Administration Guide R80.20 | 132


Creating an Access Control Policy

2. Define a translated destination IPv6 Network object with an IPv4-embedded IPv6 address, or a
translated destination IPv6 Host object with a static IPv6 address.
This object represents the translated destination IPv6 address, to which the IPv6 sources
connect.
3. Define a translated source IPv4 Address Range object.
This object represents the translated source IPv4 addresses, to which you translate the
original source IPv6 addresses.
4. Create a Manual NAT64 rule.
5. Install the Access Policy.

To define a source IPv6 Network object that represents the source IPv6 address, which
you translate to source IPv4 addresses:
1. Click Objects menu > New Network.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
a) In the Network address field, enter the IPv6 address of your IPv6 network, which you
translate to source IPv4 addresses.
b) In the Prefix field, enter the prefix of your IPv6 network.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.

To define a translated destination IPv6 Network object with IPv4-embedded IPv6


address that represents the IPv6 addresses, to which the IPv6 sources connect:
1. Click Objects menu > New Network.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
a) In the Network address field, enter the destination IPv4-embedded IPv6 address (also
called IPv4-mapped IPv6 address), to which the IPv6 sources connect.
Such IPv6 address contains (from left to right) 80 "zero" bits, followed by 16 "one" bits, and
then the 32 bits of the IPv4 address - 0:0:0:0:0:FFFF:X.Y.Z.W, where X.Y.Z.W are the four
octets of the destination IPv4 address.
For example, for IPv4 network 192.168.3.0, the IPv4-embedded IPv6 address is
0:0:0:0:0:FFFF:192.168.3.0, or 0:0:0:0:0:FFFF:C0A8:0300. For more information, see RFC
6052 https://tools.ietf.org/html/rfc6052.
These IPv4-embedded IPv6 addresses are published by an external DNS64 server.
Security Management Administration Guide R80.20 | 133
Creating an Access Control Policy

b) In the Prefix field, enter the applicable IPv6 prefix.


Note - You can define IPv4-embedded IPv6 addresses only for these object types: Address
Range, Network, and Host.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.

To define a translated destination IPv6 Host object with static IPv6 address that
represents the IPv6 address, to which the IPv6 sources connect:
1. Click Objects menu > New Host.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
In the Network address field, enter the destination static IPv6 address, to which the IPv6
sources connect.
7. On the NAT page of this object:
Do not configure anything.
8. Configure the applicable settings on other pages of this object.
9. Click OK.

To define a translated source IPv4 Address Range object that represents the IPv4
addresses, to which you translate the source IPv6 addresses:
1. Click Objects menu > More object types > Network Object > Address Range > New Address
Range.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
a) In the First IP address field, enter the first IPv4 address of your IPv4 addresses range, to
which you translate the source IPv6 addresses.
b) In the Last IP address field, enter the last IPv4 address of your IPv4 addresses range, to
which you translate the source IPv6 addresses.
Notes:
• This IPv4 addresses range must not use private IPv4 addresses (see RFC 1918
https://tools.ietf.org/html/rfc1918 and Menu > Global properties > Non Unique IP Address
Range).
• This IPv4 addresses range must not be used on the IPv4 side of the network.
• We recommend that you define a large IPv4 addresses range for more concurrent NAT64
connections.
6. In the IPv6 section:
Do not enter anything.

Security Management Administration Guide R80.20 | 134


Creating an Access Control Policy

7. On the NAT page of this object:


Do not configure anything.
8. Click OK.

To create a Manual NAT64 rule:


1. From the left Navigation Toolbar, click Security Policies.
2. In the top Access Control section, click NAT.
3. Right-click on the Manual Lower Rules section title, and near the New Rule, click Above or
Below.
4. Configure this Manual NAT64 rule:
Important - Some combinations of object types are not supported in the Original Source and
Original Destination columns. See the summary table with the supported NAT rules at the
bottom of this section.
a) In the Original Source column, add the IPv6 object for your original source IPv6 addresses.
In this rule column, NAT64 rules support only these types of objects:
 *Any
 Host with a static IPv6 address
 Address Range with IPv6 addresses
 Network with IPv6 address
b) In the Original Destination column, add a translated destination IPv6 object with an
IPv4-embedded IPv6 address.
In this rule column, NAT64 rules support only these types of objects:
 Host with a static IPv6 address
 Address Range with IPv4-embedded IPv6 addresses
 Network with an IPv4-embedded IPv6 address
c) In the Original Services column, you must leave the default Any.
d) In the Translated Source column, add the IPv4 Address Range object for your translated
source IPv4 addresses range.
In this rule column, NAT64 rules support only these types of objects:
 Host with a static IPv4 address, only if in the Original Source column you selected a
Host with a static IPv6 address
 Address Range with IPv4 addresses
e) In the Translated Source column, right-click the IPv4 Address Range object > click NAT
Method > click Stateful NAT64:
 The Translated Packet Destination column shows = Embedded IPv4 Address.
 The 64 icon shows in both the Translated Source and Translated Destination columns.
In this rule column, NAT64 rule supports only these types of objects:
 Host with a static IPv4 address, only if in the Original Source column you selected a
Host with a static IPv6 address
 Embedded IPv4 Address
f) In the Translated Services column, you must leave the default = Original.
5. Publish the session and install the Access Policy.
Security Management Administration Guide R80.20 | 135
Creating an Access Control Policy

To summarize, you must configure only these Manual NAT64 rules (rule numbers are for
convenience only):

# Original Original Original Translated Translated Translated


Source Destination Services Source Destination Services
1 *Any IPv6 *Any IPv4 IPv4 = Original
Host Address Host
object with Range object
a static object
IPv6 address
2 *Any IPv6 *Any IPv4 Embedded = Original
Address Range Address IPv4
object with an Range Address
IPv4-embedded object
IPv6 addresses
3 *Any IPv6 *Any IPv4 Embedded = Original
Network Address IPv4
object with an Range Address
IPv4-embedded object
IPv6 address
4 IPv6 IPv6 *Any IPv4 IPv4 = Original
Host Host Host Host
object object with object object
with a static
a static IPv6 address
IPv6
address
5 IPv6 IPv6 *Any IPv4 Embedded = Original
Host Address Range Address IPv4
object object with Range Address
with IPv4-embedded object
a static IPv6 addresses
IPv6
address
6 IPv6 IPv6 *Any IPv4 Embedded = Original
Host Network Address IPv4
object object with an Range Address
with IPv4-embedded object
a static IPv6 address
IPv6
address
7 IPv6 IPv6 *Any IPv4 IPv4 = Original
Address Host Address Host
Range object with Range object
object a static object
IPv6 address

Security Management Administration Guide R80.20 | 136


Creating an Access Control Policy

# Original Original Original Translated Translated Translated


Source Destination Services Source Destination Services
8 IPv6 IPv6 *Any IPv4 Embedded = Original
Address Address Range Address IPv4
Range object with Range Address
object IPv4-embedded object
IPv6 addresses
9 IPv6 IPv6 *Any IPv4 Embedded = Original
Address Network Address IPv4
Range object with an Range Address
object IPv4-embedded object
IPv6 address
10 IPv6 IPv6 *Any IPv4 IPv4 = Original
Network Host Address Host
object object with Range object
a static object
IPv6 address
11 IPv6 IPv6 *Any IPv4 Embedded = Original
Network Address Range Address IPv4
object object with Range Address
IPv4-embedded object
IPv6 addresses
12 IPv6 IPv6 *Any IPv4 Embedded = Original
Network Network Address IPv4
object object with an Range Address
IPv4-embedded object
IPv6 address

Configuring the Additional Settings for NAT64


You can configure the additional settings that control the NAT64 translation mechanism. These
settings are compliant with RFC 6145 https://tools.ietf.org/html/rfc6145.
Note - We recommend that you change the default settings only if you are familiar with the
technology.
1. Close all SmartConsole windows.
2. Connect with GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009 to
the applicable Security Management Server or Domain Management Server.
3. In the top left section, click Table > Global Properties > properties.
4. In the top right section, click firewall_properties.
5. In the bottom section, scroll to these Field Names:
• nat64_add_UDP_checksum
• nat64_avoid_PMTUD_blackhole
• nat64_copy_type_of_service
• nat64_error_message_on_dropped_packets
6. Right-click on the applicable Field Name and click Edit.
7. Select the applicable Value (true, or false) and click OK.

Security Management Administration Guide R80.20 | 137


Creating an Access Control Policy

Field Name Description


nat64_add_UDP_check This setting controls whether the translator should calculate and add
sum a valid UDP checksum value to a packet, if the packet checksum
value is zero.
This is important because, by default, an IPv4 UDP packet with a
checksum value of zero is dropped on the IPv6 side.
Default: false
nat64_avoid_PMTUD_b This setting controls whether to allow packet fragmentation on the
lackhole IPv4 (destination) side during PMTU discovery.
Enable this setting if some equipment combinations cause PMTU
discovery to fail.
Default: false
nat64_copy_type_of_ This setting controls whether to copy the traffic Class Field to the
service Type Of Service field, and set the Type Of Service field in the
translated packet to zero.
Default: true
nat64_error_message This setting controls whether to generate an audit log after a
_on_dropped_packets connection is closed.
For each closed connection, the log shows:
• Connection information (source and destination IP address,
source port, and service).
• Translated source IP address and source port.
• Start time and end time.
• If the connection was closed because the connection expired, log
shows additional information in the TCP End Reason field.
If this field does not show in the log, the connection was closed
with a TCP RST, or with a TCP FIN, and did not expire.
Default: true
1. Click File > Save All to save the changes.
2. Close the GuiDBedit Tool.
3. Connect with the SmartConsole to the applicable Security Management Server or Domain
Management Server.
4. Install the Access Policy.

Logging of NAT64 traffic


In the Security Gateway log for NAT64 connection, the source and destination IPv6 addresses
show in their original IPv6 format. To identify a NAT64 entry, look in the More section of the Log
Details window.

Field in Log Description


Xlate (NAT) Shows the translated source IPv4 address, to which the Security Gateway
Source IP translated the original source IPv6 address

Security Management Administration Guide R80.20 | 138


Creating an Access Control Policy

Field in Log Description


Xlate (NAT ) Shows the translated destination IPv4 address, to which the Security Gateway
Destination IP translated the original destination IPv6 address

More Identifies the entry as NAT64 traffic (Nat64 enabled)

Example of NAT64 Translation Flow


Example topology:
[IPv6 Client] --- (interface) [Security Gateway] (internal) --- [IPv4 Server]
Where:

Item Description
IPv6 Client IPv6 real address is 1111:1111::0100/96
Security Gateway IPv6 address is 1111:1111::1/96
external interface
Security Gateway IPv4 address is 10.0.0.1/24
internal interface IPv6 address is 3333:4444::1/96
IPv4 Server IPv4 real address is 10.0.0.100/24
IPv6 NATed address is 1111:2222::0A00:0064/96
IPv6 NATed network IPv6 address of the network on the external Security Gateway side is
1111:2222::/96
These IPv6 addresses are used to translate the IPv4 address of the IPv4
Server to the IPv6 address
IPv4 NATed network IPv4 address of the network on the internal Security Gateway side is
1.1.1.0/24
These IPv4 addresses are used to translate the IPv6 address of the IPv6
Client to the IPv4 address

Traffic flow:
1. IPv6 Client opens an IPv6 connection to the NATed IPv6 address of the IPv4 Server:
From the IPv6 Client's IPv6 real address 1111:1111::0100 to the IPv4 Server's NATed IPv6
address 1111:2222::0A00:0064
Where:
The "1111:2222::" part is the NATed IPv6 subnet
The "0A00:0064" part is 10.0.0.100
2. Security Gateway performs these NAT translations:
a) Translate the IPv6 Client's source address from the real IPv6 address 1111:1111::0100 to
the special concatenated source IPv6 address 0064:FF9B::0101:01XX
Where:
The "0064:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the RFC)
The "0101:01XX" part is 1.1.1.X

Security Management Administration Guide R80.20 | 139


Creating an Access Control Policy

b) Translate the IPv6 Client's source address from the special concatenated source IPv6
address 0064:FF9B::0101:01XX to the source IPv4 address 1.1.1.X
c) Translate the IPv6 Client's NATed destination address from the IPv6 address
1111:2222::0A00:0064 to the NATed destination IPv4 address 10.0.0.100
3. IPv4 Server receives this request connection as from the source IPv4 address 1.1.1.X to the
destination IPv4 address 10.0.0.100
4. IPv4 Server replies to this connection from the source IPv4 address 10.0.0.100 to the
destination IPv4 address 1.1.1.X
5. Security Gateway performs these NAT translations:
a) Translate the IPv4 Server's source real IPv4 address 10.0.0.100 to the source NATed IPv6
address 1111:2222::0A00:0064
b) Translate the IPv6 Client's NATed destination IPv4 address 1.1.1.X to the destination
special concatenated IPv6 address 0064:FF9B::0101:01XX
Where:
The "64:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the RFC)
The "0101:01XX" part is 1.1.1.X
c) Translate the IPv6 Client's destination special concatenated IPv6 address
0064:FF9B::0101:01XX to the destination IPv6 real address 1111:1111::0100
6. IPv6 Client receives this reply connection as from the source IPv6 address
1111:2222::0A00:0064 to the destination IPv6 address 1111:1111::0100

To summarize:
• Request: [IPv6 Client] ---> [Security Gateway] ---> [IPv4 Server]
Field in packet Original IPv6 packet NATed IPv4 packet
Source IP 1111:1111::0100 / 96 1.1.1.X / 24
Destination IP 1111:2222::0A00:0064 / 96 10.0.0.100 / 24

• Reply: [IPv6 Client] <--- [Security Gateway] <--- [IPv4 Server]


Field in packet Original IPv4 packet NATed IPv6 packet
Source IP 10.0.0.100 / 24 1111:2222::0A00:0064 / 96
Destination IP 1.1.1.X / 24 1111:1111::0100 / 96

Configuring Stateless NAT46 (IPv4 to IPv6 translation)


NAT46 rules are only supported on R80.20 gateways.
Background:
NAT46 translation lets an IPv4 network communicate with an IPv6 network without maintaining
any session information on Security Gateway.
Properties of Stateless NAT46:
• Performs 1:1 IP address mapping.
• The system generates the translated source IPv6 address as a combination of these two parts:
a) A user-defined Network object with an IPv6 address defined with the 96-bit prefix.

Security Management Administration Guide R80.20 | 140


Creating an Access Control Policy

b) The source IPv4 address, which is added as a 32-bit suffix.


NAT46 use case scenarios:
• [IPv4 Network] --- (Internet) --- [Security Gateway] --- [IPv6 Network]
Common use case for Content Providers.
• [IPv4 Network] --- [Security Gateway] --- (Internet) --- [IPv6 Network]
Common use case for Enterprises.
R80.20 does not support these features not for NAT46:
• VoIP traffic.
• FTP traffic.
• Any protocols that require state information between Control and Data connections.

Workflow for configuring NAT46 rules:


1. Prepare your Security Gateway for NAT46 (on page 141).
2. Define the NAT46 rules (on page 143).

Preparing Security Gateway for NAT46


To prepare a Security Gateway for NAT46:
Note - In cluster, do these steps on each cluster member.

Step Instructions
1 Make sure that an IPv6 address is assigned to the interface that connects to the
destination IPv6 network, and the IPv6 network prefix length is equal to 96.
Note - This can be any valid IPv6 address with the IPv6 network prefix length equal to
96.
• In Gaia Portal:
Click Network Management > Network Interfaces.
• In Gaia Clish:
Run: show interface <Name of Interface> ipv6-address
If such IPv6 address is not assigned yet, assign it now. For details, see R80.20 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_G
aia_AdminGuide/html_frameset.htm - Chapter Network Management - Section
Network Interfaces - Section Physical Interfaces.

Security Management Administration Guide R80.20 | 141


Creating an Access Control Policy

Step Instructions
2 Make sure that the routing is configured to send the traffic that is destined to the
NATed IPv4 addresses (defined in the Translated Destination column in the NAT46 rule)
through the interface that connects to the destination IPv6 network.
• In Gaia Portal:
Click Advanced Routing > Routing Monitor.
• In Gaia Clish:
Run: show route
If such route does not already exist, add it in Gaia Clish. For details, see R80.20 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_G
aia_AdminGuide/html_frameset.htm. Run these commands in Gaia Clish:
1. set static route <NATed Destination IPv4 Addresses>/<NATed IPv4 Net Mask>
nexthop gateway logical <Name of Interface that connects to the real IPv6
Network> on
Example topology:
[IPv4 Client] --- (NATed IPv4 of IPv6 side are 1.1.1.0/24) [Security Gateway] (eth3) ---
[IPv6 Server]
In such case, configure the IPv4 route using this command:
set static route 1.1.1.0/24 nexthop gateway logical eth3 on
2. save config

Security Management Administration Guide R80.20 | 142


Creating an Access Control Policy

Step Instructions
3 Make sure that the number of IPv6 CoreXL FW instances is equal to the number of IPv4
CoreXL FW instances.
1. Connect to the command line on the Security Gateway.
2. Log in to Gaia Clish, or Expert mode.
3. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
4. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
5. If the number of IPv6 CoreXL FW instances is less than the number of IPv4 CoreXL
FW instances, then do these steps:
a) Run:
cpconfig
b) Select Check Point CoreXL
c) Select Change the number of IPv6 firewall instances
d) Configure the number of IPv6 CoreXL FW instances to be the same as the
number of IPv4 CoreXL FW instances
e) Select Exit
f) Reboot the Security Gateway
6. Connect to the command line on the Security Gateway.
7. Log in to Gaia Clish, or Expert mode.
8. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
9. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
Example output:
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#
[Expert@GW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#

Defining NAT46 Rules


Define NAT46 rules as Manual NAT rules in the Access Policy. Make sure that you add access
rules that allow this NAT traffic.

Do these steps in SmartConsole to define NAT46 rules:


1. Define an applicable source IPv4 object (IPv4 Host, IPv4 Address Range, or IPv4 Network).
2. Define a destination IPv4 Host object.
This object represents the destination IPv4 address, to which the IPv4 sources connect.

Security Management Administration Guide R80.20 | 143


Creating an Access Control Policy

3. Define a translated source IPv6 Network object with an IPv6 address defined with the 96-bit
prefix.
This object represents the translated source IPv6 addresses, to which you translate the source
IPv4 addresses.
4. Define a translated destination IPv6 Host object.
This object represents the translated destination IPv6 address, to which the translated IPv4
sources connect.
5. Create a Manual NAT46 rule.
6. Install the Access Policy.

To define a source IPv4 Host object:


1. Click Objects menu > New Host.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 address field, enter the source IPv4 address.
6. In the IPv6 section:
Do not enter anything
7. On the NAT page of this object:
Do not configure anything.
8. Configure the applicable settings on other pages of this object.
9. Click OK.

To define a source IPv4 Network object:


1. Click Objects menu > New Network.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
a) In the Network address field, enter the IPv4 address of your source IPv4 network.
b) In the Net mask field, enter the net mask of your source IPv4 network.
6. In the IPv6 section:
Do not enter anything.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.

To define a source IPv4 Address Range object:


1. Click Objects menu > More object types > Network Object > Address Range > New Address
Range.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.

Security Management Administration Guide R80.20 | 144


Creating an Access Control Policy

5. In the IPv4 section:


a) In the First IP address field, enter the first IPv4 address of your IPv4 addresses range.
b) In the Last IP address field, enter the last IPv4 address of your IPv4 addresses range.
6. In the IPv6 section:
Do not enter anything.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.

To define a translated destination IPv4 Host object:


1. Click Objects menu > New Network.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
a) In the Network address field, enter the IPv4 address of your destination IPv4 network.
b) In the Net mask field, enter the net mask of your destination IPv4 network.
6. In the IPv6 section:
Do not enter anything.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.

To define a translated source IPv6 Network object with an IPv6 address defined with the
96-bit prefix:
1. Click Objects menu > New Network.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
a) In the Network address field, enter the translated source IPv6 address.
b) In the Prefix field, enter the number 96.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.

To define a translated destination IPv6 Host object:


1. Click Objects menu > New Host.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.

Security Management Administration Guide R80.20 | 145


Creating an Access Control Policy

4. Click the General page of this object.


5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
In the Network address field, enter the destination static IPv6 address.
7. On the NAT page of this object:
Do not configure anything.
8. Configure the applicable settings on other pages of this object.
9. Click OK.

To create a Manual NAT46 rule:


1. From the left Navigation Toolbar, click SECURITY POLICIES.
2. In the top Access Control section, click NAT.
3. Right-click on the Manual Lower Rules section title, and near the New Rule, click Above or
Below.
4. Configure this NAT46 rule:
Original Original Original Translated Translated Translated
Source Destination Services Source Destination Services
*Any IPv4 *Any IPv6 IPv6 = Original
or Host Network Host
object object object
Source
with an
IPv4
IPv6 address
Host
defined with
object
the 96-bit
or prefix
Source
IPv4
Address Range
object
or
Source
IPv4
Network
object
Do these steps:
a) In the Original Source column, add the applicable IPv4 object.
In this rule column, NAT46 rules support only these types of objects:
 *Any
 Host with a static IPv4 address
 Address Range with IPv4 addresses
 Network with IPv4 address
b) In the Original Destination column, add the IPv4 Host object that represents the
destination IPv4 address, to which the IPv4 sources connect.
In this rule column, NAT46 rules support only IPv4 Host objects.
Security Management Administration Guide R80.20 | 146
Creating an Access Control Policy

c) In the Original Services column, you must leave the default Any.
d) In the Translated Source column, add the IPv6 Network object with an IPv6 address
defined with the 96-bit prefix.
In this rule column, NAT64 rules support only IPv6 Network objects with an IPv6 address
defined with the 96-bit prefix.
e) In the Translated Source column, right-click the IPv6 Network object with the 96-bit prefix
> click NAT Method > click Stateless NAT46.
The 46 icon shows in the Translated Source column.
f) In the Translated Destination column, add the IPv6 Host object represents the translated
destination IPv6 address, to which the translated IPv4 sources connect.
In this rule column, NAT46 rule supports only an IPv6 Host objects.
g) In the Translated Services column, you must leave the default = Original.

To summarize, you must configure only these NAT46 rules (rule numbers are for convenience
only):
# Original Original Original Translated Translated Translated
Source Destination Services Source Destination Services
1 *Any IPv4 *Any IPv6 IPv6 = Original
Host Network Host
object object object
with an
IPv6 address
defined with
the 96-bit
prefix
2 IPv4 IPv4 *Any IPv6 IPv6 = Original
Host Host Network Host
object object object object
with with an
a static IPv6 address
IPv4 defined with
address the 96-bit
prefix
3 IPv4 IPv4 *Any IPv6 IPv6 = Original
Address Host Network Host
Range object object object
object with an
IPv6 address
defined with
the 96-bit
prefix

Security Management Administration Guide R80.20 | 147


Creating an Access Control Policy

# Original Original Original Translated Translated Translated


Source Destination Services Source Destination Services
4 IPv4 IPv4 *Any IPv6 IPv6 = Original
Network Host Network Host
object object object object
with an
IPv6 address
defined with
the 96-bit
prefix
5. Publish the session and install the Access Policy.

Logging of NAT46 traffic


In the Security Gateway log for NAT64 connection, the source and destination IPv6 addresses
show in their original IPv6 format. To identify a NAT46 entry, look in the More section of the Log
Details window.

Field in Log Description


Xlate (NAT) Shows the translated source IPv6 address, to which the Security Gateway
Source IP translated the original source IPv4 address

Xlate (NAT ) Shows the translated destination IPv6 address, to which the Security Gateway
Destination IP translated the original destination IPv4 address

More Identifies the entry as NAT46 traffic (Nat46 enabled)

Example of NAT46 Translation Flow


Example topology:
[IPv4 Client] --- (internal) [Security Gateway] (external) --- [IPv6 Server]
Where:

Item Description
IPv4 Client IPv4 real address is 192.168.2.55
IPv6 NATed address is 2001:DB8:90::192.168.2.55/96
Security Gateway internal IPv4 address is 192.168.2.1/24
interface
Security Gateway external IPv6 address is 2001:DB8:5001::1/96
interface
IPv6 Server IPv6 real address is 2001:DB8:5001::30/96
IPv4 NATed address is 1.1.1.66/24
IPv6 NATed network IPv6 address of the network on the external Security Gateway
side is 2001:DB8:90::/96
These IPv6 addresses are used to translate the IPv4 address
of the IPv4 Client to IPv6 address

Security Management Administration Guide R80.20 | 148


Creating an Access Control Policy

Item Description
IPv4 NATed network IPv4 address of the network on the internal Security Gateway
side is 1.1.1.0/24
These IPv4 addresses are used to translate the IPv6 address
of the IPv6 Server to IPv4 address

Traffic flow:
1. IPv4 Client opens an IPv4 connection to the NATed IPv4 address of the IPv6 Server
From IPv4 address 192.168.2.55 to IPv4 address 1.1.1.66
2. Security Gateway performs these NAT translations:
a) From the source IPv4 address 192.168.2.55 to the source IPv6 address
2001:DB8:90::192.168.2.55/96
b) From the destination IPv4 address 1.1.1.66 to the destination IPv6 address
2001:DB8:5001::30
3. IPv6 Server receives this request connection as from the IPv6 address
2001:DB8:90::192.168.2.55/96 to the IPv6 address 2001:DB8:5001::30
4. IPv6 Server replies to this connection from the IPv6 address 2001:DB8:5001::30 to the IPv6
address 2001:DB8:90::192.168.2.55/96
5. Security Gateway performs these NAT translations:
a) From the source IPv6 address 2001:DB8:5001::30 to the source IPv4 address 1.1.1.66
b) From the destination IPv6 address 2001:DB8:90::192.168.2.55/96 to the destination IPv4
address 192.168.2.55
6. IPv4 Client receives this reply connection as from the IPv4 address 1.1.1.66 to the IPv4 address
192.168.2.55
To summarize:
• Request: [IPv4 Client] ---> [Security Gateway] ---> [IPv6 Server]
Field in packet Original IPv4 packet NATed IPv6 packet
Source IP 192.168.2.55 / 24 2001:DB8:90::192.168.2.55 / 96
Destination IP 1.1.1.66 / 24 2001:DB8:5001::30 / 96

• Reply: [IPv4 Client] <--- [Security Gateway] <--- [IPv6 Server]


Field in packet Original IPv6 packet NATed IPv4 packet
Source IP 2001:DB8:5001::30 / 96 192.168.2.55 / 24
Destination IP 2001:DB8:90::192.168.2.55 / 96 1.1.1.66 / 24

Security Management Administration Guide R80.20 | 149


Creating an Access Control Policy

Advanced NAT Settings


This section includes advanced NAT settings.

Deployment Configurations
This section discusses how to configure NAT in some network deployments.

Automatic and Proxy ARP


Giving a computer on the internal network an IP address from an external network using NAT
makes that computer appear on the external network. When NAT on the Security Gateway is
configured automatically, the Security Gateway replies on behalf of translated network objects to
ARP Requests that are sent from the external network for the IP address of the internal computer.

Item Description
1 Computer on the internal network with IP address 10.1.1.3
2 Security Gateway with external interface IP address 192.168.0.2 responds to ARP
Requests on behalf of translated internal objects
3 Translated IP Address 192.168.0.3 on the external network
4 External network

If you are using manual NAT rules, you must configure Proxy ARP entries to associate the
translated IP address with the MAC address of the Security Gateway interface that is on the same
network as the translated IP addresses.
See sk30197 http://supportcontent.checkpoint.com/solutions?id=sk30197 for more information
about configuring:
• Proxy ARP for IPv4 Manual NAT
• Proxy ARP for Scalable Platforms
See sk91905 http://supportcontent.checkpoint.com/solutions?id=sk91905 for more about
configuring Proxy NDP for IPv6 Manual NAT.

NAT and Anti-Spoofing


NAT is performed after Anti-Spoofing checks, which are performed only on the source IP address
of the packet. This means that spoofing protection is configured on the interfaces of the Security
Gateway in the same way as NAT.

Security Management Administration Guide R80.20 | 150


Creating an Access Control Policy

Disabling NAT in a VPN Tunnel


When communicating within a VPN, it is normally not necessary to perform NAT. You can disable
NAT in a VPN tunnel with a single click in the VPN community object. Disabling NAT in a VPN
tunnel by defining a NAT rule slows down the performance of the VPN.

Connecting Translated Objects on Different Interfaces


The following sections describe how to allow connections in both directions between statically
translated objects (hosts, networks or address ranges) on different Security Gateway interfaces.
If NAT is defined through the network object (as opposed to using Manual NAT Rules), then you
must ensure that bidirectional NAT is enabled.

Internal Communication with Overlapping Addresses


If two internal networks have overlapping (or partially overlapping) IP addresses, Security Gateway
enables:
• Communication between the overlapping internal networks.
• Communication between the overlapping internal networks and the outside world.
• Enforcement of a different security policy for each overlapping internal network.
Network Configuration

For example, assume both Network 2A and Network 2B share the same address space
(192.168.1.0/24), therefore standard NAT cannot be used to enable communication between the
two networks. Instead, overlapping NAT must be performed on a per interface basis.
Users in Network 2A who want to communicate with users in Network 2B must use the
192.168.30.0/24 network as a destination. Users in Network 2B who want to communicate with
users in Network 2A must use the 192.168.20.0/24 network as a destination.
The Security Gateway (4) translates the IP addresses in the following way for each individual
interface:
Interface 4A
• Inbound source IP addresses are translated to the virtual network 192.168.20.0/24.
• Outbound destination IP addresses are translated to the network 192.168.1.0/24.
Interface 4B
• Inbound source IP addresses are translated to the network 192.168.30.0/24.
• Outbound destination IP addresses are translated to the network 192.168.1.0/24.

Security Management Administration Guide R80.20 | 151


Creating an Access Control Policy

Interface 4C
Overlapping NAT is not configured for this interface. Instead, use NAT Hide in the normal way (not
on a per-interface basis) to hide source addresses behind the interface's IP address (192.168.4.1).

Communication Examples
This section describes how to enable communication between internal networks, and between an
internal network and the Internet

Communication Between Internal Networks


If user 1A, at IP address 192.168.1.10 in Network 2A, wants to connect to user 1B, at IP address
192.168.1.10 (the same IP address) in Network 2B, user 1A opens a connection to the IP address
192.168.30.10.
Communication Between Internal Networks

Step Source IP address Destination IP address


Interface 4A — before NAT 192.168.1.10 192.168.30.10

Interface 4A — after NAT 192.168.20.10 192.168.30.10

Security Gateway enforces the security policy for packets from network 192.168.20.0/24 to
network 192.168.30.0/24.

Interface 4B — before NAT 192.168.20.10 192.168.30.10


Interface 4B — after NAT 192.168.20.10 192.168.1.10
Communication Between an Internal Network and the Internet
If user 1A, at IP address 192.168.1.10 in network 2A, connects to IP address 192.0.2.10 on the
Internet (3).
Communication Between an Internal Network and the Internet

Step Source IP address Destination IP address


Interface 4A — before NAT 192.168.1.10 192.0.2.10
Interface 4A — after NAT 192.168.20.10 192.0.2.10

The Security Gateway (4) enforces the security policy for packets from network 192.168.20.0/24
to the Internet (3).

Interface 4C — before NAT 192.168.20.10 192.0.2.10


Interface 4C — after NAT Hide 192.168.4.1 192.0.2.10

Routing Considerations
To allow routing from Network 2A to Network 2B, routing must be configured on the Security
Gateway.
These sections contain sample routing commands for Windows and Linux operating systems (for
other operating systems, use the equivalent commands).

On Windows
• route add 192.168.30.0 mask 255.255.255.0 192.168.3.2
• route add 192.168.20.0 mask 255.255.255.0 192.168.2.2

Security Management Administration Guide R80.20 | 152


Creating an Access Control Policy

On Linux
• route add -net 192.168.30.0/24 gw 192.168.3.2
• route add -net 192.168.20.0/24 gw 192.168.2.2
Object Database Configuration
To activate the overlapping NAT feature, use GuiDBedit Tool (see sk13009
http://supportcontent.checkpoint.com/solutions?id=sk13009), or dbedit (see skI3301
http://supportcontent.checkpoint.com/solutions?id=skI3301). In the sample network
configuration, the per interface values for interface 4A and interface 4B are set in the following
way:
Sample Network Configuration: Interface Configuration

Parameter Value
enable_overlapping_nat true
overlap_nat_dst_ipaddr The overlapping IP addresses (before NAT). In the sample
network configuration, 192.168.1.0 for both interfaces.

overlap_nat_src_ipaddr The IP addresses after NAT. In the sample network


configuration, 192.168.20.0 for interface 4A, and
192.168.30.0 for interface 4B.
overlap_nat_netmask The net mask of the overlapping IP addresses. In the
sample network configuration, 255.255.255.0.

Security Management Behind NAT


The Security Management Server sometimes uses a private IP address (as listed in RFC 1918) or
some other non-routable IP address, because of the lack of public IP addresses.
NAT (Static or Hide) for the Security Management Server IP address can be configured in one
click, while still allowing connectivity with managed gateways. All gateways can be controlled
from the Security Management Server, and logs can be sent to the Security Management Server.
NAT can also be configured for a Management High Availability server and a Log Server.
Note - Security Management behind NAT is not supported for deployments where the Security
Management Server also acts as a gateway and must be addressed from outside the NATed
domain, for example, when it receives SAM commands.
In a typical Security Management Behind NAT scenario: the Security Management Server (1) is in a
network on which Network Address Translation is performed (the "NATed network"). The Security
Management Server can control Security Gateways inside the NATed network, on the border
between the NATed network and the outside world and outside the NATed network.

Item Description
1 Primary_Security_Management object with IP address 10.0.0.1. Translated address
192.168.55.1

In ordinary Hide NAT configurations, connections cannot be established from the external side the
NAT A Security Gateway. However, when using Hide NAT on the Security Management Server,
gateways can send logs to the Security Management Server.

Security Management Administration Guide R80.20 | 153


Creating an Access Control Policy

When using the Security Management behind NAT feature, the remote gateway automatically
selects the Security Management address to be addressed and simultaneously applies NAT
considerations.

To enable NAT for the Security Management Server:


• From the NAT page of the Security Management Server object, define NAT and select Apply
for A Security Gateway control connections.
Non-Corresponding Gateway Addresses
Sometimes the gateway contacts the Security Management Server with an address that does not
correspond to the deployment of the remote gateway. For example:
• When the automatic selection of the gateway does not conform with the routing of the
deployment of the gateway. In this case, define the masters and loggers manually, to allow the
remote gateway to contact the Security Management Server using the required address. When
an inbound connection from a managed gateway enters the Security Gateway, port translation
is used to translate the hide address to the real IP address of the Security Management
Server.
To define masters and loggers, select Use local definitions for Log Servers and Use local
definitions for Masters and specify the correct IP addresses on the gateway.
This solution encompasses different scenarios:
• The remote gateway addresses the NATed IP when you want it to address the real IP.
• The remote gateway addresses the real IP when you want it to address the NATed IP. In this
case, specify the SIC name of the Security Management Server in the masters file.

Notes:
• Only one object can be defined with these settings, unless the second object is defined as a
Secondary Security Management Server or as a Log Server.
• Ensure that you properly define the Topology settings on all gateways. All workarounds
required for previous versions still function with no changes in their behavior.
Configuring the Security Management Server Object

To configure the Security Management Server object:


1. From the NAT page on the Primary_Security_Management object, select either Static NAT or
Hide NAT. If using Hide NAT, select Hide behind IP Address, for example, 192.168.55.1. Do not
select Hide behind Gateway (address 0.0.0.0).
2. Select Install on Gateway to protect the NATed objects or network. Do not select All.
3. Select Apply for Security Gateway control connections.

Configuring the Security Gateway Object

To configure the Security Gateway object:


1. Open the Security Gateway Network Management page
2. Create the Interface. Click Actions > New interface.
3. In the General page of the Interface window, define the IP address and the Net Mask.
4. In the Topology section, click Modify.
5. Select Override.
6. Select Network defined by the interface IP and Net Mask.
Security Management Administration Guide R80.20 | 154
Creating an Access Control Policy

IP Pool NAT
An IP Pool is a range of IP addresses (an address range, a network or a group of one of these
objects) that is routable to the gateway. IP Pool NAT ensures proper routing for encrypted
connections for the following two connection scenarios:
• Remote Access Client to MEP (Multiple Entry Point) gateways
• Gateway to MEP gateways
When a connection is opened from a Remote Access Client or a client behind a gateway, to a
server behind the MEP Gateways, the packets are routed through one of the MEP gateways.
Return packets in the connection must be routed back through the same gateway in order to
maintain the connection. To ensure that this occurs, each of the MEP gateways maintains a pool of
IP addresses that are routable to the gateway. When a connection is opened to a server, the
gateway substitutes an IP address from the IP pool for the source IP address. Reply packets from
the server return to the gateway, which restores the original source IP address and forwards the
packets to the source.

IP Pool Per Interface


You can define a separate IP address pool on one or more of the gateway interfaces instead of
defining a single pool of IPs for the gateway.
Defining an IP pool per interface solves routing issues that occur when the gateway has more than
two interfaces. Sometimes it is necessary that reply packets return to the gateway through the
same gateway interface. This illustration shows one of the MEP Gateways in a Remote Access
Client to MEP (Multiple Entry Point) gateway deployment.

Item Description
1 Packets from source host:
Source: Original
Destination:
2 VPN tunnel through the Internet
3 MEP Gateway
3A IP Pool 1 packets:
Source: 10.55.8.x
Destination:
3B IP Pool 2 packets:
Source: 10.55.10.x
Destination:

Security Management Administration Guide R80.20 | 155


Creating an Access Control Policy

Item Description
4 Internal network 10.8.8.0
5 Target host in internal network 10.10.10.0

If a remote client opens a connection to the internal network, reply packets from hosts inside the
internal networks are routed to the correct gateway interface through the use of static IP pool
NAT addresses.
The remote client's IP address is NATed to an address in the IP pool on one of the gateway
interfaces. The addresses in the IP pool can be routed only through that gateway interface so that
all reply packets from the target host are returned only to that interface. Therefore, it is important
that the IP NAT pools of the interfaces do not overlap.
When the packet returns to the gateway interface, the gateway restores the remote peer's source
IP address.
The routing tables on the routers that lie behind the gateway must be edited so that addresses
from a gateway IP pool are returned to the correct gateway interface.
Switching between IP Pool NAT per gateway and IP Pool NAT per interface and then installing the
security policy deletes all IP Pool allocation and all NATed connections.

NAT Priorities
IP Pool NAT can be used both for encrypted (VPN) and non-encrypted (decrypted by the gateway)
connections.
Note - To enable IP Pool NAT for clear connections through the gateway, configure INSPECT
changes in the user.def file (see sk98239
http://supportcontent.checkpoint.com/solutions?id=sk98239). Contact Check Point Technical
Support.
For non-encrypted connections, IP Pool NAT has the following advantages over Hide NAT:
• New back connections (for example, X11) can be opened to the NATed host.
• User-to-IP server mapping of protocols that allow one connection per IP can work with a
number of hosts instead of only one host.
• IPsec, GRE and IGMP protocols can be NATed using IP Pool NAT (and Static NAT). Hide NAT
works only with TCP, UDP and ICMP protocols.
Because of these advantages, you can specify that IP Pool NAT has priority over Hide NAT, if both
match the same connection. Hide NAT is only applied if the IP pool is used up.
The order of NAT priorities are:
1. Static NAT
2. IP Pool NAT
3. Hide NAT
Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than
the other NAT methods.

Reusing IP Pool Addresses For Different Destinations


IP Pool addresses can be reused for different destinations, which makes more efficient use of the
addresses in the pool. If a pool contains N addresses, then any number of clients can be assigned
an IP from the pool as long as there are no more than N clients per server.

Security Management Administration Guide R80.20 | 156


Creating an Access Control Policy

Using IP Pool allocation per destination, two different clients can receive the same IP from the
pool as long as they communicate with different servers (connections 1 and 2). When reusing
addresses from the IP Pool, back connections are supported from the original server only
(connection 3). This means that connections back to the client can be opened only from the
specific server to which the connection was opened.

Item Description
1 Gateway with IP Pool addresses A to Z
2 Clients.
Source: Original
Destination:

3A NATed packet from connection 3.


Source: A
Destination:

4A NATed packet from connection 4.


Source: A
Destination:

5A NATed packet from reply connection 5.


Source: Original
Destination: A

6A This server cannot open a connection with Destination A back to the client.

The default Do not reuse IP Pool NAT behavior means that each IP address in the IP Pool is used
once (connections 1 and 2 in the following illustration). In this mode, if an IP pool contains 20
addresses, up to 20 different clients can be NATed and back connections can be opened from any
source to the client (connection 3).

Item Description
1 Gateway with IP Pool addresses A to Z.

Security Management Administration Guide R80.20 | 157


Creating an Access Control Policy

Item Description
2 Clients.
Source: Original
Destination:

3A NATed packet from connection 3.


Source: A
Destination:

4A NATed packet from connection 4.


Source: Z
Destination:

5 Connection.
Source: Original
Destination: A

Switching between the Reuse and Do not reuse modes and then installing the security policy,
deletes all IP Pool allocations and all NATed connections.

Configuring IP Pool NAT

To configure IP Pool NAT:


1. From the SmartConsole Menu, select Global Properties.
2. In the Global Properties > NAT page, select Enable IP Pool NAT and the required tracking
options.
3. In the gateway General Properties page, ensure the gateway version is specified correctly.
4. For each gateway or gateway interface, create a network object that represents its IP pool NAT
addresses. The IP pool can be a network, group, or address range. For example, for an
address range, do the following:
a) From the Objects Bar (F11), In the network objects tree, select New > More > Network
Object > Address Range > Address Range.
The Address Range Properties window opens.
b) In the General tab, enter the first and last IP of the address range.
c) Click OK. The new address range appears in the Address Ranges branch of the network
objects tree.
5. Edit the gateway object, and select NAT > IP Pool NAT.
6. In the IP Pool NAT page, select one of the following:
a) Allocate IP Addresses from and then select the address range you created to configure IP
Pool NAT for the whole gateway, or
b) Define IP Pool NAT on Gateway interfaces to configure IP Pool NAT per interface.
7. If required, select one or more of the following options:
a) Use IP Pool NAT for VPN client connections
b) Use IP Pool NAT for gateway to gateway connections
c) Prefer IP Pool NAT over Hide NAT to specify that IP Pool NAT has priority over Hide NAT, if
both match the same connection. Hide NAT is only applied if the IP pool is used up.

Security Management Administration Guide R80.20 | 158


Creating an Access Control Policy

8. Click Advanced.
a) Return unused addresses to IP Pool after: Addresses in the pool are reserved for 60
minutes (default), even if the user logs off. If the user disconnects from their ISP and then
redials and reconnects, there will be two Pool NAT addresses in use for the user until the
first address from the IP Pool times out. If users regularly lose their ISP connections, you
may want to decrease the time-out to prevent the IP Pool from being depleted.
b) Reuse IP addresses from the pool for different destinations: This is a good option unless
you need to allow back connections to be opened to clients from any source, rather than
just from the specific server to which the client originally opened the connection.
9. Click OK.
10. Edit the routing table of each internal router so that packets with an IP address assigned from
the NAT pool are routed to the appropriate gateway or, if using IP Pools per interface, the
appropriate gateway interface.

IP Pool NAT for Clusters


IP Pools for gateway clusters are configured in two places in SmartConsole:
• In the gateway Cluster object NAT > IP Pool NAT page, select the connection scenario.
• In the Cluster member object IP Pool NAT page, define the IP Pool on the cluster member. A
separate IP pool must be configured for each cluster member. It is not possible to define a
separate IP Pool for each cluster member interface.

Site-to-Site VPN
The basis of Site-to-Site VPN is the encrypted VPN tunnel. Two Security Gateways negotiate a link
and create a VPN tunnel and each tunnel can contain more than one VPN connection. One Security
Gateway can maintain more than one VPN tunnel at the same time.

Sample Site-to-Site VPN Deployment

Item Description
A, B Security Gateways
2 VPN tunnel
3 Internal network in VPN domain
4 Host 4

Security Management Administration Guide R80.20 | 159


Creating an Access Control Policy

Item Description
5 Host 5

In this sample VPN deployment, Host 4 and Host 5 securely send data to each other. The Security
Gateways perform IKE negotiation and create a VPN tunnel. They use the IPsec protocol to encrypt
and decrypt data that is sent between Host 4 and Host 5.

VPN Workflow

Host 4 sends packet Firewalls A & B create


Firewall A encrypts data
to Host 5 VPN tunnel

Host 5 receives Encrypted data is sent


Firewall B decrypts data
unencrypted data through VPN tunnel

VPN Communities
A VPN Domain is a collection of internal networks that use Security Gateways to send and receive
VPN traffic. Define the resources that are included in the VPN Domain for each Security Gateway.
Then join the Security Gateways into a VPN community - collection of VPN tunnels and their
attributes. Network resources of different VPN Domains can securely communicate with each
other through VPN tunnels that terminate at the Security Gateways in the VPN communities.
VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN
tunnels between each pair of Security Gateway. In a Star community, each satellite Security
Gateway has a VPN tunnel to the central Security Gateway, but not to other Security Gateways in
the community.

Mesh Topology Star Topology

Item Description
1 Security Gateway
2 Satellite Security Gateways
3 Central Security Gateway

Security Management Administration Guide R80.20 | 160


Creating an Access Control Policy

Sample Star Deployment


This section explains how to configure a VPN star community. This deployment lets the satellite
Security Gateways connect to the internal network of the central Security Gateway. The internal
network object is named: Internal-network.

To create a new VPN Star Community:


1. In SmartConsole, go to the Security Policies page.
2. In the Access Tools section, click VPN Communities.
3. Click New and select Star Community.
The New Star Community window opens.
4. Enter the name for the community.
5. From the navigation tree, select Encryption.
6. Configure the VPN encryption methods and algorithms for the VPN community.
7. Click OK.

To configure star VPN for the Security Gateways:


For each Security Gateway in the VPN community, follow these configuration steps.
1. In SmartConsole, go to the Gateways & Servers page and double-click the Security Gateway
object.
The gateway properties window opens.
2. In the Network Security section of the General Properties page, select IPsec VPN.
3. From the navigation tree, go to Network Management > VPN Domain.
• For the central Security Gateway, click Manually defined and select the Internal-network
object
• For a satellite Security Gateway, select All IP addresses
4. From the navigation tree, click IPsec VPN.
5. Configure the Security Gateway as a member of a VPN star community.
a) In the This Security Gateway participates in the following VPN Communities section, click
Add.
The Add this Gateway to Community window opens.
b) Select the VPN Community and click OK.
6. Click OK.
After you create a community and configure Security Gateways, add those Security Gateways to
the community as a center or as a satellite gateway.

To add a Security Gateway to a new star community:


1. In SmartConsole, go to the Security Policies page.
2. In the Access Tools section, click VPN Communities.
3. Select the new star community and click Edit.
The Star Community window opens.
4. In the Gateways page, add Security Gateways to the community:
• Center Gateways - Click Add and select center gateways. Select Mesh center gateways, if
necessary.

Security Management Administration Guide R80.20 | 161


Creating an Access Control Policy

• Satellite Gateways - Click Add and select satellite gateways.


5. Click OK.

Sample Combination VPN Community

Item Description
1 London Security Gateway
2 New York Security Gateway
3 London - New York Mesh community
4 London company partner (external network)
5 London Star community
6 New York company partner (external network)
7 New York Star community

This deployment is composed of a Mesh community for London and New York Security Gateways
that share internal networks. The Security Gateways for external networks of company partners
do not have access to the London and New York internal networks. However, the Star VPN
communities let the company partners access the internal networks of the sites that they work
with.

Allowing VPN Connections


To allow VPN connections between Security Gateways in specific VPN communities, add Access
Control rules that accept such connections.
To allow all VPN traffic to hosts and clients on the internal networks of a specific VPN community,
select these options in the Encrypted Traffic section of the properties configuration window for
that VPN Community:
• For a meshed community: Accept all encrypted traffic
• For a Star Community: Accept all encrypted traffic on Both center and satellite gateways,
or Accept all encrypted traffic on Satellite gateways only.

Security Management Administration Guide R80.20 | 162


Creating an Access Control Policy

Sample VPN Access Control Rules


This table shows sample VPN rules for an Access Control Rule Base. (The Action, Track and Time
columns are not shown. Action is set to Allow, Track is set to Log, and Time is set to Any.)

No. Name Source Destination VPN Service Install On


1 - Any NEGATED BranchOffices Any BranchOffices
Member LondonOffices LondonOffices
Gateways
2 Site-to-sit Any Any All_GwToGw FTP-port Policy Targets
e VPN HTTP
HTTPS
SMTP
3 Remote Any Any RemoteAccess HTTP Policy Targets
access HTTPS
IMAP

1. Automatic rule that SmartConsole adds to the top of the Implied Rules when the Accept All
Encrypted Traffic configuration option is selected for the BranchOffices VPN community
and the LondonOffices VPN community. This rule is installed on all the Security Gateways
in these communities. It allows all VPN traffic to hosts and clients on the internal networks of
these communities. Traffic that is sent to the Security Gateways in these VPN communities is
dropped.
Note - This automatic rule can apply to more than one VPN community.
2. Site-to-site VPN - Connections between hosts in the VPN Domains of all Site-to-Site VPN
communities are allowed. These are the only protocols that are allowed: FTP, HTTP, HTTPS
and SMTP.
3. Remote access - Connections between hosts in the VPN Domains of Remote Access VPN
community are allowed. These are the only protocols that are allowed: HTTP, HTTPS, and
IMAP.

To Learn More About Site-to-Site VPN


To learn more about site-to-Site VPN, see the R80.20 Site-to-Site VPN Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_SitetoSiteVP
N_AdminGuide/html_frameset.htm.

Remote Access VPN


If employees remotely access sensitive information from different locations and devices, system
administrators must make sure that this access does not become a security vulnerability. Check
Point's Remote Access VPN solutions let you create a VPN tunnel between a remote user and the
internal network. The Mobile Access Software Blade extends the functionality of Remote Access
solutions to include many clients and deployments.

VPN Connectivity Modes


When securely connecting remote clients with the internal resources, organizations face
connectivity challenges, such as these:
• The IP addresses of a remote access client might be unknown
Security Management Administration Guide R80.20 | 163
Creating an Access Control Policy

• The remote access client can be connected to a LAN with internal IP addresses (such as, at
hotels)
• It is necessary for the remote client to use protocols that are not supported
The Check Point IPsec VPN Software Blade provides these VPN connectivity modes to help
organizations resolve those challenges:
• Office Mode
Remote users can be assigned the same or non-routable IP addresses from the local ISP.
Office Mode solves these routing problems and encapsulates the IP packets with an available
IP address from the internal network. Remote users can send traffic as if they are in the office
and avoid VPN routing problems.
• Visitor Mode
Remote users can be restricted to using only HTTP and HTTPS protocols. Visitor Mode lets
these users tunnel all protocols through regular TCP connections on port 443.

Sample Remote Access VPN Workflow


Here is an example of a Remote Access VPN workflow:
1. Use SmartConsole to enable Remote Access VPN on the Security Gateway.
2. Add the remote user information to the Security Management Server:
• Create and configure an LDAP Account Unit
• Enter the information in the SmartConsole user database
Optional - Configure the gateway for remote user authentication (optional).
3. Define the gateway Access Control and encryption rules.
4. Create the group objects to use in the gateway rules:
• LDAP Group object - for an LDAP Account Unit
• User Group object - for users configured in the SmartConsole user database
5. Create and configure the encryption settings for the VPN community object in Global
Properties > Remote Access > VPN - Authentication and Encryption.
6. Add Access Control rules to the Access Control Rule Base to allow VPN traffic to the internal
networks.

Enable remote access


VPN

R80 Smart
Configure LDAP LDAP
Manage Users? Console Configure users
Account Unit

Configure user Configure user


authentication authentication

Security Management Administration Guide R80.20 | 164


Creating an Access Control Policy

Create LDAP user Create user


Create VPN Community
group object group object

Configure rules for VPN


access in Access Control
Rule Base

Install policy

Configuring the Security Gateway for a Remote Access Community


Make sure that the VPN Software Blade is enabled before you configure the Remote Access
community.

To configure the Security Gateway for Remote Access:


1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.
The gateway window opens and shows the General Properties page.
2. From the navigation tree, click IPsec VPN.
The page shows the VPN communities that the Security Gateway is participating.
3. To add the Security Gateway to a Remote Access community:
a) Click Add.
b) Select the community.
c) Click OK.
4. From the navigation tree, click Network Management > VPN Domain.
5. Configure the VPN Domain.
6. Configure the settings for Visitor Mode.
7. From the navigation tree, click VPN Clients > Office Mode.
8. Configure the settings for Office Mode.
Note - Office Mode support is mandatory on the Security Gateway side.
9. Click OK and publish the changes.

To Learn More About Remote Access VPN


To learn more about Remote Access VPN, see the R80.20 Remote Access VPN Administration
Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_RemoteAcc
essVPN_AdminGuide/html_frameset.htm.

Security Management Administration Guide R80.20 | 165


Creating an Access Control Policy

Mobile Access to the Network


Check Point Mobile Access lets remote users easily and securely use the Internet to connect to
internal networks. Remote users start a standard HTTPS request to the Mobile Access Security
Gateway, and authenticate with one or more secure authentication methods.
The Mobile Access Portal lets mobile and remote workers connect easily and securely to critical
resources over the internet. Check Point Mobile Apps enable secure encrypted communication
from unmanaged smartphones and tablets to your corporate resources. Access can include
internal apps, email, calendar, and contacts.
To include access to Mobile Access applications in the Rule Base, include the Mobile Application
in the Services & Applications column.
To give access to resources through specified remote access clients, create Access Roles for the
clients and include them in the Source column of a rule.

Check Point Mobile Access Solutions


Check Point Mobile Access has a range of flexible clients and features that let users access
internal resources from remote locations. All these solutions include these features:
• Enterprise-grade, secure connectivity to corporate resources
• Strong user authentication
• Granular access control
For more information about the newest versions of Mobile Access solutions and clients, go to
sk67820 http://supportcontent.checkpoint.com/solutions?id=sk67820.

Client-Based vs. Clientless


Check Point remote access solutions use IPsec and SSL encryption protocols to create secure
connections. All Check Point clients can work through NAT devices, hotspots, and proxies in
situations with complex topologies, such as airports or hotels. These are the types of installations
for remote access solutions:
• Client-based - Client application installed on endpoint computers and devices. The client
supplies access to most types of corporate resources according to the access privileges of the
user.
• Clientless - Users connect through a web browser and use HTTPS connections. Clientless
solutions usually supply access to web-based corporate resources.
• On demand client - Users connect through a web browser and a client is installed when
necessary. The client supplies access to most types of corporate resources according to the
access privileges of the user.

Mobile Access Clients


• Capsule Workspace - An app that creates a secure container on the mobile device to give
users access to internal websites, file shares, and Exchange servers.
• Capsule Connect - A full L3 tunnel app that gives users network access to all mobile
applications.
• Check Point Mobile for Windows - A Windows IPsec VPN client that supplies secure IPsec VPN
connectivity and authentication.

Security Management Administration Guide R80.20 | 166


Creating an Access Control Policy

Mobile Access Web Portal


The Mobile Access Portal is a clientless SSL VPN solution that supplies secure access to
web-based resources. After users authenticate to the portal, they can access Mobile Access
applications such as Outlook Web App and a corporate wiki.

SSL Network Extender


SSL Network Extender is an on-demand SSL VPN client and is installed on the computer or
mobile device from an Internet browser. It supplies secure access to internal network resources.

Configuring Mobile Access to Network Resources


Sample Mobile Access Workflow
This is a high-level workflow to configure remote access to Mobile Access applications and
resources.
1. Use SmartConsole to enable the Mobile Access Software Blade on the gateway.
2. Follow the steps in the Mobile Access Configuration wizard to configure these settings:
a) Select mobile clients.
b) Define the Mobile Access portal.
c) Define applications, for example Outlook Web App.
d) Connect to the AD server for user information.
3. Select the policy type:
• The default is to use the Legacy Policy, configured in the Mobile Access tab in
SmartConsole.
• To include Mobile Access in the Unified Access Control Policy, select this in Gateway
Properties > Mobile Access.
4. Add rules to the Policy:
• For Legacy Policy: Add rules in SmartConsole. Select Security Policies > Shared Policies >
Mobile Access > Open Mobile Access Policy in SmartConsole
• For Unified Access Control Policy: Add rules in SmartConsole > Security Policies Access
Control Policy.
5. Configure the authentication settings in Gateway Properties > Mobile Access >
Authentication.
6. Install the Access Control Policy on the gateway.
Users can access mobile applications through the configured Mobile Access portal with the
defined authentication method.
7. Optional: Give secure access to users through the Capsule Workspace app with certificate
authentication.
a) In the gateway Mobile Access > Authentication, click Settings, and select Require client
certificate.
b) Use the Certificate Creation and Distribution Wizard (in the Security Policies view > Client
Certificates > New.
c) Users download the Capsule Workspace app.

Security Management Administration Guide R80.20 | 167


Creating an Access Control Policy

d) Users open the Capsule Workspace app and enter the Mobile Access Site Name and
necessary authentication, such as user name and password.

Configure
Select the policy Update the
Enable Mobile settings in
type and add Authentication
Access Mobile Access
rules to policy settings
wizard

Users can Users download Generate a Install the


access internal app, open it, and certificate for Access Control
resources enter settings the clients Policy

Sample Mobile Access Deployment


This is a sample deployment of a Mobile Access Security Gateway with an AD and Exchange server
in the internal network.

Item Description
1 Mobile devices
2 Mobile Access tunnels
3 Internet (external networks)
4 Mobile Access Security Gateway
5 Internal network resources, AD and Exchange servers
In this sample Mobile Access deployment, a mobile device uses a Mobile Access tunnel to connect
to the internal network. The Mobile Access Security Gateway decrypts the packets and
authenticates the user. The connection is allowed and the mobile device connects to the internal
network resources.

Using the Mobile Access Configuration Wizard


This procedure describes how to enable and configure the Mobile Access Software Blade on a
Security Gateway with the Configuration wizard. For this sample configuration, the AD user group
Mobile_Access contains all the users that are allowed to connect to the internal network. The
deployment is based on the Sample Mobile Access Deployment (on page 168).
This configuration lets these clients connect to internal resources:
• Android and iOS mobile devices

Security Management Administration Guide R80.20 | 168


Creating an Access Control Policy

• Windows and Mac computers


• Internet browsers can open a SSL Network Extender connection to the internal network

To configure Mobile Access:


1. In SmartConsole, go to Gateways & Servers and double-click the gateway object.
The General Properties window opens.
2. In the General Properties > Network Security section, select Mobile Access.
The Mobile Access page of the Mobile Access Configuration Wizard opens.
3. Configure the Security Gateway to allow connections from the Internet and mobile devices.
Select these options:
• Web
• Mobile Devices - Select the required options.
• Desktops/Laptops - Select the required options.
4. Click Next.
The Web Portal page opens.
5. Enter the primary URL for the Mobile Access portal. The default is
https://<gw_IPv4>/sslvpn
6. Click Next.
The Applications page opens.
7. Configure the applications to show:
a) In Web Applications, make sure Demo web application (World Clock) is selected.
b) In Mail/Calendar/Contacts, enter the domain for the Exchange server and select:
 Mobile Mail (including push mail notifications)
 ActiveSync Applications
 Outlook Web App
The Mobile Access portal shows links to the Demo web and Outlook Web App applications.
The client on the mobile device shows links to the other applications.
8. Click Next.
The Active Directory page opens.
9. Select the AD domain and enter the user name and password.
10. Click Connect.
The Security Gateway makes sure that it can connect to the AD server.
11. Click Next.
The Users page opens.
Click Add and then select the group Mobile_Access.
12. Click Next and then click Finish.
The Mobile Access Configuration Wizard closes.
13. Click OK.
The Gateway Properties window closes.

Allowing Mobile Connections


The Mobile Access Configuration Wizard enables and configures the Mobile Access Software
Blade. It is necessary to add Firewall rules to allow connections from the VPN clients on the
Security Management Administration Guide R80.20 | 169
Creating an Access Control Policy

computers and devices. Create a Host Node object for the Exchange server, all of the other objects
are predefined.

Name Source Destination VPN Service Action Install On Track


Mobile Any ExchngSrvr RemoteAcces HTTP Accept MobileAccessG Log
Access s HTTPS W
Users MSExcha
nge

All connections from the RemoteAccess VPN community to the Exchange server are allowed.
These are the only protocols that are allowed: HTTP, HTTPS, and MS Exchange. This rule is
installed on Security Gateways in the MobileAccessGW group.

Defining Access to Applications


Use the Security Policies page in SmartConsole to define rules that let users access Mobile
Access applications. The applications that are selected in the Configuration Wizard are
automatically added to this page. You can also create and edit the rules that include these
SmartConsole objects:
• Users and user groups
• Mobile Access applications
• Mobile Access Security Gateways

Activating Single Sign On


Enable the SSO (Single Sign On) feature to let users authenticate one time for applications that
they use during Mobile Access sessions. The credentials that users enter to log in to the Mobile
Access portal can be re-used automatically to authenticate to different Mobile Access
applications. SSO user credentials are securely stored on the Mobile Access Security Gateway for
that session and are used again if users log in from different remote devices. After the session is
completed, the credentials are stored in a database file.
By default, SSO is enabled on new Mobile Access applications that use HTTP. Most Web
applications authenticate users with specified Web forms. You can configure SSO for an
application to use the authentication credentials from the Mobile Access portal. It is not necessary
for users to log in again to each application.

To configure SSO:
1. In SmartConsole, go to Security Policies > Shared Policies > Mobile Access.
2. Click Open Mobile Access Policy in SmartDashboard.
3. In the Mobile Access tab, select Additional Settings > Single Sign On.
The Single Sign On page opens.
4. Select an application and click Edit.
The application properties window opens and shows the Single Sign On page.
5. For Web form applications:
a) In the Application Single Sign On Method section, select Advanced and click Edit.
The Advanced window opens.
b) Select This application reuses the portal credentials. Users are not prompted.

Security Management Administration Guide R80.20 | 170


Creating an Access Control Policy

c) Click OK.
d) Select This application uses a Web form to accept credentials from users.
e) Click OK.
6. Install the policy.

Security Management Administration Guide R80.20 | 171


Creating an Access Control Policy

Connecting to a Citrix Server


Citrix Services
The Mobile Access Software Blade integrates the Firewall Citrix clients and services. It is not
necessary to use STA (Secure Ticketing Authority) servers in a Mobile Access Security Gateway
deployment because Mobile Access uses its own STA engine. You can also use Mobile Access in a
deployment with STA and CSG (Citrix Secure Gateway) servers.
The Mobile Access server certificate must use a FQDN (Fully Qualified Domain Name) that is
issued to the FQDN of the Mobile Access Security Gateway.

Sample Deployment with Citrix Server


This is a sample deployment of a Mobile Access Security Gateway and a Citrix web server in the
DMZ. The Citrix XenApp server is connected to the internal network.

Item Description
1 Mobile devices
2 Mobile Access tunnels
3 Internet (external networks)
4 Security Gateway for the internal network
5 Mobile Access Security Gateway in the DMZ
6 Citrix web interface
7 Internal network resources
8 Citrix XenApp (MetaFrame) server

Configuring Citrix Services for Mobile Access


This procedure describes how to configure Mobile Access to let remote users connect to Citrix
applications. The deployment is based on the Sample Deployment with Citrix Server (on page 172).

To configure Citrix services:


1. In SmartConsole, go to Manage & Settings > Blades.

Security Management Administration Guide R80.20 | 172


Creating an Access Control Policy

2. In the Mobile Access, click Configure in SmartDashboard.


3. In the Mobile Access tab, click Applications > Citrix Services.
4. Click New.
The General Properties page of the Citrix Service window opens.
5. Enter the Name for the Citrix server object.
6. From the navigation tree, click Web Interface.
7. Create a new object for the Citrix web interface server, in Servers, click Manage > New > Host.
The Host Node window opens.
8. Enter the settings for the Citrix web interface server and the click OK.
9. In Services, select one or more of these services that the Citrix web interface server supports:
• HTTP
• HTTPS
10. From the navigation tree, click Link in Portal.
11. Configure the settings for the link to the Citrix services in the Mobile Access portal:
• Link text - The text that is shown for the Citrix link
• URL - The URL for the directory or subdirectory of the Citrix application
• Tooltip - Text that is shown when the user pauses the mouse pointer above the Citrix link
12. From the navigation tree, select Additional Settings > Single Sign On.
13. Enable Single Sign On for Citrix services, select these options:
• Turn on single Sign On for this application
• Prompt users for their credentials, and store them for future use
14. Click OK.
The Citrix server object is added to Defined Citrix Services.
15. From the Mobile Access navigation tree, select Policy.
16. Add the Citrix services object to the applicable rules.
a) Right-click on the Applications cell of a rule and select Add Applications.
b) Select the Citrix services object.
17. Install the policy.

Compliance Check
The Mobile Access Software Blade lets you use the Endpoint Security on Demand feature to create
compliance policies and add more security to the network. Mobile devices and computers are
scanned one time to make sure that they are compliant before they can connect to the network.
The compliance scanner is installed on mobile devices and computers with ActiveX (for Internet
Explorer on Windows) or Java. The scan starts when the Internet browser tries to open the Mobile
Access Portal.

Compliance Policy Rules


The compliance policy is composed of different types of rules. You can configure the security and
compliance settings for each rule or use the default settings.
These are the rules for a compliance policy:
• Windows security - Microsoft Windows hotfixes, patches and Service Packs.

Security Management Administration Guide R80.20 | 173


Creating an Access Control Policy

• Anti-Spyware protection - Anti-Spyware software.


• Anti-Virus protection - Anti-Virus software version and virus signature files.
• Firewall - Personal firewall software.
• Spyware scan - Action that is done for different types of spyware.
• Custom - Compliance rules for your organization, for example: applications, files, and registry
keys.
• OR group - A group of the above rules. An endpoint computer is compliant if it meets one of the
rules in the group.

Creating a Compliance Policy


By default, Endpoint Security on Demand only allows endpoint computers that are compliant with
the compliance policy log in to the Mobile Access portal.

To create a compliance policy:


1. In SmartConsole, go to Manage & Settings > Blades.
2. In the Mobile Access section, click Configure in SmartDashboard.
3. In the Mobile Access tab, select Endpoint Security on Demand > Endpoint Compliance.
4. Click Edit policies.
The Policies window opens.
5. Click New Policy.
The Policies > New Policy window opens.
6. Enter the Name and Description for the policy.
7. Click Add.
The Add Enforcement Rules window opens.
8. Select rules for the policy.
You can also create new rules - click New Rule, and configure the rule settings.
9. Click OK.
The Policies > New Policy window shows the rules for the policy.
10. Select Bypass spyware scan if necessary.
When selected, the scan for endpoint computers that are compliant with the Anti-Virus or
Anti-Spyware settings is changed. These computers do not scan for spyware when they
connect to a Mobile Access Security Gateway.
11. Click OK.
The Policies window opens.
12. Click OK.

Configuring Compliance Settings for a Security Gateway


The Firewall on a Mobile Access Security Gateway only allows access to endpoint computers that
are compliant with the compliance policy.
This procedure shows how to configure the Laptop Computer policy (on page 173) for a Security
Gateway.

Security Management Administration Guide R80.20 | 174


Creating an Access Control Policy

To configure the compliance settings:


1. In SmartConsole, go to Manage & Settings > Blades.
2. In the Mobile Access section, click Configure in SmartDashboard.
3. In the Mobile Access tab, select Endpoint Security on Demand > Endpoint Compliance.
4. Select the Security Gateway and click Edit.
The Endpoint Compliance page of the Security Gateway properties window opens.
5. Select Scan endpoint machine when user connects.
6. Select Threshold policy and from the drop-down menu select Laptop Computer.
7. Click OK.
8. Install the policy on the Mobile Access Security Gateway.

Secure Workspace
Secure Workspace is a security solution that allows remote users to connect to enterprise
network resources safely and securely. The Secure Workspace virtual workspace provides a
secure environment on endpoint computers that is segregated from the "real" workspace. Users
can only send data from this secure environment through the Mobile Access portal. Secure
Workspace users can only access permitted applications, files, and other resources from the
virtual workspace.
Secure Workspace creates an encrypted folder on the computer called My Secured Documents
and can be accessed from the virtual desktop. This folder contains temporary user files. When the
session terminates, Secure Workspace deletes this folder and all other session data.
For more about configuring Secure Workspace, see the R80.20 Mobile Access Administration
Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_MobileAcce
ss_AdminGuide/html_frameset.htm.

To enable Secure Workspace on a Mobile Access Security Gateway:


1. In SmartConsole, go to Manage & Settings > Blades.
2. In the Mobile Access section, click Configure in SmartDashboard.
Legacy SmartDashboard opens.
3. In the Mobile Access tab, click Endpoint Security on Demand > Secure Workspace.
4. Select the Security Gateway and click Edit.
The Check Point Secure Workspace page of the Security Gateway properties window opens.
5. Select This gateway supports access to applications from within Check Point Secure
Workspace.
6. Click OK and then install the policy.

To Learn More About Mobile Access


To learn more about Mobile Access VPN, see the R80.20 Mobile Access Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_MobileAcce
ss_AdminGuide/html_frameset.htm.

Security Management Administration Guide R80.20 | 175


CHAPTER 9

Creating a Threat Prevention Policy


In This Section:
Threat Prevention Components ...............................................................................176
Assigning Administrators for Threat Prevention .....................................................182
Analyzing Threats .....................................................................................................182
Out-of-the-Box Protection from Threats .................................................................183
The Threat Prevention Policy ...................................................................................189
Creating Threat Prevention Rules ...........................................................................193
The Check Point ThreatCloud ..................................................................................211
Threat Prevention Scheduled Updates ....................................................................212
To Learn More About Threat Prevention .................................................................213

Threat Prevention Components


To challenge today's malware landscape, Check Point's comprehensive Threat Prevention
solution offers a multi-layered, pre- and post-infection defense approach and a consolidated
platform that enables enterprise security to detect and block modern malware. These Threat
Prevention Software Blades are available:
• IPS - A complete IPS cyber security solution, for comprehensive protection against malicious
and unwanted network traffic, which focuses on application and server vulnerabilities, as well
as in-the-wild attacks by exploit kits and malicious attackers.
• Anti-Bot - Post-infection detection of bots on hosts. Prevents bot damages by blocking bot
C&C (Command and Control) communications. The Anti-Bot Software Blade is continuously
updated from ThreatCloud, a collaborative network to fight cybercrime. Anti-Bot discovers
infections by correlating multiple detection methods.
• Anti-Virus - Pre-infection detection and blocking of malware at the gateway. The Anti-Virus
Software Blade is continuously updated from ThreatCloud. It detects and blocks malware by
correlating multiple detection engines before users are affected.
• SandBlast - Protection against infections from undiscovered exploits, zero-day and targeted
attacks:
• Threat Emulation - This innovative solution quickly inspects files and runs them in a virtual
sandbox to discover malicious behavior. Discovered malware is prevented from entering
the network. The ThreatCloud Emulation service reports to the ThreatCloud and
automatically shares the newly identified threat information with other Check Point
customers.
• Threat Extraction - Protection against incoming malicious content. The Threat Extraction
capability removes exploitable content, including active content and embedded objects,
reconstructs files to eliminate potential threats, and promptly delivers sanitized content to
users to maintain business flow. To remove possible threats, the Threat Extraction blade
creates a safe copy of the file, while the Threat Emulation Software Blade inspects the
original file for potential threats.
Each Software Blade gives unique network protections. When combined, they supply a strong
Threat Prevention solution. Data from malicious attacks are shared between the Threat
Security Management Administration Guide R80.20 | 176
Creating a Threat Prevention Policy

Prevention Software Blades and help to keep your network safe. For example, the signatures from
threats that Threat Emulation identifies are added to the ThreatCloud for use by the other Threat
Prevention blades.

IPS
The IPS Software Blade delivers complete and proactive intrusion prevention. It delivers 1,000s of
signatures, behavioral and preemptive protections. It gives another layer of security on top of
Check Point firewall technology. IPS protects both clients and servers, and lets you control the
network usage of certain applications. The hybrid IPS detection engine provides multiple defense
layers, which allows it excellent detection and prevention capabilities of known threats and in
many cases future attacks as well. It also allows unparalleled deployment and configuration
flexibility and excellent performance.
Elements of Protection
IPS protection includes:
• Detection and prevention of specific known exploits.
• Detection and prevention of vulnerabilities, including both known and unknown exploit tools,
for example protection from specific CVEs.
• Detection and prevention of protocol misuse which in many cases indicates malicious activity
or potential threat. Examples of commonly manipulated protocols are HTTP, SMTP, POP, and
IMAP.
• Detection and prevention of outbound malware communications.
• Detection and prevention of tunneling attempts. These attempts may indicate data leakage or
attempts to circumvent other security measures such as web filtering.
• Detection, prevention or restriction of certain applications which, in many cases, are
bandwidth consuming or may cause security threats to the network, such as Peer to Peer and
Instant Messaging applications.
• Detection and prevention of generic attack types without any pre-defined signatures, such as
Malicious Code Protector.
Check Point constantly updates the library of protections to stay ahead of emerging threats.
Capabilities of IPS
The unique capabilities of the Check Point IPS engine include:
• Clear, simple management interface.
• Reduced management overhead by using one management console for all Check Point
products
• Integrated management with SmartConsole.
• Easy navigation from business-level overview to a packet capture for a single attack.
• #1 security coverage for Microsoft and Adobe vulnerabilities.
• Resource throttling so that high IPS activity will not impact other blade functionality
• Complete integration with Check Point configuration and monitoring tools in SmartConsole, to
let you take immediate action based on IPS information.
For example, some malware can be downloaded by a user unknowingly when he browses to a
legitimate web site, also known as a drive-by-download. This malware can exploit a browser
vulnerability to create a special HTTP response and sending it to the client. IPS can identify and
Security Management Administration Guide R80.20 | 177
Creating a Threat Prevention Policy

block this type of attack even though the firewall may be configured to allow the HTTP traffic to
pass.

Anti-Bot
A bot is malicious software that can infect your computer. It is possible to infect a computer when
you open attachments that exploit a vulnerability, or go to a web site that results in a malicious
download.
When a bot infects a computer, it:
• Takes control of the computer and neutralizes its Anti-Virus defenses. It is not easy to find bots
on your computer; they hide and change how they look to Anti-Virus software.
• Connects to a C&C (Command and Control center) for instructions from cyber criminals. The
cyber criminals, or bot herders, can remotely control it and instruct it to do illegal activities
without your knowledge. Your computer can do one or more of these activities:
• Steal data (personal, financial, intellectual property, organizational)
• Send spam
• Attack resources (Denial of Service Attacks)
• Consume network bandwidth and reduce productivity
One bot can often create multiple threats. Bots are frequently used as part of Advanced
Persistent Threats (APTs) where cyber criminals try to damage individuals or organizations.
The Anti-Bot Software Blade detects and prevents these bot and botnet threats. A botnet is a
collection of compromised and infected computers.
The Anti-Bot Software Blade uses these procedures to identify bot infected computers:
• Identify the C&C addresses used by criminals to control bots
These web sites are constantly changing and new sites are added on an hourly basis. Bots can
attempt to connect to thousands of potentially dangerous sites. It is a challenge to know which
sites are legitimate and which are not.
• Identify the communication patterns used by each botnet family
These communication fingerprints are different for each family and can be used to identify a
botnet family. Research is done for each botnet family to identify the unique language that it
uses. There are thousands of existing different botnet families and new ones are constantly
emerging.
• Identify bot behavior
Identify specified actions for a bot such as, when the computer sends spam or participates in
DoS attacks.
After the discovery of bot infected machines, the Anti-Bot Software Blade blocks outbound
communication to C&C sites based on the Rule Base. This neutralizes the threat and makes sure
that no sensitive information is sent out.

Identifying Bot Infected Computers


The Anti-Bot Software Blade uses these procedures to identify bot infected computers:
• Identify the C&C addresses used by criminals to control bots

Security Management Administration Guide R80.20 | 178


Creating a Threat Prevention Policy

These web sites are constantly changing and new sites are added on an hourly basis. Bots can
attempt to connect to thousands of potentially dangerous sites. It is a challenge to know which
sites are legitimate and which are not.
• Identify the communication patterns used by each botnet family
These communication fingerprints are different for each family and can be used to identify a
botnet family. Research is done for each botnet family to identify the unique language that it
uses. There are thousands of existing different botnet families and new ones are constantly
emerging.
• Identify bot behavior
Identify specified actions for a bot such as, when the computer sends spam or participates in
DoS attacks.

Preventing Bot Damage


After the discovery of bot infected machines, the Anti-Bot Software Blade blocks outbound
communication to C&C sites based on the Rule Base. This neutralizes the threat and makes sure
that no sensitive information is sent out.

ThreatSpect Engine and ThreatCloud Repository


The ThreatSpect engine is a unique multi-tiered engine that analyzes network traffic and
correlates information across multiple layers to find bots and other malware. It combines
information on remote operators, unique botnet traffic patterns and behavior to identify thousands
of different botnet families and outbreak types.
The ThreatCloud repository contains more than 250 million addresses that were analyzed for bot
discovery and more than 2,000 different botnet communication patterns. The ThreatSpect engine
uses this information to classify bots and viruses.
The Security Gateway gets automatic binary signature and reputation updates from the
ThreatCloud repository. It can query the cloud for new, unclassified IP/URL/DNS resources that it
finds.
The layers of the ThreatSpect engine:
• Reputation - Analyzes the reputation of URLs, IP addresses and external domains that
computers in the organization access. The engine searches for known or suspicious activity,
such as a C&C.
• Signatures - Detects threats by identifying unique patterns in files or in the network.
• Suspicious Mail Outbreaks - Detects infected machines in the organization based on analysis
of outgoing mail traffic.
• Behavioral Patterns - Detects unique patterns that indicate the presence of a bot. For
example, how a C&C communicates with a bot-infected machine.

Anti-Virus
Malware is a major threat to network operations that has become increasingly dangerous and
sophisticated. Examples include worms, blended threats (combinations of malicious code and
vulnerabilities for infection and dissemination) and trojans.
The Anti-Virus Software Blade scans incoming and outgoing files to detect and prevent these
threats, and provides pre-infection protection from malware contained in these files. The
Anti-Virus blade is also supported by the Threat Prevention API.
Security Management Administration Guide R80.20 | 179
Creating a Threat Prevention Policy

The Anti-Virus Software Blade:


• Identifies malware in the organization using the ThreatSpect engine and ThreatCloud
repository:
• Prevents malware infections from incoming malicious files types (Word, Excel, PowerPoint,
PDF, etc.) in real-time. Incoming files are classified on the gateway and the result is then
sent to the ThreatCloud repository for comparison against known malicious files, with
almost no impact on performance.
• Prevents malware download from the internet by preventing access to sites that are known
to be connected to malware. Accessed URLs are checked by the gateway caching
mechanisms or sent to the ThreatCloud repository to determine if they are permissible or
not. If not, the attempt is stopped before any damage can take place.
• Uses the ThreatCloud repository to receive binary signature updates and query the repository
for URL reputation and Anti-Virus classification.

SandBlast
Cyber-threats continue to multiply and now it is easier than ever for criminals to create new
malware that can easily bypass existing protections. On a daily basis, these criminals can change
the malware signature and make it virtually impossible for signature-based products to protect
networks against infection. To get ahead, enterprises need a multi-faceted prevention strategy
that combines proactive protection that eliminates threats before they reach users. With Check
Point's Threat Emulation and Threat Extraction technologies, SandBlast provides zero-day
protection against unknown threats that cannot be identified by signature-based technologies.

Threat Emulation
Threat Emulation gives networks the necessary protection against unknown threats in web
downloads and e-mail attachments. The Threat Emulation engine picks up malware at the exploit
phase, before it enters the network. It quickly quarantines and runs the files in a virtual sandbox,
which imitates a standard operating system, to discover malicious behavior before hackers can
apply evasion techniques to bypass the sandbox.
Threat Emulation receives files through these methods of delivery:
• E-mail attachments transferred using the SMTP or SMTPS protocols.
• Web downloads.
• Files sent to Threat Extraction through the Threat Prevention API.
When emulation is done on a file:
• The file is opened on more than one virtual computer with different operating system
environments.
• The virtual computers are closely monitored for unusual and malicious behavior, such as an
attempt to change registry keys or run an unauthorized process.
• Any malicious behavior is immediately logged and you can use Prevent mode to block the file
from the internal network.
• The cryptographic hash of a new malicious file is saved to a database and the internal network
is protected from that malware.
• After the threat is caught, a signature is created for the new (previously unknown) malware
which turns it into a known and documented malware. The new attack information is

Security Management Administration Guide R80.20 | 180


Creating a Threat Prevention Policy

automatically shared with Check Point ThreatCloud to block future occurrences of similar
threats at the gateway.
If the file is found not to be malicious, you can download the file after the emulation is complete.
Learn more about Threat Emulation.

Threat Extraction
Threat Extraction is supported on R77.30 and higher.
The Threat Extraction blade extracts potentially malicious content from files before they enter the
corporate network. To remove possible threats, the Threat Extraction does one of these two
actions:
• Creates a safe copy of the file by converting it to PDF, or
• Extracts exploitable content out of the file.
Threat Extraction receives files through these methods of delivery:
• E-mail attachments received through the Mail transfer Agent (on page 206).
• Files sent to Threat Extraction through the Threat Prevention API.
Threat Extraction delivers the reconstructed file to users and blocks access to the original
suspicious version, while Threat Emulation analyzes the file in the background. This way, users
have immediate access to content, and can be confident they are protected from the most
advanced malware and zero-day threats.
Threat Emulation runs in parallel to Threat Extraction for version R80.10 and higher.
Here are examples for exploitable content in Microsoft Office Suite Applications and PDF files:
• Queries to databases where the query contains a password in the clear
• Embedded objects
• Macros and JavaScript code that can be exploited to propagate viruses
• Hyperlinks to sensitive information
• Custom properties with sensitive information
• Automatic saves that keep archives of deleted data
• Sensitive document statistics such as owner, creation and modification dates
• Summary properties
• PDF documents with:
• Actions such as launch, sound, or movie URIs
• JavaScript actions that run code in the reader's Java interpreter
• Submit actions that transmit the values of selected fields in a form to a specified URL
• Incremental updates that keep earlier versions of the document
• Document statistics that show creation and modification dates and changes to hyperlinks
• Summarized lists of properties
Before you enable the Threat Extraction blade, you must deploy the gateway as a Mail Transfer
Agent.

Security Management Administration Guide R80.20 | 181


Creating a Threat Prevention Policy

Assigning Administrators for Threat Prevention


You can control the administrator Threat Prevention permissions with a customized Permission
Profile. The customized profile can have different Read/Write permissions for Threat Prevention
policy, settings, profiles and protections.

Analyzing Threats
Networks today are more exposed to cyber-threats than ever. This creates a challenge for
organizations in understanding the security threats and assessing damage.
SmartConsole helps the security administrator find the cause of cyber-threats, and remediate the
network.
The Logs & Monitor > Logs view presents the threats as logs.
The other views in the Logs & Monitor view combine logs into meaningful security events. For
example, malicious activity that occurred on a host in the network in a selected time interval (the
last hour, day, week or month). They also show pre- and post-infections statistics.
You can create rich and customizable views and reports for log and event monitoring, which
inform key stakeholders about security activities. For each log or event, you can see a lot of useful
information from the ThreatWiki and IPS Advisories about the malware, the virus or the attack.

Security Management Administration Guide R80.20 | 182


CHAPTER 10

Out-of-the-Box Protection from Threats


In This Section:
Getting Quickly Up and Running with the Threat Prevention Policy .......................183
Enabling the Threat Prevention Software Blades ...................................................183
Installing the Threat Prevention Policy....................................................................186
Introducing Profiles ..................................................................................................186
Optimized Protection Profile Settings .....................................................................187
Predefined Rule ........................................................................................................188

Getting Quickly Up and Running with the Threat Prevention Policy


You can configure Threat Prevention to give the exact level of protection that you need, but you can
also configure it to provide protection right out of the box.

To get quickly up and running with Threat Prevention:


1. Enable the Threat Prevention blades on the gateway.
2. Install Policy.
After you enable the blades and install the policy, this rule is generated:

Name Protected Scope Action Track Install On


Out-of-the-box *Any Optimized Log *Policy Targets
Threat Packet
Prevention Capture
policy

Notes:
• The Optimized (on page 187) profile is installed by default.
• The Protection/Site column is used only for protection exceptions.

Enabling the Threat Prevention Software Blades


Enabling the IPS Software Blade
Enable the IPS Software Blade on the Security Gateway.

To enable the IPS Software Blade:


1. In the Gateways & Servers view, double-click the gateway object.
The General Properties window opens.
2. In the General Properties > Network Security tab, click IPS.
3. Follow the steps in the wizard that opens.
4. Click OK.
5. Click OK in the General Properties window.
6. Install Policy (on page 186).

Security Management Administration Guide R80.20 | 183


Creating a Threat Prevention Policy

Enabling the Anti-Bot Software Blade


To enable the Anti-Bot Software Blade on a Security Gateway:
1. In the Gateways & Servers view, double-click the gateway object.
The General Properties window of the gateway opens.
2. From the Network Security tab, select Anti-Bot.
The Anti-Bot and Anti-Virus First Time Activation window opens.
3. Select an activation mode option:
• According to the Anti-Bot and Anti-Virus policy - Enable the Anti-Bot Software Blade and
use the Anti-Bot settings of the Threat Prevention profile in the Threat Prevention policy.
• Detect only - Packets are allowed, but the traffic is logged according to the settings in the
Threat Prevention Rule Base.
4. Click OK.
5. Install Policy (on page 186).

Enabling the Anti-Virus Software Blade


Enable the Anti-Virus Software Blade on a Security Gateway.

To enable the Anti-Virus Software Blade:


1. In the Gateways & Servers view, double-click the gateway object.
The General Properties window of the gateway opens.
2. From the Network Security tab, click Anti-Bot.
The Anti-Bot and Anti-Virus First Time Activation window opens.
3. Select one of the activation mode options:
• According to the Anti-Bot and Anti-Virus policy - Enable the Anti-Virus Software Blade and
use the Anti-Virus settings of the Threat Prevention profile in the Threat Prevention policy.
• Detect only - Packets are allowed, but the traffic is logged according to the settings in the
Threat Prevention Rule Base.
4. Click OK
5. Install Policy (on page 186).

Enabling SandBlast Threat Emulation Software Blade


To enable the Threat Emulation Blade:
1. In the Gateways & Servers view, double-click the Security Gateway object.
The Gateway Properties window opens.
2. From the Network Security tab, select SandBlast Threat Emulation.
The Threat Emulation First Time Configuration Wizard opens and shows the Emulation
Location page.
3. Select the Emulation Location.
4. Click Next.
The Summary page opens.
5. Click Finish to enable Threat Emulation and close the First Time Configuration Wizard.
6. Click OK.

Security Management Administration Guide R80.20 | 184


Creating a Threat Prevention Policy

The Gateway Properties window closes.


7. Install Policy (on page 186).

Using Cloud Emulation


Files are sent to the Check Point ThreatCloud over a secure SSL connection for emulation. The
emulation in the ThreatCloud is identical to emulation in the internal network, but it uses only a
small amount of CPU, RAM, and disk space of the Security Gateway. The ThreatCloud is always
up-to-date with all available operating system environments.
Best Practice - For ThreatCloud emulation, it is necessary that the Security Gateway connects to
the Internet. Make sure that the DNS and proxy settings are configured correctly in Global
Properties.

Sample Workflow - Creating a Threat Emulation Profile


This is a sample workflow to create a Threat Prevention profile that includes Threat Emulation.

To create a Threat Prevention profile for Threat Emulation:


1. In SmartConsole, select Security Policies > Threat Prevention.
2. From the Threat Tools section, click Profiles.
The Profiles page opens.
3. Click New.
4. Enter the Name for the Threat Prevention profile.
5. In Blades Activation, select the Threat Prevention Software Blades.
6. Configure the Activation Mode settings for the traffic.
7. From the Threat Emulation Settings page, set the Prevent and Ask UserCheck settings.
8. From the navigation tree, click Threat Emulation > General.
9. Configure the Threat Emulation Protected Scope for this profile, and define how traffic from
external and internal networks is sent for emulation.
10. Select one or more Protocols for this profile.
The Software Blade runs emulation only for files and traffic that match the selected protocols.
11. Configure the File Types for this profile.
The Software Blade runs emulation only for files that match the selected file types.
12. Click OK and install Policy.

Enabling the SandBlast Threat Extraction Blade


To enable the Threat Extraction Blade:
1. In the Gateways & Servers view, double-click the gateway object.
The General Properties window of the gateway opens
2. Go to the Network Security tab, and select Threat Extraction.
The Threat Extraction First Time Activation Wizard opens:
a) Configure the Domain and Next Hop.
b) Click Next.
c) Click Finish.

Security Management Administration Guide R80.20 | 185


Creating a Threat Prevention Policy

3. Enable the gateway as a Mail Transfer Agent (MTA).


Note - In a ClusterXL High Availability environment, do this once for the cluster object.

Configuring LDAP
If you use LDAP for user authentication, you must activate User Directory for Security Gateways.

To activate User Directory:


1. Open SmartConsole > Global Properties.
2. On the User Directory page, select Use User Directory for Security Gateways.
3. Click OK.

Installing the Threat Prevention Policy


The IPS, Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction Software Blades have a
dedicated Threat Prevention policy. You can install this policy separately from the policy
installation of the Access Control Software Blades. Install only the Threat Prevention policy to
minimize the performance impact on the Security Gateways.

To install the Threat Prevention policy:


1. From the Global toolbar, click Install Policy.
The Install Policy window opens showing the installation targets (Security Gateways).
2. Select Threat Prevention.
3. Select Install Mode:
• Install on each selected gateway independently - Install the policy on the selected
Security Gateways without reference to the other targets. A failure to install on one
Security Gateway does not affect policy installation on other gateways.
If the gateway is a member of a cluster, install the policy on all the members. The Security
Management Server makes sure that it can install the policy on all the members before it
installs the policy on one of them. If the policy cannot be installed on one of the members,
policy installation fails for all of them.
• Install on all selected gateways, if it fails do not install on gateways of the same version -
Install the policy on all installation targets. If the policy fails to install on one of the Security
Gateways, the policy is not installed on other targets of the same version.
4. Click OK.

Introducing Profiles
Check Point Threat Prevention provides instant protection based on pre-defined Threat Prevention
Profiles. You can also configure a custom Threat Prevention profile to give the exact level of
protection that the organization needs.
When you install a Threat Prevention policy on the Security Gateways, they immediately begin to
enforce IPS protection on network traffic.
A Threat Prevention profile determines which protections are activated, and which Software
Blades are enabled for the specified rule or policy. The protections that the profile activates
depend on the:
• Performance impact of the protection.

Security Management Administration Guide R80.20 | 186


Creating a Threat Prevention Policy

• Severity of the threat.


• Confidence that a protection can correctly identify an attack.
• Settings that are specific to the Software Blade.
A Threat Prevention profile applies to one or more of the Threat Prevention Software Blades: IPS,
Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction.
A profile is a set of configurations based on:
• Activation settings (prevent, detect, or inactive) for each confidence level of protections that the
ThreatSpect engine analyzes
• IPS Settings
• Anti-Bot Settings
• Anti-Virus Settings
• Threat Emulation Settings
• Threat Extraction Settings
• Indicator configuration
• Malware DNS Trap configuration
• Links inside mail configuration
Without profiles, it would be necessary to configure separate rules for different activation settings
and confidence levels. With profiles, you get customization and efficiency.
SmartConsole includes these default Threat Prevention profiles:
• Optimized - Provides excellent protection for common network products and protocols against
recent or popular attacks
• Strict - Provides a wide coverage for all products and protocols, with impact on network
performance
• Basic - Provides reliable protection on a range of non-HTTP protocols for servers, with
minimal impact on network performance

Optimized Protection Profile Settings


The Optimized profile is activated by default, because it gives excellent security with good gateway
performance.
These are the goals of the Optimized profile, and the settings that achieve those goals:

Goal Parameter Setting


Apply settings to all the Blades Activation Activate the profile for IPS, Anti-Bot,
Threat Prevention Software Anti-Virus, Threat Emulation and Threat
Blades Extraction.
Do not have a critical effect on Performance impact Activate protections that have a Medium
performance or lower effect on performance.
Protect against important Severity Protect against threats with a severity of
threats Medium or above.

Security Management Administration Guide R80.20 | 187


Creating a Threat Prevention Policy

Goal Parameter Setting


Reduce false-positives Confidence Set to Prevent the protections with an
attack confidence of Medium or High.
Set to Detect the protections with a
confidence of Low.

Predefined Rule
When you enable one of the Threat Prevention Software Blades, a predefined rule is added to the
Rule Base. The rule defines that all traffic for all network objects, regardless of who opened the
connection, (the protected scope value equals any) is inspected for all protections according to the
Optimized profile. By default, logs are generated and the rule is installed on all Security Gateways
that use a Threat Prevention Software Blade.
The result of this rule (according to the Optimized profile) is that:
• When an attack meets the below criteria, the protections are set to Prevent mode:
• Confidence Level - Medium or above
• Performance Impact - Medium or above
• Severity - Medium or above
• When an attack meets the below criteria, the protections are set to Detect mode:
• Confidence Level - Low
• Performance Impact - Medium or above
• Severity - Medium or above
Use the Logs & Monitor page to show logs related to Threat Prevention traffic. Use the data there
to better understand the use of these Software Blades in your environment and create an effective
Rule Base. You can also directly update the Rule Base from this page.
You can add more exceptions that prevent or detect specified protections or have different
tracking settings.

Security Management Administration Guide R80.20 | 188


CHAPTER 11

The Threat Prevention Policy


In This Section:
Workflow for Creating a Threat Prevention Policy ..................................................189
Threat Prevention Policy Layers ..............................................................................189
Threat Prevention Rule Base ...................................................................................192

Workflow for Creating a Threat Prevention Policy


Threat Prevention lets you customize profiles that meet the needs of your organization.
Ideally, you might want to set all protections to Prevent in order to protect against all potential
threats. However, to let your gateway processes focus on handling the most important traffic and
report only the most concerning threats, you need to determine the most effective way to apply the
Threat Prevention settings.
When you define a new Threat Prevention profile, you can create a Threat Prevention Policy which
activates only the protections that you need and prevents only the attacks that most threaten your
network.
This is the high-level workflow to create and deploy a Threat Prevention policy:
1. Enable the Threat Prevention Software Blades on the Security Gateways.
2. Update the IPS database and Malware database with the latest protections.
3. Optional: Create Policy Packages.
4. Optional: For each Policy Package, create Threat Prevention Policy Layers.
Note - For each Policy Layer, configure a Threat Prevention Rule Base with the Threat
Prevention profile as the Action of the rule.
5. Install the Threat Prevention policy.

Threat Prevention Policy Layers


You can create a Threat Prevention Rule Base with multiple Ordered Layers. Ordered Layers help
you organize your Rule Base to best suit your organizational needs. You can divide the Ordered
Layers by services or networks. Each Ordered Layer calculates its action separately from the
other Layers. In case of one Layer in the policy package, the rule enforced is the first rule
matched. In case of multiple Layers:
• If a connection matches a rule in only one Layer, then the action enforced is the action in that
rule.
• When a connection matches rules in more than one Layer, the gateway enforces the strictest
action and settings.
Important - When the Threat Prevention blades run in MTA mode, the gateway enforces the
automatic MTA rule, which is created when MTA is enabled on the gateway.

Action Enforcement in Multiple-Layered Security Policies


These examples show which action the gateway enforces when a connection matches rules in
more than one Ordered Layers.

Security Management Administration Guide R80.20 | 189


Creating a Threat Prevention Policy

Example 1
Data Center Layer Corporate LAN Layer
Rule matched Rule 3 Rule 1
Profile action Prevent Detect

Enforced action: Prevent

Example 2
Data Center Layer Corporate LAN Layer
Rule matched Rule 3 Rule 1
Profile action Prevent Detect
Exception for protection X Inactive -

Enforced action for protection X: Detect

Example 3
Data Center Layer Corporate LAN Layer

Rule matched Rule 3 Rule 1


Profile action Prevent Detect
Override for protection X Detect -
Exception for protection X Inactive -

Exception is prior to override and profile action. Therefore, the action for the Data Center Layer is
Inactive.
The action for the Corporate LAN Layer is Detect.
Enforced action for protection X: Detect.

Example 4
Data Center Layer Corporate LAN Layer
Rule matched Rule 3 Rule 1
Profile action Deep Scan all files Process specific file type families: Inspect doc files
and Drop rtf files.

Enforced action: Deep Scan doc files and Drop rtf files.

Example 5
MIME nesting level and Maximum archive scanning time
The strictest action is:
Block combined with the minimum nesting level/scanning time, or
Allow combined with the maximum nesting level/scanning time, or
If both Block and Allow are matched, the enforced action is Block.

Security Management Administration Guide R80.20 | 190


Creating a Threat Prevention Policy

Example 6
UserCheck

HR Layer Finance Layer Data Center Layer 3


Rule matched Rule 3 Rule 1 Rule 4
Profile action Detect Prevent Prevent
Configured page Page A Page B Page C

The first Layer with the strictest action is enforced.


Enforced Action: Prevent with UserCheck Page B.

Creating a New Ordered Layer


This section explains how to create a new Threat Prevention Ordered Layer. You can configure
reuse of Threat Prevention Ordered Layers in different Policy Packages, and set different
administrator permissions per Threat Prevention Layer.

To create a new Threat Prevention Layer:


1. In SmartConsole, go to Threat Prevention.
2. Right-click Policy and select Edit Policy.
3. In the General tab, go to Threat Prevention and click the + sign.
4. Select New Layer.
The New Threat Prevention Layer window opens
5. Enter the Layer Name.
6. Optional: In the General tab, in the Sharing area, you can configure reuse of the layer in
different policy packages. Select Multiple policies and rules can use this layer.
Note - you cannot share the first Threat Prevention layer because it contains the MTA and ICAP
rules. If this layer is shared with other policy packages then there can be conflicting MTA and
ICAP rules in the same policy package.
7. In the Permissions tab, select the permission profiles that can edit this layer.
Note - There is no need to add permission profiles that are configured to edit all layers.
8. Click OK.

Threat Prevention Layers in Pre-R80 Gateways


In pre-R80 versions, the IPS Software Blade was not part of the Threat Prevention Policy, and was
managed separately. In R80.xx versions, the IPS Software Blade is integrated into the Threat
Prevention Policy.
When you upgrade SmartConsole to R80.xx from earlier versions, with some Security Gateways
upgraded to R80.xx, and other Security Gateways remaining in previous versions:
• For pre-R80 gateways with IPS and Threat Prevention Software Blades enabled, the policy is
split into two parallel layers: IPS and Threat Prevention.
To see which Security Gateway enforces which IPS profile, look at the Install On column in the
IPS Layer.
• R80.xx gateways are managed separately, based on the R80 or higher Ordered Layers (on page
189).

Security Management Administration Guide R80.20 | 191


Creating a Threat Prevention Policy

Best Practice - For better performance, we recommend that you use the Optimized profile when
you upgrade to R80 or higher from earlier versions.

Threat Prevention Rule Base


Each Threat Prevention Layer contains a Rule Base. The Rule Base determines how the system
inspects connections for malware.
The Threat Prevention rules use the Malware database and network objects. Security Gateways
that have Identity Awareness enabled can also use Access Role objects as the Protected Scope in
a rule. The Access Role objects let you easily make rules for individuals or different groups of
users.
There are no implied rules in this Rule Base, traffic is allowed or not allowed based on how you
configure the Rule Base. For example, A rule that is set to the Prevent action, blocks activity and
communication for that malware.

Security Management Administration Guide R80.20 | 192


CHAPTER 12

Creating Threat Prevention Rules


In This Section:
Configuring Mail Settings .........................................................................................193
Configuring IPS Profile Settings ..............................................................................197
Configuring Anti-Virus Settings ...............................................................................198
Configuring Anti-Bot Settings ..................................................................................200
Configuring Threat Emulation Settings ...................................................................203
Configuring Threat Extraction Settings .................................................................206
Configuring a Malware DNS Trap ............................................................................208
Exception Rules ........................................................................................................209

Create and manage the policy for the Threat Prevention Software Blade as part of the Threat
Prevention Policy.
• The Threat Prevention page shows the rules and exceptions for the Threat Prevention policy.
The rules set the Threat profiles for the network objects or locations defined as a protected
scope.
Click the Add Rule button to get started.
• You can configure the Threat Prevention settings in the Threat Prevention profile for the
specified rule.
• To learn about bots and protections, look through the ThreatWiki.
Best Practice - Disable a rule when you work on it. Enable the rule when you want to use it.
Disabled rules do not affect the performance of the Gateway. To disable a rule, right click in the
No. column of the rule and select Disable.

Configuring Mail Settings


General
General
• Emulate emails for malicious content (requires Threat Emulation) - When this option and the
Threat Emulation blade are enabled, the Threat Emulation blade scans SMTP traffic.
• Scan emails for viruses (requires Anti-Virus) - When this option and the Anti-Virus blade are
enabled, the Anti-Virus blade scans SMTP traffic.
• Extract potentially malicious attachments (requires Threat Extraction) - When this option
and the Threat Extraction blade are enabled, the Threat Extraction blade scans SMTP traffic.
Malicious Email Policy on MTA Gateways
In this section you can decide whether to block or allow an email which was found malicious. If you
allow the email, you can select any or all of these options:
Remove attachments and links - This option is selected by default. You can replace a link or an
attachment found malicious with a neutralized version of the links and attachments. The
neutralized email version is sent to the recipient with a customizable template. Click Configure to
edit the template:

Security Management Administration Guide R80.20 | 193


Creating a Threat Prevention Policy

• Malicious Attachments - Replaced by a neutralized txt file. You can customize the message
which the user receives. Click Insert Field to add more file-related information to your
message (for example: file name or MD5 hash).
• Failed to Scan Attachments - If the scanning of the attachment fails and fail mode is set to
fail-close, the attachment is replaced with a txt attachment. If fail mode is set to fail-open,
the original attachment is allowed. Click Insert Field to add more file-related information
to your message (for example: file name or MD5 hash).
• Malicious Links - Replaced by a neutralized link. Click Insert Field to add more
link-related information to your message, for example, neutralized url.
• Add an X-Header to the email - Tag the email found malicious with an X-Header. The
X-Header format is: "X-Check Point-verdict: <verdict>; confidence: <confidence>". For
example: "X-Check Point-verdict: malicious; confidence: high". With this option, you can
configure the MTA Next Hop to quarantine all emails with a specific X-Header.
• Add a prefix to the email subject - Adds a prefix to the subject of an email found malicious. For
example: you can add a warning message that the email is malicious. Click Configure to edit
the prefix.
• Add customized text to the email body - This option adds a section at the beginning of the
email body, based on a customizable template, with an optional placeholder for the verdicts of
the links and attachments found malicious or failed to be scanned. The links are given in their
neutralized versions, and attachments are only given by file names. Click Configure to edit the
template.
Send a copy to the following list - This option is available both if you allow or block the malicious
email. With this option, the original email (with the malicious attachments and links) is attached to
a new email, which contains: the verdict list with the neutralized links and attachment file names,
and the SMTP envelope information. You can configure the email content on the gateway. You can
use this option for research purposes. For example: The Incident Response Team needs to inquire
the emails received in the organization for improved security and protection.

Use Case
The configuration in the Mail page lets you block or allow malicious emails. However, you do not
want to configure a global decision regarding all malicious emails. You prefer to make a decision
per each email separately, on a case-by-case basis. For that purpose, you need to create a system
in which Threat Emulation allows the emails, but does not send them to the recipient right away.
Instead, it puts them in a container where you can check them and then decide whether to block or
allow them.

To configure external quarantine for malicious emails:


In SmartConsole:
1. Enable MTA on your gateway.
2. Clone the Profile you wish to configure and rename it.
3. In the new profile, go to Mail > General > Malicious Email Policy on MTA Gateways and select
Allow the email.
4. Clear Remove attachments and links.
5. Select Add an X-Header to the email.
Note - When you add an X-Header to the email, the rest of the email is kept in the email's
original form. The other options: Remove attachments and links, Add a prefix to the email

Security Management Administration Guide R80.20 | 194


Creating a Threat Prevention Policy

subject and Add customized text to the email body, change the email, and therefore must be
cleared.
6. Click OK.
7. Install Policy.
In the Next Hop:
1. Configure a rule which quarantines all emails which were marked with an X-Header by the
MTA.
You can now see the emails in the Next Hop in their original forms and examine them. After you
examine the emails in the Next Hop, you can decide whether to allow or block them.

Exceptions
You can exclude specific email addresses from the Threat Emulation or Threat Extraction
protections.

To exclude emails from Threat Emulation:


1. In Emulation Exceptions, click Configure.
2. In the Recipients section, click the + button to enter one or more emails.
Emails and attachments that are sent to these recipients will not be sent for emulation.
3. In the Senders section, click the + button to enter one or more emails.
Emails and attachments that are received from these senders will not be sent for emulation.
Note - You can use a wildcard character to exclude more than one email address from a
domain.
4. Click OK.
Note - If you want to do emulation on outgoing emails, make sure that you set the Protected Scope
to Inspect incoming and outgoing files.

To exclude emails from Threat Extraction:


1. In Extraction Exclusion/Inclusion:
• Select Scan all emails (selected by default) and click Exceptions.
Click the + button to exclude specific recipients, users, groups or senders.
• Select Scan mail only for specific users or groups and click Configure.
Click the Add button to exclude specific User Groups, Recipients or Senders.
2. Click OK.
Examples:
A user is an object that can contain an email address with other details.
A group is an AD group or an LDAP group of users
A recipient is an email address only.
Important: In the main SmartConsole menu > Global Properties > User Directory, make sure that
you selected Use User Directory for Security Gateways.

Security Management Administration Guide R80.20 | 195


Creating a Threat Prevention Policy

Signed Email Attachments


Signed emails are not encrypted, but the mail contents are signed to authenticate the sender. If
the received email differs from the email that was sent, the recipient gets a warning, and the
digital signature is no longer valid.
Clean replaces the original attachment with an attachment cleaned of threats, or converts the
attachment to PDF form. Both actions invalidate the digital signature. If the attachment does not
include active content, the mail remains unmodified and the digital signature valid.
Allow does not change the email. The digital signature remains valid. Select this option to prevent
altering digital signatures.

MIME Nesting
This is an optional configuration. In this section, you can configure the maximum number of MIME
nesting levels to be scanned (A nesting level is an email within an email). These settings are the
same for Anti-Virus, Threat Emulation and Threat Extraction.
• Maximum MIME nesting is (levels) - Set the maximum number of levels in the email which the
engine scans.
• When nesting level is exceeded (action on file) - If there are more MIME nested levels than
the configured amount, select to Block or Allow the email.

Configuring Inspection of Links Inside Mail


Inspection of Links Inside Mail scans URL links in email messages. Inspection of Links Inside
Mail is on by default, and is supported with the Anti-Virus, Anti-Bot and Threat Emulation blades.
Inspection of Links Inside Mail scans incoming mail with the Anti-Virus Software Blade and
outgoing mail with Anti-Bot Software Blade. For the Threat Emulation blade, only URL links to
files are scanned. You must enable MTA for Inspection of Links Inside Mail to work with the Threat
Emulation blade.
On this page, you can configure these settings:
• Inspect first <number> (B) of email messages
• Inspect first <number> URLs in email messages

To turn off Inspection of Links Inside Mail:


1. Go to Security Policies > Threat Prevention > Threat Tools > Protections.
2. Right-click on a Links Inside Mail protection, and select Inactive Selected.
Note - For each Software Blade (Anti-Bot and Anti-Virus) you must turn off the Links Inside
Mail separately.

To turn on Inspection of Links Inside Mail:


1. Go to Security Policies > Threat Prevention > Threat Tools > Protections.
2. Right-click on a Links Inside Mail protection, and select one of these -
• Prevent Selected
• Detect Selected

Security Management Administration Guide R80.20 | 196


Creating a Threat Prevention Policy

Configuring IPS Profile Settings


To configure IPS settings for a Threat Prevention profile:
1. In SmartConsole, select Security Policies > Threat Prevention.
2. From the Threat Tools section, click Profiles.
The Profiles page opens.
3. Right-click the profile, and click Edit.
4. From the navigation tree, click IPS > Additional Activation.
5. Configure the customized protections for the profile.
6. From the navigation tree, click IPS > Updates.
7. Configure the settings for newly downloaded IPS protections (on page 197).
8. If you import IPS profiles from a pre-R80 deployment:
a) From the navigation tree, click IPS > Pre-R80 Settings.
b) Activate the applicable Client and Server protections (on page 198).
c) Configure the IPS protection categories to exclude from this profile (on page 198).
Note - These categories are different from the protections in the Additional Activation page.
9. Click OK.
10. Install Policy.

Updates
There are numerous protections available in IPS. It takes time to become familiar with those that
are relevant to your environment. Some are easily configured for basic security and can be safely
activated automatically.
In the Threat Prevention profile, you can configure an updates policy for IPS protections that were
newly updated. You can do this with the IPS > Updates page in the Profiles navigation tree. Select
one of these settings for Newly Updated Protections:
• Active - According to profile settings - Selected by default. Protections are activated
according to the settings in the General page of the Profile. This is the Check Point
recommended configuration.
Set activation as staging mode - Newly updated protections remain in staging mode until you
change their configuration. The default action for protections in staging mode is Detect. You
can change the action manually in the IPS Protections page.
Click Configure to exclude specific protections from staging mode.
• Inactive - Newly updated protections are not activated
Best Practice - In the beginning, allow IPS to activate protections based on the IPS policy. During
this time, you can analyze the alerts that IPS generates and how it handles network traffic, while
you minimize the impact on the flow of traffic. Then you can manually change the protection
settings to suit your needs.

Security Management Administration Guide R80.20 | 197


Creating a Threat Prevention Policy

Pre-R80 Settings
The Pre-R80 Settings are relevant for the pre-R80 gateways only.

Protections Activation
Activate protections of the following types:
• Client Protections - Select to activate protections that protect only clients (for example,
personal computers).
• Server Protections - Select to activate protections that protect only servers.
If a network has only clients or only servers, you can enhance gateway performance by
deactivation of protections. If you select Client Protections and Server Protections, all
protections are activated, except for those that are:
• Excluded by the options selected here
• Application Controls or Engine Settings
• Defined as Performance Impact — Critical
Excluded Protections Categories
Do not activate protections of the following categories - The IPS protection categories you select
here are not automatically activated. They are excluded from the Threat Prevention policy rule
that has this profile in the action of the Rule Base.

Configuring Anti-Virus Settings


You can configure Threat Prevention to exclude files from inspection, such as internal emails and
internal file transfers. These settings are based on the interface type (internal or external, as
defined in SmartConsole) and traffic direction (incoming or outgoing).
Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces
are configured correctly. To do this:
1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.
The gateway window opens and shows the General Properties page.
2. From the navigation tree, click Network Management and then double-click a DMZ interface.
3. In the General page of the Interface window, click Modify.
4. In the Topology Settings window, click Override and Interface leads to DMZ.
5. Click OK and close the gateway window.
Perform this procedure for each interface that goes to the DMZ.

You can configure these Anti-Virus settings in the Anti-Virus page:


• Anti-Virus UserCheck Settings:
• Prevent - Select the UserCheck message that opens for a Prevent action.
• Ask - Select the UserCheck message that opens for an Ask action.
• Protected Scope:
• Inspect incoming files from:
Sends only incoming files from the specified interface type for inspection. Outgoing files
are not inspected. Select an interface type from the list:
 External - Inspect incoming files from external interfaces. Files from the DMZ and
internal interfaces are not inspected.
Security Management Administration Guide R80.20 | 198
Creating a Threat Prevention Policy

 External and DMZ - Inspect incoming files from external and DMZ interfaces. Files
from internal interfaces are not inspected.
 All - Inspect all incoming files from all interface types.
• Inspect incoming and outgoing files - Sends all incoming and outgoing files for inspection.
• The Protocols that Anti-Virus scans:
• HTTP
• Mail (SMTP) - Click Mail to configure the SMTP traffic inspection. This links you to the Mail
(on page 193) page of the Profile settings.
• File Types:
• Process file types known to contain malware
• Process all file types - Select Enable deep inspection scanning, if needed. Remember, it
impacts performance.
• Process specific file types families
To configure the specific file type families:
a) Click Configure.
b) In the File Types Configuration window, for each file type, select the Anti-Virus action for
the file type.
c) Click OK to close the File Types Configuration window.
• Archives - You can configure the Anti-Virus profile to enable archive scanning (on page 199).

Enabling Archive Scanning


You can configure the Anti-Virus settings to enable archive scanning. The Anti-Virus engine
unpacks archives and applies proactive heuristics. The use of this feature impacts network
performance.
Select Enable Archive scanning (impacts performance) and click Configure:
1. Stop processing archive after (seconds) - Sets the amount in seconds to stop processing the
archive. The default is 30 seconds.
2. When maximum time is exceeded (action on file) - Sets to block or allow the file when the
time for processing the archive is exceeded. The default setting is Allow.

Blocking Viruses
To block viruses and malware in your organization:
1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.
2. In the General Properties page, select the Anti-Virus Software Blade.
The First Time Activation window opens.
3. Select According to the Anti-Bot and Anti-Virus policy and click OK.
4. Close the gateway Properties window and publish the changes.
5. Click Security Policies > Threat Prevention > Policy > Threat Prevention.
6. Click Add Rule.
A new rule is added to the Threat Prevention policy. The Software Blade applies the first rule
that matches the traffic.

Security Management Administration Guide R80.20 | 199


Creating a Threat Prevention Policy

7. Make a rule that includes these components:


• Name - Give the rule a name such as Block Virus Activity.
• Protected Scope - The list of network objects you want to protect. In this example, the Any
network object is used.
• Action - The Profile that contains the protection settings you want. The default profile is
Optimized.
• Track - The type of log you want to get when detecting malware on this scope. In this
example, keep Log and also select Packet Capture to capture the packets of malicious
activity. You will then be able to view the actual packets in SmartConsole > Logs & Monitor
> Logs.
• Install On - Keep it as All or choose specified gateways to install the rule on.
8. Install the Threat Prevention policy.

Configuring Anti-Bot Settings


Here you can configure the Anti-Bot UserCheck Settings:
• Prevent - Select the UserCheck message that opens for a Prevent action
• Ask - Select the UserCheck message that opens for an Ask action

Blocking Bots
To block bots in your organization, install this default Threat Policy rule that uses the Optimized
profile, or create a new rule.

Protected Scope Action Track Install On


*Any Optimized Log *Policy Targets
Packet Capture

To block bots in your organization:


1. In SmartConsole, click Gateways & Servers.
2. Enable the Anti-Bot Software Blade on the Gateways that protect your organization. For each
Gateway:
a) Double-click the Gateway object.
b) In the Gateway Properties page, select the Anti-Bot Software Blade.
The First Time Activation window opens.
c) Select According to the Anti-Bot and Anti-Virus policy
d) Click OK.
3. Click Security Policies > Threat Prevention > Policy > Threat Prevention.
You can block bots with the out-of-the-box Threat Prevention policy rule with the default
Optimized Profile.
Alternatively, add a new Threat Prevention rule:
a) Click Add Rule.
A new rule is added to the Threat Prevention policy. The Software Blade applies the first
rule that matches the traffic.

Security Management Administration Guide R80.20 | 200


Creating a Threat Prevention Policy

b) Make a rule that includes these components:


 Name - Give the rule a name such as Block Bot Activity.
 Protected Scope - The list of network objects you want to protect. By default, the Any
network object is used.
 Action - The Profile that contains the protection settings you want. The default profile is
Optimized.
 Track - The type of log you want to get when the gateway detects malware on this
scope.
 Install On - Keep it as Policy Targets or select Gateways to install the rule on.
4. Install the Threat Prevention policy (on page 186).

Monitoring Bot Activity


Scenario: I want to monitor bot activity in my organization without blocking traffic at all. How can I
do this?
In this example, you will create this Threat Prevention rule, and install the Threat Prevention
policy:

Name Protected Action Track Install On


Scope
Monitor *Any A profile that has these changes Log *Policy
Bot relative to the Optimized profile: Targets
activity Go to the General Policy pane >
Activation Mode section, and set all
Confidence levels to Detect.

To monitor all bot activity:


1. In SmartConsole, select Security Policies > Threat Prevention.
2. Create a new profile:
a) From the Threat Tools section, click Profiles.
The Profiles page opens.
b) Right-click a profile and select Clone.
c) Give the profile a name such as Monitoring_Profile.
d) Edit the profile, and under Activation Mode, configure all confidence level settings to
Detect.
e) Select the Performance Impact - for example, Medium or lower.
This profile detects protections that are identified as an attack with low, medium or high
confidence and have a medium or lower performance impact.
3. Create a new rule:
a) Click Threat Prevention > Policy > Threat Prevention.
b) Add a rule to the Rule Base.
The first rule that matches is applied.
c) Make a rule that includes these components:
 Name - Give the rule a name such as Monitor Bot Activity.
Security Management Administration Guide R80.20 | 201
Creating a Threat Prevention Policy

 Protected Scope - Keep Any so the rule applies to all traffic in the organization.
 Action - Right-click in this cell and select Monitoring_Profile.
 Track - Keep Log.
 Install On - Keep it as Policy Targets or choose Gateways to install the rule on.
4. Install the Threat Prevention policy (on page 186).

Disabling a Protection on One Server


Scenario: The protection Backdoor.Win32.Agent.AH blocks malware on windows servers. How can
I change this protection to detect for one server only?
In this example, create this Threat Prevention rule, and install the Threat Prevention policy:

Name Protected Protection/Site Action Track Install On


Scope
Monitor * Any - N/A A profile based on the Log Policy
Bot Optimized profile. Targets
Activity Edit this profile > go to the
General Policy pane> in the
Activation Mode section, set
every Confidence to Prevent.
Exclude Server_1 Backdoor.Win32.Agen Detect Log Server_1
t.AH

To add an exception to a rule:


1. In SmartConsole, click Threat Prevention > Policy > Layer.
2. Click the rule that contains the scope of Server_1.
3. Click the Add Exception toolbar button to add the exception to the rule. The gateway applies
the first exception matched.
4. Right-click the rule and select New Exception.
5. Configure these settings:
• Name - Give the exception a name such as Exclude.
• Protected Scope - Change it to Server_1 so that it applies to all detections on the server.
• Protection/Site - Click + in the cell. From the drop-down menu, click the category and
select one or more of the items to exclude.
Note - To add EICAR files as exceptions, you must add them as Whitelist Files. When you
add EICAR files through Exceptions in Policy rules, the gateway still blocks them, if archive
scanning is enabled.
• Action - Keep it as Detect.
• Track - Keep it as Log.
• Install On - Keep it as Policy Targets or select specified gateways to install the rule on.
6. Install Policy.

Security Management Administration Guide R80.20 | 202


Creating a Threat Prevention Policy

Configuring Threat Emulation Settings


Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces
are configured correctly. To do this:
1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.
The gateway window opens and shows the General Properties page.
2. From the navigation tree, click Network Management and then double-click a DMZ interface.
3. In the General page of the Interface window, click Modify.
4. In the Topology Settings window, click Override and Interface leads to DMZ.
5. Click OK and close the gateway window.
Do this procedure for each interface that goes to the DMZ.
If there is a conflict between the Threat Emulation settings in the profile and for the Security
Gateway, the profile settings are used.

To configure Threat Emulation settings for a Threat Prevention profile:


1. In SmartConsole, select Security Policies > Threat Prevention.
2. From the Threat Tools section, click Profiles.
The Profiles page opens.
3. Right-click the profile, and click Edit.
4. From the navigation tree, go to Threat Emulation and configure these settings:
a) General Threat Emulation Settings (on page 203).
b) Emulation Environment (on page 204)
c) Advanced Threat Emulation Settings (on page 205).
5. Click OK and close the Threat Prevention profile window.
6. Install the Threat Prevention policy.

Selecting the Threat Emulation Action


What are the available emulation actions that I can use with a Threat Emulation profile?
• Prevent - Files do not go to the destination computer until emulation is completed. If Threat
Emulation discovers that a file contains malware, the malicious file does not enter the internal
network. Users can notice a delay when downloading a file, because they cannot download and
open the file until the emulation is complete.
• Detect - The file is sent to the destination and to Threat Emulation. If Threat Emulation
discovers that a file contains malware, the appropriate log action is done. Users receive all
files without delay.
Note - To estimate the system requirements and amount of file emulations for a network, go
to sk93598 http://supportcontent.checkpoint.com/solutions?id=sk93598.

Threat Emulation General Settings


On the Threat Emulation > General page, you can configure these settings:
• UserCheck Settings:
• Prevent - Select the UserCheck message that opens for a Prevent action
• Ask - Select the UserCheck message that opens for an Ask action
Security Management Administration Guide R80.20 | 203
Creating a Threat Prevention Policy

• Protected Scope. Select an interface type and traffic direction option:


• Inspect incoming files from the following interfaces:
Sends only incoming files from the specified interface type for inspection. Outgoing files
are not inspected. Select an interface type from the list:
 External - Inspect incoming files from external interfaces. Files from the DMZ and
internal interfaces are not inspected.
 External and DMZ - Inspect incoming files from external and DMZ interfaces. Files
from internal interfaces are not inspected.
 All - Inspect all incoming files from all interface types.
• Inspect incoming and outgoing files - Sends all incoming and outgoing files for inspection.
• Protocols to be emulated.
• HTTP
• Mail (SMTP) - Click Mail to configure the SMTP traffic inspection by the Threat Emulation
blade. This links you to the Mail (on page 193) page of the Profile settings.
• File Types. Here you can configure the Threat Emulation Action and Emulation Location for
each file type scanned by the Threat Emulation blade. Select one of these:
• Process all enabled file types - This option is selected by default. Click the blue link to see
the list of supported file types. Out of the supported file types, select the files to be scanned
by the Threat Emulation blade.
Note - you can find this list of supported file types also in Manage & Settings view > Blades
> Threat Prevention > Advanced Settings > Threat Emulation > File Type Support.
• Process specific file type families - Click Configure to change the action or emulation
location for the scanned file types.
To change the emulation action for a file type, click the applicable action in the Action
column and select one of these options:
 Inspect - The Threat Emulation blade scans these files.
 Bypass - Files of this type are considered safe and the Software Blade does not do
emulation for them.
To change the emulation location for a file type, click Emulation Location and select one of
these options:
 According to gateway - The Emulation Location is according to the settings defined in
the Gateway Properties window of each gateway.
 Locally - Emulation for these file types is done on the gateway.
 ThreatCloud - These file types are sent to the ThreatCloud for emulation.
• Archives - Block archives containing these prohibited file types. Click Configure to select the
prohibited file types. If a prohibited file type is in an archive, the gateway drops the archive.

Emulation Environment
You can use the Emulation Environment window to configure the emulation location and images
that are used for this profile:
• The Analysis Locations section lets you select where the emulation is done

Security Management Administration Guide R80.20 | 204


Creating a Threat Prevention Policy

• To use the Security Gateway settings for the location of the virtual environment, click
According to the gateway.
• To configure the profile to use a different location of the virtual environment, click Specify
and select the applicable option.
Note - In the Remote Emulation Appliances option, for R80.10 gateways with R80.10
Jumbo Hotfix Accumulator and R77.20 gateways, you can select multiple appliances for
remote emulation. For older gateways, you can select only one appliance for remote
emulation.
• The Environments section lets you select the operating system images on which the emulation
is run. If the images defined in the profile and the Security Gateway or Emulation appliance are
different, the profile settings are used.
These are the options to select the emulation images:
• To use the emulation environments recommended by Check Point security analysts, click
Use Check Point recommended emulation environments
• To select other images for emulation, that are closest to the operating systems for the
computers in your organization, click Use the following emulation environments

Advanced Threat Emulation Settings


• Emulation Connection Handling Mode lets you configure Threat Emulation to allow or block a
connection while it finishes the analysis of a file. You can also specify a different mode for
SMTP and HTTP services.
• Background - The connection is allowed and the file goes to the destination even if the
emulation is not finished.
• Hold - A connection that must have emulation is blocked and Threat Emulation holds the
file until the emulation is complete. This option can create a time-delay for users to receive
emails and files.
• Custom - Lets you configure different modes for HTTP and SMTP. For example, you can set
HTTP to Background and SMTP to Hold.
Best Practice - For configurations that use Hold mode for SMTP traffic, we recommend that
you use an MTA deployment.
If you use the Prevent action, a file that Threat Emulation already identified as malware is
blocked. Users cannot get the file even in Background mode.
• Static Analysis optimizes file analysis by doing an initial analysis on files. If the analysis finds
that the file is simple and cannot contain malicious code, the file is sent to the destination
without additional emulation. Static analysis significantly reduces the number of files that are
sent for emulation. If you disable it, you increase the percentage of files that are sent for full
emulation. The Security Gateways do static analysis by default, and you have the option to
disable it.
• Logging lets you configure the system to generate logs for each file after emulation is
complete.

Preparing for Local or Remote Emulation


Prepare the network and Emulation appliance for a Local or Remote deployment in the internal
network.
1. Open SmartConsole.
2. Create the network object for the Emulation appliance.

Security Management Administration Guide R80.20 | 205


Creating a Threat Prevention Policy

3. If you are running emulation on HTTPS traffic, configure the settings for HTTPS Inspection.
4. Make sure that the traffic is sent to the appliance according to the deployment:
• Local Emulation - The Emulation appliance receives the traffic. The appliance can be
configured for traffic the same as a Security Gateway.
• Remote Emulation - The traffic is routed to the Emulation appliance.

Configuring Threat Extraction Settings


To configure Threat Extraction settings for a Threat Prevention profile:
1. In the Security Policies view > Threat Tools section, click Profiles.
2. Right-click a profile and select Edit.
The Profiles properties window opens.
3. On the General Policy page in the Blade Activation area, select Threat Extraction.
4. Configure these Threat Extraction Settings:
• General (on page 206)
• Advanced (on page 207).
5. Click OK.
Note - You can configure some of the Threat Extraction features in a configuration file, in addition
to the CLI and GUI. See sk114613 http://supportcontent.checkpoint.com/solutions?id=sk114613.

Threat Extraction General Settings


On the Threat Extraction > General page, you can configure these settings:
• UserCheck Settings
• Allow the user to access the original file
• Allow access to original files that are not malicious according to Threat Emulation
Note - This option is only configurable when the Threat Emulation blade is activated in the
General Properties pane of the profile.
• UserCheck Message
Select a message to show the user when the user receives the clean file. In this message,
the user selects if they want to download the original file or not. To select the success or
cancelation messages of the file download, go to Manage & Settings > Blades > Threat
Prevention > Advanced Settings > UserCheck. You can create or edit UserCheck messages
on the UserCheck page.
• Optional: To give the user access to the original email, you can add the Send Original Mail
field in the Threat Extraction Success Page. Go to Threat Prevention > Threat Tools >
UserCheck > Threat Extraction Success Page > Right-click > Clone > Click inside the
message > Insert Field > Select Send Original Mail.
Send Original Mail is added to the message body.
• Protocol
• Mail (SMTP) - Click Mail to configure the SMTP traffic inspection by the Threat Extraction
blade. This links you to the Mail (on page 193) page of the Profile settings.
• Extraction Method
• Extract potentially malicious parts from files - Selected by default
Security Management Administration Guide R80.20 | 206
Creating a Threat Prevention Policy

Click Configure to select which malicious parts the blade extracts. For example, macros,
JavaScript, images and so on.
• Convert to PDF -
Converts the file to PDF, and keeps text and formatting.
Best Practice - If you use PDFs in right-to-left languages or Asian fonts, preferably select
Extract files from potential malicious parts to make sure that these files are processed
correctly.
• Extraction Settings
• Process all files - selected by default
• Process malicious files when the confidence level is:
Set a low, medium or high confidence level. This option is only configurable when the Threat
Emulation blade is activated in the General Properties pane of the profile.
• File Types
• Process all enabled file types - This option is selected by default. Click the blue link to see
the list of supported file types. Out of the supported file types, select the files to be scanned
by the Threat Extraction blade.
Note - you can find this list of supported file type also in Manage & Settings view > Blades >
Threat Prevention > Advanced Settings > Threat Extraction > Configure File Type
Support.
• Process specific file type families -
Here you can configure a different extraction method for certain file types. Click Configure
to see the list of enabled file types and their extraction methods. To change the extraction
method for a file type, right-click the file type and select: bypass, clean or convert to pdf.
Notes:
• For jpg, bmp, png, gif, and tiff files - Threat Extraction supports only extraction of
potentially malicious content.
• For hwp, jtd, eps, files - Threat Extraction supports only conversion to pdf.
• For Microsoft Office and PDF files and all other file types on the list - Threat Extraction
supports both extraction of potentially malicious content and conversion to pdf.
• You can also configure supported file types in the configuration file. For explanation, see
sk112240 http://supportcontent.checkpoint.com/solutions?id=sk112240.

Threat Extraction Advanced Settings


On the Threat Extraction > Advanced page, you can configure these settings:
• Logging
• Log only those files from which threats were extracted - Logs only files on which an
operation was performed (clean or convert).
• Log every file - Every file that is selected in Threat Extraction > General > File Types is
logged, even if no operation was performed on them.
• Threat Extraction Exceptions
• Corrupted files
Block or Allow corrupted files attached to the email or downloaded from the web.
Corrupted files are files the blade fails to process, possibly because the format is incorrect.

Security Management Administration Guide R80.20 | 207


Creating a Threat Prevention Policy

Despite the incorrect format, the related application (Word, Adobe Reader) can sometimes
show the content.
Block removes the corrupted file and sends the recipient a text which describes how the
file contained potentially malicious content. You can block corrupt files if they are malicious
according to Threat Emulation. If the action is block, you can deny access to the original
corrupted file.
Allow lets the recipient receive the corrupted file.
• Encrypted files
Block or Allow encrypted files attached to the email or downloaded from the web.
Block removes the encrypted file and sends the recipient a text file which describes how
the file contained potentially malicious content.
If the action is block, you can also deny access to the original encrypted file.
Allow lets the recipient receive the encrypted file.

Configuring Threat Extraction on the Security Gateway


To configure the Threat Extraction blade on the gateway:
1. Enable the Threat Extraction Blade:
a) On the General Properties > Network Security tab, select Threat Extraction.
The Threat Extraction First Time Activation Wizard opens.
b) Configure the Domain and Next Hop.
c) Click Next.
d) Click Finish.
2. Enable the gateway as a Mail Transfer Agent (MTA).
3. In the Gateways & Servers view, open the gateway properties > Threat Extraction page.
4. Make sure the Activation Mode is set to Active.
5. In the Resource Allocation section, configure the resource settings.
6. Click OK.
7. Install the Access Control Policy.

Configuring a Malware DNS Trap


The Malware DNS trap works by configuring the Security Gateway to return a false (bogus) IP
address for known malicious hosts and domains. You can use the Security Gateways external IP
address as the DNS trap address but:
• Do not use a gateway address that leads to the internal network
• Do not use the gateway internal management address
• If the gateway external IP address is also the management address, select a different address
for the DNS trap.
You can also add internal DNS servers to better identify the origin of malicious DNS requests.
Using the Malware DNS Trap you can detect compromised clients by checking logs with
connection attempts to the false IP address.

Security Management Administration Guide R80.20 | 208


Creating a Threat Prevention Policy

At the Security Gateway level, you can configure the DNS Trap according to the profile settings or
as a specific IP address for all profiles on the specific gateway.

To set the Malware DNS Trap parameters for the profile:


1. In SmartConsole, select Security Policies > Threat Prevention.
2. From the Threat Tools section, click Profiles.
The Profiles page opens.
3. Right-click the profile, and click Edit.
4. From the navigation tree, click Malware DNS Trap.
5. Click Activate DNS Trap.
6. Enter the IP address for the DNS trap.
7. Optional: Add Internal DNS Servers to identify the origin of malicious DNS requests.
8. Click OK and close the Threat Prevention profile window.
9. Install the Threat Prevention policy.

To set the Malware DNS Trap parameters for a gateway:


1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.
The gateway window opens and shows the General Properties page.
2. From the navigation tree, select Anti-Bot and Anti-Virus.
3. In the Malicious DNS Trap section, select one of these options:
• According to profile settings - Use the Malware DNS Trap IP address configured for each
profile.
• IPv4 - Enter an IP address to be used in all the profiles assigned to this Security Gateway.
4. Click OK.
5. Install the policy.

Exception Rules
If necessary, you can add an exception directly to a rule. An exception sets a different Action to an
object in the Protected Scope from the Action specified Threat Prevention rule. In general,
exceptions are designed to give you the option to reduce the level of enforcement of a specific
protection and not to increase it. For example: The Research and Development (R&D) network
protections are included in a profile with the Prevent action. You can define an exception which
sets the specific R&D network to Detect. For some Anti-Bot and IPS signatures only, you can
define exceptions which are stricter than the profile action.
You can add one or more exceptions to a rule. The exception is added as a shaded row below the
rule in the Rule Base. It is identified in the No. column with the rule's number plus the letter E and
a digit that represents the exception number. For example, if you add two exceptions to rule
number 1, two lines will be added and show in the Rule Base as E-1.1 and E-1.2.
You can use exception groups to group exceptions that you want to use in more than one rule. See
the Exceptions Groups Pane.
You can expand or collapse the rule exceptions by clicking on the minus or plus sign next to the
rule number in the No. column.

Security Management Administration Guide R80.20 | 209


Creating a Threat Prevention Policy

To add an exception to a rule:


1. In the Policy pane, select the rule to which you want to add an exception.
2. Click Add Exception.
3. Select the Above, Below, or Bottom option according to where you want to place the
exception.
4. Enter values for the columns. Including these:
• Protected Scope - Change it to reflect the relevant objects.
• Protection - Click the plus sign in the cell to open the Protections viewer. Select the
protection(s) and click OK.
5. Install Policy.
Note - You cannot set an exception rule to an inactive protection or an inactive blade.

Blade Exceptions
You can also configure an exception for an entire blade.

To configure a blade exception:


1. In the Policy, select the Layer rule to which you want to add an exception.
2. Click Add Exception.
3. Select the Above, Below, or Bottom option according to where you want to place the
exception.
4. In the Protection/Site column, select Blades from the drop-down menu.
5. Select the blade you want to exclude.
6. Install Policy.

Security Management Administration Guide R80.20 | 210


CHAPTER 13

The Check Point ThreatCloud


Check Point ThreatCloud is a dynamically updated service that is based on an innovative global
network of threat sensors and organizations that share threat data and collaborate to fight against
modern malware. Customers can send their own threat data to the ThreatCloud and benefit from
increased security and protection and enriched threat intelligence. The ThreatCloud distributes
attack information, and turns zero-day attacks into known signatures that the Anti-Virus Software
Blade can block. The Security Gateway does not collect or send any personal data.
Participation in Check Point information collection is a unique opportunity for Check Point
customers to be a part of a strategic community of advanced security research. This research
aims to improve coverage, quality, and accuracy of security services and obtain valuable
information for organizations.
The ThreatCloud repository contains more than 250 million addresses that were analyzed for bot
discovery and more than 2,000 different botnet communication patterns. The ThreatSpect engine
uses this information to classify bots and viruses.
For the reputation and signature layers of the ThreatSpect engine, each Security Gateway also
has:
• A local database, the Malware database that contains commonly used signatures, URLs, and
their related reputations. You can configure automatic or scheduled updates for this database.
• A local cache that gives answers to 99% of URL reputation requests. When the cache does not
have an answer, it queries the ThreatCloud repository.
• For Anti-Virus - the signature is sent for file classification.
• For Anti-Bot - the host name is sent for reputation classification.
Access the ThreatCloud repository from:
• SmartConsole - You can add specific malwares to rule exceptions when necessary. From the
Threat Prevention Rule Base in SmartConsole, click the plus sign in the Protection column in
the rule exceptions, and the Protection viewer opens.
• ThreatWiki - A tool to see the entire Malware database. Open ThreatWiki in SmartConsole or
access it from the Check Point website.
Data which Check Point Collects
When you enable information collection, the Check Point Security Gateway collects and securely
submits event IDs, URLs, and external IPs to the Check Point Lab regarding potential security
risks.
For example:
<entry engineType="3" sigID="-1" attackName="CheckPoint - Testing Bot"
sourceIP="7a1ec646fe17e2cd" destinationIP="d8c8f142" destinationPort="80"
host="www.checkpoint.com"
path="/za/images/threatwiki/pages/TestAntiBotBlade.html"
numOfAttacks="20" />
This is an example of an event that was detected by a Check Point Security Gateway. It includes
the event ID, URL, and external IP addresses. Note that the data does not contain confidential data
or internal resource information. The source IP address is obscured. Information sent to the
Check Point Lab is stored in an aggregated form.

Security Management Administration Guide R80.20 | 211


CHAPTER 14

Threat Prevention Scheduled Updates


In This Section:
Introduction to Scheduled Updates..........................................................................212
Configuring Threat Prevention Scheduled Updates ................................................212

Introduction to Scheduled Updates


Check Point wants the customer to be protected. When a protection update is available, Check
Point wants the configuration to be automatically enforced on the gateway. You can configure
automatic gateway updates for the Anti-Virus, Anti-Bot, Threat Emulation and IPS blades.
For the Anti-Virus, Anti-Bot and Threat Emulation, the gateways download the updates directly
from the Check Point cloud.
For the IPS blade, prior to R80.20, the updates were downloaded to the Security Management
Server, and only after you installed policy, the gateways could enforce the updates. Starting from
R80.20, the gateways can directly download the updates. For R80.20 gateways and higher with no
internet connectivity, you must still install policy to enforce the updates.
When you configure automatic IPS updates on the gateway, the action for the newly downloaded
protections is by default according to the profile settings.
IPS, Anti-Virus and Anti-Bot updates are performed every two hours by default. Threat Emulation
engine updates are performed daily at 05:00 by default, and Threat Emulation image updates are
performed daily at 04:00 by default.
You can see the list of Anti-Bot and Anti-Virus protections in Threat Tools > Protections, and the
list of IPS protections in Threat Tools > IPS Protections. The update date appears next to each
protection.

Configuring Threat Prevention Scheduled Updates


To configure Threat Prevention scheduled updates:
1. In SmartConsole, go to the Security Policies page and select Threat Prevention.
2. In the Threat Tools section of the Threat Prevention Policy, click Updates.
3. In the section for the applicable Software Blade, click Schedule Update.
The Scheduled Updates window opens.
4. Make sure Enable <blade> scheduled updates is selected.
5. For IPS, there are 2 more configuration options for scheduling Security Management Server
updates:
• On successful IPS update on the Security Management Server, install policy on the
Security Gateway - automatically installs the policy on the devices you select after the IPS
update is completed. Click Configure to select these devices.
Note - In pre-R80 gateways, IPS was part of the Access Control policy. Therefore, when you
select this option, a message shows which indicates that for pre-R80 gateways, the Access
Control policy is installed and for R80 and above gateways, the Threat Prevention policy is
installed.

Security Management Administration Guide R80.20 | 212


Creating a Threat Prevention Policy

• Perform retries on the Security Management Server when the update fails - lets you
configure the number of tries the scheduled update makes if it does not complete
successfully the first time.
6. Click Configure.
7. In the window that opens, set the Time of event:
• Update every: set the update frequency by hours
OR:
• Update at: set the update frequency by days:
 Daily - Every day
 Days in week - Select days of the week
 Days in month - Select dates of the month
8. Click OK.
9. Click Close.
10. Install Policy.

To Learn More About Threat Prevention


To learn more about configuring a Threat Prevention Policy, see the R80.20 Threat Prevention
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_ThreatPreve
ntion_AdminGuide/html_frameset.htm.

Security Management Administration Guide R80.20 | 213


CHAPTER 15

Managing User Accounts


In This Section:
Authentication Methods for Users and Administrators...........................................214
Configuring Authentication Methods for Users .......................................................215
User Database ..........................................................................................................219
Managing User Groups.............................................................................................222
LDAP and User Directory .........................................................................................222
Access Roles ............................................................................................................252
Authentication Rules ................................................................................................253

Authentication Methods for Users and Administrators


Check Point supports different methods of authenticating end users and administrators.
Security Gateways authenticate individual users. The Security Management Server authenticates
administrators.
Users and Administrators authenticate using credentials. All the methods required a username
and password.
Users and administrators can be stored in the Check Point User Database (on page 219) or on an
LDAP server.
The following sections describe the supported authentication methods.

Check Point Password


Check Point password is a static password that is configured in SmartConsole. For
administrators, the password is stored in the local database on the Security Management Server.
For users, it is stored on the local database on the Security Gateway. No additional software is
required.

Operating System Password


OS Password is stored on the operating system of the computer on which the Security Gateway
(for users) or Security Management Server (for administrators) is installed. You can also use
passwords that are stored in a Windows domain. No additional software is required.

RADIUS
Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that
provides security and scalability by separating the authentication function from the access server.
Using RADIUS, the Security Gateway forwards authentication requests by remote users to the
RADIUS server. For administrators, the Security Management Server forwards the authentication
requests. The RADIUS server, which stores user account information, does the authentication.

Security Management Administration Guide R80.20 | 214


Managing User Accounts

The RADIUS protocol uses UDP to communicate with the gateway or the Security Management
Server.
RADIUS servers and RADIUS server group objects are defined in SmartConsole.

SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or password.
Token authenticators generate one-time passwords that are synchronized to an RSA ACE/server
and may come in the form of hardware or software. Hardware tokens are key-ring or credit
card-sized devices, while software tokens reside on the PC or device from which the user wants to
authenticate. All tokens generate a random, one-time use access code that changes
approximately every minute. When a user attempts to authenticate to a protected resource, the
one-time use code must be validated by the ACE/server.
Using SecurID, the Security Gateway forwards authentication requests by remote users to the
ACE/server. For administrators, it is the Security Management Server that forwards the requests.
ACE manages the database of RSA users and their assigned hard or soft tokens. The gateway or
the Security Management Server act as an ACE/Agent 5.0 and direct all access requests to the
RSA ACE/server for authentication. For additional information on agent configuration, refer to
ACE/server documentation.
There are no specific parameters required for the SecurID authentication method.

TACACS
Terminal Access Controller Access Control System (TACACS) provides access control for routers,
network access servers and other networked devices through one or more centralized servers.
TACACS is an external authentication method that provides verification services. Using TACACS,
the Security Gateway forwards authentication requests by remote users to the TACACS server. For
administrators, it is the Security Management Server that forwards the requests. The TACACS
server, which stores user account information, authenticates users. The system supports physical
card key devices or token cards and Kerberos secret key authentication. TACACS encrypts the
user name, password, authentication services and accounting information of all authentication
requests to ensure secure communication.

Configuring Authentication Methods for Users


These instructions show how to configure authentication methods for users. For administrators,
see Configuring Authentication Methods for Administrators (on page 41).
For background information about the authentication methods, see Authentication Methods for
Users and Administrators (on page 214).

Granting User Access Using RADIUS Server Groups


The Security Gateway lets you control access privileges for authenticated RADIUS (on page 214)
users, based on the administrator's assignment of users to RADIUS groups. These groups are
used in the Security Rule Base to restrict or give users access to specified resources. Users are
unaware of the groups to which they belong.

Security Management Administration Guide R80.20 | 215


Managing User Accounts

To use RADIUS groups, you must define a return attribute in the RADIUS user profile of the
RADIUS server. This attribute is returned to the Security Gateway and contains the group name
(for example, RAD_<group to which the RADIUS users belong>) to which the users belong.
Use these RADIUS attributes (refer to RFC 2865):
• For SecurePlatform - attribute "Class" (25)
• For other operating systems, including Gaia, Windows, and IPSO-attribute "Vendor-Specific"
(26)

Configuring a Security Gateway to use SecurID Authentication


Sample workflow for SecurID (on page 215) authentication configuration:
1. Configure gateways for SecurID authentication.
2. Define user groups.
3. Configure SecurID authentication settings for users.
The procedure for doing this is different for Internal Users (that are defined in the internal
User Database on the Security Management Server) and for External Users.
4. Complete the SecurID authentication configuration.

To configure a Security Gateway to use SecurID:


1. Generate the sdconf.rec file on the ACE/Server and copy it to:
• /var/ace/sdconf.rec on UNIX, Linux or IPSO
• %SystemRoot%\System32\sdconf.rec on 32-bit Windows
• %SystemRoot%\SysWOW64\sdconf.rec on 64-bit Windows
On a Virtual System, follow the instructions in sk97908
http://supportcontent.checkpoint.com/solutions?id=sk97908.
2. In SmartConsole, go to the Gateways & Servers view, right-click a Security Gateway object
and select Edit.
3. In the gateway property window that opens, select Other > Legacy Authentication.
4. In the Enabled Authentication Schemes section, select SecurID.
5. Click OK.

To define a user group:


1. In SmartConsole, open the Objects Bar (F11).
2. Click New > More > User > User Group.
The New User Group window opens.
3. Enter the name of the group, for example SecurID_Users.
Make sure the group is empty.
4. Click OK.
5. Publish the changes and install the policy.

To configure SecurID authentication settings for Internal Users:


Internal users are users that are defined in the internal User Database on the Security
Management Server.
1. Create a new user. In SmartConsole, open the Objects Bar (F11).
2. Click New > More > User > User.
Security Management Administration Guide R80.20 | 216
Managing User Accounts

The New User window opens.


3. Choose a template.
4. Click OK.
5. In the General page:
• Enter a default Name. This name will be used to authenticate users on the ACE/Server.
• Set the Expiration date.
6. In the Authentication page, from the Authentication Method drop-down list, select SecurID.
7. Click OK.

To configure SecurID authentication settings for External Users:


External users are users that are not defined in the internal Users Database on the Security
Management Server.
1. In SmartConsole, click Manage & Settings > Blades.
2. In the Mobile Access section, click Configure in SmartDashboard.
Legacy SmartDashboard opens.
3. In the bottom left Network Objects pane, and click Users.

4. Right-click on an empty space and select the applicable option:


• If you support only one external authentication scheme, select New > External User Profile
> Match all users.
• If you support more than one external authentication scheme, select New > External User
Profile > Match by domain.
5. Configure the External User Profile properties:
a) General Properties page:
 If selected Match all users, then configure:
In the External User Profile name field, leave the default name generic*.
In the Expiration Date field, set the applicable date.
 If selected Match by domain, then configure:
In the External User Profile name field, enter the applicable name. This name will be
used to authenticate users on the ACE/Server.
In the Expiration Date field, set the applicable date.
In the Domain Name matching definitions section, configure the applicable settings.
b) Authentication page:
From the Authentication Scheme drop-down list, select SecurID.
c) Click OK.
6. From the top toolbar, click Update (Ctrl + S).
7. Close the Legacy SmartDashboard.

To complete the SecurID authentication configuration:


1. Make sure that connections between the gateway and the ACE/Server are not NATed in the
Address Translation Rule Base.

Security Management Administration Guide R80.20 | 217


Managing User Accounts

On a Virtual System, follow the instructions in sk107281


http://supportcontent.checkpoint.com/solutions?id=sk107281.
2. Save, verify, and install the policy in SmartConsole.
When a Security Gateway has multiple interfaces, the SecurID agent on the Security Gateway
sometimes uses the wrong interface IP to decrypt the reply from the ACE/Server, and
authentication fails.
To overcome this problem, place a new text file, named sdopts.rec in the same directory as
sdconf.rec. The file should contain the CLIENT_IP=<ip> line, where <ip> is the primary IP
address of the Security Gateway, as defined on the ACE/Server. This is the IP address of the
interface to which the server is routed.

Configuring TACACS+ Authentication


To configure a Security Gateway to use TACACS+ authentication, you must set up the server and
enable its use on the Security Gateway.

To define a TACACS+ server:


1. Define a TACACS Host object: Object Explorer (Ctrl+E) > New > Host
2. Enter a name and IP address.
3. Define a TACACS server: Object Explorer (Ctrl+E) > New > Server > More > TACACS.
4. Enter a name.
5. In Host, select the TACACS host.
6. Select the Type.
Best Practice: The default is TACACS, but TACACS+ is recommended.
7. In Service, select the TACACSplus service (or TACACS UDP service if you selected TACACS
type).
8. Enter a Secret key. (If you selected TACACS type, this is not available. If you selected
TACACS+, it is required.)
9. Click OK.

To enable TACACS on the Security Gateway:


1. Right-click the gateway object and select Edit.
2. Click Other > Legacy Authentication.
3. In the Enabled Authentication Schemes section, click TACACS.
4. Click OK.

To enable TACACS authentication for users:


1. In the Object Explorer, click Users > User Templates.
2. Edit the Default user template.
3. In the Authentication page, Authentication method list, select TACACS.
4. When TACACS server shows, select the TACACS server you defined.
5. Click OK.
When you create a new user account, TACACS is the default selected authentication.

Security Management Administration Guide R80.20 | 218


Managing User Accounts

User Database
Users defined in SmartConsole are saved to the User Database on the Security Management
Server, together with the user authentication schemes and encryption keys. Then, the user
database is installed on Security Gateways and Check Point hosts:
• On Security Gateways - When the policy is installed (Install Policy)
• On Check Point hosts with an active Management blade (such as Log Server) - When the
database is installed (Install Database)
The user database does not contain information about users defined elsewhere than on the
Security Management Server (such as users in external User Directory groups), but it does contain
information about the external groups themselves (for example, on which Account Unit the
external group is defined). Changes to external groups take effect only after the policy is installed,
or the user database is downloaded from the management server.

Creating, Modifying, Removing User Accounts


To create a new user:
1. In the Object Bar (F11)tree, click New > More > User > User.
The New User window opens.
2. Choose a template and click OK.
3. Configure required and optional settings in General Properties (on page 219).
4. Select and configure Authentication (on page 220).
Important! If you do not select an authentication method, the user cannot log in or use
network resources.
5. In Location (on page 220), select objects from which this user can access or send data and
traffic.
6. If the user has specified working days or hours, configure when (on page 220) the user can be
authenticated for access.
7. Click OK.

To change an existing user:


1. In the object tree, click Users > Users.
2. Double-click a user.
The User Properties window opens.
3. Change the properties as necessary.
4. Click OK.

User > General Properties


Required settings:
• User Name - A unique, case sensitive character string.
If you generate a user certificate with a non-Check Point Certificate Authority, enter the
Common Name (CN) component of the Distinguished Name (DN). For example, if the DN is:
[CN = James, O = My Organization, C = My Country],
enter James as the user name. If you use Common Names as user names, they must contain
exactly one string with no spaces.
Security Management Administration Guide R80.20 | 219
Managing User Accounts

• Expiration Date - The date, after which the user is no longer authorized to access network
resources and applications. By default, the date defined in the Default Expiration Settings (on
page 221) shows as the expiration date.
Optional settings:
• Comment
• Email Address
• Mobile Phone Number

User > Authentication


Select an Authentication Scheme:
• SecurID
• Check Point Password - Enter the password string (between 4 and 8 characters) and confirm it
• OS Password
• RADIUS - Select a RADIUS server or a group of servers
• TACACS - Select a TACACS server

User > Location


In the Allowed locations section:
Source - Click Add, to add selected objects to this user's permitted resources. The user can get
data and traffic from these objects.
Destination - Click Add, to add selected objects to this user's permitted destinations. The user can
send data and traffic to these objects.

User > Time


From and To - Enter start time and end time of an expected workday. This user will not be
authenticated if a login attempt is made on a time outside the given range.
Days in week or Daily - Select the days that the user can authenticate and access resources. This
user will not be authenticated if a login attempt is made on an unselected day.

User > Certificates


Generate and register SIC certificates for user accounts. This authenticates the user in the Check
Point system. Use certificates with required authentication for added access control.

To create a new certificate:


1. Open the User Properties window > Certificates page.
2. Click New.
3. Select key or p12 file:
• Registration key for certificate enrollment - Select to send a registration key that
activates the certificate. When prompted, select the number of days the user has to activate
the certificate, before the registration key expires.
• Certificate file (p12) - Select to create a .p12 certificate file with a private password for
the user. When prompted, enter and confirm the certificate password.
Security Management Administration Guide R80.20 | 220
Managing User Accounts

4. Click OK.
If a user will not be in the system for some time (for example, going on an extended leave), you can
revoke the certificate. This leaves the user account in the system, but it cannot be accessed until
you renew the certificate.
To revoke a certificate, select the certificate and click Revoke.

User > Encryption


If the user will access resources from a remote location, traffic between the remote user and
internal resources will be encrypted. Configure encryption settings for remote access users.

To configure encryption:
1. Open the User Properties window > Encryption page.
2. Select an encryption method for the user.
3. Click Edit.
The encryption Properties window opens.
The next steps are for IKE Phase 2. The options can be different for different methods.
4. Open the Authentication tab.
5. Select the authentication schemes:
a) Password - The user authenticates with a pre-shared secret password. Enter and confirm
the password.
b) Public Key - The user authenticates with a public key contained in a certificate file.
6. Click OK.
7. Click OK.

Configuring Default Expiration Settings for Users


If a user account is about to expire, notifications show when you open the properties of the user in
SmartConsole.

To configure the default expiration settings:


1. From the Menu, select Global Properties.
The Global Properties window opens.
2. Click User Accounts.
3. Select Expire at or Expire after.
• Expire at - Select the expiration date from the calendar control.
• Expire after - Enter the number of days (from the day the account is made) before user
accounts expire.
4. Select Show accounts expiration indication, and enter the number of days.
Expiration warnings in the SmartConsole User object show this number of days before an
account expires. During this time, if the user account is to be active for longer, you can edit the
user account expiration configuration. This will avoid loss of working time.

Security Management Administration Guide R80.20 | 221


Managing User Accounts

Delete a User
To delete a user:
1. In the object tree, click Users > Users.
2. Right-click the account and select Delete.
The confirmation window opens.
3. Click Yes.

Managing User Groups


User groups are collections of user accounts. Add the user group to the Source or Destination of a
rule. You cannot add individual users to a rule.
You can also edit user groups, and delete user groups that are not used in the Rule Base.

Adding User Groups


To create a new user group:
1. In the Object Bar (F11), click New> More > User > User Group.
The New User Group window opens.
2. Enter a name for the new group.
3. For each user or a group of users, click the [+] sign and select the object from the list.
4. Configure the optional settings:
• Mailing List Address
• Comment
• Tag
• Color
5. Click OK.

To add new users or other user groups to a group:


1. In the Object Bar (F11), select Object Categories > User >User Groups
2. Right click the User group and click Edit.
The User Group window opens.
3. Click +
4. Select users or user groups.
5. Click OK.

LDAP and User Directory


Check Point User Directory integrates LDAP, and other external user management technologies,
with the Check Point solution. If you have a large user count, we recommend that you use an
external user management database such as LDAP for enhanced Security Management Server
performance.
• Users can be managed externally by an LDAP server.

Security Management Administration Guide R80.20 | 222


Managing User Accounts

• The gateways can retrieve CRLs.


• The Security Management Server can use the LDAP data to authenticate users.
• User data from other applications gathered in the LDAP user database can be shared by
different applications.
You can choose to manage Domains on the Check Point users' database, or to implement an
external LDAP server.
Note - User Directory requires a special license. If you have the Mobile Access Software Blade,
you have the User Directory license.
User Directory lets you configure:
• High Availability, to duplicate user data across multiple servers for backup (on page 249).
• Multiple Account Units, for distributed databases.
• Define LDAP Account Units, for encrypted User Directory connections (on page 249).
• Profiles, to support multiple LDAP vendors (on page 231).

User Directory and Identity Awareness


Identity Awareness uses User Directory.
Identity Awareness lets you enforce network access and audit data, based on network location, the
identity of the user, and the identity of the computer. You can use Identity Awareness in the Access
Control, Threat Prevention and DLP Rule Bases.

User Directory Considerations


Before you begin, plan your use of User Directory.
• Decide whether you will use the User Directory servers for user management, CRL retrieval,
user authentication (on page 246), or all of those.
• Decide how many Account Units you will need. You can have one for each User Directory
server, or you can divide branches of one User Directory server among different Account Units
(on page 246).
• Decide whether you will use High Availability (on page 249) setup.
• Determine the order of priority (on page 250) among the User Directory servers for High
Availability and querying purposes.
• Assign users (on page 251) to different Account Units, branches, and sub-branches, so that
users with common attributes (such as their role in the organization, permissions, etc.) are
grouped together.

The User Directory Schema


The User Directory default schema is a description of the structure of the data in a user directory.
It has user definitions defined for an LDAP server. This schema does not have Security
Management Server or Security Gateway specific data, such as IKE-related attributes,
authentication methods, or values for remote users.
You can use the default User Directory schema, if all users have the same authentication method
and are defined according to a default template. But if users in the database have different
definitions, it is better to apply a Check Point schema to the LDAP server (on page 224).

Security Management Administration Guide R80.20 | 223


Managing User Accounts

In This Section
Schema Checking .....................................................................................................224
OID Proprietary Attributes .......................................................................................224
User Directory Schema Attributes ...........................................................................225
Netscape LDAP Schema ..........................................................................................231

Check Point Schema for LDAP


The Check Point Schema adds Security Management server and Security Gateway specific data to
the structure in the LDAP server. Use the Check Point Schema to extend the definition of objects
with user authentication functionality.
For example, an Object Class entitled fw1Person is part of the Check Point schema. This Object
Class has mandatory and optional attributes to add to the definition of the Person attribute.
Another example is fw1Template. This is a standalone attribute that defines a template of user
information.

Schema Checking
When schema checking is enabled, User Directory requires that every Check Point object class
and its associated attributes is defined in the directory schema.
Before you work with User Directory, make sure that schema checking is disabled. Otherwise the
integration will fail. After the Check Point object classes and attributes are applied to the User
Directory server's schema, you must enable schema checking again.

OID Proprietary Attributes


Each of the proprietary object classes and attributes (all of which begin with "fw1") has a
proprietary Object Identifier (OID), listed below.
Object Class OIDs

object class OID


fw1template 1.3.114.7.4.2.0.1
fw1person 1.3.114.7.4.2.0.2

The OIDs for the proprietary attributes begin with the same prefix ("1.3.114.7.4.2.0.X"). Only the
value of "X" is different for each attribute. See Attributes (on page 225) for the value of "X".

Security Management Administration Guide R80.20 | 224


Managing User Accounts

User Directory Schema Attributes


Attributes:
cn ..............................................................................................................................225
uid .............................................................................................................................226
description ................................................................................................................226
mail ...........................................................................................................................226
member ....................................................................................................................226
userPassword...........................................................................................................226
fw1authmethod.........................................................................................................226
fw1authserver...........................................................................................................227
fw1pwdLastMod........................................................................................................227
fw1expiration-date ...................................................................................................227
fw1hour-range-from ................................................................................................227
fw1hour-range-to .....................................................................................................227
fw1day .......................................................................................................................228
fw1allowed-src .........................................................................................................228
fw1allowed-dst .........................................................................................................228
fw1allowed-vlan .......................................................................................................228
fw1SR-keym .............................................................................................................228
fw1SR-datam ............................................................................................................228
fw1SR-mdm ..............................................................................................................228
fw1enc-fwz-expiration .............................................................................................228
fw1sr-auth-track ......................................................................................................229
fw1groupTemplate ...................................................................................................229
fw1ISAKMP-EncMethod ...........................................................................................229
fw1ISAKMP-AuthMethods ........................................................................................229
fw1ISAKMP-HashMethods .......................................................................................229
fw1ISAKMP-Transform ............................................................................................229
fw1ISAKMP-DataIntegrityMethod ............................................................................230
fw1ISAKMP-SharedSecret .......................................................................................230
fw1ISAKMP-DataEncMethod....................................................................................230
fw1enc-Methods .......................................................................................................230
fw1userPwdPolicy ....................................................................................................230
fw1badPwdCount ......................................................................................................230
fw1lastLoginFailure..................................................................................................230
memberof template .................................................................................................230

cn
The entry's name. This is also referred to as "Common Name". For users this can be different
from the uid attribute, the name used to login to the Security Gateway. This attribute is also used
to build the User Directory entry's distinguished name, that is, it is the RDN of the DN.

Security Management Administration Guide R80.20 | 225


Managing User Accounts

uid
The user's login name, that is, the name used to login to the Security Gateway. This attribute is
passed to the external authentication system in all authentication methods except for "Internal
Password", and must be defined for all these authentication methods.
The login name is used by the Security Management Server to search the User Directory server(s).
For this reason, each user entry should have its own unique uid value.
It is also possible to login to the Security Gateway using the full DN. The DN can be used when
there is an ambiguity with this attribute or in "Internal Password" when this attribute may be
missing. The DN can also be used when the same user (with the same uid) is defined in more than
one Account Unit on different User Directory servers.

description
Descriptive text about the user.

default
"no value"

mail
User's email address.

default
"no value"

member
An entry can have zero or more values for this attribute.
• In a template: The DN of user entries using this template. DNs that are not users (object
classes that are not one of: "person", "organizationalPerson", "inetOrgPerson" or
"fw1person") are ignored.
• In a group: The DN of user.
userPassword
Must be given if the authentication method (fw1auth-method) is "Internal Password". The value
can be hashed using "crypt". In this case the syntax of this attribute is:
"{crypt}xxyyyyyyyyyyy"
where "xx" is the "salt" and "yyyyyyyyyyy" is the hashed password.
It is possible (but not recommended) to store the password without hashing. However, if hashing
is specified in the User Directory server, you should not specify hashing here, in order to prevent
the password from being hashed twice. You should also use SSL in this case, to prevent sending
an unencrypted password.
The Security Gateway never reads this attribute, though it does write it. Instead, the User Directory
bind operation is used to verify a password.

fw1authmethod
One of these:
RADIUS, TACACS, SecurID, OS Password, Defender
This default value for this attribute is overridden by Default authentication scheme in the
Authentication tab of the Account Unit window in SmartConsole. For example: a User Directory

Security Management Administration Guide R80.20 | 226


Managing User Accounts

server can contain User Directory entries that are all of the object-class "person" even though the
proprietary object-class "fw1person" was not added to the server's schema. If Default
authentication scheme in SmartConsole is "Internal Password", all the users will be
authenticated using the password stored in the "userPassword" attribute.

fw1authserver
"X" in OID fw1person fw1template default
1 y y "undefined"

The name of the server that will do the authentication. This field must be given if fw1auth-method
is "RADIUS" or "TACACS". For all other values of fw1auth-method, it is ignored. Its meaning is
given below:

method meaning
RADIUS name of a RADIUS server, a group of RADIUS servers, or "Any"
TACACS name of a TACACS server

"X" in OID fw1template


2 y

fw1pwdLastMod
The date on which the password was last modified. The format is yyyymmdd (for example, 20
August 1998 is 19980820). A password can be modified through the Security Gateway as a part of
the authentication process.

"X" in OID fw1person fw1template default


3 y y If no value is given, then the password has
never been modified.

fw1expiration-date
The last date on which the user can login to a Security Gateway, or "no value" if there is no
expiration date. The format is yyyymmdd (for example, 20 August 1998 is 19980820). The default is
"no value".

"X" in OID fw1person fw1template default


8 y y "no value"

fw1hour-range-from
The time from which the user can login to a Security Gateway. The format is hh:mm (for example,
8:15 AM is 08:15).

"X" in OID fw1person fw1template default


9 y y "00:00"

fw1hour-range-to
The time until which the user can login to a Security Gateway. The format is hh:mm (for example,
8:15 AM is 08:15).

"X" in OID fw1person fw1template default


10 y y "23:59"
Security Management Administration Guide R80.20 | 227
Managing User Accounts

fw1day
The days on which the user can login to a Security Gateway. Can have the values "SUN","MON",
and so on.

"X" in OID fw1person fw1template default


11 y y all days of the week

fw1allowed-src
The names of one or more network objects from which the user can run a client, or "Any" to
remove this limitation, or "no value" if there is no such client. The names should match the name
of network objects defined in Security Management server.

"X" in OID fw1person fw1template default


12 y y "no value"

fw1allowed-dst
The names of one or more network objects which the user can access, or "Any" to remove this
limitation, or "no value" if there is no such network object. The names should match the name of
network objects defined on the Security Management server.

"X" in OID fw1person fw1template default


13 y y "no value"

fw1allowed-vlan
Not currently used.

"X" in OID fw1person fw1template default


14 y y "no value"

fw1SR-keym
The algorithm used to encrypt the session key in SecuRemote. Can be "CLEAR", "FWZ1", "DES" or
"Any".

"X" in OID fw1person fw1template default


15 y y "Any"

fw1SR-datam
The algorithm used to encrypt the data in SecuRemote. Can be "CLEAR", "FWZ1", "DES" or "Any".

"X" in OID fw1person fw1template default


16 y y "Any"

fw1SR-mdm
The algorithm used to sign the data in SecuRemote. Can be "none" or "MD5".

"X" in OID fw1person fw1template default


17 y y "none"

fw1enc-fwz-expiration
The number of minutes after which a SecuRemote user must re-authenticate himself or herself to
the Security Gateway.
Security Management Administration Guide R80.20 | 228
Managing User Accounts

"X" in OID fw1person fw1template


18 y y

fw1sr-auth-track
The exception to generate on successful authentication via SecuRemote. Can be "none", "cryptlog"
or "cryptalert".

"X" in OID fw1person fw1template default


19 y y "none"

fw1groupTemplate
This flag is used to resolve a problem related to group membership.
The group membership of a user is stored in the group entries to which it belongs, in the user
entry itself, or in both entries. Therefore there is no clear indication in the user entry if information
from the template about group relationship should be used.
If this flag is "TRUE", then the user is taken to be a member of all the groups to which the
template is a member. This is in addition to all the groups in which the user is directly a member.

"X" in OID fw1person fw1template default


20 y y "False"

fw1ISAKMP-EncMethod
The key encryption methods for SecuRemote users using IKE. This can be one or more of: "DES",
"3DES". A user using IKE (formerly known as ISAMP) may have both methods defined.

"X" in OID fw1person fw1template default


21 y y "DES", "3DES"

fw1ISAKMP-AuthMethods
The allowed authentication methods for SecuRemote users using IKE, (formerly known as ISAMP).
This can be one or more of: "preshared", "signatures".

"X" in OID fw1person fw1template default


22 y y "signatures"

fw1ISAKMP-HashMethods
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one or more of: "MD5", "SHA1". A user using IKE must have both methods defined.

"X" in OID fw1person fw1template default


23 y y "MD5", "SHA1"

fw1ISAKMP-Transform
The IPSec Transform method for SecuRemote users using IKE, (formerly known as ISAMP). This
can be one of: "AH", "ESP".

"X" in OID fw1person fw1template default


24 y y "ESP"

Security Management Administration Guide R80.20 | 229


Managing User Accounts

fw1ISAKMP-DataIntegrityMethod
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one of: "MD5", "SHA1".

"X" in OID fw1person fw1template default


25 y y "SHA1"

fw1ISAKMP-SharedSecret
The pre-shared secret for SecuRemote users using IKE, (formerly known as ISAMP).
The value can be calculated using the fw ikecrypt command line.

"X" in OID fw1person fw1template


26 y y

fw1ISAKMP-DataEncMethod
The data encryption method for SecuRemote users using IKE, (formerly known as ISAMP).

"X" in OID fw1person fw1template default


27 y y "DES"

fw1enc-Methods
The encryption method allowed for SecuRemote users. This can be one or more of: "FWZ",
"ISAKMP" (meaning IKE).

"X" in OID fw1person fw1template default


28 y y "FWZ"

fw1userPwdPolicy
Defines when and by whom the password should and can be changed.

"X" in OID fw1person


29 y

fw1badPwdCount
Number of allowed wrong passwords entered sequentially.

"X" in OID fw1person


30 y

fw1lastLoginFailure
Time of the last login failure.

"X" in OID fw1person


31 4

memberof template
DN of the template that the user is a member of.

"X" in OID fw1person


33 4

Security Management Administration Guide R80.20 | 230


Managing User Accounts

Netscape LDAP Schema


To add the propriety schema to your Netscape directory server, use the file schema.ldif in the
$FWDIR/lib/ldap directory.

Important - This deletes the objectclass definition from the schema and adds the
updated one in its place.

We recommend that you back up the User Directory server before you run the command.
The ldif file:
• Adds the new attributes to the schema
• Deletes old definitions of fw1person and fw1template
• Adds new definitions of fw1person and fw1template
To change the Netscape LDAP schema, run the ldapmodify command with the schema.ldif file.
On some server versions, the delete objectclass operation can return an error, even if it was
successful. Use ldapmodify with the -c (continuous) option.

User Directory Profiles


The User Directory profile is a configurable LDAP policy that lets you define more exact User
Directory requests and enhances communication with the server. Profiles control most of the
LDAP server-specific knowledge. You can manage diverse technical solutions, to integrate LDAP
servers from different vendors.
Use User Directory profiles to make sure that the user management attributes of a Security
Management Server are correct for its associated LDAP server. For example, if you have a
certified OPSEC User Directory server, apply the OPSEC_DS profile to get enhanced
OPSEC-specific attributes.
LDAP servers have difference object repositories, schemas, and object relations.
• The organization's user database may have unconventional object types and relations because
of a specific application.
• Some applications use the cn attribute in the User object's Relatively Distinguished Name
(RDN) while others use uid.
• In Microsoft Active Directory, the user attribute memberOf describes which group the user
belongs to, while standard LDAP methods define the member attribute in the group object
itself.
• Different servers implement different storage formats for passwords.
• Some servers are considered v3 but do not implement all v3 specifications. These servers
cannot extend the schema.
• Some LDAP servers already have built in support for certain user data, while others require a
Check Point schema extended attribute. For example, Microsoft Active Directory has the
accountExpires user attribute, but other servers require the Check Point attribute
fw1expirationdate, which is part of the Check Point defined fw1person objectclass.
• Some servers allow queries with non-defined types, while others do not.

Security Management Administration Guide R80.20 | 231


Managing User Accounts

Default User Directory Profiles


These profiles are defined by default:
• OPSEC_DS - the default profile for a standard OPSEC certified User Directory.
• Netscape_DS - the profile for a Netscape Directory Server.
• Novell_DS - the profile for a Novell Directory Server.
• Microsoft_AD - the profile for Microsoft Active Directory.

Modifying User Directory Profiles


Profiles have these major categories:
• Common - Profile settings for reading and writing to the User Directory.
• Read - Profile settings only for reading from the User Directory.
• Write - Profile settings only for writing to the User Directory.
Some of these categories list the same entry with different values, to let the server behave
according to type of operation. You can change certain parameters of the default profiles for finer
granularity and performance tuning.

To apply a profile:
1. Open the Account Unit.
2. Select the profile.

To change a profile:
1. Create a new profile.
2. Copy the settings of a User Directory profile into the new profile.
3. Change the values.

Fetch User Information Effectively


User Directory servers organize groups and members through different means and relations.
User Directory operations are performed by Check Point on users, groups of users, and user
templates where the template is defined as a group entry and users are its members. The mode in
which groups/templates and users are defined has a profound effect on the performance of some
of the Check Point functionality when fetching user information. There are three different modes:
• Defining a "Member" attribute per member, or "Member" user-to-group membership mode. In
this case, each member of a specific group gets the 'Member" attribute, where the value of
this attribute is the DN of that member.
• Defining a "Memberof" attribute per group, or "MemberOf" user-to-group membership mode.
In this case, each group gets the "Memberof" attribute per group, where the value of this
attribute is the DN of a group entry. This is referred to as "MemberOf" user-to-group
membership mode.
• Defining a "Memberof" attribute per member and group, or "Both" user-to-group membership
mode. In this case both members and groups are given the "Memberof" attribute.
The most effective mode is the "MemberOf" and "Both" modes where users' group membership
information is available on the user itself and no additional User Directory queries are necessary.

Security Management Administration Guide R80.20 | 232


Managing User Accounts

Setting User-to-Group Membership Mode


Set the user-to-group membership mode in the profile objects for each User Directory server in
objects_5_0.C.
• To specify the user-to-group and template-to-group membership mode set the
GroupMembership attribute to one of the following values: Member, MemberOf, Both
accordingly.
• To specify the user-to-template membership mode set the TemplateMembership attribute
to one of the following values: Member, MemberOf accordingly.
After successfully converting the database, set the User Directory server profile in
objects_5_0.C to the proper membership setting and start the Security Management server.
Make sure to install policy/user database on all gateways to enable the new configuration.

Security Management Administration Guide R80.20 | 233


Managing User Accounts

Profile Attributes
Attributes:
UserLoginAttr ...........................................................................................................234
UserPasswordAttr ....................................................................................................235
TemplateObjectClass ...............................................................................................235
ExpirationDateAttr ....................................................................................................235
ExpirationDateFormat ..............................................................................................235
PsswdDateFormat ....................................................................................................235
PsswdDateAttr..........................................................................................................235
BadPwdCountAttr .....................................................................................................236
ClientSideCrypt .........................................................................................................236
DefaultCryptAlgorith ................................................................................................236
CryptedPasswordPrefix............................................................................................236
PhoneNumberAttr ....................................................................................................236
AttributesTranslationMap ........................................................................................236
ListOfAttrsToAvoid....................................................................................................236
BranchObjectClass ...................................................................................................237
BranchOCOperator ...................................................................................................237
OrganizationObjectClass ..........................................................................................237
OrgUnitObjectClass ..................................................................................................237
DomainObjectClass ..................................................................................................237
UserObjectClass .......................................................................................................237
UserOCOperator .......................................................................................................238
GroupObjectClass .....................................................................................................238
GroupOCOperator .....................................................................................................238
UserMembershipAttr ...............................................................................................238
TemplateMembership ..............................................................................................239
TemplateMembershipAttr ........................................................................................239
UserTemplateMembershipAttr ................................................................................239
OrganizationRDN ......................................................................................................239
OrgUnitRDN ..............................................................................................................239
UserRDN ...................................................................................................................239
GroupRDN.................................................................................................................239
DomainRDN ..............................................................................................................240
AutomaticAttrs .........................................................................................................240
GroupObjectClass .....................................................................................................240
OrgUnitObjectClass ..................................................................................................240
OrganizationObjectClass ..........................................................................................240
UserObjectClass .......................................................................................................240
DomainObjectClass ..................................................................................................241

UserLoginAttr
The unique username User Directory attribute (uid). In addition, when fetching users by the
username, this attribute is used for query.

Security Management Administration Guide R80.20 | 234


Managing User Accounts

default Other
• uid (most servers) One value allowed

• SamAccountName (in Microsoft_AD)


UserPasswordAttr
This user password is User Directory attribute.

default Other
• userPassword (most servers) One value allowed

• unicodePwd (in Microsoft_AD)


TemplateObjectClass
The object class for Check Point User Directory templates. If you change the default value with
another objectclass, make sure to extend that objectclass schema definition with relevant
attributes from fw1template.

default Other
fw1template Multiple values allowed

ExpirationDateAttr
The account expiration date is User Directory attribute. This could be a Check Point extended
attribute or an existing attribute.

default Other
• fw1expiration-date (most servers) One value allowed

• accountExpires (in Microsoft_AD)


ExpirationDateFormat
Expiration date format. This format will be applied to the value defined at ExpirationDateAttr.

default Other
CP format is yyyymmdd One value allowed

PsswdDateFormat
The format of the password modified date is User Directory attribute. This formation will be
applied to the value defined at PsswdDateAttr.

default Other
• CP (most servers) format is yyyymmdd One value allowed

• MS (in Microsoft_AD)
PsswdDateAttr
The password last modified date is User Directory attribute.

default Other
• fw1pwdLastMod (most servers) One value allowed

• pwdLastSet (in Microsoft_AD)

Security Management Administration Guide R80.20 | 235


Managing User Accounts

BadPwdCountAttr
User Directory attribute to store and read bad password authentication count.

default Other
fw1BadPwdCount One value allowed

ClientSideCrypt
If 0, the sent password will not be encrypted. If 1, the sent password will be encrypted with the
algorithm specified in the DefaultCryptAlgorithm.

default Other
• 0 for most servers One value allowed

• 1 for Netscape_DS
if not using encrypted password, SSL is recommended

DefaultCryptAlgorith
The algorithm used to encrypt a password before updating the User Directory server with a new
password.

default Other
• Plain (for most servers) One value allowed

• Crypt (for Netscape_DS)


• SHAI1
CryptedPasswordPrefix
The text to prefix to the encrypted password when updating the User Directory server with a
modified password.

default Other
{Crypt} (for Netscape_DS) One value allowed

PhoneNumberAttr
User Directory attribute to store and read the user phone number.

default Other
internationalisednumber One value allowed

AttributesTranslationMap
General purpose attribute translation map, to resolve problems related to peculiarities of different
server types. For example, an X.500 server does not allow the "-" character in an attribute name.
To enable the Check Point attributes containing "-", specify a translation entry: (e.g.,
"fw1-expiration =fw1expiration").

default Other
none Multiple values allowed

ListOfAttrsToAvoid
All attribute names listed here will be removed from the default list of attributes included in
read/write operations. This is most useful in cases where these attributes are not supported by

Security Management Administration Guide R80.20 | 236


Managing User Accounts

the User Directory server schema, which might fail the entire operation. This is especially relevant
when the User Directory server schema is not extended with the Check Point schema extension.

Default Other
There are no values by default. In case the User Multiple values allowed
Directory server was not extended by the Check
Point schema, the best thing to do is to list here all
the new Check Point schema attributes.

BranchObjectClass
Use this attribute to define which type of objects (objectclass) is queried when the object tree
branches are displayed after the Account Unit is opened in SmartConsole.

Default Other
• Organization OrganizationalUnit Domain (most Multiple values allowed
servers)
• Container (extra for Microsoft_AD)
BranchOCOperator
If One is set, an ORed query will be sent and every object that matches the criteria will be
displayed as a branch. If All, an ANDed query will be sent and only objects of all types will be
displayed.

Default Other
One One value allowed

OrganizationObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new
object type specified here should also be in BranchObjectClass.

Default Other
organization Multiple values allowed

OrgUnitObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new
object type specified here should also be in BranchObjectClass.

Default Other
• organizationalUnit (most servers) Multiple values allowed

• Contained (added to Microsoft_AD)


DomainObjectClass
This attribute defines what objects should be displayed with a Domain object icon. A new object
type specified here should also be in BranchObjectClass.

Default Other
Domain Multiple values allowed

UserObjectClass
This attribute defines what objects should be read as user objects. The user icon will be displayed
on the tree for object types specified here.
Security Management Administration Guide R80.20 | 237
Managing User Accounts

Default Other
• User (in Microsoft_AD) Multiple values allowed

• Person
OrganizationalPerson
InertOrgPerson
FW1 Person (most servers)

UserOCOperator
If 'one' is set, an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' and ANDed query will be sent and only objects of all types will be
displayed.

Default Other
One One value allowed

GroupObjectClass
This attribute defines what objects should be read as groups. The group icon will be displayed on
the tree for objects of types specified here.

Default Other
Groupofnames Multiple values allowed
Groupofuniquenames (most servers)
Group
Groupofnames (in Microsoft_AD)

GroupOCOperator
If 'one' is set an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' an ANDed query will be sent and only objects of all types will be
displayed.
GroupMembership

Default Other
One One value allowed

Defines the relationship Mode between the group and its members (user or template objects)
when reading group membership.

Default Other
• Member mode defines the member DN in the Group object (most servers) One value
allowed
• MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
• Modes define member DN in Group object and group DN in Member object.
UserMembershipAttr
Defines what User Directory attribute to use when reading group membership from the user or
template object if GroupMembership mode is 'MemberOf' or 'Both' you may be required to extend
the user/template object schema in order to use this attribute.

Security Management Administration Guide R80.20 | 238


Managing User Accounts

Default Other
MemberOf One value allowed

TemplateMembership
Defines the user to template membership mode when reading user template membership
information.

Default Other
• Member mode defines the member DN in the Group object (most One value allowed
servers)
• MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
TemplateMembershipAttr
Defines which attribute to use when reading the User members from the template object, as User
DNs, if the TemplateMembership mode is Member.

Default Other
member Multiple values allowed

UserTemplateMembershipAttr
Defines which attribute to use when reading from the User object the template DN associated with
the user, if the TemplateMembership mode is MemberOf.

Default Other
member Multiple values allowed

OrganizationRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when
you create a new organizational unit in SmartConsole.

Default Other
o One value allowed

OrgUnitRDN
This value is used as the attribute name in the Relatively Distinguished Name (RDN) when you
create a new organizational Unit in SmartConsole.

Default Other
ou One value allowed

UserRDN
This value is used as the attribute name in the Relatively Distinguished Name (RDN), when you
create a new User object in SmartConsole.

Default Other
cn One value allowed

GroupRDN
This value is used as the attribute name for the RDN, when you create a new Group object in
SmartConsole.
Security Management Administration Guide R80.20 | 239
Managing User Accounts

Default Other
cn One value allowed

DomainRDN
This value is used as the attribute name for the RDN, when you create a new Domain object in
SmartConsole.

Default Other
dc One value allowed

AutomaticAttrs
This field is relevant when you create objects in SmartConsole. The format of this field is
Objectclass:name:value meaning that if the object created is of type ObjectClass then
additional attributes will be included in the created object with name 'name' and value 'value'.

Default Other
user:userAccountControl:66048 Multiple values
For Microsoft_AD This means that when a user object is created an extra allowed
attribute is included automatically: userAccountControl with the value
66048

GroupObjectClass
This field is used when you modify a group in SmartConsole. The format of this field is
ObjectClass:memberattr meaning that for each group objectclass there is a group membership
attribute mapping. List here all the possible mappings for this User Directory server profile. When
a group is modified, based on the group's objectclass the right group membership mapping is
used.

Default Other
groupOfNames:member Multiple values allowed
groupOfUniqueNames:uniqueMember
(All other servers)

OrgUnitObjectClass
This determines which ObjectClass to use when creating/modifying an OrganizationalUnit object.
These values can be different from the read counterpart.

Default Other
OrganizationalUnit Multiple values allowed

OrganizationObjectClass
This determines which ObjectClass to use when creating and/or modifying an Organization object.
These values can be different from the read counterpart.

Default Other
Organization Multiple values allowed

UserObjectClass
This determines which ObjectClass to use when creating and/or modifying a user object. These
values can be different from the read counterpart.

Security Management Administration Guide R80.20 | 240


Managing User Accounts

Default Other
User (in Microsoft_AD) Multiple values allowed
person
organizationalPerson
inetOrgPerson
fw1Person
(All other servers)

DomainObjectClass
Determines which ObjectClass to use when creating and/or modifying a domain context object.
These values can be different from the read counterpart.

Default Other
Domain Multiple values allowed

Microsoft Active Directory


The Microsoft Windows 2000 advanced server (or later) includes a sophisticated User Directory
server that can be adjusted to work as a user database for the Security Management server.
By default, the Active Directory services are disabled. In order to enable the directory services:
• run the dcpromo command from the Start > Run menu, or
• run the Active Directory setup wizard using the System Configuration window.
The Active Directory has the following structure:
DC=qa, DC=checkpoint,DC=com
CN=Configuration,DCROOT
CN=Schema,CN=Configuration,DCROOT
CN=System,DCROOT
CN=Users,DCROOT
CN=Builtin,DCROOT
CN=Computers,DCOOT
OU=Domain Controllers,DCROOT
...

Most of the user objects and group objects created by Windows 2000 tools are stored under the
CN=Users, DCROOT branch, others under CN=Builtin, DCROOT branch, but these objects can
be created under other branches as well.
The branch CN=Schema, CN=Configuration, DCROOT contains all schema definitions.
Check Point can take advantage of an existing Active Directory object as well as add new types.
For users, the existing user can be used "as is" or be extended with fw1person as an auxiliary of
"User" for full feature granularity. The existing Active Directory "Group" type is supported "as is".
A User Directory template can be created by adding the fw1template objectclass. This information
is downloaded to the directory using the schema_microsoft_ad.ldif file (see Adding New
Attributes to the Active Directory (on page 243)).

Performance
The number of queries performed on the directory server is significantly low with Active Directory.
This is achieved by having a different object relations model. The Active Directory group-related

Security Management Administration Guide R80.20 | 241


Managing User Accounts

information is stored inside the user object. Therefore, when fetching the user object no additional
query is necessary to assign the user with the group. The same is true for users and templates.

Manageability
SmartConsole allows the creation and management of existing and new objects. However, some
specific Active Directory fields are not enabled in SmartConsole.

Enforcement
It is possible to work with the existing Active Directory objects without extending the schema. This
is made possible by defining an Internal Template object and assigning it with the User Directory
Account Unit defined on the Active Directory server.
For example, if you wish to enable all users with IKE+Hybrid based on the Active Directory
passwords, create a new template with the IKE properties enabled and "Check Point password" as
the authentication method.

Updating the Registry Settings


To modify the Active Directory schema, add a new registry DWORD key named Schema Update
Allowed with the value different from zero under
HKLM\System\CurrentControlSet\Services\NTDS\Parameters.

Delegating Control
Delegating control over the directory to a specific user or group is important since by default the
Administrator is not allowed to modify the schema or even manage directory objects through User
Directory protocol.

To delegate control over the directory:


1. Display the Users and Computers Control console.
2. Right-click on the domain name displayed in the left pane and choose Delegate control from
the right-click menu.
The Delegation of Control wizard window is displayed.
3. Add an Administrator or another user from the System Administrators group to the list of
users who can control the directory.
4. Reboot the machine.

Extending the Active Directory Schema


Modify the file with the Active Directory schema, to use SmartConsole to configure the Active
Directory users.

To extend the Active Directory schema:


1. From the Security Gateway, go to the directory of the schema file: $FWDIR/lib/ldap.
2. Copy schmea_microsoft_ad.ldif to the C:\ drive in the Active Directory server.
3. From Active Directory server, with a text editor open the schema file.
4. Find the value DOMAINNAME, and replace it with the name of your domain in LDIF format.
For example, the domain sample.checkpoint.com in LDIF format is:
DC=sample,DC=checkpoint,DC=com

Security Management Administration Guide R80.20 | 242


Managing User Accounts

5. Make sure that there is a dash character - at the end of the modify section.
This is an example of the modify section.
dn: CN=User,CN-Schema,CN=Configuration,DC=sample,DC=checkpoint,DC=com
changetype: modify
add: auxiliaryClass
auxiliaryClass: 1.3.114.7.3.2.0.2
-
6. Run ldifde -i -f c:/schema_microsoft_ad.ldif

Adding New Attributes to the Active Directory


Below is the example in LDAP Data Interchange (LDIF) format that adds one attribute to the
Microsoft Active Directory:
dn:CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
changetype: add
adminDisplayName: fw1auth-method
attributeID: 1.3.114.7.4.2.0.1
attributeSyntax: 2.5.5.4
cn: fw1auth-method
distinguishedName:
CN=fw1auth-method,CN=Schema,CN=Configuration,DCROOT
instanceType: 4
isSingleValued: FALSE
LDAPDisplayName: fw1auth-method
name: fw1auth-method
objectCategory:
CN=Attribute-Schema,CN=ConfigurationCN=Schema,CN=Configuration,DCROOT
ObjectClass: attributeSchema
oMSyntax: 20
rangeLower: 1
rangeUpper: 256
showInAdvancedViewOnly: TRUE

All Check Point attributes can be added in the same way.


The definitions of all attributes in LDIF format are contained in the
schema_microsoft_ad.ldif file located in the $FWDIR/lib/ldap directory.
Before attempting to run the ldapmodify command, edit schema_microsoft_ad.ldif and
replace all instances of DCROOT with the domain root of your organization. For example if your
domain is support.checkpoint.com, replace DCROOT with
dc=support,dc=checkpoint,dc=com.
After modifying the file, run the ldapmodify command to load the file into the directory. For
example if you use the Administrator account of the dc=support,dc=checkpoint,dc=com
domain the command syntax will be as follows:
Note - A shell script is available for UNIX gateways. The script is at:
$FWDIR/lib/ldap/update_schema_microsoft_ad
ldapmodify -c -h support.checkpoint.com -D
cn=administrator,cn=users,dc=support,dc=checkpoint,dc=com" -w SeCrEt -f
$FWDIR/lib/ldap/schema_microsoft_ad.ldif

Security Management Administration Guide R80.20 | 243


Managing User Accounts

Retrieving Information from a User Directory Server


When a gateway requires user information for authentication, it goes through this process:
1. The gateway searches for the user in the internal users database.
2. If the specified user is not defined in the internal users database, the gateway queries the
LDAP server defined in the Account Unit with the highest priority.
3. If the query against an LDAP server with the highest priority fails (for example, the connection
is lost), the gateway queries the server with the next highest priority.
If there is more than one Account Unit, the Account Units are queried concurrently. The results
of the query are taken from the first Account Unit to meet the conditions, or from all the
Account Units which meet the conditions.
4. If the query against all LDAP servers fails, the gateway matches the user against the generic
external user profile.

Running User Directory Queries


Use queries to get User Directory user or group data. For best performance, query Account Units
when there are open connections. Some connections are kept open by the gateways, to make sure
the user belongs to a group that is permitted to do a specified operation.

To query User Directory:


1. In SmartConsole, go to Manage & Settings > Blades.
2. Click Configure in SmartDashboard.
SmartDashboard opens.
3. In the Objects Tree, click Users.
4. Double-click the Account Unit to open a connection to the LDAP server.
5. Right-click the Account Unit and select Query Users/Group.
The LDAP Query Search window opens.
Click Advanced to select specified objects types, such as Users, groups, or templates.
6. Define the query.
7. To add more conditions, select or enter the values and click Add.
Query conditions:
• Attributes - Select a user attribute from the drop-down list, or enter an attribute.
• Operators - Select an operator from the drop-down list.
• Value - Enter a value to compare to the entry's attribute. Use the same type and format as the
actual user attribute. For example, if Attribute is fw1expiration-date, then Value must be in
the yyyymmdd syntax.
• Free Form - Enter your own query expression. See RFC 1558 for information about the syntax
of User Directory (LDAP) query expressions.
• Add - Appends the condition to the query (in the text box to the right of Search Method).

Example of a Query
If you create a query where:
• Attributes = mail
• Contains
Security Management Administration Guide R80.20 | 244
Managing User Accounts

• Value = Andy
The server queries the User Directory with this filter:
filter:(&(|(objectclass=fw1person)(objectclass=person)
(objectclass=organizationalPerson)(objectclass=inetOrgPerson))
(|(cn=Brad)(mail=*Andy*)))

Querying Multiple LDAP Servers


The Security Management server and the gateways can work with multiple LDAP servers
concurrently. For example, if a gateway needs to find user information, and it does not know
where the specified user is defined, it queries all the LDAP servers in the system. (Sometimes a
gateway can find the location of a user by looking at the user DN, when working with certificates.)

Deploying User Directory


User Directory integrates the Security Management Server and an LDAP server and lets the
Security Gateways use the LDAP information.

Item Description
1 Security Gateway - Retrieves LDAP user information and CRLs
2 Internet
3 Security Gateway - Queries LDAP user information, retrieves CRLs, and does bind
operations for authentication
4 Security Management Server - Uses User Directory to manage user information
5 LDAP server - Server that holds one or more Account Units

Enabling User Directory


In SmartConsole, enable the Security Management Server to manage users in the Account Unit
(on page 246).
Note - You cannot use the SmartConsole User Database when the User Directory LDAP server is
enabled.

To enable User Directory on the Security Management Server:


1. From the Menu, select Global Properties > User Directory.

Security Management Administration Guide R80.20 | 245


Managing User Accounts

The User Directory page opens.


2. Select Use User Directory for Security Gateways.
3. Configure login and password settings.
4. Click OK.
5. In the Gateways & Servers view (Ctrl+1), open the Security Management Server object for
editing
6. On General Properties page, Management tab, select Network Policy Management and
User Directory.
7. Click OK.
8. Install the policy.

Account Units
An Account Unit represents branches of user information on one or more LDAP servers. The
Account Unit is the interface between the LDAP servers and the Security Management Server and
Security Gateways.
You can have a number of Account Units representing one or more LDAP servers. Users are
divided among the branches of one Account Unit, or between different Account Units.
Note - When you enable the Identity Awareness and Mobile Access Software Blades,
SmartConsole opens a First Time Configuration Wizard. The Active Directory Integration window
of this wizard lets you create a new AD Account Unit. After you complete the wizard, SmartConsole
creates the AD object and Account Unit.

Working with LDAP Account Units


Use the LDAP Account Unit Properties window in SmartConsole to edit an existing Account Unit
or to create a new one manually.

To edit an existing LDAP Account Unit:


1. In SmartConsole, open the Object Explorer (press the CTRL+E keys).
2. Select Servers > LDAP Account Units.
3. Right-click the LDAP Account Unit and select Edit.
The LDAP Account Unit Properties window opens.
4. Edit the settings in these tabs:
• General (on page 247) - Configure how the Security Management Server uses the Account
Unit
• Servers (on page 247) - Manage LDAP servers that are used by this Account Unit
• Objects Management (on page 248) - Configure the LDAP server for the Security
Management Server to query and the branches to use
• Authentication (on page 248) - Configure the authentication scheme for the Account Unit
5. Click OK.
6. Install the Access Control Policy.

To create a new LDAP Account Unit:


1. In the Objects tab, click New > More > Server > LDAP Account unit.
The LDAP Account Unit Properties window opens.

Security Management Administration Guide R80.20 | 246


Managing User Accounts

2. Configure the settings on these tabs:


• General (on page 247) - Configure how the Security Management Server uses the Account
Unit
• Servers (on page 247) - Manage LDAP servers that are used by this Account Unit
• Objects Management (on page 248) - Configure the LDAP server for the Security
Management Server to query and the branches to use
• Authentication (on page 248) - Configure the authentication scheme for the Account Unit
3. Click OK.
4. Install the Access Control Policy.

General Tab
These are the configuration fields in the General tab:
• Name - Name for the Account Unit
• Comment - Optional comment
• Color - Optional color associated with the Account Unit
• Profile - LDAP vendor
• Domain - Domain of the Active Directory servers, when the same user name is used in
multiple Account Units (this value is also necessary for AD Query and SSO)
• Prefix - Prefix for non-Active Directory servers, when the same user name is used in multiple
Account Units
• Account Unit usage - Select applicable options:
• CRL retrieval - The Security Management Server manages how the CA sends information
about revoked licenses to the Security Gateways
• User Management - The Security Management Server uses the user information from this
LDAP server (User Directory must be enabled on the Security Management Server)
Note - LDAP SSO (Single Sign On) is only supported for Account Unit objects that use User
Management.
• Active Directory Query - This Active Directory server is used as an Identity Awareness
source.
Note - This option is only available if the Profile is set to Microsoft_AD.
• Enable Unicode support - Encoding for LDAP user information in non-English languages
• Active Directory SSO configuration - Click to configure Kerberos SSO for Active Directory -
Domain Name, Account Name, Password, and Ticket encryption method
Configuring an LDAP Server
You can add, edit, or delete LDAP server objects.

To configure an LDAP server for the Account Unit:


1. To add a new server, click Add. To edit an existing one, select it from the table and click Edit.
The LDAP Server Properties window opens.
2. From the Host drop-down menu, select the server object.
If necessary, create a new SmartConsole server object:
a) Click New.

Security Management Administration Guide R80.20 | 247


Managing User Accounts

b) In the New Host window opens, enter the settings for the LDAP server.
c) Click OK.
3. Enter the login credentials and the Default priority.
4. Select access permissions for the Check Point Gateways:
• Read data from this server
• Write data to this server
5. In the Encryption tab, configure the optional SSL encryption settings. To learn about these
settings, see the Help. Click ? or press F1 in the Encryption tab.
6. Click OK.

To remove an LDAP server from the Account Unit:


1. Select a server from the table.
2. Click Remove.
If all the configured servers use the same login credentials, you can modify those simultaneously.

To configure the login credentials for all the servers simultaneously:


1. Click Update Account Credentials.
The Update Account to All Servers window opens.
2. Enter the login credentials.
3. Click OK.

Objects Management Tab


Configure the LDAP server for the Security Management Server to query and the branches to
fetch.
Note - Make sure there is LDAP connectivity between the Security Management Server and the
LDAP Server that holds the management directory.

To configure LDAP query parameters:


1. From the Manage objects on drop-down menu, select the LDAP server object.
2. Click Fetch branches.
The Security Management Server queries and shows the LDAP branches.
3. Configure Branches in use:
• To add a branch, click Add and in the LDAP Branch Definition window that opens, enter a
new Branch Path
• To edit a branch, click Edit and in the LDAP Branch Definition window that opens, modify
the Branch Path
• To delete a branch, select it and click Delete
4. Select Prompt for password when opening this Account Unit, if necessary (optional).
5. Configure the number of Return entries that are stored in the LDAP database (the default is
500).

Authentication Tab
These are the configuration fields in the Authentication tab:
• Use common group path for queries - Select to use one path for all the LDAP group objects
(only one query is necessary for the group objects)
Security Management Administration Guide R80.20 | 248
Managing User Accounts

• Allowed authentication schemes - Select one or more authentication schemes allowed to


authenticate users in this Account Unit - Check Point Password, SecurID, RADIUS, OS
Password, or TACACS
• Users' default values - The default settings for new LDAP users:
• User template - Template that you created
• Default authentication scheme - one of the authentication schemes selected in the
Allowed authentication schemes section
• Limit login failures (optional):
• Lock user's account after - Number of login failures, after which the account gets locked
• Unlock user's account after - Number of seconds, after which the locked account becomes
unlocked
• IKE pre-shared secret encryption key - Pre-shared secret key for IKE users in this Account
Unit

Modifying the LDAP Server


1. On the LDAP Account Unit Properties > Servers tab, double-click a server.
The LDAP Server Properties window opens.
2. On the General tab, you can change:
• Port of the LDAP server
• Login DN
• Password
• Priority of the LDAP server, if there are multiple servers
• Security Gateway permissions on the LDAP server
3. On the Encryption tab, you can change the encryption settings between Security Management
Server / Security Gateways and LDAP server.
If the connections are encrypted, enter the encryption port and strength settings.
Note - User Directory connections can be authenticated by client certificates from a Certificate
Authority (CA) (on page 250). To use certificates, the LDAP server must be configured with SSL
strong authentication.

Account Units and High Availability


With User Directory replications for High Availability, one Account Unit represents all the
replicated User Directory servers. For example, two User Directory server replications can be
defined on one Account Unit, and two Security Gateways can use the same Account unit.

Security Management Administration Guide R80.20 | 249


Managing User Accounts

Item Description
1 Security Management Server. Manages user data in User Directory. It has an
Account Unit object, where the two servers are defined.
2 User Directory server replication.
3 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory
server replication (2).
4 Internet
5 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory
server replication (6).
6 User Directory server replication.

Setting High Availability Priority


With multiple replications, define the priority of each LDAP server in the Account Unit. Then you
can define a server list on the Security Gateways.
Select one LDAP server for the Security Management server to connect to. The Security
Management server can work with one LDAP server replication. All other replications must be
synchronized for standby.

To set priority on the Account Unit:


1. Open the LDAP Account Unit Properties window.
2. Open the Servers tab.
3. Add the LDAP servers of this Account Unit in the order of the priority that you want.

Authenticating with Certificates


The Security Management Server and Security Gateways can use certificates to secure
communication with LDAP servers. If you do not configure certificates, the management server,
Security Gateways, and LDAP servers communicate without authentication.

To configure User Directory to use certificates:


1. On each Account Unit, to which you want to authenticate with a certificate, set the
ldap_use_cert_auth attribute to true:
a) Connect with GuiDBedit Tool (see sk13009
http://supportcontent.checkpoint.com/solutions?id=sk13009) to Security Management
Server.
b) In the left pane, browse to Table > Managed Objects > servers.
c) In the right pane, select the Account Unit object.
d) In the bottom pane, search for the ldap_use_cert_auth attribute, and set it to true.
e) Save the changes and close GuiDBedit.
2. Log in to SmartConsole.
3. Add a CA object:
a) From the Objects Bar (F11), click New > More > Server > More > Trusted CA.
The Certificate Authority Properties window opens.
Security Management Administration Guide R80.20 | 250
Managing User Accounts

b) In Certificate Authority Type, select External Check Point CA.


c) Set the other options of the CA.
4. For all necessary network objects (such as Security Management Server, Security Gateway,
Policy Server) that require certificate-based User Directory connections:
a) On the IPSec VPN page of the network object properties, click Add in the Repository of
Certificates Available list.
Note - a management-only server does not have an IPSec VPN page. The User Directory on
a management-only server cannot be configured to authenticate to an LDAP server using
certificates.
b) In the Certificate Properties window, select the defined CA.
5. Test connectivity between the Security Management Server and the LDAP Server (on page
251).

Managing Users on a User Directory Server


In SmartConsole, users and user groups in the Account Unit show in the same tree structure as
on the LDAP server.
• To see User Directory users, open Users and Administrators. The LDAP Groups folder holds
the structure and accounts of the server.
• You can change the User Directory templates. Users associated with this template get the
changes immediately. If you change user definitions manually in SmartConsole, the changes
are immediate on the server.

Distributing Users in Multiple Servers


The users of an organization can be distributed across several LDAP servers. Each LDAP server
must be represented by a separate Account Unit.

Managing LDAP Information


User Directory lets you use SmartDashboard to manage information about users and OUs
(Organizational Units) that are stored on the LDAP server.

To manage LDAP information from SmartDashboard:


1. In SmartConsole, go to Manage & Settings > Blades.
2. Click Configure in SmartDashboard.
SmartDashboard opens.
3. From the object tree, select Servers and OPSEC.
4. Double-click the Account Unit.
The LDAP domain is shown.
5. Double-click the LDAP branch.
The Security Management Server queries the LDAP server and SmartDashboard shows the
LDAP objects.
6. Expand the Objects List pane.
7. Double-click the LDAP object.
The Objects List pane shows the user information.

Security Management Administration Guide R80.20 | 251


Managing User Accounts

8. Right-click a user and select Edit.


The LDAP User Properties window opens.
9. Edit the user information and settings and then click OK.

LDAP Groups for the User Directory


Create LDAP groups for the User Directory. These groups classify users according to type and can
be used in Policy rules. You can add users to groups, or you can create dynamic filters.

To create LDAP groups for User Directory:


1. In SmartConsole, open Object Categories > New > More > Users > LDAP group.
2. In the New LDAP Group window that opens, select the Account Unit for the User Directory
group.
3. Define Group's Scope - select one of these:
• All Account-Unit's Users - All users in the group
• Only Sub Tree - Users in the specified branch
• Only Group in branch - Users in the branch with the specified DN prefix
4. Apply an advanced LDAP filter:
a) Click Apply filter for dynamic group.
b) Enter the filter criteria.
5. Click OK.
Examples
• If the User objects for managers in your organization have the object class "myOrgManager",
define the Managers group with the filter: objectclass=myOrgManagers
• If users in your organization have an e-mail address ending with us.org.com, you can define
the US group with the filter: mail=*us.org.com

Access Roles
Access role objects let you configure network access according to:
• Networks
• Users and user groups
• Computers and computer groups
• Remote access clients - will be supported with R80.x gateways
After you activate the Identity Awareness Software Blade, you can create access role objects and
use them in the Source and Destination columns of Access Control Policy rules.

Adding Access Roles


Important: Before you add Active Directory users, machines, or groups to an access role, make
sure there is LDAP connectivity between the Security Management Server and the AD Server that
holds the management directory. The management directory is defined on the Objects
Management tab in the Properties window of the LDAP Account Unit.

Security Management Administration Guide R80.20 | 252


Managing User Accounts

To create an access role:


1. In the object tree, click New> More > Users > Access Role.
The New Access Role window opens.
2. Enter a Name for the access role.
3. Enter a Comment (optional).
4. Select a Color for the object (optional).
5. In the Networks pane, select one of these:
• Any network
• Specific networks - For each network, click and select the network from the list
6. In the Users pane, select one of these:
• Any user
• All identified users - includes any user identified by a supported authentication method
(internal users, Active Directory users, or LDAP users).
• Specific users/groups - For each user or user group, click and select the user or the
group from the list
7. In the Machines pane, select one of these:
• Any machine
• All identified machines - includes machines identified by a supported authentication
method (Active Directory).
• Specific machines - For each machine, click and select the machine from the list
8. In the Remote Access Clients pane, select the clients for remote access.
9. Click OK.
Identity Awareness engine automatically recognizes changes to LDAP group membership and
updates identity information, including access roles. For more, see the R80.20 Identity Awareness
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwa
reness_AdminGuide/html_frameset.htm.

Authentication Rules
To make an authentication rule:
1. Add users to user groups.
2. Define an access role (on page 252) for networks, users and user groups, and computers and
computer groups.
3. Make the authentication rules with the access roles in the Source.

Security Management Administration Guide R80.20 | 253


CHAPTER 16

Client Certificates for Smartphones and


Tablets
In This Section:
Managing Client Certificates ....................................................................................254
Creating Client Certificates ......................................................................................255
Revoking Certificates ...............................................................................................255
Creating Templates for Certificate Distribution ......................................................256
Cloning a Template ..................................................................................................257
Giving Permissions for Client Certificates ...............................................................257

To allow your users to access their resources using their handheld devices, make sure they can
authenticate to the Gateway with client certificates.
In many organizations, the daily task of assigning and maintaining client certificates is done by a
different department than the one that maintains the Security Gateways. The computer help desk,
for example. You can create an administrator that is allowed to use SmartConsole to create client
certificates, while restricting other permissions (on page 257).
To configure client certificates, open SmartConsole and go to Security Policies > Access Control >
Access Tools > Client Certificates.
To configure the Mobile Access policy, go to Manage & Settings > Blades > Mobile Access >
Configure in SmartDashboard. The Client Certificates page in SmartConsole is a shortcut to the
SmartDashboard Mobile Access tab, Client Certificates page.

Managing Client Certificates


Check Point Mobile Apps for mobile devices can use certificate-only authentication or two-factor
authentication with client certificates and username/password. The certificate is signed by the
internal CA of the Security Management Server that manages the Mobile Access Security Gateway.
Manage client certificates in Security Policies > Access Control > Access Tools > Client
Certificates..
The page has two panes.
• In the Client Certificates pane:
• Create, edit, and revoke client certificates.
• See all certificates, their status, expiration date and enrollment key. By default, only the
first 50 results show in the certificate list. Click Show more to see more results.
• Search for specified certificates.
• Send certificate information to users.
• In the Email Templates for Certificate Distribution pane:
• Create and edit email templates for client certificate distribution.
• Preview email templates.

Security Management Administration Guide R80.20 | 254


Client Certificates for Smartphones and Tablets

Creating Client Certificates


Note - If you use LDAP or AD, creation of client certificates does not change the LDAP or AD
server. If you get an error message regarding LDAP/AD write access, ignore it and close the
window to continue.

To create and distribute certificates with the client certificate wizard:


1. In SmartConsole, select Security Policies > Access Control > Access Tools > Client
Certificates.
2. In the Client Certificates pane, click New.
The Certificate Creation and Distribution wizard opens.
3. In the Certificate Distribution page, select how to distribute the enrollment keys to users. You
can select one or both options.
a) Send an email containing the enrollment keys using the selected email template - Each
user gets an email, based on the template you choose, that contains an enrollment key.
 Template - Select the email template that is used.
 Site - Select the gateway that users connect to.
 Mail Server - Select the mail server that sends the emails.
You can click Edit to view and change its details.
b) Generate a file that contains all of the enrollment keys - Generate a file for your records
that contains a list of all users and their enrollment keys.
4. Optional: To change the expiration date of the enrollment key, edit the number of days in
Users must enroll within x days.
5. Optional: Add a comment that will show next to the certificate in the certificate list on the
Client Certificates page.
6. Click Next.
The Users page opens.
7. Click Add to add the users or groups that require certificates.
• Type text in the search field to search for a user or group.
• Select a type of group to narrow your search.
8. When all included users or groups show in the list, click Generate to create the certificates
and send the emails.
9. If more than 10 certificates are being generated, click Yes to confirm that you want to
continue.
A progress window shows. If errors occur, an error report opens.
10. Click Finish.
11. Click Save.
12. From SmartConsole, install the Policy.

Revoking Certificates
If the status of a certificate is Pending Enrollment, after you revoke it, the certificate does not
show in the Client Certificate list.

Security Management Administration Guide R80.20 | 255


Client Certificates for Smartphones and Tablets

To revoke one or more certificates:


1. Select the certificate or certificates from the Client Certificate list.
2. Click Revoke.
3. Click OK.
After you revoke a certificate, it does not show in the Client Certificate list.

Creating Templates for Certificate Distribution


To create or edit an email template:
1. In SmartConsole, select Security Policies > Access Control > Access Tools > Client
Certificates.
2. To create a new template: In the Email Templates for Certificate Distribution pane, select
New.
To edit a template: In the Email Templates for Certificate Distribution pane, double-click a
template.
The Email Template opens.
3. Enter a Name for the template.
4. Optional: Enter a Comment. Comments show in the Mail Template list on the Client
Certificates page.
5. Optional: Click Languages to change the language of the email.
6. Enter a Subject for the email. Click Insert Field to add a predefined field, such as a Username.
7. In the message body add and format text. Click Insert Field to add a predefined field, such as
Username, Registration Key, or Expiration Date.
8. Click Insert Link to add a link or QR code and select the type of link to add.
For each link type, you select which elements will be added to the mail template:
• QR Code - Users scan the code with their mobile devices.
• HTML Link - Users tap the link on their mobile devices.
You can select both QR Code and HTML link to include both in the email.
The text in Display Text is the text that shows on the link.
a. Certificate and Site Creation - For users who already have a Check Point app installed.
When users scan the CR code or go to the link, it creates the site and registers the certificate.
• Select the client type that will connect to the site- Select one client type that users will have
installed.
 Capsule Workspace - An app that creates a secure container on the mobile device to
give users access to internal websites, file shares, and Exchange servers.
 Capsule Connect/VPN - A full L3 tunnel app that gives users network access to all
mobile applications.
b. Download Application - Direct users to download a Check Point App for their mobile
devices.
• Select the client device operating system:
 iOS
 Android

Security Management Administration Guide R80.20 | 256


Client Certificates for Smartphones and Tablets

• Select the client type to download:


 Capsule Workspace - An app that creates a secure container on the mobile device to
give users access to internal websites, file shares, and Exchange servers.
 Capsule Connect/VPN - A full L3 tunnel app that gives users network access to all
mobile applications.
• Select which elements will be added to the mail template:
 QR Code - Users scan the code with their mobile devices
 HTML Link - Users tap the link on their mobile devices.
 Display Text - Enter the text to show on the HTML link.
9. Click OK.
10. Optional: Click Preview in Browser to see a preview of how the email will look.
11. Click OK.
12. Publish the changes

Cloning a Template
Clone an email template to create a template that is similar to one that already exists.

To create a clone of an email template:


1. Select a template from the template list in the Client Certificates page.
2. Click Clone.
3. A new copy of the selected template opens for you to edit.

Giving Permissions for Client Certificates


You can create an administrator that is allowed to use SmartConsole to create client certificates,
and restrict other permissions.

To make an administrator for client certificates:


1. Define an administrator (on page 29).
2. Create a customized profile for the administrator (on page 32), with permission to handle
client certificates. Configure this in the Others page of the Administrator Profile. Restrict
other permissions.

Security Management Administration Guide R80.20 | 257


CHAPTER 17

Preferences and Management Settings


In This Section:
Database Revisions ..................................................................................................258
Setting IP Address Versions of the Environment.....................................................259
Restoring Window Defaults ......................................................................................260
Configuring the Login Window .................................................................................260
Testing New SmartConsole Features ......................................................................260
Sync with User Center ..............................................................................................261
Inspection Settings ...................................................................................................261
SmartConsole Extensions ........................................................................................263

Database Revisions
The Security Management architecture has built-in revisions. Each revision is a new restore point
in the database. It contains only the changes from the previous revision. Revisions therefore need
only a small amount of disk space, and are created fast. Other benefits of this architecture are:
• Fast policy verification, based on the difference between installed revisions.
• More efficient Management High Availability.
• Safe recovery from a crisis.
This diagram shows the database revisions over time:

1. Install
2. Upgrade
3. Publish
4. Publish
5. Publish

Working with Database Revisions


To see saved database versions:
In SmartConsole, go to Manage & Settings > Revisions.

To see the changes made during a specific revision:


1. In the Manage & Settings > Revisions window, select revision.
The bottom pane shows the audit logs of the changes made in the revision.
2. Optional: Click View.
A separate read-only SmartConsole session opens.

Security Management Administration Guide R80.20 | 258


Preferences and Management Settings

To delete all versions of the database that are older than the selected version:
1. In the Manage & Settings > Revisions window, select a revision.
2. Click Purge.
3. In the confirmation window that opens, click Yes.
Important - Deletion is irreversible. When you purge, that revision and older revisions are deleted
permanently.

Managing a Crisis Using Database Revisions


Case A connectivity or security problem after making changes to the policy and
installing the policy

Solution 1. Go to Security Policies > Installation History.


2. In the Policy Installation History, choose the last known good version and
click Install specific version.
After a Gateway is safely installed, the Gateway has the last good revision, and
the Security Management Server has the most recent revision.
3. To see the changes made in the revision, browse the audit logs in the bottom
pane of the revision.

Case Network problem after downloading a Threat Prevention update and installing it
on gateways.

Solution 1. From Security Policies > Threat Prevention > Threat Tools > Updates, in the
IPS section, choose an update that is known to be good.
2. Click Switch to Version.
3. Install the Threat Prevention Policy.
The Gateway gets that version of the IPS protections. Other network objects and
policies do not change.

More Database Revision Scenarios:


• Need a full environment restore to a certain point in time.
Best Practice: Use Restore Backup. All work done after the backup is lost. To learn more, see
the R80.20 Gaia Administration Guide.
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_Ad
minGuide/html_frameset.htm
• To revert to a previous state, use Revert Policy. This reverts the structure of the Rule Base,
but not the objects used in the Rule Base.

Setting IP Address Versions of the Environment


Many objects and rules use IP addresses. Configure the version that your environment uses to see
only relevant options.

To set IP address version:


1. Click Manage & Settings.

Security Management Administration Guide R80.20 | 259


Preferences and Management Settings

2. Click Preferences.
3. Select the IP address version that your environment uses: IPv4, IPv6, or IPv4 and IPv6.
4. Select how you want to see subnets: Mask Length or Subnet Mask.

Restoring Window Defaults


Some windows in the SmartConsole offer administrators the option to not see the window again.
You can undo this selection, and restore all windows to show again.
This option is available only if administrators selected do not show in a window.

To restore windows from "do not show":


1. Click Manage & Settings.
2. Click Preferences.
3. In the User Preferences area, click Restore All Messages.

Configuring the Login Window


Administrators in your environment use SmartConsole daily. Customize the Login window, to set
the environment to comply with your organization's culture.

To customize the Login window:


1. Click Manage & Settings.
2. Click Preferences > Login Message.
The Login Message window opens.
3. Select Show custom message during login.
4. In Customize Message, enter a Header and Message for administrators to see.
The default suggestion is:
Warning
This system is for authorized use only
5. If you want the message to have a warning icon, in Customize Layout, select Add warning
sign.
6. If you want the Login window to show your organization's logo, in Customize Layout, select
Add logo and then Browse to an image file.

Testing New SmartConsole Features


You can influence Check Point product development by selecting and testing one or more of the
new features listed here.

To test a new SmartConsole feature:


1. Click Manage & Settings.
2. Click Preferences.
3. In the Check Point Lab area, select the feature you want to test:
• Enable Session pane - Review all changes before you publish

Security Management Administration Guide R80.20 | 260


Preferences and Management Settings

Sync with User Center


You can add information regarding your environment to User Center, such as gateway name,
version, and active blades. Check Point uses this additional information for better inventory
management, pro-active support, and more efficient ticket resolution.
To learn more, see sk94064 http://supportcontent.checkpoint.com/solutions?id=sk94064.

To sync with User Center:


1. In SmartConsole, click Manage & Settings.
2. Click Sync with User Center
3. Select Synchronize information once a day.

Inspection Settings
You can configure inspection settings for the Firewall:
• Deep packet inspection settings
• Protocol parsing inspection settings
• VoIP packet inspection settings
The Security Management Server comes with two preconfigured inspection profiles for the
Firewall:
• Default Inspection
• Recommended Inspection
When you configure a Security Gateway, the Default Inspection profile is enabled for it. You can
also assign the Recommended Inspection profile to the Security Gateway, or to create a custom
profile and assign it to the Security Gateway.
To activate the Inspection Settings, install the Access Control Policy.
Note - In a pre-R80 SmartConsole, Inspection Settings are configured as IPS Protections.

Configuring Inspection Settings


To configure Inspection Settings:
1. In SmartConsole, go to the Manage & Settings > Blades view.
2. In the General section, click Inspection Settings.
The Inspection Settings window opens.
You can:
• Edit inspection settings.
• Edit user-defined Inspection Settings profiles. You cannot change the Default Inspection
profile and the Recommended Inspection profile.
• Assign Inspection Settings profiles to Security Gateways.
• Configure exceptions to settings.

Security Management Administration Guide R80.20 | 261


Preferences and Management Settings

To edit a setting:
1. In the Inspection Settings > General view, select a setting.
2. Click Edit.
3. In the window that opens, select a profile, and click Edit.
The settings window opens.
4. Select the Main Action:
• Default Action - preconfigured action
• Override with Action - from the drop-down menu, select an action with which to override
the default - Accept, Drop, Inactive (the setting is not activated)
5. Configure the Logging Settings
Select Capture Packets, if you want to be able to examine packets that were blocked in Drop
rules.
6. Click OK.
7. Click Close.

To view settings for a certain profile:


1. In the Inspection Settings > General view, click View > Show Profiles.
2. In the window that opens, select Specific Inspection settings profiles.
3. Select profiles.
4. Click OK.
Only settings for the selected profiles are shown.
You can add, edit, clone, or delete custom Inspection Settings profiles.

To edit a custom Inspection Settings profile:


1. In the Inspection Settings > Profiles view, select a profile.
2. Click Delete, to remove it, or click Edit to change the profile name, associated color, or tag.
3. If you edited the profile attributes, click OK to save the changes.

To add a new Inspection Settings profile:


1. In the Profiles view, click New.
2. In the New Profile window that opens, edit the profile attributes:
3. Click OK.

To assign an Inspection Settings profile to a Security Gateway:


1. In the Inspection Settings > Gateways view, select a gateway, and click Edit.
2. In the window that opens, select an Inspection Settings profile.
3. Click OK.

To configure exceptions to inspection settings:


1. In the Inspection Settings > Exceptions view, click New to add a new exception, or select an
exception and click Edit to modify an existing one.
The Exception Rule window opens.
2. Configure the exception settings:
• Apply To - select the Profile to which to apply the exception

Security Management Administration Guide R80.20 | 262


Preferences and Management Settings

• Protection - select the setting


• Source - select the source Network Object, or select IP Address and enter a source IP
address
• Destination - select the destination Service Object
• Service - select Port/Range, TCP or UDP, and enter a destination port number or a range
of port numbers
• Install On - select a gateway on which to install the exception
3. Click OK.
To enforce the changes, install the Access Control Policy.

SmartConsole Extensions
SmartConsole Extensions is an open platform within SmartConsole which allows it to integrate
with web-based interfaces of other systems. For example, you can create a web-interface for an
existing ticketing system, and integrate it within SmartConsole so that associated tickets are seen
for every rule in the Rule Base.
Customers, vendors, and third-parties can develop their own Extensions to integrate into
SmartConsole.

Importing Extensions into SmartConsole


The client system that runs SmartConsole saves installed Extensions locally. You must install
Extensions on each client system that runs SmartConsole.

To import an extension:
1. On SmartConsole, go to Manage & Settings > Preferences > SmartConsole Extensions > +.
The Import SmartConsole Extension window opens.
2. Enter the web-service manifest URL for the manifest file and click OK. The URL must be an
HTTPS URL.
Note - When the hosting server uses an invalid SSL certificate (self-signed), it prompts an
Invalid Certificate confirmation window. Confirm the server's fingerprint against the SSL
certificate which runs the Extension by selecting View Certificate. On the Certificate window,
you can enable trust for this certificate with a click on Install Certificate to use the Certificate
Import Wizard.
SmartConsole retrieves the manifest file and displays these Extension details in the
SmartConsole Extension Installation window:

Parameter Name Description Example


Name Extension displayed name Demo Extension
Provider The URL for the Extension service entry point ACME Labs
Server Name The Extension provider hosting server name acme.com
Certificate Server Certificate
Required Permission The required accessibility which Extension Read relevant objects
request to acquire from the installed
location

Security Management Administration Guide R80.20 | 263


Preferences and Management Settings

You can disable Extensions from SmartConsole. To disable an Extension, clear the box next to the
Extension name. To uninstall an Extension, select the Extension and click the X above the
Extension list. You do not need to restart SmartConsole to install, uninstall, enable, or disable
Extensions.

Configuring Extension Settings


To configure the Extension settings:
In SmartConsole, go to Manage & Settings > Preferences > SmartConsole Extensions,
double-click the Extension you imported. The Settings window for the Extension opens:
• The Extension Key allows any string you enter to identify the Extension.
• Key Data allows developers to customize the extensions through these keys, such as choosing
a color theme.

Certified Check Point Extensions and Development


Extensions reviewed and verified by Check Point are distinguished by a green check sign.
To learn more about developing extensions, see the SmartConsole Extension Developer Guide
https://sc1.checkpoint.com/documents/SmartConsole/Extensions/index.html.

Security Management Administration Guide R80.20 | 264


CHAPTER 18

Management High Availability


In This Section:
Overview of Management High Availability ..............................................................265
The High Availability Environment ...........................................................................265
Configuring a Secondary Server in SmartConsole ..................................................266
Synchronizing Active and Standby Servers ..............................................................267
Changeover Between Active and Standby................................................................268
Changing a Server to Active or Standby ...................................................................269
High Availability Troubleshooting ............................................................................269
Environments with Endpoint Security ......................................................................270
High Availability Disaster Recovery .........................................................................270

Overview of Management High Availability


High Availability is redundancy and database backup for management servers. Synchronized
servers have the same policies, rules, user definitions, network objects, and system configuration
settings.
Management High Availability uses the built-in revisions technology and allows the High
Availability procedure to synchronize only the changes done since the last synchronization. This
provides:
• Real-time updates between management peers.
• Minimal effect on the management server resources.
The first management server installed is the primary. If the primary Security Management Server
fails, or is off line for maintenance, the administrator can initiate a changeover, so that the
secondary server takes over.
Notes:
• High Availability (and Load Sharing) for Security Gateways is covered in the R80.20 ClusterXL
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_ClusterX
L_AdminGuide/html_frameset.htm.
• For Endpoint Security environments, see the R80.20 Endpoint Security Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Endpoint
Security_AdminGuide/html_frameset.htm.

The High Availability Environment


A Management High Availability environment includes:
• One Active Security Management Server
• One or more Standby Security Management Server
For full redundancy, the active management server at intervals synchronizes its database with the
secondary server or servers.
Security Management Administration Guide R80.20 | 265
Management High Availability

Active vs. Standby


In a standard High Availability configuration there is one Active server at a time. The administrator
uses the Active server manage the High Availability configuration. The Active server automatically
synchronizes the standby server(s) at regular intervals. You can open a Standby server only in
Read Only mode. If the Active server fails, you can initiate a changeover to make a Standby server
become the Active server. If communication with the Active server fails, there may be more than
one Active server. This is called Collision Mode.

Primary Server vs. Secondary Server


The sequence in which you install management servers defines them as Primary or Secondary.
The first management server installed becomes the Primary active server. When you install
more Security Management Servers, you define them as Secondary. Secondary servers are
Standby servers by default.
Important notes about backing up and restoring in Management High Availability environment:
• To back up and restore a consistent environment, make sure to collect and restore the
backups and snapshots from all servers in the High Availability environment at the same time.
(This does not apply to Multi-Domain Log Servers.)
• Make sure other administrators do not make changes in SmartConsole until the backup
operation is completed.
For more information:
• About Gaia Backup and Gaia Snapshot, see the R80.20 Gaia Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_Ad
minGuide/html_frameset.htm.
• About the migrate export and migrate import commands, see the R80.20 CLI Reference
Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_Ref
erenceGuide/html_frameset.htm.
• About the mds_backup and mds_restore commands, see the R80.20 Multi-Domain Security
Management Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Multi-Do
mainSecurityManagement_AdminGuide/html_frameset.htm.
• About Virtual Machine Snapshots, see the vendor documentation.

Configuring a Secondary Server in SmartConsole


In the SmartConsole connected to the Primary server, create a network object to show the
Secondary Security Management Server. After you publish, synchronize starts between the
primary and secondary servers.

To configure the secondary server in SmartConsole:


1. Open SmartConsole.
2. In Object Categories, click New > More > Network Object > Gateways and Servers > Check
Point Host.
3. On the General Properties page, enter a unique name and IP address for the server.
4. In the Software Blades section, select the Management tab.
5. Select Network Policy Management.
Security Management Administration Guide R80.20 | 266
Management High Availability

This automatically selects the Secondary Server, Logging and Status, and Provisioning.
6. Create SIC trust between the Secondary Security Management Server and the Primary:
a) Click Communication.
b) Enter the SIC Activation Key of the secondary server.
c) Click Initialize.
d) Click Close.
7. Click OK.
8. Click Publish to save these session changes to the database.
On publish, the initialization and synchronization between the servers start.
9. Monitor these tasks in the Task List, in the SmartConsole System Information area. Wait for
the Task List to show that a full sync has completed.
10. Open the High Availability Status window and make sure there is one active server, and one
standby.

Synchronizing Active and Standby Servers


At intervals, the Active server synchronizes with the standby server or servers, and when you
publish the session. Sessions that are not published are not synchronized.

Monitoring High Availability


The High Availability Status window shows the status of each Security Management Server in the
High Availability configuration.

To see the server status in your High Availability environment:


1. Open SmartConsole and connect to a primary or secondary server.
2. On the Menu, click High Availability.
The High Availability Status window opens.
For the management server and its peer or peers in the High Availability configuration, the High
Availability Status window shows:
• A Warning or Error message – The message shows if there is a problem between the High
Availability peers.
• Connected To - The server that SmartConsole is connected to. Also, the High Availability mode
of the server (Active or Standby), and the synchronization status and actions of the server (on
page 267).
• Peers - The servers that the connected server sees. Also, the High Availability mode of each
server (Active or Standby), and the synchronization status and actions of each server.

Monitoring Synchronization Status and Actions


Status messages can be general, meaning that they apply to the full system, or they can apply to a
specified active or standby server. General messages show in the yellow overview banner.

Security Management Administration Guide R80.20 | 267


Management High Availability

General Status messages in Description


overview banner
The database of the primary Security Management Server
is identical with the database of the secondary.
Some servers could not be A communication issue prevents synchronization, or some
synchronized other synchronization issue exists.
The active and standby servers are not communicating.
Communication Problem Some services are down or cannot be reached.
Collision or HA conflict More than one management server configured as active.
Two active servers cannot sync with each other.

When connected to a specified active management server:

Status window area: Peer Status Additional Information


Connected to: Active SmartConsole is connected to the active
management server.
Peers Standby The peer is in standby. The message can also
show:
• Sync problem, last time sync
• Synchronized successfully. Last sync time:
<time>
• No communication
Not communicating,
last sync time
Active A state of collision exists between two servers
both defined as active.

When connected to a specified standby management server:

Status window area: Peer Status Description


Connected to: Standby Also shows: last sync time.
Peers Active The peer is in standby. The message can also
show:
• No communication, last sync time
• OK., last sync time: <time>
• Sync problem, last sync time (in any
direction)
Standby or Unknown Can also show: no communication.

Changeover Between Active and Standby


Changeover between the primary (active) and secondary (standby) management server is not
automatic. If the Active fails or it is necessary to change the Active to a Standby, you must do this
manually. When the management server becomes Standby it becomes Read Only, and gets all
changes from the new Active server.
Security Management Administration Guide R80.20 | 268
Management High Availability

Changing a Server to Active or Standby


The Active server synchronizes with the Standby server or servers at intervals, and when you
publish the session. Sessions that are not published are not synchronized.
When the administrator initiates changeover, all public data is synchronized from the new Active
to the new Standby server after the Standby becomes Active. Data from the new Active overrides
the data on the new Standby. Unpublished changes are not synchronized.
Best Practice - We recommend that you publish changes before initiating a changeover to the
Standby.

To Interchange the Active and Standby:


1. Open SmartConsole.
2. Connect to the Standby server.
3. On the Menu button, select High Availability.
The High Availability Status window opens.
4. Use the Action buttons to change the Standby server to Active.
This changes the previous Active server to Standby.

Working in Collision Mode


You can make more than one server Active. You may need to do that if there is no connectivity to
the primary. When you change the Standby to Active, it becomes Active without telling the current
Active server to become Standby. This is known as collision mode. You can later change one of the
Active servers to Standby, and return to the standard configuration.
When in collision mode, the Active servers do not sync even if they have network connectivity.
When you change one of them to Standby, sync starts and overwrites the data on the Standby
server with the remaining Active data.

High Availability Troubleshooting


These error messages show in the High Availability Status window when synchronization fails:

Not communicating
Solution:
1. Check connectivity between the servers.
2. Test SIC.

Collision or HA Conflict
More than one management server is configured as active.
Solution:
1. From the main SmartConsole menu, select Management High Availability.
The High Availability Status window opens.
2. Use the Actions button to set one of the active servers to standby.

Security Management Administration Guide R80.20 | 269


Management High Availability

Warning - When this server becomes the Standby, all its data is overwritten by the active server.

Sync Error
Solution:
Do a manual sync.

Environments with Endpoint Security


Environments that include Endpoint Security require additional steps and information.
See High Availability in the R80.20 Endpoint Security Administration Guide for details
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_EndpointSe
curity_AdminGuide/html_frameset.htm.

High Availability Disaster Recovery


If the primary management server becomes permanently unavailable:
• Create a new Primary server with the IP address of the original Primary server (on page 270)
Note - This is not supported for environments with Endpoint Security.
• Promote the Secondary server to Primary and create new licenses.
IMPORTANT: Check Point product licenses are linked to IP addresses. At the end of the
disaster recovery you must make sure that licenses are correctly assigned to your servers.

Creating a New Primary Management Server


To create a new Primary Management Server:
1. Change the Secondary Management Server from Standby to Active.
2. Promote the Secondary Management Server to be Primary. Follow the procedure of Promoting
a Secondary Management Server (on page 270) (no need to do step 5).
3. Install the new Secondary Management Server with the IP of the old Primary Management
Server.
4. Reset SIC and connect with SIC to the new Secondary Management Server.

To set the old Primary Management Server as the new Primary Management Server:
1. Change the new Secondary Management Server from Standby to Active.
2. Promote the new Secondary Management Server to be the Primary Management Server.
Follow the procedure of Promoting a Secondary Management Server (on page 270) (no need to
do step 5).
3. Create the Secondary Management Server on the old Secondary Management Server with the
original IP of the old Secondary Management Server.
4. Reset SIC and connect with SIC to the Secondary Management Server.

Promoting a Secondary Server to Primary


The first management server installed is the Primary Server and all servers installed afterwards
are Secondary servers. The Primary server acts as the synchronization master. When the Primary
Security Management Administration Guide R80.20 | 270
Management High Availability

server is down, secondary servers cannot synchronize their databases until a Secondary is
promoted to Primary and the initial syncs completes.
Note - This is the disaster recovery method supported for High Availability environments with
Endpoint Security.

To promote a Secondary server to become the Primary server:


1. On the Secondary Server that you will promote, run:
#$FWDIR/bin/promote_util
#cpstop
2. Remove the $FWDIR/conf/mgha* files. They contain information about the current
Secondary settings. These files will be recreated when you start the Check Point services.
3. Make sure you have a mgmtha license on the newly promoted server.
Note - All licenses must have the IP address of the promoted Security Management Server.
4. Run cpstart on the promoted server.
5. Open SmartConsole, and:
a) Make the secondary server active.
b) Remove all instances of the old Primary Management object. To see all of the instances,
right-click the object and select Where Used.
Note - When you remove the old Primary server, all previous licenses are revoked.
c) Install database.

Security Management Administration Guide R80.20 | 271


APPENDIX A

The ICA Management Tool


The ICA Management Tool lets you:
• Manage certificates
• Run searches
• Recreate CRLs
• Configure the ICA
• Remove expired certificates
Note - The ICA Management Tool supports TLS.
Check Point ICA is fully compliant with X.509 standards for both certificates and CRLs. See the
related X.509 and PKI documentation, and RFC 2459 for more information.
For more information, see:
• sk30501: Setting up the ICA Management Tool
http://supportcontent.checkpoint.com/solutions?id=sk30501
• sk102837: Best Practices - ICA Management Tool configuration
http://supportcontent.checkpoint.com/solutions?id=sk102837
• sk39915: Invoking the ICA Management Tool
http://supportcontent.checkpoint.com/solutions?id=sk39915
In This Appendix
Using the ICA Management Tool ..............................................................................273
Enabling and Connecting to the ICA Management Tool ..........................................273
The ICA Management Tool GUI ................................................................................273
User Certificate Management ..................................................................................274
Performing Multiple Simultaneous Operations .......................................................275
ICA Administrators with Reduced Privileges ...........................................................275
Management of SIC Certificates ..............................................................................275
Management of Gateway VPN Certificates ..............................................................275
Management of User Certificates in SmartConsole ................................................276
Notifying Users about Certificate Initialization ........................................................276
Retrieving the ICA Certificate ...................................................................................276
Searching for a Certificate .......................................................................................276
Removing and Revoking Certificates and Sending Email Notifications ..................278
Submitting a Certificate Request to the CA .............................................................278
Initializing Multiple Certificates Simultaneously .....................................................279
CRL Management .....................................................................................................280
CRL Operations ........................................................................................................281
CA Cleanup ...............................................................................................................281
Configuring the CA ...................................................................................................281
CA Data Types and Attributes ..................................................................................281
Certificate Longevity and Statuses ..........................................................................285

Security Management Administration Guide R80.20 | 272


The ICA Management Tool

Using the ICA Management Tool


Use the ICA management tool for user certificate operations only, such as certificate creation. Do
not use the ICA management tool to change SIC certificates or VPN certificates. Change SIC and
VPN certificates in SmartConsole.
To use the ICA management tool, you must first enable it on the Security Management Server.

Enabling and Connecting to the ICA Management Tool


The ICA Management Tool is disabled by default.

To enable the ICA Management tool


Run this command on the Security Management Server:
cpca_client [-d] set_mgmt_tool on|off [-p <ca_port>] [-a|-u
"administrator|user DN" ... ]
The command options are:

Option Description
on Starts the ICA Management Tool (by opening port 18265)
off Stops the ICA Management Tool (by closing port 18265)
-p Changes the port used to connect to the CA (if the default
port is not being used)
-a "administrator DN" ... Sets the DNs of the administrators that will be allowed to
use the ICA Management Tool
-u "user DN" ... Sets the DNs of users allowed to use the ICA Management
Tool. An option intended for administrators with limited
privileges.

Note - If cpca_client is run without -a or -u parameters, the list of the allowed users and
administrators remains unchanged.

To Connect to the ICA Management Tool


1. Add the administrator's certificate to the browser's certificate repository.
2. Open the ICA Management tool from the browser using this address:
https://<Management_Host_Name>:18265
Authenticate when requested.

The ICA Management Tool GUI


Item Description
1 Menu Pane
Shows a list of operations

Security Management Administration Guide R80.20 | 273


The ICA Management Tool

Item Description
2 Operations Pane
Manage certificates. The window divides into Search attributes configuration and Bulk
operation configuration.
Create Certificates.
Configure the CA. Contains configuration parameters You can also view the CA's time,
name, and the version and build number of the Security Management Server.
Manage CRLs. Download, publish, and recreate CRLs.
3 Search Results Pane. The results of the applied operation show in this pane. This
window consists of a table with a list of certificates and certificate attributes.

Connect to the ICA Management tool using a browser and HTTPS connection.
Important: Before connecting, make sure to add an administrator certificate to the browser's
store.

User Certificate Management


Internally managed User Certificates can be initialized, revoked or have their registrations
removed using the ICA Management Tool. User Certificates of users managed on an LDAP server
can only be managed using the ICA Management Tool.
This table shows User Certificate attributes that can be configured using the ICA Management
Tool

Attributes Default Configurable Comments


validity 2 years yes
key size 2048 bits yes Can be set to 4096 bits
DN of User certificates CN=user name, no This DN is appended to the
managed by the internal OU=users DN of the ICA
database
DN of User certificates yes Depends on LDAP branch
managed on an LDAP
server
KeyUsage 5 yes Digital signature and Key
encipherment
ExtendedKeyUsage 0 (no KeyUsage) yes

Modifying the Key Size for User Certificates


If the user completes the registration from the Remote Access machine, the key size can be
configured in the Advanced Configuration page in SmartConsole.

To configure the key size:


1. From the Menu, select Global Properties.
2. Go to Advanced, and in the Advanced Configuration section, click configure.
The Advanced Configuration window opens.

Security Management Administration Guide R80.20 | 274


The ICA Management Tool

3. Go to the Certificates and PKI properties page.


4. Set the new key size for this property: user_certs_key_size.
5. Click OK.
You can also change the key size using the GuiDBedit Tool (see sk13009
http://supportcontent.checkpoint.com/solutions?id=sk13009). Change the key size as it is listed in
users_certs_key_size Global Property. The new value is downloaded when you update
the site.

Performing Multiple Simultaneous Operations


The ICA Management Tool can do multiple operations at the same time. For example:
• Run an LDAP query for the details of all the organization's employees
• Create a file out of this data, and then use this file to:
• Start (initialize) the creation of certificates for all employees
• Send a notification about the new certificates to each of those employees
These operations can be done simultaneously:
• Start (initialize) user certificates
• Revoke user certificates
• Send mail to users
• Remove expired certificates
• Remove certificates for which the registration procedure was not completed

ICA Administrators with Reduced Privileges


The ICA Management Tool supports administrators with limited privileges. These administrators
cannot execute multiple concurrent operations, and their privileges include only these:
• Basic searches
• Initialization of certificates for new users

Management of SIC Certificates


SIC certificates are managed using SmartConsole.

Management of Gateway VPN Certificates


VPN certificates are managed in the VPN page of the corresponding network object. These
certificates are issued automatically when the IPSec VPN blade is defined for the Check Point
gateway or host. This definition is specified in the General Properties window of the
corresponding network object.
If a VPN certificate is revoked, a new one is issued automatically.

Security Management Administration Guide R80.20 | 275


The ICA Management Tool

Management of User Certificates in SmartConsole


The user certificates of users that are managed on the internal database are managed in
SmartConsole.
For more information, see User Certificates in the R80.20 Remote Access VPN Administration
Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_RemoteAcc
essVPN_AdminGuide/html_frameset.htm.

Notifying Users about Certificate Initialization


The ICA Management Tool can be configured to send a notification to users about certificate
initialization. To send mail notifications
1. In the Menu pane, click Configure the CA.
2. In the Management Tool Mail Attributes area, configure:
• The mail server
• The mail "From" address
• An optional 'To' address, which can be used if the users' address is not known
The administrator can use this address to get the certificates on the user's behalf and
forward them later.
3. Click Apply.

Retrieving the ICA Certificate


For trust purposes, some gateways and remote clients, such as peer gateways that are not
managed by the Security Management Server or clients using Clientless VPN, must retrieve the
ICA certificate.

To retrieve the ICA Certificate:


1. Open a browser and enter the applicable URL.
Use this format:
http://<Management Server IP address>:18264
The Certificate Services window opens.
2. Use the links to download the CA certificate to your computer or (in Windows) install the CA
certification path.

Searching for a Certificate


There are two search options:
• A basic search that includes only the user name, type, status and the serial number
• An advanced search that includes all the search fields (can only be performed by
administrators with unlimited privileges)

Security Management Administration Guide R80.20 | 276


The ICA Management Tool

To do a certificate search:
In the Manage Certificates page, enter the search parameters, and click Search.

Basic Search Parameters


• User Name - Username string (by default, this field is empty)
• Type - a drop-down list with these options:
• Any (default)
• SIC
• Gateway
• Internal User or LDAP user
• Status - Drop-down list with these options:
• Any (default)
• Pending
• Valid
• Revoked
• Expired
• Renewed (superseded)
• Serial Number - Serial number of the requested certificate (by default, this field is empty)

Advanced Search Attributes


In addition to the parameters of the basic search, specify these parameters:
• Sub DN - DN substring (by default, this field is empty)
• Valid From - Date, from which the certificate is valid, in the format dd-mmm-yyyy [hh:mm:ss]
(for example 15-Jan-2003) (by default, this field is empty)
• Valid To - Date until which the certificate is valid, in the format dd-mmm-yyyy [hh:mm:ss] (for
example 14-Jan-2003 15:39:26) (by default, this field is empty)
• CRL Distribution Point - Drop-down list with these options:
• Any (default)
• No CRL Distribution Point (for certificates issued before the management upgrade - old
CRL mode certificates)
The list also shows all available CRL numbers.

The Search Results


The results of a search show in the Search Results pane. This pane consists of a table with a list
of searched certificate attributes such as:
• (SN) Serial Number - The SN of the certificate
• User Name (CN) - The string between the first equals sign ("=") and the next comma (",")
• DN
• Status - One of these: Pending, Valid, Revoked, Expired, Renewed (superseded)
• The date from which certificates are valid until the date they expire

Security Management Administration Guide R80.20 | 277


The ICA Management Tool

Note - The status bar shows search statistics after each search.

Viewing and Saving Certificate Details


You can view or save the certificate details that show in the search results.

To view and save certificate details:


Click on the DN link in the Search Results pane.
• If the status is pending, the certificate information together with the registration key shows,
and a log entry is created and shows in SmartConsole > Logs & Monitor > Logs.
• If the certificate was already created, you can save it on a disk or open directly (if the operating
system recognizes the file extension)

Removing and Revoking Certificates and Sending Email


Notifications
1. In the Menu pane, click Manage Certificates.
2. Search for certificates (on page 276) with set attributes.
The results show in the Search Results pane.
3. Select the certificates, as needed, and click one of these options:
• Revoke Selected - revokes the selected certificates and removes pending certificates from
the CA's database
• Remove Selected - removes the selected certificates from the CA's database and from the
CRL
Note - You can only remove expired or pending certificates.
• Mail to Selected - sends mail for all selected pending certificates
The mail includes the authorization codes. Messages to users that do not have an email
defined are sent to a default address. For more, see Notifying Users about Certificate
Initialization (on page 276).

Submitting a Certificate Request to the CA


There are three ways to submit certificate requests to the CA:
• Initiate - A registration key is created on the CA and used once by a user to create a certificate
• Generate - A certificate file is created and associated with a password which must be entered
when the certificate is accessed
• PKCS#10 - When the CA receives a PKCS#10 request, the certificate is created and delivered
to the requester

To initiate a certificate:
1. In the Menu pane, select Create Certificates > Initiate.
2. Enter a User Name or Full DN, or click Advanced and fill in the form:
• Certificate Expiration Date - Select a date or enter the date in the format dd-mmm-yyyy
[hh:mm:ss] (the default value is two years from the date of creation)
Security Management Administration Guide R80.20 | 278
The ICA Management Tool

• Registration Key Expiration Date - Select a date or enter the date in the format
dd-mmm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)
3. Click Go.
A registration key is created and show in the Results pane.
If necessary, click Send mail to user to email the registration key. The number of characters in
the email is limited to 1900.
4. The certificate becomes usable after entering the correct registration key.

To generate a certificate:
1. In the Menu pane, select Create Certificates > Generate.
2. Enter a User Name or Full DN, or click Advanced and fill in the form:
• Certificate Expiration Date - Select a date or enter the date in the format dd-mm-yyyy
[hh:mm:ss] (the default value is two years from the date of creation)
• Registration Key Expiration Date - Select a date or enter the date in the format
dd-mm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)
3. Enter a password.
4. Click Go.
5. Save the P12 file, and supply it to the user.

To create a PKCS#10 certificate:


1. In the Menu pane, select Create Certificates > PKCS#10.
2. Paste into the space the encrypted base-64 buffer text provided.
You can also click on Browse for a file to insert (IE only) to import the request file.
3. Click Create and save the created certificate.
4. Supply the certificate to the requester.

Initializing Multiple Certificates Simultaneously


You can initialize a batch of certificates at the same time.

To initialize several certificates simultaneously:


1. Create a file with the list of DNs to initialize.
Note - There are two ways to create this file - through an LDAP query or a non-LDAP query.
2. In the Menu pain, go to Create Certificates > Advanced.
3. Browse to the file you created.
• To send registration keys to the users, select Send registration keys via email
• To receive a file that lists the initialized DNs with their registration keys, select Save
results to file
This file can later be used in a script.
4. Click Initiate from file.

Files created through LDAP Queries


The file initiated by the LDAP search has this format:
• Each line after a blank line or the first line in the file represents one DN to be initialized

Security Management Administration Guide R80.20 | 279


The ICA Management Tool

• If the line starts with "mail=", the string continues with the mail of the user
If no email is given, the email address will be taken from the ICA's "Management Tool Mail To
Address" attribute.
• If there is a line with the not_after attribute, then the value at the next line is the Certificate
Expiration Date
The date is given in seconds from now.
• If there is a line with the is otp_validity attribute, then the value at the next line is the
Registration Key Expiration Date.
The date is given in seconds from now.
Here is an example of an LDAP Search output:
not_after
86400
otp_validity
3600
uid=user_1,ou=People,o=intranet,dc=company,dc=com
mail=user_1@company.com
<blank_line>

uid=…

For more information, see User Directory (on page 222).

Files created through a Simple Non-LDAP Query


It is possible to create a simple (non-LDAP) query by configuring the DN + email in a file using this
format:
<email address> space <DN>
… blank line as a separator …
<email address> space <DN>

CRL Management
By default, the CRL is valid for one week. This value can be configured. New CRLs are issued:
• When approximately 60% of the CRL validity period has passed
• Immediately following the revocation of a certificate
It is possible to recreate a specified CRL using the ICA Management Tool. The utility acts as a
recovery mechanism in the event that the CRL is deleted or corrupted. An administrator can
download a DER encoded version of the CRL using the ICA Management Tool.

CRL Modes
The ICA can issue multiple CRLs. Multiple CRLs prevent one CRL from becoming larger than 10K.
If the CRL exceeds 10K, IKE negotiations can fail when trying to open VPN tunnels.
Multiple CRLs are created by attributing each certificate issued to a specified CRL. If revoked, the
serial number of the certificate shows in the specified CRL.
The CRL Distribution Point (CRLDP) extension of the certificate contains the URL of the specified
CRL. This ensures that the correct CRL is retrieved when the certificate is validated.

Security Management Administration Guide R80.20 | 280


The ICA Management Tool

CRL Operations
You can download, update, or recreate CRLs through the ICA management tool.

To do operations with CRLs:


1. In the Menu pane, select Manage CRLs.
2. From the drop-down box, select one or more CRLs.
3. Select an action:
• Click Download to download the CRL.
• Click Publish to renew the CRL after changes have been made to the CRL database.
This operation is done at an interval set by the CRL Duration attribute.
• Click Recreate to recreate the CRL.

CA Cleanup
To clean up the CA, you must remove the expired certificates. Before you do that, make sure that
the time set on the Security Management Server is correct.

To remove the expired certificates:


In the Menu pane, select Manage CRLs > Clean the CA's Database and CRLs from expired
certificates.

Configuring the CA
To configure the CA:
1. In the Menu pane, select Configure the CA.
2. Edit the CA data values (on page 281) as necessary.
3. In the Operations pane, select an operation:
• Apply - Save and enter the CA configuration settings.
If the values are valid, the configured settings become immediately effective. All non-valid
strings are changed to the default values.
• Cancel - Reset all values to the values in the last saved configuration.
• Restore Default - Revert the CA to its default configuration settings.
Entering the string Default in one of the attributes will also reset it to the default after
you click Configure. Values that are valid will be changed as requested, and others will
change to default values.

CA Data Types and Attributes


The CA data types are:
• Time - displayed in the format: <number> days <number> seconds, for example: CRL
Duration: 7 days 0 seconds

Security Management Administration Guide R80.20 | 281


The ICA Management Tool

You can enter the values in the format in which they are displayed (<number> days
<number> seconds) or as a number of seconds.
• Integer - a regular integer, for example: SIC Key Size: 2048
• Boolean - the values can be true or false (not case sensitive), for example: Enable renewal:
true
• String - an alphanumeric string, for example: Management Tool DN prefix: cn=tests
These are the CA attributes, in alphabetical order:

Attribute Comment Values Default


Authorization Code The number of characters min-6 6
Length of the authorization codes. max-12

CRL Duration The period of time for min-5 minutes 1 week


which the CRL is valid. max-1 year

Enable Renewal For User certificates. This true or false true


is a Boolean value setting
which stipulates whether to
enable renewal or not.
Grace Period Before The amount of time the old min-0 1 week
Revocation certificate will remain in max-5 years
Renewed (superseded)
state.
Grace Period Check The amount of time min-10 minutes 1 day
Period between sequential checks max-1 week
of the Renewed
(superseded) list in order
to revoke those whose
duration has passed.
IKE Certificate Validity The amount of time an IKE min-10 minutes 5 years
Period certificate will be valid. max-20 years

IKE Certificate Certificate purposes for means no KeyUsage


Extended Key Usage describing the type of the
extended key usage for IKE
certificates. Refer to RFC
2459.
IKE Certificate Key Certificate purposes for Digital signature and
usage describing the certificate Key encipherment
operations. Refer to RFC
2459.
Management Tool DN Determines the DN prefix possible values CN=
prefix of a DN that will be created CN=
when entering a user
UID=
name.

Security Management Administration Guide R80.20 | 282


The ICA Management Tool

Attribute Comment Values Default


Management Tool DN Determines the DN suffix ou=users
suffix of a DN that will be created
when entering a user
name.
Management Tool Hide For security reasons the true or false false
Mail Button mail sending button after
displaying a single
certificate can be hidden.
Management Tool Mail The SMTP server that will -
Server be used in order to send
registration code mails. It
has no default and must be
configured in order for the
mail sending option to
work.
Management Tool The amount of time a min-10 minutes 2 weeks
Registration Key registration code is valid max-2 months
Validity Period when initiated using the
Management Tool.
Management Tool User The amount of time that a min-one week 2 years
Certificate Validity user certificate is valid max-20 years
Period when initiated using the
Management Tool.
Management Tool Mail When sending mails this is -
From Address the email address that will
appear in the from field. A
report of the mail delivery
status will be sent to this
address.
Management Tool Mail The email subject field. -
Subject

Management Tool Mail The text that appears in the Registration Key:
Text Format body of the message. 3 $REG_KEY
variables can be used in Expiration:
addition to the text: $EXPIRE
$REG_KEY (user's
registration key);
$EXPIRE (expiration time);
$USER (user's DN).
Management Tool Mail When the send mail option -
To address is used, the emails to users
that have no email address
defined will be sent to this
address.

Security Management Administration Guide R80.20 | 283


The ICA Management Tool

Attribute Comment Values Default


Max Certificates Per The maximum capacity of a min-3 400
Distribution Point CRL in the new CRL mode. max-400

New CRL Mode A Boolean value describing 0 for old CRL true
the CRL mode. mode
1 for new mode
Number of certificates The number of certificates min-1 approx 700
per search page that will be displayed in max-approx 700
each page of the search
window.
Number of Digits for The number of digits of min-5 5
Serial Number certificate serial numbers. max-10

Revoke renewed This flag determines true or false true


certificates whether to revoke an old
certificate after it has been
renewed. The reason for
not revoking this is to
prevent the CRL from
growing each time a
certificate is renewed.
If the certificate is not
revoked the user may have
two valid certificates.
SIC Key Size The key size in bits of keys possible values: 2048
used in SIC. 1024
2048
4096
SIC Certificate Key Certificate purposes for Digital signature and
usage describing the certificate Key encipherment
operations. Refer to RFC
2459.
SIC Certificate Validity The amount of time a SIC min-10 minutes 5 years
Period certificate will be valid. max-20 years

User Certificate Certificate purposes for means no KeyUsage


Extended Key Usage describing the type of the
extended key usage for
User certificates. Refer to
RFC 2459.
User Certificate Key The key size in bits of the Possible values: 2048
Size user's certificates. 1024
2048
4096

Security Management Administration Guide R80.20 | 284


The ICA Management Tool

Attribute Comment Values Default


User Certificate Key Certificate purposes for Digital signature and
usage describing the certificate Key encipherment
operations. Refer to RFC
2459

Certificate Longevity and Statuses


Certificates issued by the ICA have a defined validity period. When period ends, the certificate
expires.
SIC certificates, VPN certificates for Security Gateways and User certificates can be created in one
step in SmartConsole. User certificates can also be created in two steps using SmartConsole or
the ICA Management Tool. The two steps are:
• Initialization – during this step a registration code is created for the user. When this is done,
the certificate status is pending
• Registration – when the user completes the registration procedure in the remote client. After
entering the registration code the certificate becomes valid.
The advantages are:
Enhanced security
• The private key is created and stored on the user's machine
• The certificate issued by the ICA is downloaded securely to the client.
Pre-issuance automatic and administrator-initiated certificate removal
If a user does not complete the registration procedure in a given period (two weeks by default), the
registration code is automatically removed. An administrator can remove the registration key
before the user completes the registration procedure. After that, the administrator can revoke the
user certificate.
Explicit or Automatic Renewal of User certificates ensuring continuous User connectivity
A user certificate of type PKCS12 can be renewed explicitly by the user. A PKCS12 certificate can
also be set to renew automatically when it is about to expire. This renewal operation ensures that
the user can continuously connect to the organization's network. The administrator can choose
when to set the automatic revoke old user certificates.
One more advantage is:
Automatic renewal of SIC certificates ensuring continuous SIC connectivity
SIC certificates are renewed automatically after 75% of the validity time of the certificate has
passed. If, for example, the SIC certificate is valid for five years. After 3.75 years, a new certificate
is created and downloaded automatically to the SIC entity. This automatic renewal ensures that
the SIC connectivity of the gateway is continuous. The administrator can revoke the old certificate
automatically or after a set period of time. By default, the old certificate is revoked one week after
certificate renewal.

Security Management Administration Guide R80.20 | 285


CHAPTER 19

Command Line Reference


In This Section:
Managing Security through API and CLI ..................................................................287
contract_util .............................................................................................................289
cpca_client................................................................................................................299
cp_conf .....................................................................................................................316
cpca_create ..............................................................................................................326
cpconfig ....................................................................................................................327
cpinfo ........................................................................................................................329
cplic...........................................................................................................................330
cppkg ........................................................................................................................348
cpprod_util................................................................................................................356
cprid ..........................................................................................................................359
cprinstall...................................................................................................................360
cpstart.......................................................................................................................378
cpstat ........................................................................................................................379
cpstop .......................................................................................................................386
cpview .......................................................................................................................387
cpwd_admin .............................................................................................................389
dbedit ........................................................................................................................409
fw ..............................................................................................................................420
fwm ...........................................................................................................................454
inet_alert ..................................................................................................................480
ldapcmd ....................................................................................................................483
ldapcompare.............................................................................................................485
ldapmemberconvert .................................................................................................488
ldapmodify ................................................................................................................492
ldapsearch ................................................................................................................494
mgmt_cli ...................................................................................................................496
migrate .....................................................................................................................497
queryDB_util .............................................................................................................500
rs_db_tool.................................................................................................................501
sam_alert .................................................................................................................502
threshold_config ......................................................................................................505

See the R80.20 Command Line Interface Reference Guide


https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_Refere
nceGuide/html_frameset.htm.
Below is a limited list of applicable commands.

Security Management Administration Guide R80.20 | 286


Command Line Reference

Managing Security through API and CLI


You can configure and control the Management Server with the new command line tools and
through web services. You must first configure the API server.
The API server runs scripts that automate daily tasks and integrate the Check Point solutions with
third party systems such as virtualization servers, ticketing systems, and change management
systems.
You can use these tools to run API scripts on the Management Server:
• Standalone management tool, included with SmartConsole. You can copy this tool to
computers that run Windows or Gaia operating system.
• mgmt_cli.exe (for Windows operating system)
• mgmt_cli (for Gaia operating system)
• Web Services API that allows communication and data exchange between the clients and the
Management Server over the HTTP protocol. It also lets other Check Point processes
communicate with the Management Server over the HTTPS protocol.
All API clients use the same port as the Gaia Portal.
To learn more about the management APIs, to see code samples, and to take advantage of user
forums, see:
• The Online Check Point Management API Reference Guide
https://sc1.checkpoint.com/documents/latest/APIs/index.html.
• The Developers Network section of CheckMates https://community.checkpoint.com.

Configuring the API Server


To configure the API Server:
1. In SmartConsole, go to Manage & Settings > Blades.
2. In the Management API section, click Advanced Settings.
The Management API Settings window opens.
3. Configure the Startup Settings and the Access Settings.

API Settings
Startup Settings
Select Automatic start to automatically start the API server when you start or reboot the
Management Server.
The Automatic start option is activated by default during Management Server installation, if the
Management Server has more than 4GB of RAM installed. If the Management Server has less than
4GB of RAM, the Automatic Start is deactivated.
If you change the Automatic start option:
1. Publish the session changes in SmartConsole.
2. Run the api restart command on the Management Server.

Security Management Administration Guide R80.20 | 287


Command Line Reference

Access Settings
Select one of these options to configure which SmartConsole clients connect to the API server:
• Management server only - Only the Management Server itself can connect to the API Server.
This option only lets you use the mgmt_cli utility to send API requests. You cannot use
SmartConsole or web services to send API requests.
• All IP addresses that can be used for GUI clients - You can send API requests from all IP
addresses that are defined as Trusted Clients in SmartConsole. This includes requests from
SmartConsole, Web services and the mgmt_cli utility.
• All IP addresses - You can send API requests from all IP addresses. This includes requests
from SmartConsole, Web services and the mgmt_cli utility.

Security Management Administration Guide R80.20 | 288


Command Line Reference

contract_util
Description
Works with the Check Point Service Contracts.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
http://supportcontent.checkpoint.com/solutions?id=sk33089

Syntax
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify

Parameters
Parameter Description

check <options> (on Checks whether the Security Gateway is eligible for an upgrade.
page 290)
cpmacro <options> (on Overwrites the current cp.macro file with the specified cp.macro
page 291) file.
download <options> (on Downloads all associated Check Point Service Contracts from the
page 292) User Center, or from a local file.
mgmt (on page 294) Delivers the Service Contract information from the Management
Server to the managed Security Gateways.
print <options> (on Shows all the installed licenses and whether the Service Contract
page 295) covers these license, which entitles them for upgrade or not.
summary <options> (on Shows post-installation summary.
page 296)
update <options> (on Updates Check Point Service Contracts from your User Center
page 297) account.
verify (on page 298) Checks whether the Security Gateway is eligible for an upgrade.
This command also interprets the return values and shows a
meaningful message.

Security Management Administration Guide R80.20 | 289


Command Line Reference

contract_util check
Description
Checks whether the Security Gateway is eligible for an upgrade.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
http://supportcontent.checkpoint.com/solutions?id=sk33089

Syntax
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

hfa Checks whether the Security Gateway is eligible for an upgrade to a


higher Hotfix Accumulator.
maj_upgrade Checks whether the Security Gateway is eligible for an upgrade to a
higher Major version.
min_upgrade Checks whether the Security Gateway is eligible for an upgrade to a
higher Minor version.
upgrade Checks whether the Security Gateway is eligible for an upgrade.

Security Management Administration Guide R80.20 | 290


Command Line Reference

contract_util cpmacro
Description
Overwrites the current cp.macro file with the specified cp.macro file, if the specified is newer
than the current file.
For more information about the cp.macro file, see sk96217: What is a cp.macro file?
http://supportcontent.checkpoint.com/solutions?id=sk96217

Syntax
contract_util cpmacro /<path_to>/cp.macro

This command shows one of these messages:

Message Description
CntrctUtils_Write_cp_macro returned -1 The contract_util cpmacro
command failed:
• Failed to create a temporary file.
• Failed to write to a temporary
file.
• Failed to replace the current file.
CntrctUtils_Write_cp_macro returned 0 The contract_util cpmacro
command was able to overwrite the
current file with the specified file,
because the specified file is newer.
CntrctUtils_Write_cp_macro returned 1 The contract_util cpmacro
command did not overwrite the
current file, because it is newer than
the specified file.

Security Management Administration Guide R80.20 | 291


Command Line Reference

contract_util download
Description
Downloads all associated Check Point Service Contracts from User Center, or from a local file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
http://supportcontent.checkpoint.com/solutions?id=sk33089

Syntax
contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service Contract File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}] <Username>
<Password> [<Proxy Server> [<Proxy Username>:<Proxy Password>]]

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

-i Interactive mode - prompts the user for the User Center credentials
and proxy server settings.
local Specifies to download the Service Contract from the local file.
This is equivalent to the cplic contract put (on page 334)
command.
uc Specifies to download the Service Contract from the User Center.
hfa Downloads the information about a Hotfix Accumulator.
maj_upgrade Downloads the information about a Major version.
min_upgrade Downloads the information about a Minor version.
upgrade Downloads the information about an upgrade.

<Username> Your User Center account e-mail address.

<Password> Your User Center account password.

<Proxy Server> [<Proxy Specifies that the connection to the User Center goes through the
Username>:<Proxy proxy server.
Password>] • <Proxy Server> - IP address of resolvable hostname of the proxy
server
• <Proxy Username> - Username for the proxy server.
• <Proxy Password> - Password for the proxy server.
Note - If you do not specify the proxy server explicitly, the command
uses the proxy server configured in the management database.

Security Management Administration Guide R80.20 | 292


Command Line Reference

Parameter Description

<Service Contract File> Path to and the name of the Service Contract file.
First, you must download the Service Contract file from your User
Center account.

Security Management Administration Guide R80.20 | 293


Command Line Reference

contract_util mgmt
Description
Delivers the Service Contract information from the Management Server to the managed Security
Gateways.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
http://supportcontent.checkpoint.com/solutions?id=sk33089

Syntax
contract_util mgmt

Security Management Administration Guide R80.20 | 294


Command Line Reference

contract_util print
Description
Shows all the installed licenses and whether the Service Contract covers these license, which
entitles them for upgrade or not.
This command can show which licenses are not recognized by the Service Contract file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
http://supportcontent.checkpoint.com/solutions?id=sk33089

Syntax
contract_util [-d] print
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

-d Shows a formatted table header and more information.


hfa Shows the information about Hotfix Accumulator.
maj_upgrade Shows the information about Major version.
min_upgrade Shows the information about Minor version.
upgrade Shows the information about an upgrade.

Security Management Administration Guide R80.20 | 295


Command Line Reference

contract_util summary
Description
Shows post-installation summary and whether this Check Point computer is eligible for upgrades.

Syntax
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade

Parameters
Parameter Description
hfa Shows the information about Hotfix Accumulator.
maj_upgrade Shows the information about Major version.
min_upgrade Shows the information about Minor version.
upgrade Shows the information about an upgrade.

Security Management Administration Guide R80.20 | 296


Command Line Reference

contract_util update
Description
Updates the Check Point Service Contracts from your User Center account.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
http://supportcontent.checkpoint.com/solutions?id=sk33089

Syntax
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]

Parameters
Parameter Description
update Updates Check Point Service Contracts (attached to pre-installed
licenses) from your User Center account.
-proxy <Proxy Specifies that the connection to the User Center goes through the
Server>:<Proxy Port> proxy server:
• <Proxy Server> - IP address of resolvable hostname of the proxy
server.
• <Proxy Port> - The applicable port on the proxy server.
Note - If you do not specify the proxy explicitly, the command uses
the proxy configured in the management database.
-ca_path <Path to Specifies the path to the Certificate Authority Bundle file
ca-bundle.crt File> (ca-bundle.crt).
Note - If you do not specify the path explicitly, the command uses the
default path.

Security Management Administration Guide R80.20 | 297


Command Line Reference

contract_util verify
Description
Checks whether the Security Gateway is eligible for an upgrade.
This command is the same as the contract_util check (on page 290) command, but it also
interprets the return values and shows a meaningful message.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
http://supportcontent.checkpoint.com/solutions?id=sk33089

Syntax
contract_util verify

Security Management Administration Guide R80.20 | 298


Command Line Reference

cpca_client
Description
Execute operations on the Internal Certificate Authority (ICA).
Important - On Multi-Domain Server, you must run these commands in the context of the relevant
Domain Management Server:
1. mdsenv <Name or IP Address of Domain Management Server>
2. cpca_client ...

Syntax
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_mgmt_tool <options>
set_sign_hash <options>

Parameters
Parameter Description
-d Runs the cpca_client command in debug
mode.
create_cert <options> (on page 301) Issues a SIC certificate for the Security
Management Server or Domain Management
Server.
double_sign <options> (on page 302) Creates a second signature for a certificate.
get_crldp <options> (on page 303) Shows how to access a CRL file from a CRL
Distribution Point.
get_pubkey <options> (on page 304) Saves the encoding of the public key of the
ICA's certificate to a file.
init_certs <options> (on page 305) Imports a list of DNs for users and creates a
file with registration keys for each user.
lscert <options> (on page 306) Shows all certificates issued by the ICA.
revoke_cert <options> (on page 308) Revokes a certificate issued by the ICA.
revoke_non_exist_cert <options> (on page Revokes a non-existent certificate issued by the
310) ICA.
search <options> (on page 311) Searches for certificates in the ICA.
set_mgmt_tool <options> (on page 313) Controls the ICA Management Tool.

Security Management Administration Guide R80.20 | 299


Command Line Reference

Parameter Description
set_sign_hash <options> (on page 315) Sets the hash algorithm that the CA uses to
sign the file hash.

Security Management Administration Guide R80.20 | 300


Command Line Reference

cpca_client create_cert
Description
Issues a SIC certificate for the Security Management Server or Domain Management Server.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] create_cert [-p <CA port number>] -n "CN=<Common Name>" -f <Full
Path to PKCS12 file> [-w <Password>] [-k {SIC | USER | IKE | ADMIN_PKG}] [-c "<Comment
for Certificate>"]

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-p <CA port number> Specifies the TCP port on the Security Management Server or
Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.
-n "CN=<Common Sets the CN to the specified <Common Name>.
Name>"
-f <Full Path to PKCS12 Specifies the PKCS12 file, which stores the certificate and keys.
file>
-w <Password> Optional. Specifies the certificate password.
-k {SIC | USER | IKE Optional. Specifies the certificate kind.
| ADMIN_PKG}
-c "<Comment for Optional. Specifies the certificate comment (must enclose in double
Certificate>" quotes).

Example
[Expert@MGMT:0]# cpca_client create_cert -n "cn=cp_mgmt" -f
$CPDIR/conf/sic_cert.p12

Security Management Administration Guide R80.20 | 301


Command Line Reference

cpca_client double_sign
Description
Creates a second signature for a certificate.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] double_sign [-p <CA port number>] -i <Certificate File in PEM
format> [-o <Full Path to Output File>]

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-p <CA port number> Optional. Specifies the TCP port on the Security Management Server
or Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.
-i <Certificate File in Imports the specified certificate (only in PEM format).
PEM format>
-o <Full Path to Output Optional. Saves the certificate into the specified file.
File>

Example
[Expert@MGMT:0]# cpca_client double_sign -i certificate.pem

Requesting Double Signature for the following Certificate:


refCount: 1
Subject: Email=example@example.com,CN=http://www.example.com/,OU=ValiCert Class 2 Policy
Validation Authority,O=exampleO\, Inc.,L=ExampleL Validation Network

Double Sign of Cert:


======================
(
: (
:dn ("Email=example@example.com,CN=http://www.example.com/,OU=exampleOU Class 2
Policy Validation Authority,O=exampleO\, Inc.,L=exampleL Validation Network")
:doubleSignCert (52016390... ... ...ebb67e96)
:return_code (0)
)
)

[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 302


Command Line Reference

cpca_client get_crldp
Description
Show the how to access a CRL file from a CRL Distribution Point.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] get_crldp [-p <CA port number>]

Parameters
Parameter Description
-d Runs the command in debug mode.
-p <CA port number> Optional. Specifies the TCP port on the Security Management Server
or Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.

Example
[Expert@MGMT:0]# cpca_client get_crldp
192.168.3.51
[Expert@MGMT:0]

Security Management Administration Guide R80.20 | 303


Command Line Reference

cpca_client get_pubkey
Description
Saves the encoding of the public key of the ICA's certificate to a file.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] get_pubkey [-p <CA port number>] <Full Path to Output File>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-p <CA port number> Specifies the TCP port on the Security Management Server or
Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.
<Full Path to Output File> Saves the encoding of the public key of the ICA's certificate to the
specified file.

Example
[Expert@MGMT:0]# cpca_client get_pubkey /tmp/key.txt
[Expert@MGMT:0]#
[Expert@MGMT:0]# cat /tmp/key.txt
3082010a... ... ...f98b8910
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 304


Command Line Reference

cpca_client init_certs
Description
Imports a list of DNs for users and creates a file with registration keys for each user.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] init_certs [-p <CA port number>] -i <Full Path to Input File> -o
<Full Path to Output File>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-p <CA port number> Optional. Specifies the TCP port on the Security Management
Server or Domain Management Server, which is used to connect
to the Certificate Authority.
The default TCP port number is 18209.
-i <Full Path to Input File> Imports the specified file.
Make sure to use the full path.
Make sure that there is an empty line between each DN in the
specified file.
Example:
...CN=test1,OU=users...
<Empty Line>
...CN=test2,OU=users...

-o <Full Path to Output File> Saves the registration keys to the specified file.
This command saves the error messages in the <Name of
Output File>.failures file in the same directory.

Security Management Administration Guide R80.20 | 305


Command Line Reference

cpca_client lscert
Description
Shows all certificates issued by the ICA.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] lscert [-dn <SubString>] [-stat {Pending | Valid | Revoked |
Expired | Renewed}] [-kind {SIC | IKE | User | LDAP}] [-ser <Certificate Serial
Number>] [-dp <Certificate Distribution Point>]

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-dn <SubString> Optional. Filters the search results to those with a DN that matches
the specified <SubString>.
This command does not support multiple values.
-stat {Pending | Optional. Filters the search results to those with certificate status
Valid | Revoked | that matches the specified status.
Expired | Renewed}
This command does not support multiple values.
-kind {SIC | IKE | Optional. Filters the search results to those with certificate kind that
User | LDAP} matches the specified kind.
This command does not support multiple values.
-ser <Certificate Serial Optional. Filters the search results to those with certificate serial
Number> number that matches the specified serial number.
This command does not support multiple values.
-dp <Certificate Optional. Filters the search results to the specified Certificate
Distribution Point> Distribution Point (CDP).
This command does not support multiple values.

Example
[Expert@MGMT:0]# cpca_client lscert -stat Revoked
Operation succeeded. rc=0.
5 certs found.

Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023

Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023

Subject = CN=VSX1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Revoked Kind = IKE Serial = 82434 DP = 2
Not_Before: Mon May 14 19:15:05 2018 Not_After: Sun May 14 19:15:05 2023
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 306


Command Line Reference

[Expert@MGMT:0]# cpca_client lscert -kind IKE


Operation succeeded. rc=0.
3 certs found.

Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023

Subject = CN=VSX_Cluster VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Valid Kind = IKE Serial = 64655 DP = 1
Not_Before: Mon Apr 9 19:36:31 2018 Not_After: Sun Apr 9 19:36:31 2023

Subject = CN=VSX1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x


Status = Revoked Kind = IKE Serial = 82434 DP = 2
Not_Before: Mon May 14 19:15:05 2018 Not_After: Sun May 14 19:15:05 2023
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 307


Command Line Reference

cpca_client revoke_cert
Description
Revokes a certificate issued by the ICA.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] revoke_cert [-p <CA port number>] -n "CN=<Common Name>" -s
<Certificate Serial Number>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-p <CA port number> Optional. Specifies the TCP port on the Security Management Server
or Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.
-n "CN=<Common Specifies the certificate CN.
Name>" To get the CN, run the cpca_client lscert command and
examine the text that you see between the "Subject = " and the
",O=...".
Example:
From this output:
Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023

you get this syntax:


-n "CN=VS1 VPN Certificate

Note - You can use the parameter '-n' only, or together with the
parameter '-s'.
-s <Certificate Serial Specifies the certificate serial number.
Number> To see the serial number, run the cpca_client lscert command.
Note - You can use the parameter '-s' only, or together with the
parameter '-n'.

Example 1 - Revoking a certificate specified by its CN


[Expert@MGMT:0]# cpca_client lscert
Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023
[Expert@MGMT:0]#
[Expert@MGMT:0]# cpca_client -d revoke_cert -n "CN=VS1 VPN Certificate"
Certificate was revoked successfully
[Expert@MGMT:0]#
Security Management Administration Guide R80.20 | 308
Command Line Reference

Example 2 - Revoking a certificate specified by its serial number


[Expert@MGMT:0]# cpca_client lscert
Subject = CN=VS1 VPN Certificate,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Valid Kind = IKE Serial = 27214 DP = 1
Not_Before: Wed Apr 11 17:26:02 2018 Not_After: Tue Apr 11 17:26:02 2023
[Expert@MGMT:0]#
[Expert@MGMT:0]# cpca_client -d revoke_cert -s 27214
Certificate was revoked successfully
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 309


Command Line Reference

cpca_client revoke_non_exist_cert
Description
Revokes a non-existent certificate issued by the ICA.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] revoke_non_exist_cert -i <Full Path to Input File>

Parameters
Parameter Description
-d Runs the cpca_client command under debug.
-i <Full Path Specifies the file that contains the list of the certificate to revoke.
to Input File> You must create this file in the same format as the cpca_client lscert
command prints its output.
Example:
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri Apr 7 19:40:13 2023

Note - This command saves the error messages in the <Name of Input File>.failures file.

Security Management Administration Guide R80.20 | 310


Command Line Reference

cpca_client search
Description
Searches for certificates in the ICA.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] search <String> [-where {dn | comment | serial | device_type |
device_id | device_name}] [-kind {SIC | IKE | User | LDAP}] [-stat {Pending | Valid
| Revoked | Expired | Renewed}] [-max <Maximal Number of Results>] [-showfp {y |
n}]

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
<String> Specifies the text to search in the certificates.
You can enter only one text string that does not contain spaces.
-where {dn | comment Optional. Specifies the certificate's field, in which to search for the
| serial |
string:
device_type |
device_id | • dn - Certificate DN
device_name}
• comment - Certificate comment
• serial - Certificate serial number
• device_type - Device type
• device_id - Device ID
• device_name - Device Name
The default is to search in all fields.
-kind {SIC | IKE | Optional. Specifies the certificate kind to search.
User | LDAP}
You can enter multiple values in this format:
-kind Kind1 Kind2 Kind3
The default is to search for all kinds.

-stat {Pending | Optional. Specifies the certificate status to search.


Valid | Revoked |
Expired | Renewed} You can enter multiple values in this format:
-stat Status1 Status2 Status3
The default is to search for all statuses.

-max <Maximal Number Optional. Specifies the maximal number of results to show.
of Results> • Range: 1 and greater
• Default: 200

Security Management Administration Guide R80.20 | 311


Command Line Reference

Parameter Description
-showfp {y | n} Optional. Specifies whether to show the certificate's fingerprint and
thumbprint:
• y - Shows the fingerprint and thumbprint (this is the default)
• n - Does not show the fingerprint and thumbprint

Example 1
[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP
-stat Pending Valid Renewed

Example 2
[Expert@MGMT:0]# cpca_client search 192.168.3.51 -where dn
Operation succeeded. rc=0.
1 certs found.

Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#

Example 3
[Expert@MGMT:0]# cpca_client search 192.168.3.51 -where dn -showfp n
Operation succeeded. rc=0.
1 certs found.

Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 312


Command Line Reference

cpca_client set_mgmt_tool
Description
Controls the ICA Management Tool.
See:
• sk30501: Setting up the ICA Management Tool
http://supportcontent.checkpoint.com/solutions?id=sk30501
• sk39915: Invoking the ICA Management Tool
http://supportcontent.checkpoint.com/solutions?id=sk39915
• sk102837: Best Practices - ICA Management Tool configuration
http://supportcontent.checkpoint.com/solutions?id=sk102837
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] set_mgmt_tool {on | off | add | remove | clean | print} [-p <CA
port number>] {[-a <Administrator DN>] | [-u <User DN>] | [-c <Custom User DN>]}

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
on Starts the ICA Management Tool.
off Stops the ICA Management Tool.
add Adds the specified administrator, user, or custom user that is
permitted to use the ICA Management Tool.
remove Removes the specified administrator, user, or custom user that is
permitted to use the ICA Management Tool.
clean Removes all administrators, users, or custom users that are
permitted to use the ICA Management Tool.
print Shows the configured administrators, users, or custom users that
are permitted to use the ICA Management Tool.
-p <CA port number> Optional. Specifies the TCP port on the Security Management Server
or Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18265.

Security Management Administration Guide R80.20 | 313


Command Line Reference

Parameter Description
-a <Administrator DN> Optional. Specifies the DN of the administrator that is permitted to
use the ICA Management Tool.
Must specify the full DN as appears in SmartConsole:
Open Object Explorer > Users > Administrator or User object
properties > click Certificates pane > select the certificate and click
the pencil icon > click View certificate details > in the Certificate Info
window, click the Details tab > click the Subject field > concatenate
all fields.
Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
-u <User DN> Optional. Specifies the DN of the user that is permitted to use the ICA
Management Tool.
Must specify the full DN as appears in SmartConsole:
Open Object Explorer > Users > User object properties > click
Certificates pane > select the certificate and click the pencil icon >
click View certificate details > in the Certificate Info window, click
the Details tab > click the Subject field > concatenate all fields.
Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
-c <Custom User DN> Optional. Specifies the DN for the custom user that is permitted to
use the ICA Management Tool.
Must specify the full DN as appears in SmartConsole:
Open Object Explorer > Users > User object properties > click
Certificates pane > select the certificate and click the pencil icon >
click View certificate details > in the Certificate Info window, click
the Details tab > click the Subject field > concatenate all fields.
Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"

Note - If you run the 'cpca_client set_mgmt_tool' command without the parameter '-a', or
'-u', the list of the permitted administrators and users is not changed. The previously defined
permitted administrators and users can start and stop the ICA Management Tool.

Security Management Administration Guide R80.20 | 314


Command Line Reference

cpca_client set_sign_hash
Description
Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840
http://supportcontent.checkpoint.com/solutions?id=sk103840.
Important - On Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.

Syntax
cpca_client [-d] set_sign_hash {sha1 | sha256 | sha384 | sha512}

Important - After this change, you must restart the Check Point services with these commands:
On Security Management Server, run:
a) cpstop
b) cpstart
On Multi-Domain Server, run:
a) mdsstop_customer <Name or IP Address of Domain Management Server>
b) mdsstart_customer <Name or IP Address of Domain Management Server>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
{sha1 | sha256 | The hash algorithms that the CA uses to sign the file hash.
sha384 | sha512}
The default algorithm is SHA-256.

Example
[Expert@MGMT:0]# cpca_client set_sign_hash sha256

You have selected the signature hash function SHA-256


WARNING: This hash algorithm is not supported in Check Point gateways prior to R71.
WARNING: It is also not supported on older clients and SG80 R71.

Are you sure? (y/n)


y
Internal CA signature hash changed successfully.
Note that the signature on the Internal CA certificate has not changed, but this
has no security implications.
[Expert@MGMT:0]#
[Expert@MGMT:0]# cpstop ; cpstart

Security Management Administration Guide R80.20 | 315


Command Line Reference

cp_conf
Description
Configures or reconfigures a Check Point product installation.
The available options for each Check Point computer depend on the configuration and installed
products.

Syntax
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>

Parameters
Item Description
-h Shows the entire built-in usage.
admin <options> (on page Configures Check Point system administrators for the Security
317) Management Server.
auto <options> (on page Shows and configures the automatic start of Check Point products
319) during boot.
ca <options> (on page • Configures the Certificate Authority's (CA) Fully Qualified Domain
320) Name (FQDN).
• Initializes the Internal Certificate Authority (ICA).
client <options> (on Configures the GUI clients that can use SmartConsole to connect to
page 321) the Security Management Server.
finger <options> (on Shows the ICA's Fingerprint.
page 324)
lic <options> (on page Manages Check Point licenses.
325)
snmp <options> Do not use these commands anymore.
To configure SNMP, see the R80.20 Gaia Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides
/EN/CP_R80.20_Gaia_AdminGuide/html_frameset.htm - Chapter
System Management - Section SNMP.

Security Management Administration Guide R80.20 | 316


Command Line Reference

cp_conf admin
Description
Configures Check Point system administrators for the Security Management Server.
Notes:
• Multi-Domain Server does not support this command.
• Only one administrator can be defined in the cpconfig (on page 327) menu. To define
additional administrators, use SmartConsole.
• This command corresponds to the option Administrator in the cpconfig (on page 327) menu.

Syntax
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get

Parameters
Parameter Description
-h Shows the applicable built-in usage.
add [<UserName> Adds a Check Point system administrator:
<Password> {a | w | r}] • <UserName> - Specifies the administrator's username
• <Password> - Specifies the administrator's password
• a - Assigns all permissions - read settings, write settings,
and manage administrators
• w - Assigns permissions to read and write settings only
(cannot manage administrators)
• r - Assigns permissions to only read settings
add -gaia [{a | w | r}] Adds the Gaia administrator user admin:

• a - Assigns all permissions - read settings, write settings,


and manage administrators
• w - Assigns permissions to read and write settings only
(cannot manage administrators)
• r - Assigns permissions to only read settings
del <UserName1> Deletes the specified system administrators.
<UserName2> ...
get Shows the list of the configured system administrators.
get -gaia Shows the management permissions assigned to the Gaia
administrator user admin.

Security Management Administration Guide R80.20 | 317


Command Line Reference

Example 1
[Expert@MGMT:0]# cp_conf admin add
Administrator name: admin
Administrator admin already exists.
Do you want to change Administrator's Permissions (y/n) [n] ? y

Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w

Administrator admin was modified successfully and has


Read/Write Permission for SmartUpdate
Read/Write Permission for Monitoring
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin get

The following Administrators


are defined for this Security Management Server:

admin (Read/Write Permission for all products; )


[Expert@MGMT:0]#

Example 2
[Expert@MGMT:0]# cp_conf admin add -gaia
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) C
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
Administrator admin was added successfully and has
Read/Write Permission for SmartUpdate
Read/Write Permission for Monitoring
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin get -gaia

The following Administrators


are defined for this Security Management Server:

admin (Read/Write Permission for all products; ) - Gaia admin


[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin add -gaia a


Administrator admin already exists.

Administrator admin was modified successfully and has


Read/Write Permission for all products with Permission to Manage Administrators
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin add -gaia w


Administrator admin already exists.

Administrator admin was modified successfully and has


Read/Write Permission for all products without Permission to Manage Administrators
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf admin add -gaia r


Administrator admin already exists.

Administrator admin was modified successfully and has


Read Only Permission for all products
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 318


Command Line Reference

cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point Products in the
cpconfig menu.
Important - In cluster, you must configure all the Cluster Members in the same way.

Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all

Parameters
Parameter Description
-h Shows the applicable built-in usage.
{enable | disable} Controls whether the installed Check Point products start
<Product1> <Product2> ... automatically during boot.
This command is for Check Point use only.
get all Shows which of these Check Point products start automatically
during boot:
• Check Point Security Gateway
• QoS (former FloodGate-1)
• SmartEvent Suite

Example from a Management Server


[Expert@MGMT:0]# cp_conf auto get all

Check Point Security Gateway is not installed

QoS is not installed

The SmartEvent Suite will start automatically at boot time.

[Expert@MGMT:0]#

Example from a Security Gateway


[Expert@MyGW:0]# cp_conf auto get all

The Check Point Security Gateway will start automatically at boot time.

QoS will start automatically at boot time.

SmartEvent Suite is not installed

[Expert@MyGW:0]#

Security Management Administration Guide R80.20 | 319


Command Line Reference

cp_conf ca
Description
• Initializes the Internal Certificate Authority (ICA).
• Configures the Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).
Note - This command corresponds to the option Certificate Authority in the cpconfig (on page
327) menu.

Syntax
cp_conf ca
-h
fqdn <FQDN Name>
init

Parameters
Parameter Description
-h Shows the applicable built-in usage.
fqdn <FQDN Name> Configures the Certificate Authority's (CA) Fully Qualified
Domain Name (FQDN).
<FQDN Name> is the text string hostname.domainname
init Initializes the Internal Certificate Authority (ICA).

Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#

[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#

[Expert@MyMGMT:0]# cp_conf ca fqdn MyMGMT.checkpoint.com


Trying to contact Certificate Authority. It might take a while...
Certificate was created successfully
MyMGMT.checkpoint.com was successfully set to the Internal CA
[Expert@MyMGMT:0]#

Security Management Administration Guide R80.20 | 320


Command Line Reference

cp_conf client
Description
Configures the GUI clients that can use SmartConsoles to connect to the Security Management
Server.
Notes:
• Multi-Domain Server does not support this command.
• This command corresponds to the option GUI Clients in the cpconfig (on page 327) menu.

Syntax
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get

Parameters
Parameter Description
-h Shows the built-in usage.
<GUI Client> <GUI Client> can be one of these:
• One IPv4 address (for example, 192.168.10.20), or
one IPv6 address (for example, 3731:54:65fe:2::a7)
• One hostname (for example, MyComputer)
• "Any" - To denote all IPv4 and IPv6 addresses without
restriction
• A range of IPv4 addresses (for example,
192.168.10.0/255.255.255.0), or
a range of IPv6 addresses (for example, 2001::1/128)
• IPv4 address wild card (for example, 192.168.10.*)
add <GUI Client> Adds a GUI client.
createlist <GUI Client 1> Deletes the current allowed GUI clients and creates a new list of
<GUI Client 2> ... allowed GUI clients.

del <GUI Client 1> <GUI Client Deletes the specified the GUI clients.
2> ...
get Shows the allowed GUI clients.

Example 1 - Configure one IPv4 address


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.15


172.20.168.15 was successfully added.
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 321


Command Line Reference

[Expert@MGMT:0]# cp_conf client get


172.20.168.15
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del 172.20.168.15


172.20.168.15 was deleted successfully
[Expert@MGMT:0]#

Example 2 - Configure one hostname


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add MySmartConsoleHost


MySmartConsoleHost was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


MySmartConsoleHost
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del MySmartConsoleHost


MySmartConsoleHost was deleted successfully
[Expert@MGMT:0]#

Example 3 - Configure "Any"


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add "Any"


Any was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


Any
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del "Any"


Any was deleted successfully
[Expert@MGMT:0]#

Example 4 - Configure a range of IPv4 addresses


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.0/255.255.255.0


172.20.168.0/255.255.255.0 was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


172.20.168.0/255.255.255.0
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del 172.20.168.0/255.255.255.0


172.20.168.0/255.255.255.0 was deleted successfully
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 322


Command Line Reference

Example 5 - Configure IPv4 address wild card


[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.*


172.20.168.* was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


172.20.168.*
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client del 172.20.168.*


172.20.168.* was deleted successfully
[Expert@MGMT:0]#

Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client add 172.20.168.0/255.255.255.0


172.20.168.0/255.255.255.0 was successfully added.
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


172.20.168.0/255.255.255.0
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client createlist 192.168.40.0/255.255.255.0


172.30.40.55
New list was created successfully
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


192.168.40.0/255.255.255.0
172.30.40.55
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client createlist "Any"


New list was created successfully
[Expert@MGMT:0]#

[Expert@MGMT:0]# cp_conf client get


Any
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 323


Command Line Reference

cp_conf finger
Description
Shows the ICA's Fingerprint. This fingerprint is a text string derived from the Security
Management Server or Domain Management Server ICA certificate. This fingerprint verifies the
identity of the Security Management Server or Domain Management Server when you connect to it
with a SmartConsole.
Note - This command corresponds to the option Certificate's Fingerprint in the cpconfig (on
page 327) menu.

Syntax
cp_conf finger
-h
get

Parameters
Parameter Description
-h Shows the applicable built-in usage.
get Shows the ICA's Fingerprint.

Example
[Expert@MGMT:0]# cp_conf finger get
EDNA COCO MOLE ATOM ASH MOT SAGE NINE ILL TINT HI CUBE
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 324


Command Line Reference

cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the cpconfig menu.

Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]

Parameters
Parameter Description
-h Shows the applicable built-in usage.
add -f <Full Path to License Adds a license from the specified Check Point license file.
File> You get this license file in the Check Point User Center.
This is the same command as the cplic db_add (on page 335).
add -m <Host> <Date> Adds the license manually.
<Signature Key> You get these license details in the Check Point User Center.
<SKU/Features> This is the same command as the cplic db_add (on page 335).
del <Signature Key> Delete the license based on its signature.
This is the same command as the cplic del (on page 338).
get [-x] Shows the local installed licenses.
If you specify the '-x' parameter, output also shows the
signature key for every installed license.
This is the same command as the cplic print [-x] (on page
341).

Example 1 - Adding the license from the file


[Expert@HostName:0]# cp_conf lic add -f ~/License.lic
License was installed successfully.
[Expert@HostName:0]#

[Expert@HostName:0]# cp_conf lic get


Host Expiration Signature Features
192.168.3.28 25Aug2017 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX
[Expert@HostName:0]#

Example 2 - Adding the license manually


[Expert@HostName:0]# cp_conf lic add -m MGMT2 25Aug2017 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX
License was successfully installed
[Expert@HostName:0]#

[Expert@HostName:0]# cp_conf lic get


Host Expiration Signature Features
192.168.3.28 25Aug2017 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 325


Command Line Reference

cpca_create
Description
Creates new Check Point Internal Certificate Authority database.

Syntax
cpca_create [-d] -dn <CA DN>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).

Security Management Administration Guide R80.20 | 326


Command Line Reference

cpconfig
Description
This command starts the Check Point Configuration Tool. This tool lets you configure specific
settings for the installed Check Point products

Syntax
cpconfig

Note - On Multi-Domain Server, run the mdsconfig command.

Menu Options
Note - The options shown depend on the configuration and installed products.

Menu Option Description


Licenses and contracts Manages Check Point licenses and contracts.
Administrator Configures Check Point system administrators for
the Security Management Server.
GUI Clients Configures the GUI clients that can use
SmartConsoles to connect to the Security
Management Server.
SNMP Extension Do not use this option anymore.
To configure SNMP, see the R80.20 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/
WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/
html_frameset.htm - Chapter System Management -
Section SNMP.
Random Pool Configures the RSA keys, to be used by Gaia OS.
Certificate Authority Initializes the Internal Certificate Authority (ICA) and
configures the Certificate Authority's (CA) Fully
Qualified Domain Name (FQDN).
Certificate's Fingerprint Shows the ICA's Fingerprint. This fingerprint is a text
string derived from the Security Management Server
or Domain Management Server ICA certificate. This
fingerprint verifies the identity of the Security
Management Server or Domain Management Server
when you connect to it with a SmartConsole.
Automatic start of Check Point Products Shows and controls which of the installed Check
Point products start automatically during boot.
Exit Exits from the Check Point Configuration Tool.

Example - Menu on a Security Management Server


[Expert@MyMGMT:0]# cpconfig
This program will let you re-configure
Security Management Administration Guide R80.20 | 327
Command Line Reference

your Check Point Security Management Server configuration.

Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products

(9) Exit

Enter your choice (1-9) :

Security Management Administration Guide R80.20 | 328


Command Line Reference

cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support
https://www.checkpoint.com/support-services/contact-support/ about an issue on your Check
Point computer.
For more information, see sk92739 http://supportcontent.checkpoint.com/solutions?id=sk92739.

Security Management Administration Guide R80.20 | 329


Command Line Reference

cplic
The cplic command lets you manage Check Point licenses. The cplic command can be run in
Gaia Clish or in Expert Mode.
License Management is divided into three types of commands:

Licensing Commands Applies To Description


Local licensing commands Management Servers, You execute these commands locally
Security Gateways and on the Check Point computers.
Cluster Members
Remote licensing commands Management Servers You execute these commands on the
only Security Management Server or
Domain Management Server. These
changes affect the managed Security
Gateways and Cluster Members.
License Repository commands Management Servers You execute these commands on the
only Security Management Server or
Domain Management Server. These
changes affect the licenses stored in
the local license repository.

Syntax for Local Licensing


cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>

Syntax for Remote Licensing (applies only to Management Servers)


cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>

Syntax for License Database Operations (applies only to Management Servers)


cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>

Parameters
Parameters Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.

Security Management Administration Guide R80.20 | 330


Command Line Reference

Parameters Description
{-h | -help} Shows the applicable built-in usage.
check <options> (on page 332) Confirms that the license includes the feature on the local
Security Gateway or Security Management Server.
contract <options> (on page Manages (deletes and installs) the Check Point Service
334) Contract on the local Check Point computer.
db_add <options> (on page 335) Applies only to a Management Server:
Adds licenses to the license repository on the Security
Management Server.
db_print <options> (on page Applies only to a Management Server:
336) Displays the details of Check Point licenses stored in the
license repository on the Security Management Server.
db_rm <options> (on page 337) Applies only to a Management Server:
Removes a license from the license repository on the
Security Management Server.
del <options> (on page 338) Deletes a Check Point license on a host, including unwanted
evaluation, expired, and other licenses.
del <Object Name> <options> Detaches a Central license from a remote managed Check
(on page 339) Point Security Gateway.
get <options> (on page 340) Applies only to a Management Server:
Retrieves all licenses from Security Gateways into the license
repository on the Security Management Server.
print <options> (on page 341) Prints details of the installed Check Point licenses on the
local Check Point computer.
put <options> (on page 342) Installs and attaches licenses on a Check Point computer.
put <Object Name> <options> Attaches one or more Central or Local licenses to a remote
(on page 344) managed Security Gateway.
upgrade <options> (on page 346) Applies only to a Management Server:
Upgrades licenses in the license repository with licenses in
the specified license file.

Security Management Administration Guide R80.20 | 331


Command Line Reference

cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Security
Management Server. See sk66245 http://supportcontent.checkpoint.com/solutions?id=sk66245.

Syntax
cplic check {-h | -help}
cplic [-d] check [-p <Product>] [-v <Version>] [{-c | -count}] [-t <Date>] [{-r
| -routers}] [{-S | -SRusers}] <Feature>

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
-p <Product> Product, for which license information is requested.
Some examples of products:
• fw1 - FireWall-1 infrastructure on Security Gateway (all blades),
or Management Server (all blades)
• mgmt - Multi-Domain Server infrastructure
• services - Entitlement for various services
• cvpn - Mobile Access
• etm - QoS (FloodGate-1)
• eps - Endpoint Software Blades on Management Server
-v <Version> Product version, for which license information is requested.
{-c | -count} Outputs the number of licenses connected to this feature.

-t <Date> Checks license status on future date.


Use the format ddmmyyyy.
A feature can be valid on a given date on one license, but invalid on
another.
{-r | -routers} Checks how many routers are allowed.
The <Feature> option is not needed.
{-S | -SRusers} Checks how many SecuRemote users are allowed.
<Feature> Feature, for which license information is requested.

Example from a Management Server


[Expert@MGMT]# cplic print -p
Host Expiration Primitive-Features
W.X.Y.Z 24Mar2016 ::CK-XXXXXXXXXXXX fw1:6.0:swb fw1:6.0:comp
fw1:6.0:compunlimited fw1:6.0:cluster-1 fw1:6.0:cpxmgmt_qos_u_sites
Security Management Administration Guide R80.20 | 332
Command Line Reference

fw1:6.0:sprounl fw1:6.0:nxunlimit fw1:6.0:swp evnt:6.0:smrt_evnt fw1:6.0:fwc


fw1:6.0:ca fw1:6.0:rtmui fw1:6.0:sstui fw1:6.0:fwlv fw1:6.0:cmd evnt:6.0:alzd5
evnt:6.0:alzc1 evnt:6.0:alzs1 fw1:6.0:sstui fw1:6.0:fwlv fw1:6.0:sme10
etm:6.0:rtm_u fw1:6.0:cep1 fw1:6.0:rt fw1:6.0:cemid fw1:6.0:web_sec_u
fw1:6.0:workflow fw1:6.0:ram1 fw1:6.0:routers fw1:6.0:supmgmt fw1:6.0:supunlimit
fw1:6.0:prov fw1:6.0:atlas-unlimit fw1:6.0:filter fw1:6.0:ui
psmp:6.0:psmsunlimited fw1:6.0:vpe_unlimit fw1:6.0:cluster-u fw1:6.0:remote1
fw1:6.0:aes fw1:6.0:strong fw1:6.0:rdp fw1:6.0:des fw1:6.0:isakmp
fw1:6.0:dbvr_unlimit fw1:6.0:cmpmgmt fw1:6.0:rtmmgmt fw1:6.0:fgmgmt
fw1:6.0:blades fw1:6.0:cpipv6 fw1:6.0:mgmtha fw1:6.0:remote
[Expert@MGMT]#

Example from a Management Server in High Availability


[Expert@MGMT]# cplic check -p fw1 -v 6.0 -c mgmtha
cplic check 'mgmtha': 1 licenses
[Expert@MGMT]#

Example from a Security Gateway


[Expert@GW]# cplic print -p
Host Expiration Primitive-Features
W.X.Y.Z 23Mar2016 ::CK-XXXXXXXXXXXX fw1:6.0:swb fw1:6.0:abot fw1:6.0:ips
fw1:6.0:appi fw1:6.0:aspm fw1:6.0:av1000 fw1:6.0:urlf fw1:6.0:av fw1:6.0:vsx5
fw1:6.0:cpls fw1:6.0:cluster-u fw1:6.0:mpu fw1:6.0:sxl_vpn fw1:6.0:sxl_fw
fw1:6.0:sxl_ppk fw1:6.0:connect fw1:6.0:pam etm:6.0:fgcountunl etm:6.0:fg
etm:6.0:tclog etm:6.0:fgvpn fw1:6.0:identity cvpn:6.0:ccvunl
cvpn:6.0:cvpnunlimited fw1:6.0:des fw1:6.0:strong fw1:6.0:encryption
cvpn:6.0:cvpn fw1:6.0:dlp evnt:6.0:smrt_evnt fw1:6.0:ipsa fw1:6.0:spcps
fw1:6.0:pam fw1:6.0:enchostsunlimit fw1:6.0:aes fw1:6.0:rdp fw1:6.0:isakmp
fw1:6.0:xlate fw1:6.0:auth fw1:6.0:content fw1:6.0:sync fw1:6.0:fm fw1:6.0:blades
fw1:6.0:sr5000 fw1:6.0:hostsunlimit fw1:6.0:mc_all_8 fw1:6.0:multicore
[Expert@GW]#

Example from a Cluster Member


[Expert@MGMT]# cplic check cluster-u
cplic check 'cluster-u': license valid
[Expert@MGMT]#

[Expert@MGMT]# cplic check -c cluster-u


cplic check 'cluster-u': 9 licenses
[Expert@MGMT]#

Security Management Administration Guide R80.20 | 333


Command Line Reference

cplic contract
Description
Deletes the Check Point Service Contract from the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Notes:
• For more information about Service Contract files, see sk33089: What is a Service Contract
File? http://supportcontent.checkpoint.com/solutions?id=sk33089
• If you install a Service Contract on a managed Security Gateway, you must update the license
repository on the applicable Management Server - in SmartUpdate, or with the cplic get (on
page 340) command.

Syntax
cplic contract -h
cplic [-d] contract
del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
del Deletes the Service Contract from the $CPDIR/conf/cp.contract
file on the local Check Point computer.
put Merges the Service Contract to the $CPDIR/conf/cp.contract
file on the local Check Point computer.
<Service Contract ID> ID of the Service Contract.
{-o | -overwrite} Specifies to overwrite the current Service Contract.

<Service Contract File> Path to and the name of the Service Contract file.
First, you must download the Service Contract file from your User
Center account.

Security Management Administration Guide R80.20 | 334


Command Line Reference

cplic db_add
Description
Adds one or more licenses to the license repository on the Security Management Server.
When you add Local licenses to the license repository, Security Management Server automatically
attaches them to the intended Check Point Security Gateways.
When you add Central licenses, you must manually attach them.
Note - You get the license details in the Check Point User Center.

Syntax
cplic db_add {-h | -help}
cplic [-d] db_add -l <License File> [<Host>] [<Expiration Date>] [<Signature>]
[<SKU/Features>]

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-l <License File> Name of the file that contains the license.
<Host> Security Management Server hostname or IP address.
<Expiration Date> The license expiration date.
<Signature> The license signature string.
For example: aa6uwknDc-CE6CRtjhv-zipoVWSnm-z98N7Ck3m
The string is case sensitive and the hyphens are optional.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example, CPSUITE-EVAL-3DES-vNG

Example
If the file 192.0.2.11.lic contains one or more licenses, the command cplic db_add -l
192.0.2.11.lic produces output similar to:
[Expert@MGMT]# cplic db_add -l 192.0.2.11.lic
Adding license to database ...
Operation Done
[Expert@MGMT]#

Security Management Administration Guide R80.20 | 335


Command Line Reference

cplic db_print
Description
Displays the details of Check Point licenses stored in the license repository on the Security
Management Server.

Syntax
cplic db_print {-h | -help}
cplic [-d] db_print {<Object Name> | -all} [{-n | -noheader}] [-x] [{-t | -type}]
[{-a | -attached}]

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
<Object Name> Prints only the licenses attached to <Object Name>.
<Object Name> is the name of the Check Point Security Gateway object as
defined in SmartConsole.
-all Prints all the licenses in the license repository.
{-n | -noheader} Prints licenses with no header.
-x Prints licenses with their signatures.
{-t | -type} Prints licenses with their type: Central or Local.
{-a | -attached} Shows to which object the license is attached.
Useful, if the -all option is specified.

Example
[Expert@MGMT:0]# cplic db_print -all
Retrieving license information from database ...

The following licenses appear in the database:


===============================================
Host Expiration Features
192.168.3.28 25Aug2017 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX CK-XXXXXXXXXXXX
[Expert@MGMT:0]#

[Expert@MGMT:0]# cplic db_print -all -x -a


Retrieving license information from database ...

The following licenses appear in the database:


===============================================
Host Expiration Features
192.168.3.28 25Aug2017 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX CK-XXXXXXXXXXXX MGMT
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 336


Command Line Reference

cplic db_rm
Description
Removes a license from the license repository on the Security Management Server. You can run
this command ONLY after you detach the license with the cplic del (on page 338) command.
After you remove the license from the repository, it can no longer use it.

Syntax
cplic db_rm {-h | -help}
cplic [-d] db_rm <Signature>

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
<Signature> The signature string within the license.
To see the license signature string, run the cplic print -x (on page 341)
command.

Example
[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn

Security Management Administration Guide R80.20 | 337


Command Line Reference

cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other
licenses.
This command can delete a license on both local computer, and on remote managed computers.

Syntax
cplic del {-h | -help}
cplic [-d] del [-F <Output File>] <Signature> <Object Name>

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-F <Output File> Saves the command output to the specified file.
<Signature> The signature string within the license.
To see the license signature string, run the cplic print -x (on page 341)
command.
<Object Name> The name of the Check Point Security Gateway object as defined in
SmartConsole.

Security Management Administration Guide R80.20 | 338


Command Line Reference

cplic del <object name>


Description
Detaches a Central license from a remote managed Check Point Security Gateway.
When you run this command, it automatically updates the license repository.
The Central license remains in the license repository as an unattached license.

Syntax
cplic del {-h | -help}
cplic [-d] del <Object Name> [-F <Output File>] [-ip <Dynamic IP Address>]
<Signature>

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
<Object Name> The name of the Check Point Security Gateway object as defined in
SmartConsole.
-F <Output File> Saves the command output to the specified file.
-ip <Dynamic IP Deletes the license on the Check Point Security Gateway with the specified
Address> IP address. Use this parameter to delete a license on a DAIP Check Point
Security Gateway.
Note - If this parameter is used, then object name must be a DAIP Security
Gateway.

<Signature> The signature string within the license.


To see the license signature string, run the cplic print -x (on page 341)
command.

Security Management Administration Guide R80.20 | 339


Command Line Reference

cplic get
Description
Retrieves all licenses from Security Gateways into the license repository on the Security
Management Server.
This command helps synchronize the license repository with the managed Check Point Security
Gateways.
When you run this command, it updates the license repository with all local changes.

Syntax
cplic get {-h | -help}
cplic [-d] get
-all
<IP Address>
<Host Name>

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
-all Retrieves licenses from all Check Point Security Gateways in the managed
network.
<IP Address> The IP address of the Check Point Security Gateway, from which licenses
are to be retrieved.
<Host Name> The name of the Check Point Security Gateway object as defined in
SmartConsole, from which licenses are to be retrieved.

Example
If the Check Point Security Gateway with the object name MyGW contains four Local licenses, and
the license repository contains two other Local licenses, the command cplic get MyGW
produces output similar to this:
[Expert@MGMT:0]# cplic get MyGW
Get retrieved 4 licenses.
Get removed 2 licenses.
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 340


Command Line Reference

cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway, this command prints all installed licenses (both Local and Central).

Syntax
cplic print {-h | -help}
cplic [-d] print[{-n | -noheader}] [-x] [{-t | -type}] [-F <Output File>] [{-p |
-preatures}] [-D]

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
{-n | -noheader} Prints licenses with no header.
-x Prints licenses with their signature.
{-t | -type] Prints licenses showing their type: Central or Local.
-F <Output File> Saves the command output to the specified file.
{-p | -preatures} Prints licenses resolved to primitive features.
-D on Multi-Domain Server, prints only Domain licenses.

Example 1
[Expert@HostName:0]# cplic print
Host Expiration Features
192.168.3.28 25Aug2017 CPMP-XXX CK-XXXXXXXXXXXX
[Expert@HostName:0]#

Example 2
[Expert@HostName:0]# cplic print -x
Host Expiration Signature Features
192.168.3.28 25Aug2017 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CPMP-XXX CK-XXXXXXXXXXXX
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 341


Command Line Reference

cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.

Syntax
cplic put {-h | -help}
cplic [-d] put [{-o | -overwrite}] [{-c | -check-only}] [{-s | -select}] [-F <Output
File>] [{-P | -Pre-boot}] [{-k | -kernel-only}] -l <License File> [<Host>]
[<Expiration Date>] [<Signature>] [<SKU/Features>]

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
{-o | -overwrite} On a Security Management Server, this erases all existing licenses
and replaces them with the new licenses.
On a Check Point Security Gateway, this erases only the local
licenses, but not central licenses that are installed remotely.
{-c | -check-only} Verifies the license. Checks if the IP of the license matches the Check
Point computer and if the signature is valid.
{-s | -select} Selects only the local license whose IP address matches the IP
address of the Check Point computer.
-F <Output File> Saves the command output to the specified file.
{-P | -Pre-boot} Use this option after you have upgraded and before you reboot the
Check Point computer. Use of this option will prevent certain error
messages.
{-K | -kernel-only} Pushes the current valid licenses to the kernel.
For use by Check Point Support only.
-l <License File> Name of the file that contains the license.
<Host> Hostname or IP address of Security Management Server.
<Expiration Date> The license expiration date.
<Signature> The signature string within the license.
(Case sensitive. The hyphens are optional.)

<SKU/Features> The SKU of the license summarizes the features included in the
license.
For example: CPSUITE-EVAL-3DES-vNG

Security Management Administration Guide R80.20 | 342


Command Line Reference

Copy and paste the parameters from the license received from the User Center:

Parameter Description
host The IP address of the external interface (in quad-dot notation). The
last part cannot be 0 or 255.
expiration date The license expiration date. It can be never.
signature The license signature string.
(Case sensitive. The hyphens are optional.)
SKU/features A string listing the SKU and the Certificate Key of the license. The
SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab

Example
[Expert@HostName:0]# cplic put -l License.lic
Host Expiration SKU
192.168.2.3 14Jan2016 CPSB-SWB CPSB-ADNC-M CK0123456789ab
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 343


Command Line Reference

cplic put <object name>


Description
Attaches one or more Central or Local licenses to a remote managed Security Gateway.
When you run this command, it automatically updates the license repository.
Notes:
• You get the license details in the Check Point User Center.
• You can attach more than one license.

Syntax
cplic put {-h | -help}
cplic [-d] put <Object Name> [-ip <Dynamic IP Address>] [-F <Output File>] -l
<License File> [<Host>] [<Expiration Date>] [<Signature>] [<SKU/Feature>]

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
<Object Name> The name of the Check Point Security Gateway object, as defined in
SmartConsole.
-ip <Dynamic IP Installs the license on the Check Point Security Gateway with the specified
Address> IP address. This parameter is used to install a license on a Check Point
Security Gateway with dynamically assigned IP address.
Note - If this parameter is used, then the object name must be a DAIP
Check Point Security Gateway.
-F <Output File> Saves the command output to the specified file.

-l <license File> Installs the licenses from <license file>.

<Host> Hostname or IP address of Security Management Server.


<Expiration Date> The license expiration date.
<Signature> The license signature string.
(Case sensitive. The hyphens are optional.)
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG

Copy and paste the parameters from the license received from the User Center:

Parameter Description
host The IP address of the external interface (in quad-dot notation). The last
part cannot be 0 or 255.
expiration date The license expiration date. It can be never.

Security Management Administration Guide R80.20 | 344


Command Line Reference

Parameter Description
signature The license signature string.
(Case sensitive. The hyphens are optional.)
SKU/features A string listing the SKU and the Certificate Key of the license. The SKU of
the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab

Security Management Administration Guide R80.20 | 345


Command Line Reference

cplic upgrade
Description
Upgrades licenses in the license repository with licenses in the specified license file.
Note - You get this license file in the Check Point User Center.

Syntax
cplic upgrade {-h | -help}
cplic [-d] upgrade –l <Input File>

Parameters
Parameter Description
{-h | -help} Shows the applicable built-in usage.
–l <Input File> Upgrades the licenses in the license repository and Check Point Security
Gateways to match the licenses in the specified file.

Example
This example explains the procedure to upgrade the licenses in the license repository.
There are two Software Blade licenses in the input file:
• One license does not match any license on a remote managed Security Gateway.
• The other license matches an NGX-version license on a managed Security Gateway that has to
be upgraded.
Workflow:
• Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the Security
Gateways with the previous product versions.
• Import all licenses into the license repository. This can also be done after upgrading the
products on the remote Security Gateways.
• Run this command:
cplic get -all

Example:
[Expert@MyMGMT]# cplic get -all
Getting licenses from all modules ...
MyGW:
Retrieved 1 licenses

• To see all the licenses in the repository, run this command:


cplic db_print -all -a

Example:
[Expert@MyMGMT]# cplic db_print -all -a
Retrieving license information from database ...

The following licenses appear in the database:


==================================================
Host Expiration Features

Security Management Administration Guide R80.20 | 346


Command Line Reference

192.0.2.11 Never CPFW-FIG-25-53 CK49C3A3CC7121 MyGW1


192.0.2.11 26Nov2017 CPSB-SWB CPSB-ADNC-M CK0123456789ab MyGW2

• In the User Center https://usercenter.checkpoint.com, view the licenses for the products that
were upgraded from version NGX to a Software Blades license. You can also create new
upgraded licenses.
• Download a file containing the upgraded licenses. Only download licenses for the products that
were upgraded from version NGX to Software Blades.
• If you did not import the version NGX licenses into the repository, import the version NGX
licenses now. Use the command cplic get -all.
• Run the license upgrade command: cplic upgrade –l <Input File>
• The licenses in the downloaded license file and in the license repository are compared.
• If the certificate keys and features match, the old licenses in the repository and in the
remote Security Gateways are updated with the new licenses.
• A report of the results of the license upgrade is printed.
For more about managing licenses, see the R80.20 Security Management Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_SecurityMa
nagement_AdminGuide/html_frameset.htm.

Security Management Administration Guide R80.20 | 347


Command Line Reference

cppkg
Description
Manages the SmartUpdate software packages repository on the Security Management Server.
Important - Installing software packages with the SmartUpdate is not supported for Security
Gateways running on Gaia OS.

Syntax
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>

Notes:
• You can run this command only in the Expert mode.
• On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).

Parameters
Parameter Description
add <options> (on page 349) Adds a SmartUpdate software package to the repository.
{del | delete} <options> Deletes a SmartUpdate software package from the repository.
(on page 350)
get (on page 352) Updates the list of the SmartUpdate software packages in the
repository.
getroot (on page 353) Shows the path to the root directory of the repository (the value
of the environment variable $SUROOT).
print (on page 354) Prints the list of SmartUpdate software packages in the
repository.
setroot <options> (on page Configures the path to the root directory of the repository.
355)

Security Management Administration Guide R80.20 | 348


Command Line Reference

cppkg add
Description
Adds a SmartUpdate software package to the SmartUpdate software packages repository.
Notes:
• You can run this command only in the Expert mode.
• On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).
• This command does not overwrite existing packages. To overwrite an existing package, you
must first delete the existing package.
• You get the SmartUpdate software packages from the Support Center
http://supportcenter.checkpoint.com.

Syntax
cppkg add <Full Path to Package | DVD Drive [Product]>

Parameters
Parameter Description
<Full Path to Specifies the full local path on the computer to the SmartUpdate software
Package> package.

DVD Drive Specifies the DVD root path.


[Product] Example: /mnt/CPR80

Example - Adding R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances
[Expert@MGMT:0]# cppkg print
Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------
[Expert@MGMT:0]#

[Expert@MGMT:0]# cppkg add /var/log/CP1100_6.0_4_0_-.tgz


Adding package to the repository
Getting the package type...
Extracting the package files...
Copying package to the repository...
Package was successfully added to the repository
[Expert@MGMT:0]#

[Expert@MGMT:0]# cppkg print


Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------
Check Point CP1100 R77.20 Gaia Embedded R77.20
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 349


Command Line Reference

cppkg delete
Description
Deletes SmartUpdate software packages from the SmartUpdate software packages repository.
Notes:
• You can run this command only in the Expert mode.
• On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).

Syntax
cppkg del ["<Vendor>" "<Product>" "<Major Version>" "<OS>" "<Minor Version>"]
cppkg delete ["<Vendor>" "<Product>" "<Major Version>" "<OS>" "<Minor Version>"]

Parameters
Parameter Description
del | delete When you do not specify optional parameters, the command runs in the
interactive mode. The command shows the menu with applicable options.
"<Vendor>" Specifies the package vendor. Enclose in double-quotes.
"<Product>" Specifies the product name. Enclose in double-quotes.
"<Major Specifies the package Major Version. Enclose in double-quotes.
Version>"
"<OS>" Specifies the package OS. Enclose in double-quotes.
"<Minor Specifies the package Minor Version. Enclose in double-quotes.
Version>"

Notes:
• To see the values for the optional parameters, run the cppkg print (on page 354) command.
• You must specify all optional parameters, or none.

Example - Interactive mode


[Expert@MGMT:0]# cppkg delete

Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20

(e) Exit

Enter your choice : 1

You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y

Package was successfully removed from the repository


[Expert@MGMT:0]#

Example - Manually deleting the specified package


[Expert@MGMT:0]# cppkg print
Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------

Security Management Administration Guide R80.20 | 350


Command Line Reference

Check Point CP1100 R77.20 Gaia Embedded R77.20


[Expert@MGMT:0]#

[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 351


Command Line Reference

cppkg get
Description
Updates the list of the SmartUpdate software packages in the SmartUpdate software packages
repository based on the real content of the repository.
Notes:
• You can run this command only in the Expert mode.
• On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).

Syntax
cppkg get

Example
[Expert@MGMT:0]# cppkg get
Update successfully completed
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 352


Command Line Reference

cppkg getroot
Description
Shows the path to the root directory of the SmartUpdate software packages repository (the value
of the environment variable $SUROOT)
Notes:
• You can run this command only in the Expert mode.
• On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).

Syntax
cppkg getroot

Example
[Expert@MGMT:0]# cppkg getroot
[cppkg 7119 4128339728]@MGMT[29 May 17:16:06] Current repository root is set to
: /var/log/cpupgrade/suroot
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 353


Command Line Reference

cppkg print
Description
Prints the list of SmartUpdate software packages in the SmartUpdate software packages
repository.
Notes:
• You can run this command only in the Expert mode.
• On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).

Syntax
cppkg print

Example - R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances


[Expert@MGMT:0]# cppkg print
Vendor Product Version OS Minor Version
----------------------------------------------------------------------------------
Check Point CP1100 R77.20 Gaia Embedded R77.20
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 354


Command Line Reference

cppkg setroot
Description
Configures the path to the root directory of the SmartUpdate software packages repository.

Notes:
• You can run this command only in the Expert mode.
• On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).
• The default path is /var/log/cpupgrade/suroot
• When changing repository root directory:
• This command copies the software packages from the old repository to the new repository.
A package in the new location is overwritten by a package from the old location, if the
packages have the same name.
• This command updates the value of the environment variable $SUROOT in the Check Point
Profile shell scripts ($CPDIR/tmp/.CPprofile.sh and
$CPDIR/tmp/.CPprofile.csh).

Syntax
cppkg setroot <Full Path to Repository Root Directory>

Example
[Expert@MGMT:0]# cppkg setroot /var/log/my_directory

Repository root is set to : /var/log/cpupgrade/suroot

Note : When changing repository root directory :

1. Old repository content will be copied into the new repository


2. A package in the new location will be overwritten by a package in the old
location, if the packages have the same name

Change the current repository root ? [y/n] : y

The new repository directory does not exist. Create it ? [y/n] : y

Repository root was set to : /var/log/my_directory

Notice : To complete the setting of your directory, reboot the machine!


[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 355


Command Line Reference

cpprod_util
Description
This utility lets you work with Check Point Registry
($CPDIR/registry/HKLM_registry.data) without manually opening it:
• Shows which Check Point products and features are enabled on this Check Point computer.
• Enables and disables Check Point products and features on this Check Point computer.

Syntax
cpprod_util CPPROD_GetValue "<Product>" "<Parameter>" {0|1}
cpprod_util CPPROD_SetValue "<Product>" "<Parameter>" {1|4} "<Value>" {0|1}
cpprod_util -dump

Parameters
Parameter Description
CPPROD_GetValue Gets the configuration status of the specified product or feature:
• 0 - Disabled
• 1 - Enabled
CPPROD_SetValue Sets the configuration for the specified product or feature.
Important - Do not run these command unless explicitly instructed by
Check Point Support or R&D to do so.
"<Product>" Specifies the product or feature.
"<Parameter>" Specifies the configuration parameter for the specified product or
feature.
"<Value>" Specifies the value of the configuration parameter for the specified
product or feature:
• One of these integers: 0, 1, 4
• A string
dump Creates a dump file of Check Point Registry
($CPDIR/registry/HKLM_registry.data) in the current working
directory. The name of the output file is RegDump.

Notes
• On Multi-Domain Server, you must run this command in the context of the relevant Domain
Management Server.
• If you run the cpprod_util command without parameters, it prints:
• The list of all available products and features (for example, FwIsFirewallMgmt,
FwIsLogServer, FwIsStandAlone)
• The type of the expected argument when you configure a product or feature
(no-parameter, string-parameter, or integer-parameter)
• The type of the returned output (status-output, or no-output)

Security Management Administration Guide R80.20 | 356


Command Line Reference

• To redirect the output of the cpprod_util command, you need to redirect the stderr to
stdout:
cpprod_util <options> > <output file> 2>&1
Example: cpprod_util > /tmp/output_of_cpprod_util.txt 2>&1

Example 1 - Showing a list of all installed Check Point Products Packages on a


Management Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#

Example 2 - Checking if this Check Point computer is configured as a Management


Server
[Expert@MGMT:0]# cpprod_util FwIsFirewallMgmt
1
[Expert@MGMT:0]#

Example 3 - Checking if this Check Point computer is configured as a StandAlone


[Expert@MGMT:0]# cpprod_util FwIsStandAlone
0
[Expert@MGMT:0]#

Example 4 - Checking if this Management Server is configured as a Primary in High


Availability
[Expert@MGMT:0]# cpprod_util FwIsPrimary
1
[Expert@MGMT:0]#

Example 5 - Checking if this Management Server is configured as Active in High


Availability
[Expert@MGMT:0]# cpprod_util FwIsActiveManagement
0
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 357


Command Line Reference

Example 6 - Checking if this Management Server is configured as Backup in High


Availability
[Expert@MGMT:0]# cpprod_util FwIsSMCBackup
0
[Expert@MGMT:0]#

Example 7 - Checking if this Check Point computer is configured as a dedicated Log


Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
0
[Expert@MGMT:0]

Example 8 - Checking if on this Management Server the SmartProvisioning blade is


enabled
[Expert@MGMT:0]# cpprod_util FwIsAtlasManagement
1
[Expert@MGMT:0]#

Example 9 - Checking if on this Management Server the SmartEvent Server blade is


enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#

Example 10 - Checking if on this Management Server the SmartEvent Correlation Unit


blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#

Example 11 - Checking if on this Management Server the Endpoint Policy Management


blade is enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#

Example 12 - Checking if this Management Server is configured as Endpoint Policy


Server
[Expert@MGMT:0]# cpprod_util UepmIsPolicyServer
0
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 358


Command Line Reference

cprid
Description
Manages the Check Point Remote Installation Daemon (cprid). This daemon is used for remote
upgrade and installation of Check Point products on the managed Security Gateways.
Notes:
• You can run these commands only in the Expert mode.
• On a Multi-Domain Server, you must run these commands in the context of the MDS (run
mdsenv).

cpridstart
Description
Starts the Check Point Remote Installation Daemon (cprid).

Syntax
cpridstart

cpridstop
Description
Stops the Check Point Remote Installation Daemon (cprid).

Syntax
cpridstop

run_cprid_restart
Description
Stops and then starts the Check Point Remote Installation Daemon (cprid).

Syntax
run_cprid_restart

Security Management Administration Guide R80.20 | 359


Command Line Reference

cprinstall
Description
Performs installation of Check Point product packages and associated operations on remote
managed Security Gateways.
Important - Installing software packages with this command is not supported for Security
Gateways running on Gaia OS.
Notes:
• This command requires a license for SmartUpdate.
• You can run these commands only in the Expert mode.
• On the remote Security Gateways these are required:
• SIC Trust must be established between the Security Management Server and the Security
Gateway.
• The cpd daemon must run.
• The cprid daemon must run.

Syntax
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>

Parameters
Parameter Description
boot <options> (on page Reboots the managed Security Gateway.
362)
cprestart <options> Runs the cprestart command on the managed Security Gateway.
(on page 363)
cpstart <options> (on Runs the cpstart command on the managed Security Gateway.
page 364)
cpstop <options> (on Runs the cpstop command on the managed Security Gateway.
page 365)
delete <options> (on Deletes a snapshot (backup) file on the managed Security Gateway.
page 366)

Security Management Administration Guide R80.20 | 360


Command Line Reference

Parameter Description
get <options> (on page • Gets details of the products and the operating system installed on
367) the managed Security Gateway.
• Updates the management database on the Security Management
Server.
install <options> (on Installs Check Point products on the managed Security Gateway.
page 368)
revert <options> (on Restores the managed Security Gateway running on SecurePlatform
page 370) OS from a snapshot saved on that Security Gateway.
show <options> (on page Displays all snapshot (backup) files on the managed Security Gateway
371) running on SecurePlatform OS.
snapshot <options> (on Creates a snapshot on the managed Security Gateway running on
page 372) SecurePlatform OS and saves it on that Security Gateway.
transfer <options> (on Transfers a software package from the repository to the managed
page 373) Security Gateway without installing the package.
uninstall <options> Uninstalls Check Point products on the managed Security Gateway.
(on page 374)
verify <options> (on Confirms these operations were successful:
page 376) • If a specific product can be installed on the managed Security
Gateway.
• That the operating system and currently installed products the
managed Security Gateway are appropriate for the software
package.
• That there is enough disk space to install the product the
managed Security Gateway.
• That there is a CPRID connection with the managed Security
Gateway.

Security Management Administration Guide R80.20 | 361


Command Line Reference

cprinstall boot
Description
Reboots the managed Security Gateway.

Syntax
cprinstall boot <Object Name>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example
[Expert@MGMT]# cprinstall boot MyGW

Security Management Administration Guide R80.20 | 362


Command Line Reference

cprinstall cprestart
Description
Runs the cprestart command on the managed Security Gateway.
Note - All Check Point products on the managed Security Gateway must be of the same version.

Syntax
cprinstall cprestart <Object Name>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example
[Expert@MGMT:0]# cprinstall cprestart MyGW

Security Management Administration Guide R80.20 | 363


Command Line Reference

cprinstall cpstart
Description
Runs the cpstart command on the managed Security Gateway.
Note - All Check Point products on the managed Security Gateway must be of the same version.

Syntax
cprinstall cpstart <Object Name>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example
[Expert@MGMT]# cprinstall cpstart MyGW

Security Management Administration Guide R80.20 | 364


Command Line Reference

cprinstall cpstop
Description
Runs the cpstop command on the managed Security Gateway.
Note - All Check Point products on the managed Security Gateway must be of the same version.

Syntax
cprinstall cpstop {-proc | -nopolicy} <Object Name>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
-proc Kills the Check Point daemons and Security Servers, while it maintains the
active Security Policy running in the Check Point kernel.
Rules with generic Allow, Drop or Reject action based on services, continue to
work.
-nopolicy Kills the Check Point daemons and Security Servers and unloads the Security
Policy from the Check Point kernel.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example
[Expert@MGMT]# cprinstall cpstop -proc MyGW

Security Management Administration Guide R80.20 | 365


Command Line Reference

cprinstall delete
Description
Deletes a snapshot (backup) file on the managed Security Gateway running on SecurePlatform OS.

Syntax
cprinstall delete <Object Name> <Snapshot File>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
<Snapshot File> Specifies the name of the snapshot (backup) on SecurePlatform OS.

Example
[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017

Security Management Administration Guide R80.20 | 366


Command Line Reference

cprinstall get
Description
• Gets details of the products and the operating system installed on the managed Security
Gateway.
• Updates the management database on the Security Management Server.

Syntax
cprinstall get <Object Name>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example:
[Expert@MGMT]# cprinstall get MyGW
Checking cprid connection...
Verified
Operation completed successfully
Updating machine information...
Update successfully completed
'Get Gateway Data' completed successfully
Operating system Major Version Minor Version
------------------------------------------------------------------------
SecurePlatform R75.20 R75.20

Vendor Product Major Version Minor Version


------------------------------------------------------------------------
Check Point VPN-1 Power/UTM R75.20 R75.20
Check Point SecurePlatform R75.20 R75.20
Check Point SmartPortal R75.20 R75.20
[Expert@MGMT]#

Security Management Administration Guide R80.20 | 367


Command Line Reference

cprinstall install
Description
Installs Check Point products on the managed Security Gateway.
Important - Installing software packages with this command is not supported for Security
Gateways running on Gaia OS.
Notes:
• Before transferring the software package, this command runs the cprinstall verify (on
page 376) command.
• To see the values for the package attributes, run the cppkg print (on page 354) command on
the Security Management Server.

Syntax
cprinstall install [-boot] [-backup] [-skip_transfer] <Object Name> "<Vendor>"
"<Product>" "<Major Version>" "<Minor Version>"

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is
canceled in certain scenarios.
-backup Creates a snapshot on the managed Security Gateway before installing
the package.
Note - Only on Security Gateways running on SecurePlatform OS.
-skip_transfer Skip the transfer of the package.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
"<Vendor>" Specifies the package vendor. Enclose in double-quotes.
Example:
• checkpoint
• Check Point
"<Product>" Specifies the product name. Enclose in double-quotes.
Examples:
• SVNfoundation
• firewall
• floodgate
• CP1100
• VPN-1 Power/UTM
• SmartPortal
"<Major Version>" Specifies the package Major Version. Enclose in double-quotes.

Security Management Administration Guide R80.20 | 368


Command Line Reference

Parameter Description
"<Minor Version>" Specifies the package Minor Version. Enclose in double-quotes.

Example
[Expert@MGMT]# cprinstall install -boot MyGW "checkpoint" "firewall" "R75" "R75.20"

Installing firewall R75.20 on MyGW...


Info : Testing Check Point Gateway
Info : Test completed successfully.
Info : Transferring Package to Check Point Gateway
Info : Extracting package on Check Point Gateway
Info : Installing package on Check Point Gateway
Info : Product was successfully applied.
Info : Rebooting the Check Point Gateway
Info : Checking boot status
Info : Reboot completed successfully.
Info : Checking Check Point Gateway
Info : Operation completed successfully.
[Expert@MGMT]#

Security Management Administration Guide R80.20 | 369


Command Line Reference

cprinstall revert
Description
Restores the managed Security Gateway running on SecurePlatform OS from a snapshot saved on
that Security Gateway.

Syntax
cprinstall revert <Object Name> <Snapshot File>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
<Snapshot File> Name of the SecurePlatform snapshot file.
Note - To see the names of the saved snapshot files, run the cprinstall
show (on page 371) command.

Security Management Administration Guide R80.20 | 370


Command Line Reference

cprinstall show
Description
Displays all snapshot (backup) files on the managed Security Gateway running on SecurePlatform
OS.

Syntax
cprinstall show <Object Name>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.

Example
[Expert@MGMT]# cprinstall show GW1
SU_backup.tzg

Security Management Administration Guide R80.20 | 371


Command Line Reference

cprinstall snapshot
Description
Creates a snapshot on the managed Security Gateway running on SecurePlatform OS and saves it
on that Security Gateway.

Syntax
cprinstall snapshot <Object Name> <Snapshot File>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
<Snapshot File> Name of the SecurePlatform snapshot file.
Note - To see the names of the saved snapshot files, run the cprinstall
show command.

Security Management Administration Guide R80.20 | 372


Command Line Reference

cprinstall transfer
Description
Transfers a software package from the repository to the managed Security Gateway without
installing the package.
Note - To see the values for the package attributes, run the cppkg print (on page 354) command
on the Security Management Server.

Syntax
cprinstall transfer <Object Name> "<Vendor>" "<Product>" "<Major Version>" "<Minor
Version>"

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
"<Vendor>" Specifies the package vendor. Enclose in double-quotes.
Example:
• checkpoint
• Check Point
"<Product>" Specifies the product name. Enclose in double-quotes.
Examples:
• SVNfoundation
• firewall
• floodgate
• CP1100
"<Major Version>" Specifies the package major version. Enclose in double-quotes.
"<Minor Version>" Specifies the package minor version. Enclose in double-quotes.

Security Management Administration Guide R80.20 | 373


Command Line Reference

cprinstall uninstall
Description
Uninstalls Check Point products on the managed Security Gateway.
Important - Uninstalling software packages with this command is not supported for Security
Gateways running on Gaia OS.
Notes:
• Before uninstalling product packages, this command runs the cprinstall verify (on page
376) command.
• After uninstalling a product package, you must run the cprinstall get (on page 367)
command.
• To see the values for the package attributes, run the cppkg print (on page 354) command on
the Security Management Server.

Syntax
cprinstall uninstall [-boot] <Object Name> "<Vendor>" "<Product>" "<Major
Version>" "<Minor Version>"

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
-boot Reboots the managed Security Gateway after uninstalling the package.
Note - Reboot is canceled in certain scenarios.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
"<Vendor>" Specifies the package vendor. Enclose in double-quotes.
Example:
• checkpoint
• Check Point
"<Product>" Specifies the product name. Enclose in double-quotes.
Examples:
• SVNfoundation
• firewall
• floodgate
• CP1100
"<Major Version>" Specifies the package major version. Enclose in double-quotes.
"<Minor Version>" Specifies the package minor version. Enclose in double-quotes.

Security Management Administration Guide R80.20 | 374


Command Line Reference

Example
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get

Security Management Administration Guide R80.20 | 375


Command Line Reference

cprinstall verify
Description
Confirms these operations were successful:
• If a specific product can be installed on the managed Security Gateway.
• That the operating system and currently installed products the managed Security Gateway are
appropriate for the software package.
• That there is enough disk space to install the product the managed Security Gateway.
• That there is a CPRID connection with the managed Security Gateway.

Syntax
cprinstall verify <Object Name> "<Vendor>" "<Product>" "<Major Version>" ["<Minor
Version>"]

Notes:
• You must run this command from the Expert mode.
• To see the values for the package attributes, run the cppkg print (on page 354) command on
the Security Management Server.

Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
"<Vendor>" Specifies the package vendor. Enclose in double-quotes.
Example:
• checkpoint
• Check Point
"<Product>" Specifies the product name. Enclose in double-quotes.
Examples:
• SVNfoundation
• firewall
• floodgate
• CP1100
• VPN-1 Power/UTM
• SmartPortal
"<Major Version>" Specifies the package major version. Enclose in double-quotes.
"<Minor Version>" Specifies the package minor version. Enclose in double-quotes.
This parameter is optional.

Security Management Administration Guide R80.20 | 376


Command Line Reference

Example - Verification succeeds


[Expert@MGMT]# cprinstall verify MyGW "checkpoint" "SVNfoundation" "R75.20"
Verifying installation of SVNfoundation R75.20 on MyGW...
Info : Testing Check Point Gateway.
Info : Test completed successfully.
Info : Installation Verified, The product can be installed.

Example - Verification fails


[Expert@MGMT]# cprinstall verify MyGW "checkpoint" "SVNfoundation" "R75.20"
Verifying installation of SVNfoundation R75.20 on MyGW...
Info : Testing Check Point Gateway
Info : SVN Foundation R70 is already installed on 192.0.2.134
Operation Success. Product cannot be installed, did not pass dependency check.

Security Management Administration Guide R80.20 | 377


Command Line Reference

cpstart
Description
Manually starts all Check Point processes and applications.
Notes:
• For the cprid daemon, use the cpridstart (on page 359) command.
• For manually starting specific Check Point processes, see sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.

Syntax
cpstart

Security Management Administration Guide R80.20 | 378


Command Line Reference

cpstat
Description
Displays the status and statistics information of Check Point applications.

Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o <Polling
Interval> [-c <Count>] [-e <Period>]] <Application Flag>

Note - You can write the parameters in the syntax in any desired order.

Parameters
Parameter Description
-d Optional.
Runs the command in debug mode.
Use only if you troubleshoot the command itself.
The output shows the SNMP queries and SNMP responses for the
applicable SNMP OIDs.
-h <Host> Optional.
When you run this command on a Management Server, this parameter
specifies the managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object name.
The default is localhost.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s <SICname> Optional.
Secure Internal Communication (SIC) name of the Application Monitoring
(AMON) server.
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor in
the <Application Flag>. To see all flavors, run the cpstat command
without any parameters.

Security Management Administration Guide R80.20 | 379


Command Line Reference

Parameter Description

-o <Polling Optional.
Interval> Specifies the desired polling interval (in seconds) - how frequently the
command collects and shows the information.
• 0 - The command shows the results only once and the stops (this is the
default value).
• 5 - The command shows the results every 5 seconds in the loop.
• 30 - The command shows the results every 30 seconds in the loop.
• N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the "-e
<Period>" parameter.
Example: cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results before
it stops.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
• 0 - The command shows the results repeatedly every <Polling Interval>
(this is the default value).
• 10 - The command shows the results 10 times every <Polling Interval>
and then stops.
• 20 - The command shows the results 20 times every <Polling Interval>
and then stops.
• N - The command shows the results N times every <Polling Interval>
and then stops.
Example: cpstat os -f perf -o 2 -c 2
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the
statistics.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
You can use this parameter together with the "-c <Count>" parameter.
Example: cpstat os -f perf -o 2 -c 2 -e 60

Security Management Administration Guide R80.20 | 380


Command Line Reference

Parameter Description

<Application Flag> Mandatory.


One of these:
• os - The OS information
• persistency - The historical status values
• thresholds - The thresholds configured with the
threshold_config command
• ci - The Anti-Virus blade information
• https_inspection - The HTTPS Inspection information
• cvpn - The Mobile Access blade information
• fw - The Firewall blade information
• vsx - The VSX information
• vpn - The IPsec VPN blade information
• blades - Overall status of the software blades
• identityServer - The Identity Awareness blade information
• appi - The Application Control blade information
• urlf - The URL Filtering blade information
• dlp - The Data Loss Prevention blade information
• ctnt - The Content Awareness blade information
• antimalware - The Threat Prevention information
• threat-emulation - The Threat Emulation blade information
• scrub - The Threat Extraction blade information
• gx - The LTE / Firewall-1 GX information
• fg - The QoS (formerly FloodGate-1) information
• ha - The ClusterXL (High Availability) information
• polsrv - The Policy Server information for Remote Access VPN clients
• ca - The Certificate Authority information
• mg - The Security Management Server information (connected GUI
clients, received logs statistics from connected gateways, indexed logs
statistics)
• cpsemd - The SmartEvent blade information
• cpsead - The SmartEvent Correlation Unit information
• ls - The Log Server information
• PA - The Provisioning Agent information

These flavors are available for the application flags


--------------------------------------------------------------

Security Management Administration Guide R80.20 | 381


Command Line Reference

|Flag |Flavours |
--------------------------------------------------------------
|os |default, ifconfig, routing, routing6, |
| |memory, old_memory, cpu, disk, perf, |
| |multi_cpu, multi_disk, raidInfo, sensors, |
| |power_supply, hw_info, all, average_cpu, |
| |average_memory, statistics, updates, |
| |licensing, connectivity, vsx |
--------------------------------------------------------------
|persistency |product, TableConfig, SourceConfig |
--------------------------------------------------------------
|thresholds |default, active_thresholds, destinations, |
| |error |
--------------------------------------------------------------
|ci |default |
--------------------------------------------------------------
|https_inspection |default, hsm_status, all |
--------------------------------------------------------------
|cvpn |cvpnd, sysinfo, products, overall |
--------------------------------------------------------------
|fw |default, interfaces, policy, perf, hmem, |
| |kmem, inspect, cookies, chains, |
| |fragments, totals, totals64, ufp, http, |
| |ftp, telnet, rlogin, smtp, pop3, sync, |
| |log_connection, all |
--------------------------------------------------------------
|vsx |default, stat, traffic, conns, cpu, all, |
| |memory, cpu_usage_per_core |
--------------------------------------------------------------
|vpn |default, product, IKE, ipsec, traffic, |
| |compression, accelerator, nic, |
| |statistics, watermarks, all |
--------------------------------------------------------------
|blades |fw, ips, av, urlf, vpn, cvpn, aspm, dlp, |
| |appi, anti_bot, default, |
| |content_awareness, threat-emulation, |
| |default |
--------------------------------------------------------------
|identityServer |default, authentication, logins, ldap, |
| |components, adquery |
--------------------------------------------------------------
|appi |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|urlf |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|dlp |default, dlp, exchange_agents, fingerprint|
--------------------------------------------------------------
|ctnt |default |
--------------------------------------------------------------
|antimalware |default, scanned_hosts, scanned_mails, |
| |subscription_status, update_status, |
| |ab_prm_contracts, av_prm_contracts, |
| |ab_prm_contracts, av_prm_contracts |
--------------------------------------------------------------
|threat-emulation |default, general_statuses, update_status, |
| |scanned_files, malware_detected, |
| |scanned_on_cloud, malware_on_cloud, |
| |average_process_time, emulated_file_size, |
| |queue_size, peak_size, |
Security Management Administration Guide R80.20 | 382
Command Line Reference

| |file_type_stat_file_scanned, |
| |file_type_stat_malware_detected, |
| |file_type_stat_cloud_scanned, |
| |file_type_stat_cloud_malware_scanned, |
| |file_type_stat_filter_by_analysis, |
| |file_type_stat_cache_hit_rate, |
| |file_type_stat_error_count, |
| |file_type_stat_no_resource_count, |
| |contract, downloads_information_current, |
| |downloading_file_information, |
| |queue_table, history_te_incidents, |
| |history_te_comp_hosts |
--------------------------------------------------------------
|scrub |default, subscription_status, |
| |threat_extraction_statistics |
--------------------------------------------------------------
|gx |default, contxt_create_info, |
| |contxt_delete_info, contxt_update_info, |
| |contxt_path_mng_info, GXSA_GPDU_info, |
| |contxt_initiate_info, gtpv2_create_info, |
| |gtpv2_delete_info, gtpv2_update_info, |
| |gtpv2_path_mng_info, gtpv2_cmd_info, all |
--------------------------------------------------------------
|fg |all |
--------------------------------------------------------------
|ha |default, all |
--------------------------------------------------------------
|polsrv |default, all |
--------------------------------------------------------------
|ca |default, all, cert, crl, user |
--------------------------------------------------------------
|mg |default |
--------------------------------------------------------------
|cpsemd |default |
--------------------------------------------------------------
|cpsead |default |
--------------------------------------------------------------
|ls |default |
--------------------------------------------------------------
|PA |default |
--------------------------------------------------------------

Example 1
[Expert@MyGW:0]# cpstat -f interfaces fw

Network interfaces
--------------------------------------------------------------------------------------------------
------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------
------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------
Security Management Administration Guide R80.20 | 383
Command Line Reference

------------------

[Expert@MyGW:0]#

Example 2
[Expert@MyGW:0]# cpstat -f default fw

Policy name: MyGW_Policy


Install time: Wed May 23 18:14:32 2018

Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------

... ... [truncated for brevity] ... ...

[Expert@MyGW:0]#

Example 3
[Expert@MyGW:0]# cpstat os -f perf -o 2 -c 2 -e 60

Total Virtual Memory (Bytes): 12417720320


Active Virtual Memory (Bytes): 3741331456
Total Real Memory (Bytes): 8231063552
Active Real Memory (Bytes): 3741331456
Free Real Memory (Bytes): 4489732096
Memory Swaps/Sec: -
Memory To Disk Transfers/Sec: -
CPU User Time (%): 0
CPU System Time (%): 0
CPU Idle Time (%): 100
CPU Usage (%): 0
CPU Queue Length: -
CPU Interrupts/Sec: 135
CPUs Number: 8
Disk Servicing Read\Write Requests Time: -
Disk Requests Queue: -
Disk Free Space (%): 61
Disk Total Free Space (Bytes): 12659716096
Disk Available Free Space (Bytes): 11606188032
Disk Total Space (Bytes): 20477751296

Total Virtual Memory (Bytes): 12417720320


Active Virtual Memory (Bytes): 3741556736
Total Real Memory (Bytes): 8231063552
Active Real Memory (Bytes): 3741556736
Free Real Memory (Bytes): 4489506816
Memory Swaps/Sec: -
Memory To Disk Transfers/Sec: -
CPU User Time (%): 3
CPU System Time (%): 0
CPU Idle Time (%): 97
CPU Usage (%): 3
CPU Queue Length: -
CPU Interrupts/Sec: 140
CPUs Number: 8
Disk Servicing Read\Write Requests Time: -
Disk Requests Queue: -
Disk Free Space (%): 61
Disk Total Free Space (Bytes): 12659716096
Disk Available Free Space (Bytes): 11606188032

Security Management Administration Guide R80.20 | 384


Command Line Reference

Disk Total Space (Bytes): 20477751296

[Expert@MyGW:0]#

Security Management Administration Guide R80.20 | 385


Command Line Reference

cpstop
Description
Manually stops all Check Point processes and applications.
Notes:
• For the cprid daemon, use the cpridstop (on page 359) command.
• For manually stopping specific Check Point processes, see sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.

Syntax
cpstop

Security Management Administration Guide R80.20 | 386


Command Line Reference

cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer. CPView Utility shows statistical
data that contain both general system information (CPU, Memory, Disk space) and information for
different Software Blades (only on Security Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878
http://supportcontent.checkpoint.com/solutions?id=sk101878.

Syntax
cpview --help

CPView User Interface


The CPView user interface has three sections:

Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.

Navigation This menu bar is interactive. Move between menus with the arrow keys and
mouse.
A menu can have sub-menus and they show under the menu bar.

View This view shows the statistics collected in that view.


These statistics update at the refresh rate.

Using CPView
Use these keys to navigate the CPView:

Key Description
Arrow keys Moves between menus and views. Scrolls in a view.
Home Returns to the Overview view.
Enter Changes to the View Mode.
On a menu with sub-menus, the Enter key moves you to the lowest level
sub-menu.
Esc Returns to the Menu Mode.
Q Quits CPView.

Security Management Administration Guide R80.20 | 387


Command Line Reference

Use these keys to change CPView interface options:

Key Description
R Opens a window where you can change the refresh rate.
The default refresh rate is 2 seconds.
W Changes between wide and normal display modes.
In wide mode, CPView fits the screen horizontally.
S Manually sets the number of rows or columns.
M Switches on/off the mouse.
P Pauses and resumes the collection of statistics.

Use these keys to save statistics, show help, and refresh statistics:

Key Description
C Saves the current page to a file. The file name format is:
cpview_<cpview process ID>.cap<number of captures>

H Shows a tooltip with CPView options.

Space bar Immediately refreshes the statistics.

Security Management Administration Guide R80.20 | 388


Command Line Reference

cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes such
as Check Point daemons on the local computer, and attempts to restart them if they fail. Among
the processes monitored by Watchdog are fwm, fwd, cpd, cpm, DAService, java_solr,
log_indexer, and others. The list of monitored processes depends on the installed and
configured Check Point products and Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log
file.
The cpwd_admin utility shows the status of the monitored processes, and configures the Check
Point WatchDog.

There are two types of Check Point WatchDog monitoring


Monitoring Description
Passive WatchDog restarts the process only when the process terminates abnormally.
In the output of the cpwd_admin list command, the MON column shows N for
passively monitored processes.
Active WatchDog checks the process status every predefined interval.
WatchDog makes sure the process is alive, as well as properly functioning (not
stuck on deadlocks, frozen, and so on).
In the output of the cpwd_admin list command, the MON column shows Y for
actively monitored processes.
The list of actively monitored processes is predefined by Check Point. Users
cannot change or configure it.

Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor

Parameters
Parameter Description
config <options> (on Configures the Check Point WatchDog.
page 391)

Security Management Administration Guide R80.20 | 389


Command Line Reference

Parameter Description
del <options> (on page Temporarily deletes a monitored process from the WatchDog
394) database of monitored processes.
detach <options> (on Temporarily detaches a monitored process from the WatchDog
page 395) monitoring.
exist (on page 396) Checks whether the WatchDog process cpwd is alive.
flist <options> (on page Saves the status of all monitored processes to a
397) $CPDIR/tmp/cpwd_list_<Epoch Timestamp>.lst file.
getpid <options> (on Shows the PID of a monitored process.
page 398)
kill <options> (on page Terminates the WatchDog process cpwd.
399) Important - Do not run this command unless explicitly instructed by
Check Point Support or R&D to do so.
list (on page 400) Prints the status of all monitored processes on the screen.
monitor_list (on page Prints the status of actively monitored processes on the screen.
402)
start <options> (on page Starts a process as monitored by the WatchDog.
403) See sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
start_monitor (on Starts the active WatchDog monitoring - WatchDog monitors the
page 405) predefined processes actively.
stop <options> (on page Stops a monitored process.
406) See sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
stop_monitor (on page Stops the active WatchDog monitoring - WatchDog monitors all
408) processes only passively.

Security Management Administration Guide R80.20 | 390


Command Line Reference

cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart the
WatchDog process with the cpstop and cpstart commands (which restart all Check Point
processes).

Syntax
cpwd_admin config
-h
-a <Configuration_Parameter_1>=<Value_1>
<Configuration_Parameter_2>=<Value_2> ... <Configuration_Parameter_N>=<Value_N>
-d <Configuration_Parameter_1> <Configuration_Parameter_2> ...
<Configuration_Parameter_N>
-p
-r

Parameters
Parameter Description
-h Shows built-in usage.
-a Adds the WatchDog configuration parameters.
<Configuration_Parameter_1>=<Value_1 Note - Spaces are not allowed between the name of
>
the configuration parameter and its value.
<Configuration_Parameter_2>=<Value_2
> ...
<Configuration_Parameter_N>=<Value_N
>
-d <Configuration_Parameter_1> Deletes the WatchDog configuration parameters that
<Configuration_Parameter_2> ... user added with the cpwd_admin config -a
<Configuration_Parameter_N> command.
-p Shows the WatchDog configuration parameters that
user added with the cpwd_admin config -a
command.
-r Restores the default WatchDog configuration.

These are the available configuration parameters and the accepted values:

Configuration Accepted Values Description


Parameter
default_ctx Text string up to 128 On VSX Gateway, configures the CTX value that is
characters assigned to monitored processes, for which no CTX is
specified.

Security Management Administration Guide R80.20 | 391


Command Line Reference

display_ctx • 0 (default) On VSX Gateway, configures whether the WatchDog


shows the CTX column in the output of the
• 1
cpwd_admin list command (between the APP and
the PID columns):
• 0 - Does not show the CTX column
• 1 - Shows the CTX column
no_limit • Range: -1, 0, >0 If rerun_mode=1, specifies the maximal number of
times the WatchDog tries to restart a process.
• Default: 5
• -1 - Always tries to restart
• 0 - Never tries to restart
• >0 - Tries this number of times
num_of_procs • Range: 30 - 2000 Configures the maximal number of processes
managed by the WatchDog.
• Default: 2000
rerun_mode • 0 Configures whether the WatchDog restarts
processes after they fail:
• 1 (default)
• 0 - Does not restart a failed process. Monitor and
log only.
• 1 - Restarts a failed process (this is the default).
reset_startups • Range: > 0 Configures the time (in seconds) the WatchDog waits
after the process starts and before the WatchDog
• Default: 3600 resets the process's startup_counter to 0.
To see the process's startup counter, in the output of
the cpwd_admin list command, refer to the
#START column.
sleep_mode • 0 Configures how the WatchDog restarts the process:

• 1 (default) • 0 - Ignores timeout and restarts the process


immediately
• 1 - Waits for the duration of sleep_timeout
sleep_timeout • Range: 0 - 3600 If rerun_mode=1, specifies how much time (in
seconds) passes from a process failure until
• Default: 60
WatchDog tries to restart it.
stop_timeout • Range: > 0 Configures the time (in seconds) the WatchDog waits
for a process stop command to complete.
• Default: 60
zero_timeout • Range: > 0 After failing no_limit times to restart a process,
the WatchDog waits zero_timeout seconds before
• Default: 7200
it tries again.
The value of the zero_timeout must be greater
than the value of the timeout.

The WatchDog saves the user defined configuration parameters in the


$CPDIR/registry/HKLM_registry.data file in the ": (Wd_Config" section:
("CheckPoint Repository Set"
: (SOFTWARE
: (CheckPoint
Security Management Administration Guide R80.20 | 392
Command Line Reference

: (CPshared
:CurrentVersion (6.0)
: (6.0
... ...
: (reserved
... ...
: (Wd
: (Wd_Config
:Configuration_Parameter_1 ("[4]Value_1")
:Configuration_Parameter_2 ("[4]Value_2")
)
)
... ...

Example
[Expert@HostName:0]# cpwd_admin config -p
cpWatchDog doesn't have configuration parameters
[Expert@HostName:0]#
[Expert@HostName:0]# cpwd_admin config -a sleep_timeout=120 no_limit=12
[Expert@HostName:0]#
[Expert@HostName:0]# cpwd_admin config -p
cpWatchDog Configuration parameters are:
sleep_timeout : 120
no_limit : 12
[Expert@HostName:0]#
[Expert@HostName:0]# cpstop ; cpstart
[Expert@HostName:0]#

[Expert@HostName:0]# cpwd_admin config -r


cpWatchDog doesn't have configuration parameters
[Expert@HostName:0]#
[Expert@HostName:0]# cpstop ; cpstart
[Expert@HostName:0]#
[Expert@HostName:0]# cpwd_admin config -p
cpWatchDog doesn't have configuration parameters
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 393


Command Line Reference

cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored processes.
Notes:
• WatchDog stops monitoring the detached process, but the process stays alive.
• The cpwd_admin list command does not show the deleted process anymore.
• This change applies until all Check Point services restart during boot, or with the cpstart
command.

Syntax
cpwd_admin del -name <Application Name> [-ctx <VSID>]

Parameters
Parameter Description
<Application Name> Name of the monitored Check Point process as you see in the output
of the cpwd_admin list command in the leftmost column APP.
Examples:
• FWM
• FWD
• CPD
• CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.

Example
[Expert@HostName:0]# cpwd_admin del -name FWD
cpwd_admin:
successful Del operation
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 394


Command Line Reference

cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
• WatchDog stops monitoring the detached process, but the process stays alive.
• The cpwd_admin list command does not show the detached process anymore.
• This change applies until all Check Point services restart during boot, or with the cpstart
command.

Syntax
cpwd_admin detach -name <Application Name> [-ctx <VSID>]

Parameters
Parameter Description
<Application Name> Name of the monitored Check Point process as you see in the output
of the cpwd_admin list command in the leftmost column APP.
Examples:
• FWM
• FWD
• CPD
• CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.

Example
[Expert@HostName:0]# cpwd_admin detach -name FWD
cpwd_admin:
successful Detach operation
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 395


Command Line Reference

cpwd_admin exist
Description
• Checks whether the WatchDog process cpwd is alive.

Syntax
cpwd_admin exist

Example
[Expert@HostName:0]# cpwd_admin exist
cpwd_admin: cpWatchDog is running
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 396


Command Line Reference

cpwd_admin flist
Description
Saves the status of all WatchDog monitored processes to a $CPDIR/tmp/cpwd_list_<Epoch
Timestamp>.lst file.
Note - For information about the Unix Epoch time, see the http://www.epochconverter.com

Syntax
cpwd_admin flist [-full]

Parameters
Parameter Description
-full Saves the verbose output.

Output
Column Description
APP Shows the WatchDog name of the monitored process.
PID Shows the PID of the monitored process.
STAT Shows the status of the monitored process:
• E - executing
• T - terminated
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the last
time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see cpwd_admin config (on page 391)).
MON Shows how the WatchDog monitors this process (see the explanation for the
cpwd_admin (on page 389)):
• Y - Active monitoring
• N - Passive monitoring
COMMAND Shows the command the WatchDog ran to start this process.

Example
[Expert@HostName:0]# cpwd_admin flist
/opt/CPshrd-R80.20/tmp/cpwd_list_3209472813.lst
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 397


Command Line Reference

cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.

Syntax
cpwd_admin getpid -name <Application Name> [-ctx <VSID>]

Parameters
Parameter Description
<Application Name> Name of the monitored Check Point process as you see in the output
of the cpwd_admin list command in the leftmost column APP.
Examples:
• FWM
• FWD
• CPD
• CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.

Example
[Expert@HostName:0]# cpwd_admin getpid -name FWD
5640
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 398


Command Line Reference

cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point Support or R&D
to do so. To restart the WatchDog process, you must restart all Check Point services with the
cpstop and cpstart commands.

Syntax
cpwd_admin kill

Security Management Administration Guide R80.20 | 399


Command Line Reference

cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.

Syntax
cpwd_admin list [-full]

Parameters
Parameter Description
-full Shows the verbose output.

Output
Column Description
APP Shows the WatchDog name of the monitored process.
PID Shows the PID of the monitored process.
STAT Shows the status of the monitored process:
• E - executing
• T - terminated
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the last
time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see cpwd_admin config (on page 391)).
MON Shows how the WatchDog monitors this process (see the explanation for the
cpwd_admin (on page 389)):
• Y - Active monitoring
• N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.

Example 1 - Default output


[Expert@HostName:0]# cpwd_admin list
APP PID STAT #START START_TIME MON COMMAND
CPVIEWD 19738 E 1 [17:50:44] 31/5/2018 N cpviewd
HISTORYD 0 T 0 [17:54:44] 31/5/2018 N cpview_historyd
CPD 19730 E 1 [17:54:45] 31/5/2018 Y cpd
SOLR 19935 E 1 [17:50:55] 31/5/2018 N java_solr
/opt/CPrt-R80.20/conf/jetty.xml
RFL 19951 E 1 [17:50:55] 31/5/2018 N LogCore
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2018 N SmartView
INDEXER 20032 E 1 [17:50:55] 31/5/2018 N
/opt/CPrt-R80.20/log_indexer/log_indexer
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2018 N
/opt/CPSmartLog-R80.20/smartlog_server
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2018 N cp3dlogd
EPM 20251 E 1 [17:50:56] 31/5/2018 N startEngine
DASERVICE 20404 E 1 [17:50:59] 31/5/2018 N DAService_script
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 400


Command Line Reference

Example 2 - Verbose output


[Expert@HostName:0]# cpwd_admin list -full
APP PID STAT #START START_TIME SLP/LIMIT MON
--------------------------------------------------------------------------------
CPVIEWD 19738 E 1 [17:50:44] 31/5/2018 60/5 N
PATH = /opt/CPshrd-R80.20/bin/cpviewd
COMMAND = cpviewd
--------------------------------------------------------------------------------
HISTORYD 0 T 0 [17:54:44] 31/5/2018 60/5 N
PATH = /opt/CPshrd-R80.20/bin/cpview_historyd
COMMAND = cpview_historyd
--------------------------------------------------------------------------------
CPD 19730 E 1 [17:54:45] 31/5/2018 60/5 Y
PATH = /opt/CPshrd-R80.20/bin/cpd
COMMAND = cpd
--------------------------------------------------------------------------------
SOLR 19935 E 1 [17:50:55] 31/5/2018 60/5 N
PATH = /opt/CPrt-R80.20/bin/java_solr
COMMAND = java_solr /opt/CPrt-R80.20/conf/jetty.xml
--------------------------------------------------------------------------------
RFL 19951 E 1 [17:50:55] 31/5/2018 60/5 N
PATH = /opt/CPrt-R80.20/bin/LogCore
COMMAND = LogCore
--------------------------------------------------------------------------------
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2018 60/5 N
PATH = /opt/CPrt-R80.20/bin/SmartView
COMMAND = SmartView
--------------------------------------------------------------------------------
INDEXER 20032 E 1 [17:50:55] 31/5/2018 60/5 N
PATH = /opt/CPrt-R80.20/log_indexer/log_indexer
COMMAND = /opt/CPrt-R80.20/log_indexer/log_indexer
--------------------------------------------------------------------------------
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2018 60/5 N
PATH = /opt/CPSmartLog-R80.20/smartlog_server
COMMAND = /opt/CPSmartLog-R80.20/smartlog_server
ENV = LANG=C
--------------------------------------------------------------------------------
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2018 60/5 N
PATH = /opt/CPuepm-R80.20/bin/cp3dlogd
COMMAND = cp3dlogd
--------------------------------------------------------------------------------
EPM 20251 E 1 [17:50:56] 31/5/2018 60/5 N
PATH = /opt/CPuepm-R80.20/bin/startEngine
COMMAND = startEngine
--------------------------------------------------------------------------------
DASERVICE 20404 E 1 [17:50:59] 31/5/2018 60/5 N
PATH = /opt/CPda/bin/DAService_script
COMMAND = DAService_script
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 401


Command Line Reference

cpwd_admin exist
Description
Prints the status of actively monitored processes on the screen (see the explanation about the
active monitoring in cpwd_admin (on page 389)).

Syntax
cpwd_admin monitor_list

Example
[Expert@HostName:0]# cpwd_admin monitor_list
cpwd_admin:
APP FILE_NAME NO_MSG_TIMES LAST_MSG_TIME
CPD CPD_5420_4714.mntr 0/10 [19:00:33] 31/5/2018
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 402


Command Line Reference

cpwd_admin start
Description
Starts a process as monitored by the WatchDog.

Syntax
cpwd_admin start -name <Application Name> [-ctx <VSID>] -path "<Full Path to
Executable>" -command "<Command Syntax>" [-env {inherit | <Env_Var>=<Value>]
[-slp_timeout <Timeout>] [-retry_limit {<Limit> | u}]

Parameters
Parameter Description

-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
• FWM
• FWD
• CPD
• CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.
-path "<Full Path to The full path (with or without Check Point environment variables) to
Executable>" the executable including the executable name. Must enclose in
double-quotes.
Examples:
• For FWM: "$FWDIR/bin/fwm"
• For FWD: "/opt/CPsuite-R80.20/fw1/bin/fw"
• For CPD: "$CPDIR/bin/cpd"
• For CPM: "/opt/CPsuite-R80.20/fw1/scripts/cpm.sh"
• For SICTUNNEL: "/opt/CPshrd-R80.20/bin/cptnl"
-command "<Command The command and its arguments to run. Must enclose in
Syntax>" double-quotes.
Examples:
• For FWM: "fwm"
• For FWM on Multi-Domain Server: "fwm mds"
• For FWD: "fwd"
• For CPD: "cpd"
• For CPM: "/opt/CPsuite-R80.20/fw1/scripts/cpm.sh
-s"
• For SICTUNNEL: "/opt/CPshrd-R80.20/bin/cptnl -c
"/opt/CPuepm-R80.20/engine/conf/cptnl_srv.conf""
Security Management Administration Guide R80.20 | 403
Command Line Reference

Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the
<Env_Var>=<Value>} shell.
• inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
• <Env_Var>=<Value> - Assigns the specified value to the specified
environment variable
-slp_timeout Configures the specified value of the sleep_timeout configuration
<Timeout> parameter.
See cpwd_admin config (on page 391).
-retry_limit Configures the value of the no_limit configuration parameter.
{<Limit> | u} See cpwd_admin config (on page 391).
• <Limit> - Tries to restart the process the specified number of
times
• u - Tries to restart the process unlimited number of times

Example
For the list of process and the applicable syntax, see sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.

Security Management Administration Guide R80.20 | 404


Command Line Reference

cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes actively. See
the explanation for the cpwd_admin (on page 389).

Syntax
cpwd_admin start_monitor

Example
[Expert@HostName:0]# cpwd_admin start_monitor
cpwd_admin:
CPWD has started to perform active monitoring on Check Point services/processes
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 405


Command Line Reference

cpwd_admin stop
Description
Stops a WatchDog monitored process.

Syntax
cpwd_admin stop -name <Application Name> [-ctx <VSID>] [-path "<Full Path to
Executable>" -command "<Command Syntax>" [-env {inherit | <Env_Var>=<Value>]

Parameters
Parameter Description

-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
• FWM
• FWD
• CPD
• CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.
-path "<Full Path to The full path (with or without Check Point environment variables) to
Executable>" the executable including the executable name. Must enclose in
double-quotes.
Examples:
• For FWM: "$FWDIR/bin/fwm"
• For FWD: "/opt/CPsuite-R80.20/fw1/bin/fw"
• For CPD: "$CPDIR/bin/cpd_admin"
-command "<Command The command and its arguments to run. Must enclose in
Syntax>" double-quotes.
Examples:
• For FWM: "fw kill fwm"
• For FWD: "fw kill fwd"
• For CPD: "cpd_admin stop"
-env {inherit | Configures whether to inherit the environment variables from the
<Env_Var>=<Value>} shell.
• inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
• <Env_Var>=<Value> - Assigns the specified value to the specified
environment variable

Security Management Administration Guide R80.20 | 406


Command Line Reference

Example
For the list of process and the applicable syntax, see sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.

Security Management Administration Guide R80.20 | 407


Command Line Reference

cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively. See the
explanation for the cpwd_admin (on page 389).

Syntax
cpwd_admin stop_monitor

Example
[Expert@HostName:0]# cpwd_admin stop_monitor
cpwd_admin:
CPWD has stopped performing active monitoring on Check Point services/processes
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 408


Command Line Reference

dbedit
Description
Edits the management database - $FWDIR/conf/objects_5_0.C file - on the Security
Management Server. See skI3301 http://supportcontent.checkpoint.com/solutions?id=skI3301.
Important - Do NOT run this command unless explicitly instructed by Check Point Support or
R&D to do so. Otherwise, you can corrupt settings in the management database.

Syntax
dbedit -help
dbedit [-globallock] [{-local | -s <Management_Server>}] [{-u <User> | -c
<Certificate>}] [-p <Password>] [-f <File_Name> [ignore_script_failure]
[-continue_updating]] [-r "<Open_Reason_Text>"] [-d <Database_Name>] [-listen]
[-readonly] [-session]

Parameters
Parameter Description
-help Prints the general help.
-globallock When you work with the dbedit utility, it partially locks the
management database. If a user configures objects in
SmartConsole at the same time, it causes problems in the
management database.
This option does not let SmartConsole, or a dbedit user to
make changes in the management database.
When you specify this option, the dbedit commands run on a
copy of the management database. After you make the desired
changes with the dbedit commands and run the savedb
command, the dbedit utility saves and commits your changes to
the actual management database.
-local Connects to the localhost (127.0.0.1) without using
username/password.
If you do not specify this parameter, the dbedit utility asks how
to connect.
-s <Management_Server> Specifies the Security Management Server - by IP address or
HostName.
If you do not specify this parameter, the dbedit utility asks how
to connect.
-u <User> Specifies the username, with which the dbedit utility connects
to the Security Management Server.
Mandatory parameter when you specify the -s
<Management_Server> parameter.

Security Management Administration Guide R80.20 | 409


Command Line Reference

Parameter Description

-c <Certificate> Specifies the user's certificate file, with which the dbedit utility
connects to the Security Management Server.
Mandatory parameter when you specify the -s
<Management_Server> parameter.
-p <Password> Specifies the user's password, with which the dbedit utility
connects to the Security Management Server.
Mandatory parameter when you specify the -s
<Management_Server> and -u <User> parameters.
-f <File_Name> Specifies the file that contains the applicable dbedit internal
commands (see the section "dbedit Internal Commands"
below):
• create <object_type> <object_name>
• modify <table_name> <object_name>
<field_name> <value>
• update <table_name> <object_name>
• delete <table_name> <object_name>
• print <table_name> <object_name>
• quit
Note - Each command is limited to 4096 characters
ignore_script_failure Continues to execute the dbedit internal commands in the file
and ignores errors.
You can use it when you specify the -f <File_Name>
parameter.
-continue_updating Continues to update the modified objects, even if the operation
fails for some of the objects (ignores the errors and runs the
update_all command at the end of the script).
You can use it when you specify the -f <File_Name>
parameter.
-r "<Open_Reason_Text>" Specifies the reason for opening the database in read-write
mode (default mode).
-d <Database_Name> Specifies the name of the database, to which the dbedit utility
should connect (for example, mdsdb).
-listen The dbedit utility "listens" for changes (use this mode for
advanced troubleshooting with the assistance of Check Point
Support).
The dbedit utility prints its internal messages when a change
occurs in the management database.
-readonly Specifies to open the management database in read-only
mode.
-session Session Connectivity.

Security Management Administration Guide R80.20 | 410


Command Line Reference

dbedit Internal Commands


Command Description, Syntax, Examples
-h Description:
Prints the general help.
Syntax:
dbedit> -h
-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q
dbedit> quit [-update_all | -noupdate]
Examples:
• Exit the utility and commit the remaining modified objects (interactive
mode):
dbedit> quit
• Exit the utility and update all the remaining modified objects:
dbedit> quit -update_all
• Exit the utility and discard all modifications:
dbedit> quit -no_update
update Description:
Saves the specified object in the specified table (for example,
"network_objects", "services", "users").
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> update <table_name> <object_name>
Example:
Save the object My_Service in the table services:
dbedit> update services My_Service
update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all

Security Management Administration Guide R80.20 | 411


Command Line Reference

Command Description, Syntax, Examples


_print_set Description:
Prints the specified object from the specified table (for example,
"network_objects", "services", "users") as it appears in the
$FWDIR/conf/objects_5_0.C file (sets of attributes).
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> _print_set <table_name> <object_name>
Example:
Print the object My_Obj from the table network_objects:
dbedit> print network_objects My_Obj
print Description:
Prints the list of attributes of the specified object from the specified table (for
example, "network_objects", "properties", "services", "users").
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> print <table_name> <object_name>
Examples:
• Print the object My_Obj from the table network_objects (in "Network
Objects"):
dbedit> print network_objects my_obj
• Print the object firewall_properties from the table properties (in "Global
Properties"):
dbedit> print properties firewall_properties
printxml Description:
Prints in XML format the list of attributes of the specified object from the
specified table (for example, "network_objects", "properties",
"services", "users").
You can export the settings from a Management Server to an XML file that you
can use later with external automation systems.
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> printxml <table_name> [<object_name>]
Examples:
• Print the object My_Obj from the table network_objects:
dbedit> printxml network_objects my_obj
• Print the object firewall_properties from the table properties (in "Global
Properties"):
dbedit> printxml properties firewall_properties

Security Management Administration Guide R80.20 | 412


Command Line Reference

Command Description, Syntax, Examples


printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as
"chkpf_uid ({...})").
Syntax:
dbedit> printbyuid {object_id}
Example:
Print the attributes of the object with the specified UID:
dbedit> printbyuid {D3833F1D-0A58-AA42-865F-39BFE3C126F1}
query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value - query is
separated by a comma after "query <table_name>" (spaces are not allowed
between the <attribute> and '<value>').
Note - To see the available tables, attributes and values, connect to
Management Server with GuiDBedit Tool
http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> query <table_name> [ , <attribute>='<value>' ]
Examples:
• Print all objects in the table users:
dbedit> query users
• Print all objects in the table network_objects that are defined as
Management Servers:
dbedit> query network_objects, management='true'
• Print all objects in the table services with the name ssh:
dbedit> query services, name='ssh'
• Print all objects in the table services with the port 22:
dbedit> query services, port='22'
• Print all objects with the IP address 10.10.10.10:
dbedit> query network_objects, ipaddr='10.10.10.10'
whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant
information about each such place.
Syntax:
dbedit> whereused <table_name> <object_name>
Example:
Check where the object My_Obj is used:
dbedit> whereused network_objects My_Obj

Security Management Administration Guide R80.20 | 413


Command Line Reference

Command Description, Syntax, Examples


create Description:
Creates an object of specified type (with its default values) in the database.
Restrictions apply to the object's name:
• Object names can have a maximum of 100 characters.
• Objects names can contain only ASCII letters, numbers, and dashes.
• Reserved words will be blocked by the Management Server (refer to
sk40179).
Note - To see the available tables and their class names (object types),
connect to Management Server with GuiDBedit Tool
http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> create <object_type> <object_name>
Example:
Create the service object My_Service of the type tcp_service (with its default
values):
dbedit> create tcp_service my_service
delete Description:
Deletes an object from the specified table.
Syntax:
dbedit> delete <table_name> <object_name>
Example:
Delete the service object My_Service from the table services:
dbedit> delete services my_service

Security Management Administration Guide R80.20 | 414


Command Line Reference

Command Description, Syntax, Examples


modify Description:
Modifies the value of specified attribute in the specified object in the specified
table (for example, "network_objects", "services", "users") in the
management database.
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> modify <table_name> <object_name> <field_name>
<value>
Examples:
• Modify the color to red in the object My_Service in the table services:
dbedit> modify services My_Service color red
• Add a comment to the object MyObj:
dbedit> modify network_objects MyObj comments "Created by
fwadmin with dbedit"
• Set the value of the global property ike_use_largest_possible_subnets in
the table properties to false:
dbedit> modify properties firewall_properties
ike_use_largest_possible_subnets false
• Create a new interface on the Security Gateway My_FW and modify its
attributes - set the IP address / Mask and enable Anti-Spoofing on
interface with "Element Index"=3 (check the attributes of the object My_FW
in GuiDBedit Tool
http://supportcontent.checkpoint.com/solutions?id=sk13009):
dbedit> addelement network_objects My_FW interfaces
interface
dbedit> modify network_objects My_FW
interfaces:3:officialname NAME_OF_INTERFACE
dbedit> modify network_objects My_FW interfaces:3:ipaddr
IP_ADDRESS
dbedit> modify network_objects My_FW interfaces:3:netmask
NETWORK_MASK
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:access specific
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:allowed
network_objects:group_name
dbedit> modify network_objects My_FW
interfaces:3:security:netaccess:perform_anti_spoofing
true
dbedit> modify network_objects MyObj FieldA LINKSYS
• In the Owned Object MyObj change the value of FieldB to NewVal:
dbedit> modify network_objects MyObj FieldA:FieldB NewVal
• In the Linked Object MyObj change the value of FieldA from B to C:
dbedit> modify network_objects MyObj FieldA B:C

Security Management Administration Guide R80.20 | 415


Command Line Reference

Command Description, Syntax, Examples


lock Description:
Locks the specified object (by administrator) in the specified table (for
example, "network_objects", "services", "users") from being modified
by other users.
For example, if you connect from a remote computer to this Management
Server with admin1 and lock an object, you are be able to connect with admin2,
but are not able to modify the locked object, until admin1 releases the lock.
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> lock <table_name> <object_name>
Example:
Lock the object My_Service_Obj in the table services in the database:
dbedit> lock services My_Service_Obj
addelement Description:
Adds a specified multiple field / container (with specified value) to a specified
object in specified table.
Note - To see the available tables and their class names (object types),
connect to Management Server with GuiDBedit Tool
http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> addelement <table_name> <object_name> <field_name>
<value>
Examples:
• Add the element BranchObjectClass with the value Organization to a
multiple field Read in the object My_Obj in the table ldap:
dbedit> addelement ldap My_Obj Read:BranchObjectClass
Organization
• Add the service MyService to the group of services MyServicesGroup in the
table services:
dbedit> addelement services MyServicesGroup ''
services:MyService
• Add the network MyNetwork to the group of networks MyNetworksGroup in
the table network_objects:
dbedit> addelement network_objects MyNetworksGroup ''
network_objects:MyNetwork

Security Management Administration Guide R80.20 | 416


Command Line Reference

Command Description, Syntax, Examples


rmelement Description:
Removes a specified multiple field / container (with specified value) from a
specified object in specified table.
Note - To see the available tables and their class names (object types),
connect to Management Server with GuiDBedit Tool
http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> rmelement <table_name> <object_name> <field_name>
<value>
Examples:
• Remove the service MyService from the group of services MyServicesGroup
from the table services:
dbedit> rmelement services MyServicesGroup ''
services:MyService
• Remove the network MyNetwork from the group of networks
MyNetworksGroup from the table network_objects:
dbedit> rmelement network_objects MyNetworksGroup ''
network_objects:MyNetwork
• Remove the element BranchObjectClass with the value Organization from
the multiple field Read in the object My_Obj in the table ldap:
dbedit> rmelement ldap my_obj Read:BranchObjectClass
Organization
rename Description:
Renames the specified object in specified table.
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> rename <table_name> <object_name> <new_object_name>
Example:
Rename the network object london to chicago in the table network_objects:
dbedit> rename network_objects london chicago
rmbyindex Description:
Removes an element from a container by element's index.
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> rmbyindex <table_name> <object_name> <field_name>
<index_number>
Example:
Remove the element backup_log_servers from the container log_servers by
element index 1 in the table network_objects:
dbedit> rmbyindex network_objects g
log_servers:backup_log_servers 1

Security Management Administration Guide R80.20 | 417


Command Line Reference

Command Description, Syntax, Examples


add_owned_re Description:
move_name
Adds an owned object (and removes its name) to a specified owned object field
(or container).
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> add_owned_remove_name <table_name> <object_name>
<field_name> <value>
Example:
Add the owned object My_Gateway (and remove its name) to the owned object
field (or container) my_external_products:
dbedit> add_owned_remove_name network_objects My_Gateway
additional_products owned:my_external_products
is_delete_al Description:
lowed
Checks if the specified object can be deleted from the specified table (object
cannot be deleted if it is used by other objects).
Note - To see the available tables, connect to Management Server with
GuiDBedit Tool http://supportcontent.checkpoint.com/solutions?id=sk13009.
Syntax:
dbedit> is_delete_allowed <table_name> <object_name>
Example:
Check if the object MyObj can be deleted from the table network_objects:
dbedit> is_delete_allowed network_objects MyObj
set_pass Description:
Sets specified password for specified user.
Notes:
• The password must contain at least 4 characters and no more than 50
characters.
• This command cannot change the administrator's password.
Syntax:
dbedit> set_pass <user> <password>
Example:
Set the password 1234 for the user abcd:
dbedit> set_pass abcd 1234
savedb Description:
Saves the database. You can run this command only when the database is
locked globally (when you start the dbedit utility with the "dbedit
-globallock" command).
Syntax:
dbedit> savedb

Security Management Administration Guide R80.20 | 418


Command Line Reference

Command Description, Syntax, Examples


savesession Description:
Saves the session. You can run this command only when you start the dbedit
utility in session mode (with the "dbedit -session" command).
Syntax:
dbedit> savesession

Security Management Administration Guide R80.20 | 419


Command Line Reference

fw
Description
• Performs various operations on Security or Audit log files.
• Kills the specified Check Point processes.
• Manages the Suspicious Activity Monitoring (SAM) rules.
• Manages the Suspicious Activity Policy editor.

Syntax
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
fetchlogs <options> Fetches the specified Security log files ($FWDIR/log/*.log*) or
(on page 422) Audit log files ($FWDIR/log/*.adtlog*) from the specified Check
Point computer.
hastat <options> (on Shows information about Check Point computers in High Availability
page 424) configuration and their states.
kill <options> (on page Kills the specified Check Point processes.
426)
log <options> (on page Shows the content of Check Point log files - Security
427) ($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog).
logswitch <options> Switches the current active log file - Security ($FWDIR/log/fw.log)
(on page 435) or Audit ($FWDIR/log/fw.adtlog)
lslogs <options> (on Shows a list of Security log files ($FWDIR/log/*.log*) or Audit log
page 439) files ($FWDIR/log/*.adtlog*) residing on the local computer or a
remote computer.
mergefiles <options> Merges several input log files - Security ($FWDIR/log/*.log) or
(on page 442) Audit ($FWDIR/log/*.adtlog) - into a single log file.
repairlog <options> Rebuilds pointer files for Security ($FWDIR/log/*.log) or Audit
(on page 444) ($FWDIR/log/*.adtlog) log files.

Security Management Administration Guide R80.20 | 420


Command Line Reference

Item Description
sam <options> (on page Manages the Suspicious Activity Monitoring (SAM) rules.
445)
sam_policy <options> Manages the Suspicious Activity Policy editor that lets you work with
(on page 452) these type of rules:
or • Suspicious Activity Monitoring (SAM) rules.
samp <options> (on page • Rate Limiting rules.
452)

Security Management Administration Guide R80.20 | 421


Command Line Reference

fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.

Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]... [-f <Name
of Log File N>] <Target>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-f <Name of Log File N> Specifies the name of the log file to fetch. Need to specify name only.
Notes:
• If you do not specify the log file name explicitly, the command
transfers all Security log files ($FWDIR/log/*.log*) and all
Audit log files ($FWDIR/log/*.adtlog*).
• The specified log file name can include wildcards * and ? (for
example, 2017-0?-*.log). If you enter a wild card, you must
enclose it in double quotes or single quotes.
• You can specify multiple log files in one command. You must use
the -f parameter for each log file name pattern.
• This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local
Check Point computer has established SIC trust.
• If you run this command on a Security Management Server or
Domain Management Server, then <Target> is the applicable
object's name or main IP address of the Check Point Computer as
configured in SmartConsole.
• If you run this command on a Security Gateway or Cluster
Member, then <Target> is the main IP address of the applicable
object as configured in SmartConsole.
Notes:
• This command moves the specified log files from the $FWDIR/log/ directory on the specified
Check Point computer. Meaning, it deletes the specified log files on the specified Check Point
computer after it copies them successfully.
• This command moves the specified log files to the $FWDIR/log/ directory on the local Check
Point computer, on which you run this command.
• This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.

Security Management Administration Guide R80.20 | 422


Command Line Reference

To fetch these active log files:


a) Perform log switch on the applicable Check Point computer:
fw logswitch [-audit] [-h <IP Address or Hostname>]
b) Fetch the rotated log file from the applicable Check Point computer:
fw fetchlogs -f <Log File Name> <IP Address or Hostname>
• This command renames the log files it fetched from the specified Check Point computer. The
new log file name is the concatenation of the Check Point computer's name (as configured in
SmartConsole), two underscore (_) characters, and the original log file name (for example:
MyGW__2018-06-01_000000.log).

Example from a Management Server


[Expert@HostName:0]# fw lslogs MyGW
Size Log file name
23KB 2018-05-16_000000.log
9KB 2018-05-17_000000.log
11KB 2018-05-18_000000.log
5796KB 2018-06-01_000000.log
4610KB fw.log
[Expert@HostName:0]#

[Expert@HostName:0]# fw fetchlogs -f 2018-06-01_000000 MyGW


File fetching in process. It may take some time...
File MyGW__2018-06-01_000000.log was fetched successfully
[Expert@HostName:0]#

[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.20/fw1/log/MyGW__2018-06-01_000000.log
/opt/CPsuite-R80.20/fw1/log/MyGW__2018-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.20/fw1/log/MyGW__2018-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.20/fw1/log/MyGW__2018-06-01_000000.logptr
[Expert@HostName:0]#

[Expert@HostName:0]# fw lslogs MyGW


Size Log file name
23KB 2018-05-16_000000.log
9KB 2018-05-17_000000.log
11KB 2018-05-18_000000.log
4610KB fw.log
[Expert@HostName:0]#

Security Management Administration Guide R80.20 | 423


Command Line Reference

fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their
states.
Note - The fw hastat command is outdated:
• On cluster members, run the Gaia Clish command show cluster state, or the Expert mode
command cphaprob state.
• On Management Servers, run the cpstat (on page 379) command.

Syntax
fw hastat [<Target1>] [<Target2>] ... [<TargetN>]

Parameters
Parameter Description
<Target1> Specifies the Check Point computers to query.
<Target2> ... If you run this command on the Management Server, you can enter the
<TargetN> applicable IP address, or the resolvable HostName of the managed Security
Gateway or Cluster Member.
If you do not specify the target, the command queries the local computer.

Example 1 - Querying the local Management Server


[Expert@MGMT:0]# fw hastat

HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS


localhost active OK
[Expert@MGMT:0]#

Example 2 - Querying the cluster members from the Management Server


[Expert@MGMT:0]# fw hastat 192.168.3.52
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@MGMT:0]#

[Expert@MGMT:0]# fw hastat 192.168.3.53


HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.53 2 stand-by OK
[Expert@MGMT:0]#

[Expert@MGMT:0]# fw hastat 192.168.3.52 192.168.3.53


HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
192.168.3.53 2 stand-by OK
[Expert@MGMT:0]#

Example 3 - Querying the local Cluster Member


[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
Security Management Administration Guide R80.20 | 424
Command Line Reference

Security Management Administration Guide R80.20 | 425


Command Line Reference

fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.

Syntax
fw [-d] kill [-t <Signal Number>] <Name of Process>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-t <Signal Specifies which signal to send to the Check Point process.
Number> For the list of available signals and their numbers, run the kill -l
command. For information about the signals, see the manual pages for the
kill https://linux.die.net/man/1/kill and signal
https://linux.die.net/man/7/signal.
If you do not specify the signal explicitly, the command sends Signal 15
(SIGTERM).
Note - Processes can ignore some signals.
<Name of Process> Specifies the name of the Check Point process to kill.

Example
fw kill fwd

Security Management Administration Guide R80.20 | 426


Command Line Reference

fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).

Syntax
fw log {-h | -help}
fw [-d] log [-a] [-b "<Start Timestamp>" "<End Timestamp>"] [-c <Action>] [{-f |
-t}] [-g] [-H] [-h <Origin>] [-i] [-k {<Alert Name> | all}] [-l] [-m {initial |
semi | raw}] [-n] [-o] [-p] [-q] [-S] [-s "<Start Timestamp>"] [-e "<End Timestamp>"]
[-u <Unification Scheme File>] [-w] [-x <Start Entry Number>] [-y <End Entry
Number>] [-z] [-#] [<Log File>]

Parameters
Parameter Description

{-h | -help} Shows the built-in usage.


Note - The built-in usage does not show some of the parameters
described in this table.

-d Runs the command in debug mode.


Use only if you troubleshoot the command itself.
Note - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.

-a Shows only Account log entries.

-b "<Start Timestamp>" Shows only entries that were logged between the specified start and
"<End Timestamp>" end times.
• The <Start Timestamp> and <End Timestamp> may be a date, a
time, or both.
• If date is omitted, then the command assumes the current date.
• Enclose the "<Start Timestamp>" and "<End Timestamp> in
single or double quotes (-b 'XX' 'YY", or -b "XX" "YY).
• You cannot use the "-b" parameter together with the "-s" or "-e"
parameters.
• See the date and time format below.

Security Management Administration Guide R80.20 | 427


Command Line Reference

Parameter Description

-c <Action> Shows only events with the specified action. One of these:
• accept
• drop
• reject
• encrypt
• decrypt
• vpnroute
• keyinst
• authorize
• deauthorize
• authcrypt
• ctl
Notes:
• The fw log command always shows the Control (ctl) actions.
• For login action, use the authcrypt
-e "<End Timestamp>" Shows only entries that were logged before the specified time.
Notes:
• The <End Timestamp> may be a date, a time, or both.
• Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
• You cannot use the "-e" parameter together with the "-b"
parameter.
• See the date and time format below.
-f 1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog

-g Does not show delimiters.


The default behavior is:
• Show a colon (:) after a field name
• Show a semi-colon (;) after a field value
-H Shows the High Level Log key.

-h <Origin> Shows only logs that were generated by the Security Gateway with the
specified IP address or object name (as configured in SmartConsole).

Security Management Administration Guide R80.20 | 428


Command Line Reference

Parameter Description

-i Shows log UID.

-k {<Alert Name> | Shows entries that match a specific alert type:


all}
• <Alert Name> - Show only entries that match a specific alert type:
• alert
• mail
• snmp_trap
• spoof
• user_alert
• user_auth
• all - Show entries that match all alert types (this is the default).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries,
and then specify the time for each log entry.

-m Specifies the log unification mode:


• initial - Complete unification of log entries. The command
shows one unified log entry for each ID. This is the default.
If you also specify the -f parameter, then the output does not
show any updates, but shows only entries that relate to the start
of new connections. To shows updates, use the semi parameter.
• semi - Step-by-step unification of log entries. For each log entry,
the output shows an entry that unifies this entry with all previously
encountered entries with the same ID.
• raw - No log unification. The output shows all log entries.
-n Does not perform DNS resolution of the IP addresses in the log file
(this is the default behavior).
This significantly speeds up the log processing.

-o Shows detailed log chains - shows all the log segments in the log
entry.

-p Does not perform resolution of the port numbers in the log file (this is
the default behavior).
This significantly speeds up the log processing.

-q Shows the names of log header fields.

-S Shows the Sequence Number.

Security Management Administration Guide R80.20 | 429


Command Line Reference

Parameter Description

-s "<Start Timestamp>" Shows only entries that were logged after the specified time.
Notes:
• The <Start Timestamp> may be a date, a time, or both.
• If the date is omitted, then the command assumed the current
date.
• Enclose the <Start Timestamp> in single or double quotes (-s
'...', or -s "...").
• You cannot use the "-s" parameter together with the "-b"
parameter.
• See the date and time format below.
-t 1. Does not show the saved entries that match the specified
conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog

-u <Unification Scheme Specifies the path and name of the log unification scheme file.
File> The default log unification scheme file is:
$FWDIR/conf/log_unification_scheme.C

-w Shows the flags of each log entry (different bits used to specify the
"nature" of the log - for example, control, audit, accounting,
complementary, and so on).

-x <Start Entry Number> Shows only entries from the specified log entry number and below,
counting from the beginning of the log file.

-y <End Entry Number> Shows only entries until the specified log entry number, counting
from the beginning of the log file.
-z In case of an error (for example, wrong field value), continues to show
log entries.
The default behavior is to stop.

-# Show confidential logs in clear text.

<Log File> Specifies the log file to read.


If you do not specify the log file explicitly, the command opens the
$FWDIR/log/fw.log log file.
You can specify a switched log file.

Date and Time format


Part of timestamp Format Example
Date only MMM DD, YYYY June 11, 2018

Security Management Administration Guide R80.20 | 430


Command Line Reference

Part of timestamp Format Example


Time only HH:MM:SS 14:20:00
Note - In this case, the
command assumes the current
date.

Date and Time MMM DD, YYYY HH:MM:SS June 11, 2018 14:20:00

Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
HeaderDateHour ContentVersion HighLevelLogKey Uuid SequenceNum Flags
Action Origin IfDir InterfaceName LogId ...

This table describes some of the fields:

Field Header Description Example


HeaderDateHour Date and Time 12Jun2018 12:56:42
ContentVersion Version 5
HighLevelLogKey High Level Log Key <max_null>, or empty
Uuid Log UUID (0x5b1f99cb,0x0,0x3403a8c0,0xc0
000000)
SequenceNum Log Sequence Number 1
Flags Internal flags that specify 428292
the "nature" of the log - for
example, control, audit,
accounting, complementary,
and so on
Action Action performed on this • accept
connection
• dropreject
• encrypt
• decrypt
• vpnroute
• keyinst
• authorize
• deauthorize
• authcrypt
• ctl
Origin Object name of the Security MyGW
Gateway that generated this
log

Security Management Administration Guide R80.20 | 431


Command Line Reference

IfDir Traffic direction through • <


interface:
• >
• < - Outbound (sent by a
Security Gateway)
• > - Inbound (received by
a Security Gateway)
InterfaceName Name of the Security • eth0
Gateway interface, on which
this traffic was logged • daemon
• N/A
If a Security Gateway
performed some internal
action (for example, log
switch), then the log entry
shows daemon
LogId Log ID 0
Alert
Alert Type • alert
• mail
• snmp_trap
• spoof
• user_alert
• user_auth
OriginSicName SIC name of the Security CN=MyGW,O=MyDomain_Server.check
Gateway that generated this point.com.s6t98x
log
inzone Inbound Security Zone Local
outzone Outbound Security Zone External
service_id Name of the service used to ftp
inspect this connection
src Object name or IP address MyHost
of the connection's source
computer
dst Object name or IP address MyFTPServer
of the connection's
destination computer
proto Name of the connection's tcp
protocol
sport_svc Source port of the 64933
connection

Security Management Administration Guide R80.20 | 432


Command Line Reference

ProductName Name of the Check Point • VPN-1 & FireWall-1


product that generated this
log • Application Control
• FloodGate-1
ProductFamily Name of the Check Point Network
product family that
generated this log

Example 1 - Show all log entries with both the date and the time for each log entry.
fw log -l

Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum:
<max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x;
fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default;
fg-1_server_in_rule_name: Host Redirect; fg-1_server_out_rule_name: ;
ProductName: FG; ProductFamily: Network;

12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;

... ... ...

[Expert@MyGW:0]#

Example 3 - Show all log entries between the specified timestamps


[Expert@MyGW:0]# fw log -l -b "June 12, 2018 12:33:00" 'June 12, 2018 12:34:00'
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum:
<max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x;
fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default;
fg-1_server_in_rule_name: Host Redirect; fg-1_server_out_rule_name: ;
ProductName: FG; ProductFamily: Network;

12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;

12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum:


<max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x;
description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and
Proxy configuration on the gateway.; Severity: 2; status: Failed; version: 1.0;
failure_impact: Contracts may be out-of-date; update_service: 1; ProductName:
Security Gateway/Management; ProductFamily: Network;

Security Management Administration Guide R80.20 | 433


Command Line Reference

[Expert@MyGW:0]#

Example 4 - Show all log entries with action "drop"


[Expert@MyGW:0]# fw log -l -c drop
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;
[Expert@MyGW:0]#

Example 5 - Show all log entries with action "drop", show all field headers, and show
log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey:
<max_null>; LogUid: ; SequenceNum: 1; Flags: 428292; Action: drop; Origin: MyGW;
IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;
[Expert@MyGW:0]#

Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log
file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#

Security Management Administration Guide R80.20 | 434


Command Line Reference

fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
• By default, this command switches the active Security log file - $FWDIR/log/fw.log
• You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog

Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-audit Specifies to switch the active Audit log file ($FWDIR/log/fw.adtlog).
You can use this parameter only on a Management Server.
-h <Target> Specifies the remote computer, on which to switch the log.
Notes:
• The local and the remote computers must have established SIC trust.
• The remote computer can be a Security Gateway, a Log Server, or a Security
Management Server in High Availability deployment.
• You can specify the remote managed computer by its main IP address or
Object Name as configured in SmartConsole.

Security Management Administration Guide R80.20 | 435


Command Line Reference

Parameter Description

<Name of Specifies the name of the switched log file.


Switched Log> Notes:
• If you do not specify this parameter, then a default name is:
<YYYY-MM-DD_HHMMSS>.log
<YYYY-MM-DD_HHMMSS>.adtlog
For example, 2018-03-26_174455.log
• If you specify the name of the switched log file, then the name of the switch
log file is:
<Specified_Log_Name>.log
<Specified_Log_Name>.adtlog
• The log switch operation fails if the specified name for the switched log
matches the name of an existing log file.
• The maximal length of the specified name of the switched log file is 230
characters.
+ Specifies to copy the active log from the remote computer to the local computer.
Notes:
• If you specify the name of the switched log file, you must write it immediately
after this + (plus) parameter.
• The command copies the active log from the remote computer and saves it in
the $FWDIR/log/ directory on the local computer.
• The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
• If you specify the name of the switched log file, then the name of the saved
log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
• When this command copies the log file from the remote computer, it
compresses the file.

Security Management Administration Guide R80.20 | 436


Command Line Reference

Parameter Description
- Specifies to transfer the active log from the remote computer to the local
computer.
Notes:
• The command saves the copied active log file in the $FWDIR/log/ directory
on the local computer and then deletes the switched log file on the remote
computer.
• If you specify the name of the switched log file, you must write it immediately
after this - (minus) parameter.
• The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
• If you specify the name of the switched log file, then the name of the saved
log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
• When this command transfers the log file from the remote computer, it
compresses the file.
• As an alternative, you can use the fw fetchlogs (on page 422) command.

Compression
When this command transfers the log files from the remote computer, it compresses the file with
the gzip command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77
method. The compression ratio varies with the content of the log file and is difficult to predict.
Binary data are not compressed. Text data, such as user names and URLs, are compressed.

Example 1 - Switching the active Security log on a Security Management Server


[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#

Example 2 - Switching the active Audit log on a Security Management Server


[Expert@MGMT:0]# fw logswitch -audit
Log file has been switched to: 2018-06-13_185711.adtlog
[Expert@MGMT:0]#

Example 3 - Switching the active Security log on a managed Security Gateway


[Expert@MGMT:0]# fw logswitch -h MyGW
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.20/fw1/log/fw.log
/opt/CPsuite-R80.20/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]

Example 4 - Switching the active Security log on a managed Security Gateway and
copying the switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
Security Management Administration Guide R80.20 | 437
Command Line Reference

[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.20/fw1/log/fw.log
/opt/CPsuite-R80.20/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.20/fw1/log/fw.log
/opt/CPsuite-R80.20/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#

Security Management Administration Guide R80.20 | 438


Command Line Reference

fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) residing on the local computer or a remote computer.

Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ... [-f <Name
of Log File N>] [-e] [-r] [-s {name | size | stime | etime}] [<Target>]

Parameter
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
Note - If you use this parameter, then redirect the output to a file, or use
the script command to save the entire CLI session.
-f <Name of Log File> Specifies the name of the log file to show. Need to specify name only.
Notes:
• If the log file name not specified explicitly, the command shows all
Security log files ($FWDIR/log/*.log).
• File names may include * and ? as wild cards (for example,
2017-0?-*). If you enter a wild card, you must enclose it in double
quotes or single quotes.
• You can specify multiple log files in one command. You must use the
-f parameter for each log file name pattern.
-e Shows an extended file list. It includes the following information for
each log file:
• Size - The total size of the log file and its related pointer files
• Creation Time - The time the log file was created
• Closing Time - The time the log file was closed
• Log File Name - The file name
-r Reverses the sort order (descending order).
-s {name | size | Specifies the sort order of the log files using one of the following sort
stime | etime} options:
• name - The file name
• size - The file size
• stime - The time the log file was created (this is the default option)
• etime - The time the log file was closed

Security Management Administration Guide R80.20 | 439


Command Line Reference

Parameter Description

<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
• If you run this command on a Security Management Server or
Domain Management Server, then <Target> is the applicable
object's name or main IP address of the Check Point Computer as
configured in SmartConsole.
• If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.

Example 1 - Default output


[Expert@MGMT:0]# fw lslogs
Size Log file name
9KB 2018-06-14_000000.log
11KB 2018-06-15_000000.log
9KB 2018-06-16_000000.log
10KB 2018-06-17_000000.log
9KB fw.log
[Expert@MGMT:0]#

Example 2 - Showing all log files


[Expert@MGMT:0]# fw lslogs -f "*"
Size Log file name
9KB fw.adtlog
9KB fw.log
9KB 2018-05-29_000000.adtlog
9KB 2018-05-29_000000.log
9KB 2018-05-20_000000.adtlog
9KB 2018-05-20_000000.log
[Expert@MGMT:0]#

Example 3 - Showing only log files specified by the patterns


[Expert@MGMT:0]# fw lslogs -f "2018-06-14*" -f '2018-06-15*'
Size Log file name
9KB 2018-06-14_000000.adtlog
9KB 2018-06-14_000000.log
11KB 2018-06-15_000000.adtlog
11KB 2018-06-15_000000.log
[Expert@MGMT:0]#

Example 4 - Showing only log files specified by the patterns and their extended
information
[Expert@MGMT:0]# fw lslogs -f "2018-06-14*" -f '2018-06-15*'
Size Log file name
9KB 2018-06-14_000000.adtlog
9KB 2018-06-14_000000.log
11KB 2018-06-15_000000.adtlog
11KB 2018-06-15_000000.log
[Expert@MGMT:0]#

Example 5 - Showing only log files specified by the patterns, sorting by name in reverse
order
[Expert@MGMT:0]# fw lslogs -f "2018-06-14*" -f '2018-06-15*' -e -s name -r

Security Management Administration Guide R80.20 | 440


Command Line Reference

Size Creation Time Closing Time Log file name


11KB 14Jun2018 0:00:00 15Jun2018 0:00:00 2018-06-15_000000.log
11KB 14Jun2018 0:00:00 15Jun2018 0:00:00
2018-06-15_000000.adtlog
9KB 13Jun2018 18:23:59 14Jun2018 0:00:00 2018-06-14_000000.log
9KB 13Jun2018 0:00:00 14Jun2018 0:00:00
2018-06-14_000000.adtlog
[Expert@MGMT:0]#

Example 6 - Showing only log files specified by the patterns, from a managed Security
Gateway
[Expert@MGMT:0]# fw lslogs -f "2018-06-14*" -f '2018-06-15*' 192.168.3.53
Size Log file name
11KB 2018-06-15_000000.adtlog
11KB 2018-06-15_000000.log
9KB 2018-06-14_000000.log
9KB 2018-06-14_000000.adtlog
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 441


Command Line Reference

fw mergefiles
Description
Merges several input log files into a single log file.
The command supports merging of the Security log files (*.log) and Audit log files (*.adtlog).
Notes:
• Do not merge the active Security file $FWDIR/log/fw.log with other Security switched log
files. Switch the active Security file $FWDIR/log/fw.log and only then merge it with other
Security switched log files. See fw logswitch (on page 435).
• Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit switched log
files. Switch the active Audit file $FWDIR/log/fw.adtlog and only then merge it with other
Audit switched log files. See fw logswitch (on page 435).
• This command unifies logs entries with the same Unique-ID. If a log switch was performed
before all the segments of a specific log were received, this command merges the log entries
with the same Unique-ID from two different files, into one fully detailed record.

Syntax
fw [-d] mergefiles [-s] [-r] [-t <Time Conversion File>] <Name of Log File 1> <Name
of Log File 2> ... <Name of Log File N> <Name of Merged Log File>

The order of the parameters in the syntax is important. The name of the merged log file is always
the last parameter.

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-s Sorts the log entries in the merged log file by the time field.
-r Removes duplicate entries from the merged log file.
-t <Time Conversion Specifies the file with time conversion information.
File> This is required if you merge log files from Log Servers configured
with different time zones. This information is used to adjust the time
of log records from different time zones.
The file format is as follows:
<IP Address of Log Server 1> <Signed Date Time in
Seconds>
<IP Address of Log Server 2> <Signed Date Time in
Seconds>
... ...
Notes:
• You must specify the absolute path and the file name.
• The name of the time conversion file cannot exceed 230
characters.

Security Management Administration Guide R80.20 | 442


Command Line Reference

Parameter Description

<Name of Log File N> Specifies the log files to merge.


Notes:
You must specify the absolute path and the name of the input log
files.
The name of the input log file cannot exceed 230 characters.
<Name of Merged Log Specifies the output merged log file.
File> Notes:
• The name of the merged log file cannot exceed 230 characters.
• If a file with the specified name already exists, the command stops
and asks you to remove the existing file, or to specify another
name.
• The size of the merged log file cannot exceed 2 GB. In such
scenario, the command creates several merged log files, each not
exceeding the size limit.

Example 1 - Merging Security log files


[Expert@MGMT]# fw mergefiles -s -r $FWDIR/log/2018-06-06_000000.log
$FWDIR/log/2018-06-05_000000.log /var/log/Merged_FireWall_Log.log
[Expert@MGMT]#

Example 2 - Merging Audit log files


[Expert@MGMT]# fw mergefiles -s -r $FWDIR/log/2018-06-06_000000.adtlog
$FWDIR/log/2018-06-05_000000.adtlog /var/log/Merged_Audit_Log.adtlog
[Expert@MGMT]#

Security Management Administration Guide R80.20 | 443


Command Line Reference

fw repairlog
Description
Check Point Security log and Audit log files are databases, with special pointer files. If these log
pointer files become corrupted (which causes the inability to read the log file), this command can
rebuild them:

Log File Pointer Files Description


$FWDIR/log/*.log *.logptr Security log
*.logaccount_ptr
*.loginitial_ptr
*.logLuuidDB
$FWDIR/log/*.adtlog *.adtlogptr Audit log
*.adtlogaccount_ptr
*.adtloginitial_ptr
*.adtlogLuuidDB

Syntax
fw repairlog [-u] <Name of Log File>

Parameters
Parameter Description
-u Specifies to rebuild the unification chains in the log file.
<Name of Log File> The name of the log file to repair.

Example
fw repairlog -u 2018-06-17_000000.adtlog

Security Management Administration Guide R80.20 | 444


Command Line Reference

fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block
connections to and from IP addresses without the need to change or reinstall the Security Policy.
For more information, see sk112061
http://supportcontent.checkpoint.com/solutions?id=sk112061.
You can create the Suspicious Activity Rules in two ways:
• In SmartConsole from Monitoring Results
• In CLI with the fw sam command
Notes:
• VSX Gateway does not support Suspicious Activity Monitoring (SAM) Rules. See sk79700
http://supportcontent.checkpoint.com/solutions?id=sk79700.
• See the fw sam_policy (on page 452) and sam_alert (on page 502).
• SAM rules consume some CPU resources on Security Gateway. We recommend to set an
expiration that gives you time to investigate, but does not affect performance. The best practice
is to keep only the SAM rules that you need. If you confirm that an activity is risky, edit the
Security Policy, educate users, or otherwise handle the risk.
• Logs for enforced SAM rules (configured with the fw sam command) are stored in the
$FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches 100,000.
This data log file contains the records of one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
• SAM Requests are stored in the kernel table sam_requests on the Security Gateway.
• IP Addresses that are blocked by SAM rules, are stored in the kernel table sam_blocked_ips
on the Security Gateway.
• To configure SAM Server settings for a Security Gateway or Cluster:
a) Connect with SmartConsole to the applicable Security Management Server or Domain
Management Server
b) Open the Security Gateway or Cluster object
c) Go to the Other > SAM page.
d) Configure the settings.
e) Click OK.
f) Install the Access Control Policy in this Security Gateway or Cluster object.

Syntax
• To add or cancel a SAM rule according to criteria:
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e <key=val>]+ [-r]
-{n|i|I|j|J} <Criteria>

Security Management Administration Guide R80.20 | 445


Command Line Reference

• To delete all SAM rules:


[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D

• To monitor all SAM rules:


[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all

• To monitor SAM rules according to criteria:


[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-v Enables verbose mode.
In this mode, the command writes one message to stderr for each Security
Gateway, on which the command is enforced. These messages show
whether the command was successful or not.
-s <SAM Server> Specifies the IP address (in the X.X.X.X format) or resolvable HostName of
the Security Gateway that enforces the command.
The default is localhost.
-S <SIC Name of Specifies the SIC name for the SAM server to be contacted. It is expected
SAM Server> that the SAM server has this SIC name, otherwise the connection fails.
Notes:
• If you do not explicitly specify the SIC name, the connection continues
without SIC names comparison.
• For more information about enabling SIC, refer to the OPSEC API
Specification.
• On VSX Gateway, run the fw vsx showncs -vs <VSID> command to show
the SIC name for the relevant Virtual System.

Security Management Administration Guide R80.20 | 446


Command Line Reference

Parameter Description
-f <Security Specifies the Security Gateway, on which to enforce the action.
Gateway> <Security Gateway> can be one of these:
• All - Default. Specifies to enforce the action on all managed Security
Gateways, where SAM Server runs.
You can use this syntax only on Security Management Server or Domain
Management Server.
• localhost - Specifies to enforce the action on this local Check Point
computer (on which the fw sam command is executed).
You can use this syntax only on Security Gateway or StandAlone.
• Gateways - Specifies to enforce the action on all objects defined as
Security Gateways, on which SAM Server runs.
You can use this syntax only on Security Management Server or Domain
Management Server.
• Name of Security Gateway object - Specifies to enforce the action on
this specific Security Gateway object.
You can use this syntax only on Security Management Server or Domain
Management Server.
• Name of Group object - Specifies to enforce the action on all specific
Security Gateways in this Group object.
Notes:
• You can use this syntax only on Security Management Server or Domain
Management Server.
• VSX Gateway does not support Suspicious Activity Monitoring (SAM)
Rules.
-D Cancels all inhibit (-i, -j, -I, -J) and notify (-n) commands.
Notes:
• To "uninhibit" the inhibited connections, run the fw sam command with
the -C or -D parameters.
• It is also possible to use this command for active SAM requests.
-C Cancels the fw sam command to inhibit connections with the specified
parameters.
Notes:
• These connections are no longer inhibited (no longer rejected or
dropped).
• The command parameters must match the parameters in the original
fw sam command, except for the -t <Timeout> parameter.
-t <Timeout> Specifies the time period (in seconds), during which the action is enforced.
The default is forever, or until the fw sam command is canceled.

Security Management Administration Guide R80.20 | 447


Command Line Reference

Parameter Description
-l <Log Type> Specifies the type of the log for enforced action:
• nolog - Does not generate Log / Alert at all
• short_noalert - Generates a Log
• short_alert - Generates an Alert
• long_noalert - Generates a Log
• long_alert - Generates an Alert (this is the default)
-e <key=val>+ Specifies rule information based on the keys and the provided values.
Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
• name - Security rule name
• comment - Security rule comment
• originator - Security rule originator's username
-r Specifies not to resolve IP addresses.
-n Specifies to generate a "Notify" long-format log entry.
Notes:
• This parameter generates an alert when connections that match the
specified services or IP addresses pass through the Security Gateway.
• This action does not inhibit / close connections.
-i Inhibits (drops or rejects) new connections with the specified parameters.
Notes:
• Each inhibited connection is logged according to the log type.
• Matching connections are rejected.
-I Inhibits (drops or rejects) new connections with the specified parameters,
and closes all existing connections with the specified parameters.
Notes:
• Matching connections are rejected.
• Each inhibited connection is logged according to the log type.
-j Inhibits (drops or rejects) new connections with the specified parameters.
Notes:
• Matching connections are dropped.
• Each inhibited connection is logged according to the log type.
-J Inhibits new connections with the specified parameters, and closes all
existing connections with the specified parameters.
Notes:
• Matching connections are dropped.
• Each inhibited connection is logged according to the log type.
-b Bypasses new connections with the specified parameters.
-q Quarantines new connections with the specified parameters.
Security Management Administration Guide R80.20 | 448
Command Line Reference

Parameter Description
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
<Criteria> Criteria are used to match connections. The criteria and are composed of
various combinations of the following parameters:
• Source IP Address
• Source Netmask
• Destination IP Address
• Destination Netmask
• Port (see IANA Service Name and Port Number Registry
https://www.iana.org/assignments/service-names-port-numbers/servi
ce-names-port-numbers.xhtml)
• Protocol Number (see IANA Protocol Numbers
https://www.iana.org/assignments/protocol-numbers/protocol-number
s.xhtml)
Possible combinations are:
• src <IP>
• dst <IP>
• any <IP>
• subsrc <IP> <Netmask>
• subdst <IP> <Netmask>
• subany <IP> <Netmask>
• srv <Src IP> <Dest IP> <Port> <Protocol>
• subsrv <Src ip> <Src Netmask> <Dest IP> <Dest Netmask> <Port>
<Protocol>
• subsrvs <Src IP> <Src Netmask> <Dest IP> <Port> <Protocol>
• subsrvd <Src IP> <Dest IP> <Dest Netmask> <Port> <Protocol>
• dstsrv <Dest IP> <Port> <Protocol>
• subdstsrv <Dest IP> <Dest Netmask> <Port> <Protocol>
• srcpr <IP> <Protocol>
• dstpr <IP> <Protocol>
• subsrcpr <IP> <Netmask> <Protocol>
• subdstpr <IP> <Netmask> <Protocol>
• generic <key=val>
Explanation for the <Criteria> syntax:

Parameter Description
src <IP> Matches the Source IP address of the connection.

Security Management Administration Guide R80.20 | 449


Command Line Reference

dst <IP> Matches the Destination IP address of the connection.


any <IP> Matches either the Source IP address or the Destination IP
address of the connection.
subsrc <IP> <Netmask> Matches the Source IP address of the connections
according to the netmask.
subdst <IP> <Netmask> Matches the Destination IP address of the connections
according to the netmask.
subany <IP> <Netmask> Matches either the Source IP address or Destination IP
address of connections according to the netmask.
srv <Src IP> <Dest IP> <Port> Matches the specific Source IP address, Destination IP
<Protocol> address, Service (port number) and Protocol.

subsrv <Src IP> <Netmask> <Dest Matches the specific Source IP address, Destination IP
IP> <Netmask> <Port> <Protocol> address, Service (port number) and Protocol.
Source and Destination IP addresses are assigned
according to the netmask.
subsrvs <Src IP> <Src Netmask> Matches the specific Source IP address, source netmask,
<Dest IP> <Port> <Protocol> destination netmask, Service (port number) and Protocol.

subsrvd <Src IP> <Dest IP> <Dest Matches specific Source IP address, Destination IP,
Netmask> <Port> <Protocol> destination netmask, Service (port number) and Protocol.

dstsrv <Dest IP> <Service> Matches specific Destination IP address, Service (port
<Protocol> number) and Protocol.

subdstsrv <Dest IP> <Netmask> Matches specific Destination IP address, Service (port
<Port> <Protocol> number) and Protocol.
Destination IP address is assigned according to the
netmask.
srcpr <IP> <Protocol> Matches the Source IP address and protocol.
dstpr <IP> <Protocol> Matches the Destination IP address and protocol.
subsrcpr <IP> <Netmask> Matches the Source IP address and protocol of
<Protocol> connections.
Source IP address is assigned according to the netmask.
subdstpr <IP> <Netmask> Matches the Destination IP address and protocol of
<Protocol> connections.
Destination IP address is assigned according to the
netmask.

Security Management Administration Guide R80.20 | 450


Command Line Reference

generic <key=val>+ Matches the GTP connections based on the specified keys
and provided values.
Multiple keys are separated by the plus sign (+).
Available keys are:
• service=gtp
• imsi
• msisdn
• apn
• tunl_dst
• tunl_dport
• tunl_proto

Security Management Administration Guide R80.20 | 451


Command Line Reference

'fw sam_policy' and 'fw6 sam_policy'


Description
Manages the Suspicious Activity Policy editor that lets you work with these types of rules:
• Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules
http://supportcontent.checkpoint.com/solutions?id=sk112061.
• Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation
http://supportcontent.checkpoint.com/solutions?id=sk112454.
Also, see these commands:
• fw sam (on page 445)
• sam_alert (on page 502)
Notes:
• You can run these commands interchangeably: 'fw sam_policy' and 'fw samp'.
• Security Gateway stores the SAM Policy rules in the $FWDIR/database/sam_policy.db
file.
• The SAM Policy management file is $FWDIR/database/sam_policy.mng.
• You can run these commands in Gaia Clish, or Expert mode.
Important:
• Configuration you make with these commands, survives reboot.
• VSX Gateway does not support Suspicious Activity Policy configured in SmartView Monitor. See
sk79700 http://supportcontent.checkpoint.com/solutions?id=sk79700.
• The SAM Policy rules consume some CPU resources on Security Gateway. We recommend to
set an expiration that gives you time to investigate, but does not affect performance. The best
practice is to keep only the SAM Policy rules that you need. If you confirm that an activity is
risky, edit the Security Policy, educate users, or otherwise handle the risk.
• On VSX Gateway, first go to the context of an applicable Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
• In Cluster, you must configure the SecureXL in the same way on all the Cluster Members.

Syntax for IPv4


fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>

Security Management Administration Guide R80.20 | 452


Command Line Reference

Syntax for IPv6


fw6 [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw6 [-d] samp
add <options>
batch
del <options>
get <options>

Parameters

Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
add <options> Adds one Rate Limiting rule one at a time.
batch Adds or deletes many Rate Limiting rules at a time.
del <options> Deletes one configured Rate Limiting rule one at a time.
get <options> Shows all the configured Rate Limiting rules.

Security Management Administration Guide R80.20 | 453


Command Line Reference

fwm
Description
Performs various management operations and shows various management information.
Notes:
• For debug instructions, see the description of the fwm process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
• On Multi-Domain Server, you must run these commands in the context of the applicable
Domain Management Server.

Syntax
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
dbload <options> (on Downloads the user database and network objects information to the
page 456) specified targets
exportcert <options> Export a SIC certificate of the specified object to file.
(on page 457)
fetchfile <options> Fetches a specified OPSEC configuration file from the specified
(on page 458) source computer.
fingerprint <options> Shows the Check Point fingerprint.
(on page 459)
getpcap <options> (on Fetches the IPS packet capture data from the specified Security
page 460) Gateway.
ikecrypt <options> (on Encrypts a secret with a key.
page 461)

Security Management Administration Guide R80.20 | 454


Command Line Reference

Item Description
load <options> (on page This command is obsolete for R80 and above.
462) Use the mgmt_cli command to load a policy to a managed Security
Gateway.
logexport <options> Exports a Security log file ($FWDIR/log/*.log) or Audit log file
(on page 463) ($FWDIR/log/*.adtlog) to ASCII file.
mds <options> (on page Shows information and performs various operations on Multi-Domain
467) Server.
printcert <options> Shows a SIC certificate's details.
(on page 468)
sic_reset (on page 472) Resets SIC on the Management Server.
snmp_trap <options> Sends an SNMP Trap to the specified host.
(on page 473)
unload <options> (on Unloads the policy from the specified managed Security Gateways.
page 475)
ver <options> (on page Shows the Check Point version of the Management Server.
478)
verify <options> (on Verifies the specified policy package without installing it.
page 479)

Security Management Administration Guide R80.20 | 455


Command Line Reference

fwm dbload
Description
Downloads the user database and network objects information to the specified Security Gateways.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] dbload
-a
-c <Configuration File>
<GW1> <GW2> ... <GWN>

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm
process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
-a Executes commands on all targets specified in the default
system configuration file - $FWDIR/conf/sys.conf.
Note - You must manually create this file.
-c <Configuration File> Specifies the OPSEC configuration file to use.
Note - You must manually create this file.
<GW1> <GW2> ... <GWN> Executes commands on the specified Security Gateways.
Notes:
• Enter the main IP address or Name of the Security Gateway
object as configured in SmartConsole.
• If you do not explicitly specify the Security Gateway, the
database is downloaded to localhost.

Security Management Administration Guide R80.20 | 456


Command Line Reference

fwm exportcert
Description
Export a SIC certificate of the specified managed object to a file.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file <Output File>
[-withroot] [-pem]

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm process in
sk97638 http://supportcontent.checkpoint.com/solutions?id=sk97638.
<Name of Object> Specifies the name of the managed object, whose certificate you wish to
export.
<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish to
export.
<Output File> Specifies the name of the output file.
-withroot Exports the certificate's root in addition to the certificate's content.
-pem Save the exported information in a text file.
Default is to save in a binary file.

Security Management Administration Guide R80.20 | 457


Command Line Reference

fwm fetchfile
Description
Fetches a specified OPSEC configuration file from the specified source computer.
This command supports only the fwopsec.conf or fwopsec.v4x files.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] fetchfile -r <File> [-d <Local Path>] <Source>

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm process in
sk97638 http://supportcontent.checkpoint.com/solutions?id=sk97638.
-r <File> Specifies the relative fw1 directory.
This command supports only these:
• conf/fwopsec.conf
• conf/fwopsec.v4x
-d <Local Path> Specifies the local directory to save the fetched file.
<Source> Specifies the managed remote source computer, from which to fetch the
file.
Note - The local and the remote source computers must have established
SIC trust.

Example
[Expert@MGMT:0]# fwm fetchfile -r "conf/fwopsec.conf" -d /tmp 192.168.3.52
Fetching conf/fwopsec.conf from 192.168.3.52...
Done
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 458


Command Line Reference

fwm fingerprint
Description
Shows the Check Point fingerprint.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] fingerprint [-d]
<IP address of Target> <SSL Port>
localhost <SSL Port>

Parameters
Item Description
-d Runs the command in debug mode:
• fwm -d
Runs the complete debug of all fwm actions.
For complete debug instructions, see the description of the fwm
process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
• fingerprint -d
Runs the debug only for the fingerprint actions.
<IP address of Target> Specifies the IP address of a remote managed computer.
<SSL Port> Specifies the SSL port number.
The default is 443.

Example 1 - Showing the fingerprint on the local Management Server


[Expert@MGMT:0]# fwm fingerprint localhost 443
#DN OID.1.2.840.113549.1.9.2=An optional company name,Email=Email
Address,CN=192.168.3.51,L=Locality Name (eg\, city)
#FINGER 11:A6:F7:1F:B9:F5:15:BC:F9:7B:5F:DC:28:FC:33:C5
##
[Expert@MGMT:0]#

Example 2 - Showing the fingerprint from a managed Security Gateway


[Expert@MGMT:0]# fwm fingerprint 192.168.3.52 443
#DN OID.1.2.840.113549.1.9.2=An optional company name,Email=Email
Address,CN=192.168.3.52,L=Locality Name (eg\, city)
#FINGER 5C:8E:4D:B9:B4:3A:58:F3:79:18:F1:70:99:8B:5F:2B
##
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 459


Command Line Reference

fwm getpcap
Description
Fetches the IPS packet capture data from the specified Security Gateway.
Notes:
• On Multi-Domain Server, you must run this command in the context of the applicable Domain
Management Server (mdsenv <IP Address or Name of Domain Management Server>).
• This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory. It does not work with other Software
Blades, such as Anti-Bot and Anti-Virus that store packet captures in the $FWDIR/log/blob/
directory on the Security Gateway.

Syntax
fwm [-d] getpcap -g <Security Gateway> -u '{<Capture UID>}' -p <Local Path>

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm
process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
-g <Security Gateway> Specifies the main IP address or Name of Security Gateway object as
configured in SmartConsole.
-u '{<Capture UID>}' Specifies the Unique ID of the packet capture file.
To see the Unique ID of the packet capture file, open the applicable
log file in SmartConsole > Logs & Monitor > Logs.
-p <Local Path> Specifies the local path to save the specified packet capture file.
If you do not specify the local directory explicitly, the command saves
the packet capture file in the current working directory.

Example
[Expert@MGMT:0]# fwm getpcap -g 192.168.162.1 -u
'{0x4d79dc02,0x10000,0x220da8c0,0x1ffff}' /var/log/
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 460


Command Line Reference

fwm ikecrypt
Description
Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must then
be stored in the LDAP database.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] ikecrypt <Key> <Password>

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm process in
sk97638 http://supportcontent.checkpoint.com/solutions?id=sk97638.
<Key> Specifies the IKE Key as defined in the Encryption tab of the LDAP Account
Unit properties window.
<Password> Specifies the password for the Endpoint VPN Client user.

Example
[Expert@MGMT:0]# fwm ikecrypt MySecretKey MyPassword
OUQJHiNHCj6HJGH8ntnKQ7tg
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 461


Command Line Reference

fwm load
Description
This command is obsolete for R80 and above. Use the mgmt_cli (on page 496) command to load a
policy on a managed Security Gateway.

Security Management Administration Guide R80.20 | 462


Command Line Reference

fwm logexport
Description
Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog) to
ASCII file.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>] [-i <Input File>]
[-o <Output File>] [{-f | -e}] [-x <Start Entry Number>] [-y <End Entry Number>]
[-z] [-n] [-p] [-a] [-u <Unification Scheme File>] [-m {initial | semi | raw}]

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm
process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
-d <Delimiter> | -s Specifies the output delimiter between fields of log entries:
• -d <Delimiter> - Uses the specified delimiter.
• -s - Uses the ASCII character #255 (non-breaking space) as
delimiter.
Note - If you do not specify the delimiter explicitly, the default is a
semicolon (;).
-t <Table Delimiter> Specifies the output delimiter inside table field.
Table field would look like:
ROWx:COL0,ROWx:COL1,ROWx:COL2 and so on
Note - If you do not specify the table delimiter explicitly, the default is
a comma (,).
-i <Input File> Specifies the name of the input log file.
Notes:
• This command supports only Security log file
($FWDIR/log/*.log) and Audit log file
($FWDIR/log/*.adtlog)
• If you do not specify the input log file explicitly, the command
processes the active Security log file $FWDIR/log/fw.log
-o <Output File> Specifies the name of the output file.
Note - If you do not specify the output log file explicitly, the command
prints its output on the screen.

Security Management Administration Guide R80.20 | 463


Command Line Reference

Item Description
-f After reaching the end of the currently opened log file, continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-e After reaching the end of the currently opened log file, continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-x <Start Entry Number> Starts exporting the log entries from the specified log entry number
and below, counting from the beginning of the log file.
-y <End Entry Number> Starts exporting the log entries until the specified log entry number,
counting from the beginning of the log file.
-z In case of an error (for example, wrong field value), continue to export
log entries.
The default behavior is to stop.
-n Do not perform DNS resolution of the IP addresses in the log file (this
is the default behavior).
This significantly speeds up the log processing.
-p Do not perform resolution of the port numbers in the log file (this is
the default behavior).
This significantly speeds up the log processing.
-a Exports only Account log entries.
-u <Unification Scheme Specifies the path and name of the log unification scheme file.
File>
The default log unification scheme file is:
$FWDIR/conf/log_unification_scheme.C
-m {initial | semi | Specify the log unification mode:
raw}
• initial - Complete unification of log entries. The command
exports one unified log entry for each ID. This is the default.
If you also specify the -f parameter, then the output does not
export any updates, but exports only entries that relate to the
start of new connections. To export updates as well, use the semi
parameter.
• semi - Step-by-step unification of log entries. For each log entry,
exports entry that unifies this entry with all previously
encountered entries with the same ID.
• raw - No log unification. Exports all log entries.
The fwm logexport output appears in tabular format. The first row lists the names of all log
fields included in the log entries. Each of the next rows consists of a single log entry, whose fields
are sorted in the same order as the first row. If a log entry has no information in a specific field,
this field remains empty (as indicated by two successive semi-colons ";;"). You can control which
Security Management Administration Guide R80.20 | 464
Command Line Reference

log fields appear in the output of the fwm logexport command:

Step Description
1 Create the $FWDIR/conf/logexport.ini file:
[Expert@MGMT:0]# touch $FWDIR/conf/logexport.ini
2 Edit the $FWDIR/conf/logexport.ini file:
[Expert@MGMT:0]# vi $FWDIR/conf/logexport.ini

3 To include or exclude the log fields from the output, add these lines in the configuration
file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_FIELDS>,field100
excluded_fields = field10,field11
Where:
The num field always appears first. You cannot manipulate this field.
The <REST_OF_FIELDS> is an optional reserved token that refers to a list of fields.
• If you specify the -f parameter, then the <REST_OF_FIELDS> is based on a list of
fields from the $FWDIR/conf/logexport_default.C file.
• If you do not specify the -f parameter, then the <REST_OF_FIELDS> is based on the
input log file.
You can specify only the included_fields parameter, only the excluded_fields
parameter, or both.
4 Save the changes in the file and exit the Vi editor.
5 Run the fwm logexport command.

Example 1 - Exporting all log entries


[Expert@MGMT:0]# fwm logexport -i MySwitchedLog.log
Starting... There are 113 log records in the file
num;date;time;orig;type;action;alert;i/f_name;i/f_dir;product;LogId;ContextNum
;origin_id;ContentVersion;HighLevelLogKey;SequenceNum;log_sys_message;ProductF
amily;fg-1_client_in_rule_name;fg-1_client_out_rule_name;fg-1_server_in_rule_n
ame;fg-1_server_out_rule_name;description;status;version;comment;update_servic
e;reason;Severity;failure_impact
0;13Jun2018;19:47:54;CXL1_192.168.3.52;control; ;;daemon;inbound;VPN-1 &
FireWall-1;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_Server.checkpoint.com.s6t98x;
5;18446744073709551615;2;Log file has been switched to:
MyLog.log;Network;;;;;;;;;;;;
1;13Jun2018;19:47:54;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=CX
L1_192.168.3.52,O=MyDomain_Server.checkpoint.com.s6t98x;5;18446744073709551615
;1;;Network;Default;Default;;;;;;;;;;
... ...
35;13Jun2018;19:55:59;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=C
XL1_192.168.3.52,O=MyDomain_Server.checkpoint.com.s6t98x;5;1844674407370955161
5;1;;Network;Default;Default;Host Redirect;;;;;;;;;
36;13Jun2018;19:56:06;CXL1_192.168.3.52;control; ;;;inbound;Security
Gateway/Management;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_Server.checkpoint.com
.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Started;1.0;<null>;1;;
;
... ...
47;13Jun2018;19:57:02;CXL1_192.168.3.52;control; ;;;inbound;Security
Gateway/Management;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_Server.checkpoint.com
.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Failed;1.0;;1;Could not
reach "https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS
and Proxy configuration on the gateway.;2;Contracts may be out-of-date
Security Management Administration Guide R80.20 | 465
Command Line Reference

... ...
[Expert@MGMT:0]#

Example 2 - Exporting only log entries with specified numbers


[Expert@MGMT:0]# fwm logexport -i MySwitchedLog.log -x 36 -y 47
Starting... There are 113 log records in the file
num;date;time;orig;type;action;alert;i/f_name;i/f_dir;product;LogId;ContextNum
;origin_id;ContentVersion;HighLevelLogKey;SequenceNum;log_sys_message;ProductF
amily;fg-1_client_in_rule_name;fg-1_client_out_rule_name;fg-1_server_in_rule_n
ame;fg-1_server_out_rule_name;description;status;version;comment;update_servic
e;reason;Severity;failure_impact
36;13Jun2018;19:56:06;CXL1_192.168.3.52;control; ;;;inbound;Security
Gateway/Management;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_Server.checkpoint.com
.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Started;1.0;<null>;1;;
;
37;13Jun2018;19:56:06;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=C
XL1_192.168.3.52,O=MyDomain_Server.checkpoint.com.s6t98x;5;1844674407370955161
5;2;;Network;Default;Default;Host Redirect;;;;;;;;;
... ...
46;13Jun2018;19:56:59;CXL1_192.168.3.52;account;accept;;;inbound;FG;-1;-1;CN=C
XL1_192.168.3.52,O=MyDomain_Server.checkpoint.com.s6t98x;5;1844674407370955161
5;1;;Network;Default;Default;Host Redirect;;;;;;;;;
47;13Jun2018;19:57:02;CXL1_192.168.3.52;control; ;;;inbound;Security
Gateway/Management;-1;-1;CN=CXL1_192.168.3.52,O=MyDomain_Server.checkpoint.com
.s6t98x;5;18446744073709551615;1;;Network;;;;;Contracts;Failed;1.0;;1;Could not
reach "https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS
and Proxy configuration on the gateway.;2;Contracts may be out-of-date
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 466


Command Line Reference

fwm mds
Description
• Shows the Check Point version of the Multi-Domain Server.
• Rebuilds status tree for Global VPN Communities.
Note - On Multi-Domain Server, you can run this command in the context of the MDS or a Domain
Management Server.

Syntax
fwm [-d] mds
ver
rebuild_global_communities_status {all | missing}

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm process in
sk97638 http://supportcontent.checkpoint.com/solutions?id=sk97638.
ver Shows the Check Point version of the Multi-Domain Server.
rebuild_global_ Rebuilds status tree for Global VPN Communities:
communities_sta
tus • all - Rebuilds status tree for all Global VPN Communities.
• missing - Rebuild status tree only for Global VPN Communities that
do not have status trees.

Example
[Expert@MDS:0]# fwm mds ver
This is Check Point Multi-Domain Security Management R80.20 - Build 084
[Expert@MDS:0]#

Security Management Administration Guide R80.20 | 467


Command Line Reference

fwm printcert
Description
Shows a SIC certificate's details.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] printcert
-obj <Name of Object> [-cert <Certificate Nick Name>] [-verbose]
-ca <CA Name> [-x509 <Name of File> [-p]] [-verbose]
-f <Name of Binary Certificate File> [-verbose]

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the
fwm process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
-obj <Name of Object> Specifies the name of the managed object, for which to show
the SIC certificate information.
-cert <Certificate Nick Name> Specifies the certificate nick name.
-ca <CA Name> Specifies the name of the Certificate Authority.
Note - Check Point CA Name is internal_ca.
-x509 <Name of File> Specifies the name of the X.509 file.
-p Specifies to show the SIC certificate as a text file.
-f <Name of Binary Certificate Specifies the binary SIC certificate file to show.
File>
-verbose Shows the information in verbose mode.

Example 1 - Showing the SIC certificate of a Management Server


[Expert@MGMT:0]# fwm printcert -ca internal_ca
Subject: O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Apr 8 13:41:00 2018 Local Time
Not Valid After: Fri Jan 1 05:14:07 2038 Local Time
Serial No.: 1
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint:
is CA
MD5 Fingerprint:

Security Management Administration Guide R80.20 | 468


Command Line Reference

7B:F9:7B:4C:BD:40:B9:1C:AB:2C:AE:CF:66:2E:E7:06
SHA-1 Fingerprints:
1. A6:43:3A:2B:1A:04:7F:A6:36:A6:2C:78:BF:22:D9:BC:F7:7E:4D:73
2. KEYS HEM GERM PIT ABUT ROVE RAW PA IQ FAWN NUT SLAM
[Expert@MGMT:0]#

Example 2 - Showing the SIC certificate of a Management Server in verbose mode


[Expert@MGMT:0]# fwm printcert -ca internal_ca -verbose
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] fwa_db_init: called
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] fwa_db_init: closing existing
database
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] do_links_getver: strncmp failed.
Returning -2
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] db_fetchkey: entering
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] PubKey:
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] Modulus:
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] ae b3 75 36 64 e4 1a 40 fe c2 ad 2f
9b 83 0b 45 f1 00 04 bc
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 3f 77 77 76 d1 de 8a cf 9f 32 78 8b
d4 b1 b4 be db 75 cc c8
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] c2 6d ff 3e aa fe f1 2b c3 0a b0 a2
a5 e0 a8 ab 45 cd 87 32
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] ac c6 9f a4 a9 ba 30 79 08 fa 59 4c
d2 dc 3d 36 ca 17 d7 c1
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] b2 a2 41 f5 89 0f 00 d4 2d f2 55 d2
30 a5 32 c7 46 7a 6b 32
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 29 0f 53 9f 35 42 91 e5 7d f7 30 6d
bc b3 f2 ae f3 f0 ed 88
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] c4 d7 7d 0c 2d f6 5f c8 ed 9f 9a 57
54 79 d0 0f 0b 2f 9c 0d
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 94 2e f0 f4 66 62 f7 ae 2e f8 8e 90
08 ba 63 85 b6 46 2f b7
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] a7 01 29 9a 14 58 a8 ef eb 07 17 4e
95 8b 2f 48 5f d3 18 10
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 3f 00 d5 03 d7 fd 45 45 ca 67 5b 34
be b8 00 ae ea 9a cd 50
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] d6 e7 a2 81 86 78 11 d7 bf 04 9f 8b
43 3f f7 36 5f ed 31 a8
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] a3 9d 8b 0a de 05 fb 5c 44 2e 29 e3
3e f4 dd 50 01 0f 86 9d
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] 55 16 a3 4d f8 90 2d 13 c6 c1 28 57
f8 3e 7c 59
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] Exponent: 65537 (0x10001)
[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52]
X509 Certificate Version 3
refCount: 1
Serial Number: 1
Issuer: O=MGMT.checkpoint.com.s6t98x
Subject: O=MGMT.checkpoint.com.s6t98x
Not valid before: Sun Apr 8 13:41:00 2018 Local Time
Not valid after: Fri Jan 1 05:14:07 2038 Local Time
Signature Algorithm: RSA with SHA-256 Public key: RSA (2048 bits)
Extensions:
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint (Critical):
is CA

[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] destroy_rand_mutex: destroy


[FWM 24304 4024166304]@MGMT[12 Jun 20:21:52] cpKeyTaskManager::~cpKeyTaskManager:
called.

Security Management Administration Guide R80.20 | 469


Command Line Reference

[Expert@MGMT:0]#

Example 3 - Showing the SIC certificate of a Cluster object


[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244

printing all certificates of CXL_192.168.3.244

defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH

*****
[Expert@MGMT:0]#

Example 4 - Showing the SIC certificate of a Cluster object in verbose mode


[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing
database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed.
Returning -2

printing all certificates of CXL_192.168.3.244

[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] db_fetchkey: entering


[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] 1 certificates
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] PubKey:
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] Modulus:
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] df 35 c3 45 ca 42 16 6e 21 9e 31 af
c1 fd 20 0a 3d 5b 6f 5d
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] e0 a2 0c 0e fa fa 5e e5 91 9d 4e 73
77 fa db 86 0b 5e 5d 0c
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] ce af 4a a4 7b 30 ed b0 43 7d d8 93
c5 4b 01 f4 3d b5 d8 f4
... ... ...
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] 34 b1 db ac 18 4f 11 bd d2 fb 26 7d
23 74 5c d9 00 a1 58 1e
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] 60 7c 83 44 fa 1e 1e 86 fa ad 98 f7
df 24 4a 21
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] Exponent: 65537 (0x10001)

Security Management Administration Guide R80.20 | 470


Command Line Reference

[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45]


X509 Certificate Version 3
refCount: 1
Serial Number: 85021
Issuer: O=MGMT.checkpoint.com.s6t98x
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Not valid before: Sun Jun 3 19:58:19 2018 Local Time
Not valid after: Sat Jun 3 19:58:19 2023 Local Time
Signature Algorithm: RSA with SHA-256 Public key: RSA (2048 bits)
Extensions:
Key Usage:
digitalSignature
keyEncipherment
Subject Alternate names:
IP: 192.168.3.244
Basic Constraint:
not CA
CRL distribution Points:
URI: http://192.168.3.240:18264/ICA_CRL2.crl
DN: CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x

defaultCert:

[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] destroy_rand_mutex: destroy


[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] cpKeyTaskManager::~cpKeyTaskManager:
called.
*****
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 471


Command Line Reference

fwm sic_reset
Description
Resets SIC on the Management Server. For detailed procedure, see sk65764: How to reset SIC
http://supportcontent.checkpoint.com/solutions?id=sk65764.
Important:
• Before running this command, take a Gaia Snapshot and a full backup of the Management
Server. This command resets SIC between the Management Server and all its managed
objects.
• This operation breaks trust in all Internal CA certificates and SIC trust across the managed
environment. Therefore, we do not recommend it at all, except for real disaster recovery.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] sic_reset

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.

Security Management Administration Guide R80.20 | 472


Command Line Reference

fwm snmp_trap
Description
Sends an SNMPv1 Trap to the specified host.
Notes:
• On Multi-Domain Server, you must run this command in the context of the applicable Domain
Management Server (mdsenv <IP Address or Name of Domain Management Server>).
• On Multi-Domain Server, the SNMP Trap packet is sent from the IP address of the Leading
Interface.

Syntax
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s <Specific Trap
Number>] [-p <Source Port>] [-c <SNMP Community>] <Target> ["<Message>"]

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm
process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.
-g <Generic Trap Specifies the generic trap number.
Number> One of these values:
• 0 - For coldStart trap
• 1 - For warmStart trap
• 2 - For linkDown trap
• 3 - For linkUp trap
• 4 - For authenticationFailure trap
• 5 - For egpNeighborLoss trap
• 6 - For enterpriseSpecific trap (this is the default value)
-s <Specific Trap Specifies the unique trap type.
Number> Valid only of generic trap value is 6 (for enterpriseSpecific).
Default value is 0.
-p <Source Port> Specifies the source port, from which to send the SNMP Trap
packets.
-c <SNMP Community> Specifies the SNMP community.
<Target> Specifies the managed target host, to which to send the SNMP Trap
packets.
Enter an IP address of a resolvable hostname.

Security Management Administration Guide R80.20 | 473


Command Line Reference

Item Description
"<Message>" Specifies the SNMP Trap text message.

Example - Sending an SNMP Trap from a Management Server and capturing the traffic
on the Security Gateway
[Expert@MGMT:0]# fwm snmp_trap -g 2 -c public 192.168.3.52 "My Trap Message"
[Expert@MGMT:0]#

[Expert@MyGW_192.168.3.52:0]# tcpdump -s 1500 -vvvv -i eth0 udp and host


192.168.3.51
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 1500 bytes
22:49:43.891287 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: UDP (17),
length: 103) 192.168.3.51.53450 > MyGW_192.168.3.52.snmptrap: [udp sum ok] {
SNMPv1 { Trap(58) E:2620.1.1 192.168.3.240 linkDown 1486440 E:2620.1.1.11.0="My
Trap Message" } }
CTRL+C
[Expert@MyGW_192.168.3.52:0]#

Security Management Administration Guide R80.20 | 474


Command Line Reference

fwm unload
Description
Unloads the policy from the specified managed Security Gateways or Cluster Members.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Warning

1. The fwm unload command prevents all traffic from passing through the Security Gateway
(Cluster Member), because it disables the IP Forwarding in the Linux kernel on the Security
Gateway (Cluster Member).
2. The fwm unload command removes all policies from the Security Gateway (Cluster
Member). This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection enabled.

Notes
• If you need to remove the current policy, but keep the Security Gateway (Cluster Member)
protected, then run the comp_init_policy command on the Security Gateway (Cluster
Member).
• To load the policies on the Security Gateway (Cluster Member), run one of these commands on
the Security Gateway (Cluster Member), or reboot:
• fw fetch
• cpstart
• In addition, see the fw unloadlocal command.

Syntax
fwm [-d] unload <GW1> <GW2> ... <GWN>

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm
process in sk97638
http://supportcontent.checkpoint.com/solutions?id=sk97638.
<GW1> <GW2> ... <GWN> Specifies the managed Security Gateways by their main IP address or
Object Name as configured in SmartConsole.

Example
[Expert@MyGW:0]# cpstat -f policy fw

Product name: Firewall


Policy name: CXL_Policy
Policy install time: Tue Oct 23 18:23:14 2018
... ... ...
[Expert@MyGW:0]#
Security Management Administration Guide R80.20 | 475
Command Line Reference

[Expert@MyGW:0]# sysctl -a | grep forwarding | grep -v bridge


net.ipv6.conf.bond0.forwarding = 1
net.ipv6.conf.eth1.forwarding = 1
net.ipv6.conf.eth3.forwarding = 1
net.ipv6.conf.eth2.forwarding = 1
net.ipv6.conf.eth4.forwarding = 1
net.ipv6.conf.eth5.forwarding = 1
net.ipv6.conf.eth0.forwarding = 1
net.ipv6.conf.eth6.forwarding = 1
net.ipv6.conf.default.forwarding = 1
net.ipv6.conf.all.forwarding = 1
net.ipv6.conf.lo.forwarding = 1
net.ipv4.conf.bond0.mc_forwarding = 0
net.ipv4.conf.bond0.forwarding = 1
net.ipv4.conf.eth1.mc_forwarding = 0
net.ipv4.conf.eth1.forwarding = 1
net.ipv4.conf.eth2.mc_forwarding = 0
net.ipv4.conf.eth2.forwarding = 1
net.ipv4.conf.eth0.mc_forwarding = 0
net.ipv4.conf.eth0.forwarding = 1
net.ipv4.conf.lo.mc_forwarding = 0
net.ipv4.conf.lo.forwarding = 1
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 1
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 1
[Expert@MyGW:0]#

[Expert@MGMT:0]# fwm unload MyGW

Uninstalling Policy From: MyGW

Security Policy successfully uninstalled from MyGW...

Security Policy uninstall complete.

[Expert@MGMT:0]#

[Expert@MyGW:0]# cpstat -f policy fw

Product name: Firewall


Policy name:
Policy install time:
... ... ...
[Expert@MyGW:0]#

[Expert@MyGW:0]# sysctl -a | grep forwarding | grep -v bridge


net.ipv6.conf.bond0.forwarding = 0
net.ipv6.conf.eth1.forwarding = 0
net.ipv6.conf.eth3.forwarding = 0
net.ipv6.conf.eth2.forwarding = 0
net.ipv6.conf.eth4.forwarding = 0
net.ipv6.conf.eth5.forwarding = 0
net.ipv6.conf.eth0.forwarding = 0
net.ipv6.conf.eth6.forwarding = 0
net.ipv6.conf.default.forwarding = 0
net.ipv6.conf.all.forwarding = 0
net.ipv6.conf.lo.forwarding = 0
net.ipv4.conf.bond0.mc_forwarding = 0
net.ipv4.conf.bond0.forwarding = 0
Security Management Administration Guide R80.20 | 476
Command Line Reference

net.ipv4.conf.eth1.mc_forwarding = 0
net.ipv4.conf.eth1.forwarding = 0
net.ipv4.conf.eth2.mc_forwarding = 0
net.ipv4.conf.eth2.forwarding = 0
net.ipv4.conf.eth0.mc_forwarding = 0
net.ipv4.conf.eth0.forwarding = 0
net.ipv4.conf.lo.mc_forwarding = 0
net.ipv4.conf.lo.forwarding = 0
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 0
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 0
[Expert@MyGW:0]#

Security Management Administration Guide R80.20 | 477


Command Line Reference

fwm ver
Description
Shows the Check Point version of the Security Management Server.
Note - On Multi-Domain Server, you can run this command in the context of the MDS or a Domain
Management Server.

Syntax
fwm [-d] ver [-f <Output File>]

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm process in
sk97638 http://supportcontent.checkpoint.com/solutions?id=sk97638.
-f <Output File> Specifies the name of the output file, in which to save this information.

Example
[Expert@MGMT:0]# fwm ver
This is Check Point Security Management Server R80.20 - Build 252
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 478


Command Line Reference

fwm verify
Description
Verifies the specified policy package without installing it.
Note - On Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server (mdsenv <IP Address or Name of Domain Management Server>).

Syntax
fwm [-d] verify <Policy Name>

Parameters
Item Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
For complete debug instructions, see the description of the fwm process in
sk97638 http://supportcontent.checkpoint.com/solutions?id=sk97638.
<Policy Name> Specifies the name of the policy package as configured in SmartConsole.

Example
[Expert@MGMT:0]# fwm verify Standard
Verifier messages:
Error: Rule 1 Hides rule 2 for Services & Applications: any .
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 479


Command Line Reference

inet_alert
Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under attack.
This command forwards log messages generated by the alert daemon on your Check Point
Security Gateway to an external Management Station. This external Management Station is usually
located at the ISP site. The ISP can then analyze the alert and react accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The Management
Station receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must be
performed between the external Management Station running the ELA Proxy at the ISP site and
the Check Point Security Gateway generating the alert.

Procedure
Step Description
1 Connect with SmartConsole to the applicable Security Management Server or Domain
Management Server, which manages the applicable Security Gateway that should
forward log messages to an external Management Station.
2 From the top left Menu, click Global properties.
3 Click on the [+] near the Log and Alert and click Alerts.
4 Clear the Send user defined alert no. 1 to SmartView Monitor.
5 Select the next option Run UserDefined script under the above.
6 Enter the applicable inet_alert syntax (see the Syntax section below).
7 Click OK.
8 Install the Access Policy on the applicable Security Gateway.

Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f <Token> <Value>]
[-m <Alert Type>]

Parameters
Parameter Description
-s <IP Address> The IPv4 address of the ELA Proxy (usually located at the ISP site).
-o Prints the alert log received to stdout.
Use this option when inet_alert is part of a pipe syntax (<some
command> | inet_alert ...).

Security Management Administration Guide R80.20 | 480


Command Line Reference

Parameter Description
-a <Auth Type> Specifies the type of connection to the ELA Proxy.
One of these values:
• ssl_opsec - The connection is authenticated and encrypted (this is
the default).
• auth_opsec - The connection is authenticated.
• clear - The connection is neither authenticated, nor encrypted.
-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.
-f <Token> <Value> A field to be added to the log, represented by a <Token> <Value> pair as
follows:
• <Token> - The name of the field to be added to the log. Cannot
contain spaces.
• <Value> - The field's value. Cannot contain spaces.
This option can be used multiple times to add multiple <Token> <Value>
pairs to the log.
-m <Alert Type> The alert to be triggered at the ISP site.
This alert overrides the alert specified in the log message generated by
the alert daemon.
The response to the alert is handled according to the actions specified in
the ISP Security Policy:
These alerts execute the OS commands:
• alert - Popup alert command
• mail - Mail alert command
• snmptrap - SNMP trap alert command
• spoofalert - Anti-Spoof alert command
These NetQuota and ServerQuota alerts execute the OS commands
specified in the $FWDIR/conf/objects.C: file:
value=clientquotaalert. Parameter=clientquotaalertcmd

Exist Status
Exit Status Description
0 Execution was successful.
102 Undetermined error.
103 Unable to allocate memory.
104 Unable to obtain log information from stdin
106 Invalid command line arguments.
107 Failed to invoke the OPSEC API.

Example
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert

Security Management Administration Guide R80.20 | 481


Command Line Reference

This command specifies to perform these actions in the event of an attack:


• Establish a clear connection with the ELA Proxy located at IP address 10.0.2.4
• Send a log message to the specified ELA Proxy. Set the product field of this log message to
cads
• Trigger the OS command specified in the SmartConsole > Menu > Global properties > Log and
Alert > Popup Alert Command field.

Security Management Administration Guide R80.20 | 482


Command Line Reference

ldapcmd
Description
This is an LDAP utility that controls these features:

Feature Description
Cache LDAP cache operations, such as emptying the cache, as well as providing debug
information.
Statistics LDAP search statistics, such as:
• All user searches
• Pending lookups (when two or more lookups are identical)
• Total lookup time (the total search time for a specific lookup)
• Cache statistics such as hits and misses
These statistics are saved in the $FWDIR/log/ldap_pid_<Process PID>.stats
file.
Logging View the alert and warning logs.

Syntax
[Expert@MGMT:0]# ldapcmd [-d <Debug Level>] -p {<Process Name> | all} <Command>

Note - You must run this command from the Expert mode.

Parameters
Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
-p {<Process Name> | all} Runs on a specified Check Point process, or all supported Check
Point processes.
<Command> One of these commands:

• cacheclear {all | UserCacheObject |


TemplateCacheObject |
TemplateExtGrpCacheObject}
• all - Clears cache for all objects
• UserCacheObject - Clears cache for user objects
• TemplateCacheObject - Clears cache for template
objects
• TemplateExtGrpCacheObject - Clears cache for
external template group objects

Security Management Administration Guide R80.20 | 483


Command Line Reference

Parameter Description

• cachetrace {all | UserCacheObject |


TemplateCacheObject |
TemplateExtGrpCacheObject}
• all - Traces cache for all objects
• UserCacheObject - Traces cache for user objects
• TemplateCacheObject - Traces cache for template
objects
• TemplateExtGrpCacheObject - Traces cache for
external template group objects

• log {on | off}


• on - Creates LDAP logs
• off - Does not create LDAP logs

• stat {<Print Interval in Sec> | 0}


• <Print Interval in Sec> - How frequently to collect the
statistics
• 0 - Stops collecting the statistics

Security Management Administration Guide R80.20 | 484


Command Line Reference

ldapcompare
Description
This is an LDAP utility that performs compare queries and prints a message whether the result
returned a match or not. This utility opens a connection to an LDAP directory server, binds, and
performs the comparison specified on the command line or from a specified file.

Syntax
[Expert@MGMT:0]# ldapcompare [-d <Debug Level>] [<Options>] <DN> {<Attribute>
<Value> | <Attribute> <Base64 Value>}

Note - You must run this command from the Expert mode.

Parameters
Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
<Options> See the tables below.
<DN> Specifies the Distinguished Name.
<Attribute> Specifies the assertion attribute.
<Value> Specifies the assertion value.

<Base64 Value> Specifies the Base64 encoding of the assertion value.

Compare options:

Option Description
-E [!]<Extension>[=<Extension Specifies the compare extensions.
Parameter>] Note - The exclamation sign "!" indicates criticality.
For example: !dontUseCopy = Do not use Copy
-M Enables the Manage DSA IT control.
Use the -MM to make critical.
-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version
is 3.
-z Enables the quiet mode.
The command does not print anything. You can use
the command return values.

Common options:

Option Description
-D <Bind DN> Specifies the LDAP Server administrator
Distinguished Name.
Security Management Administration Guide R80.20 | 485
Command Line Reference

-e [!]<Extension>[=<Extension Specifies the general extensions:


Parameter>]

• [!]assert=<Filter>
RFC 4528; an RFC 4515 filter string

• [!]authzid=<Authorization ID>
RFC 4370; either "dn:<DN>", or "u:<User>"

• [!]chaining[=<Resolve
Behavior>[/<Continuation Behavior>]]
One of these:
• "chainingPreferred"
• "chainingRequired"
• "referralsPreferred"
• "referralsRequired"

• [!]manageDSAit
RFC 3296

• [!]noop
• ppolicy
• [!]postread[=<Attributes>]
RFC 4527; a comma-separated list of attributes

• [!]preread[=<Attributes>]
RFC 4527; a comma-separated list of attributes

• [!]relax
• abandon
SIGINT sends the abandon signal; if critical, does
not wait for SIGINT. Not really controls.

• cancel
SIGINT sends the cancel signal; if critical, does
not wait for SIGINT. Not really controls.

• ignore
SIGINT ignores the response; if critical, does not
wait for SIGINT. Not really controls.
Note - The exclamation sign "!" indicates criticality.
-h <LDAP Server> Specifies the LDAP Server computer by its IP address
or resolvable hostname.
-H <LDAP URI> Specifies the LDAP Server Uniform Resource
Identifier(s).
-I Specifies to use the SASL Interactive mode.
-n Dry run - shows what would be done, but does not
actually do it.
Security Management Administration Guide R80.20 | 486
Command Line Reference

-N Specifies not to use the reverse DNS to canonicalize


SASL host name.
-o <Option>[=<Option Parameter>] Specifies the general options:
nettimeout={<Timeout in Sec> | none | max}
-O <Properties> Specifies the SASL security properties.
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-Q Specifies to use the SASL Quiet mode.
-R <Realm> Specifies the SASL realm.
-U <Authentication Identity> Specifies the SASL authentication identity.
-v Runs in verbose mode (prints the diagnostics to
stdout).
-V Prints version information (use the -VV only).
-w <LDAP Admin Password> Specifies the LDAP Server administrator password
(for simple authentication).
-W Specifies to prompt the user for the LDAP Server
administrator password.
-x Specifies to use simple authentication.
-X <Authorization Identity> Specifies the SASL authorization identity (either
"dn:<DN>", or "u:<User>").
-y <File> Specifies to read the LDAP Server administrator
password from the <File>.
-Y <SASL Mechanism> Specifies the SASL mechanism.
-Z Specifies to start the TLS request.
Use the -ZZ to require successful response.

Security Management Administration Guide R80.20 | 487


Command Line Reference

ldapmemberconvert
Description
This is an LDAP utility that ports from Member attribute values in LDAP group entries to
MemberOf attribute values in LDAP member (User or Template) entries.
This utility converts the LDAP server data to work in MemberOf mode or Both mode. This means
finding all specified group or template entries that hold one or more Member attribute values. The
utility searches and modifies each value. The utility searches all specified group/template entries
and fetches their Member attribute values.
Each value is the DN of a member entry. The entry identified by this DN is added to the MemberOf
attribute value of the group/template DN at hand. In addition, those Member attribute values are
deleted from the group/template unless you run the command in the Both mode.
When your run the command, it creates a log file, ldapmemberconvert.log in the current
working directory. It logs all modifications done and errors encountered.
Important - Back up the LDAP server database before running this conversion utility.

Syntax
[Expert@MGMT:0]# ldapmemberconvert [-d <Debug Level>] -h <LDAP Server> -p <LDAP
Server Port> -D <LDAP Admin DN> -w <LDAP Admin Password> -m <Member Attribute Name>
-o <MemberOf Attribute Name> -c <Member ObjectClass Value> [-B] [-f <File> | -g
<Group DN>] [-L <LDAP Server Timeout>] [-M <Number of Updates>] [-S <Size>] [-T
<LDAP Client Timeout>] [-Z]

Note - You must run this command from the Expert mode.

Parameters
Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or
resolvable hostname.
If you do not specify the LDAP Server explicitly, the command
connects to localhost.
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password.
-m <Member Attribute Name> Specifies the LDAP attribute name when fetching and (possibly)
deleting a group Member attribute value.
-o <MemberOf Attribute Specifies the LDAP attribute name for adding an LDAP
Name> MemberOf attribute value.

Security Management Administration Guide R80.20 | 488


Command Line Reference

Parameter Description

-c <Member ObjectClass Specifies the LDAP ObjectClass attribute value that defines,
Value> which type of member to modify.
You can specify multiple attribute values with this syntax:
-c <Member Object Class 1> -c <Member Object Class
2> ... -c <Member Object Class X>
-B Specifies to run in Both mode.
-f <File> Specifies the file that contains a list of Group DNs separated by
a new line:
<Group DN 1>
<Group DN 2>
...
<Group DN X>
Length of each line is limited to 256 characters.
-g <Group DN> Specifies the Group or Template Distinguished Name, on which
to perform the conversion.
You can specify multiple Group DNs with this syntax:
-g <Group DN 1> -g <Group DN 2> ... -g <Group DN
X>
-L <LDAP Server Timeout> Specifies the Server side time limit for LDAP operations, in
seconds.
Default is never.
-M <Number of Updates> Specifies the maximal number of simultaneous member LDAP
updates.
Default is 20.
-S <Size> Specifies the Server side size limit for LDAP operations, in
number of entries.
Default is none.
-T <LDAP Client Timeout> Specifies the Client side timeout for LDAP operations, in
milliseconds.
Default is never.
-Z Specifies to use SSL connection.

Notes
There are two GroupMembership modes. You must keep these modes consistent:
• template-to-groups
• user-to-groups
For example, if you apply conversion on LDAP users to include MemberOf attributes for their
groups, then this conversion has to be applied on LDAP defined templates for their groups.

Security Management Administration Guide R80.20 | 489


Command Line Reference

Troubleshooting
Symptom:
A command fails with an error message stating the connection stopped unexpectedly when you
run it with the parameter –M <Number of Updates>.
Root Cause:
The LDAP server could not handle that many LDAP requests simultaneously and closed the
connection.
Solution:
Run the command again with a lower value for the –M parameter. The default value should be
adequate, but can also cause a connection failure in extreme situations. Continue to reduce the
value until the command runs normally. Each time you run the command with the same set of
groups, the command continues from where it left off.

Example 1
A group is defined with the DN "cn=cpGroup,ou=groups,ou=cp,c=us" and these attributes:
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...

For the two member entries:


...
cn=member1
objectclass=fw1Person
...

and:
...
cn=member2
objectclass=fw1Person
...

Run:

[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer


-d cn=admin -w secret –m uniquemember -o memberof -c fw1Person

The result for the group DN is:


...
cn=cpGroup
...

The result for the two member entries is:


...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...

Security Management Administration Guide R80.20 | 490


Command Line Reference

and:
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...

If you run the same command with the –B parameter, it produces the same result, but the group
entry is not modified.

Example 2
If there is another member attribute value for the same group entry:
uniquemember="cn=template1,ou=people, ou=cp,c=us"

and the template is:


cn=member1
objectclass=fw1Template

Then after running the same command, the template entry stays intact, because of the parameter
"-c fw1Person", but the object class of template1 is fw1Template.

Security Management Administration Guide R80.20 | 491


Command Line Reference

ldapmodify
Description
This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF
format.

Syntax
[Expert@MGMT:0]# ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server
Port>] [-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b] [-c] [-F] [-k]
[-n] [-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f <Input File>.ldif | < <Entry>]

Note - You must run this command from the Expert mode.

Parameters
Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or
resolvable hostname.
If you do not specify the LDAP Server explicitly, the command
connects to localhost.
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password.
-a Specifies that this is the LDAP add operation.
-b Specifies to read values from files (for binary attributes).
-c Specifies to ignore errors during continuous operation.
-F Specifies to force changes on all records.
-k Specifies the Kerberos bind.
-K Specifies the Kerberos bind, part 1 only.
-n Specifies to print the LDAP add operations, but do not actually
perform them.
-r Specifies to replace values, instead of adding values.
-v Specifies to run in verbose mode.
-T <LDAP Client Timeout> Specifies the Client side timeout for LDAP operations, in
milliseconds.
Default is never.
-Z Specifies to use SSL connection.

Security Management Administration Guide R80.20 | 492


Command Line Reference

Parameter Description

-f <Input File>.ldif Specifies to read from the <Input File>.ldif file.


The input file must be in the LDIF format.
< <Entry> Specifies to read the entry from the stdin.
The "<" character is mandatory part of the syntax that specifies
the input from the standard input (from the data you enter on
the screen).

Security Management Administration Guide R80.20 | 493


Command Line Reference

ldapsearch
Description
This is an LDAP utility that queries an LDAP directory and returns the results.

Syntax
[Expert@MGMT:0]# ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>]
[-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b <Base DN>] [-F
<Separator>] [-l <LDAP Server Timeout>] [-s <Scope>] [-S <Sort Attribute>] [-t]
[-T <LDAP Client Timeout>] [-u] [-z <Number of Search Entries>] [-Z] <Filter>
[<Attributes>]

Note - You must run this command from the Expert mode.

Parameters
Parameter Description

-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or
resolvable hostname.
If you do not specify the LDAP Server explicitly, the command
connects to localhost.
-p <LDAP Port> Specifies the LDAP Server port. Default is 389.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password.
-A Specifies to retrieve attribute names only, without values.
-B Specifies not to suppress the printing of non-ASCII values.
-b <Base DN> Specifies the Base Distinguished Name (DN) for search.
-F <Separator> Specifies the print separator character between attribute names
and their values.
The default separator is the equal sign "=".
-l <LDAP Server Timeout> Specifies the Server side time limit for LDAP operations, in
seconds.
Default is never.
-s <Scope> Specifies the search scope. One of these:
• base
• one
• sub
-S <Sort Attribute> Specifies to sort the results by the values of this attribute.

Security Management Administration Guide R80.20 | 494


Command Line Reference

Parameter Description
-t Specifies to write values to files in the /tmp/ directory.
Writes each <attribute>-<value> pair to a separate file named:
/tmp/ldapsearch-<Attribute>-<Value>
For example, for the fw1color attribute with the value
a00188, the command writes to the file named:
/tmp/ldapsearch-fw1color-a00188
-T <LDAP Client Timeout> Specifies the Client side timeout for LDAP operations, in
milliseconds.
Default is never.
-u Specifies to show user-friendly entry names in the output.
For example:
shows cn=Babs Jensen, users, omi
instead of cn=Babs Jensen, cn=users,cn=omi
-z <Number of Search Specifies the maximal number of entries to search on the LDAP
Entries> Server.
-Z Specifies to use SSL connection.
<Filter> LDAP search filter compliant with RFC-1558.
For example:
objectclass=fw1host
<Attributes> Specifies the list of attributes to retrieve.
If you do not specify attributes explicitly, then the command
retrieves all attributes.

Example
[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass

With this syntax, the command:


1. Connects to the LDAP Server to port 18185
2. Connects to the LDAP Server with Base DN cn=omi
3. Queries the LDAP directory for fw1host objects
4. For each object found, prints the value of its objectclass attribute

Security Management Administration Guide R80.20 | 495


Command Line Reference

mgmt_cli
Description
The mgmt_cli tool lets you work directly with the management database on your Management
Server.

Syntax on Management Server or Security Gateway running on Gaia OS


mgmt_cli <Command Name> <Command Parameters> <Optional Switches>

Syntax on SmartConsole computer running on Windows OS 32-bit


Open Windows Command Prompt and run these commands:
C:\> cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
C:\Program Files\...\PROGRAM\> mgmt_cli.exe <Command Name> <Command Parameters>
<Optional Switches>

Syntax on SmartConsole computer running on Windows OS 64-bit


Open Windows Command Prompt and run these commands:
C:\> cd /d "%ProgramFiles(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
C:\Program Files (x86)\...\PROGRAM\> mgmt_cli.exe <Command Name> <Command
Parameters> <Optional Switches>

Notes
• For a complete list of the mgmt_cli options, type the mgmt_cli (mgmt_cli.exe) command
and press Enter.
• For more information, see the Management API Reference
https://sc1.checkpoint.com/documents/latest/APIs/index.html.

Security Management Administration Guide R80.20 | 496


Command Line Reference

migrate
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
• You must run this command from the Expert mode.
• If you need to back up the current management database, and you do not plan to import it on a
Management Server that runs a higher software version, then you can use the built-in
command in the $FWDIR/bin/upgrade_tools/ directory.
• If you plan to import the management database on a Management Server that runs a higher
software version, then you must use the migrate utility from the upgrade tools package
created specifically for that higher software version. See the Installation and Upgrade Guide
for that higher software version.
• If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.20/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.20/migrate-2018.06.14_11.03.46.log
• If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.20/log/migrate-2018.06.14_11.21.39.log
Important notes about backing up and restoring in Management High Availability environment:
• To back up and restore a consistent environment, make sure to collect and restore the
backups and snapshots from all servers in the High Availability environment at the same time.
• Make sure other administrators do not make changes in SmartConsole until the backup
operation is completed.
For more information:
• About Gaia Backup and Gaia Snapshot, see the R80.20 Gaia Administration Guide
https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_Ad
minGuide/html_frameset.htm.
• About Virtual Machine Snapshots, see the vendor documentation.

Syntax
• To see the built-in help:
[Expert@MGMT:0]# ./migrate -h

• To export the management database and configuration:


[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full Path>/<Name of
Exported File> &

• To import the management database and configuration:


[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full Path>/<Name of
Security Management Administration Guide R80.20 | 497
Command Line Reference

Exported File>.tgz &

Parameters
Parameter Description
-h Shows the built-in help.
yes | nohup ./migrate ... & "yes | nohup ... &" are mandatory parts of the syntax.
Sends the yes input to the interactive migrate command
through the pipeline.
Forces the migrate command to ignore the hangup signals
from the shell. As a result, when the CLI session closes, the
command continues to run in the background.
See:
• sk133312
http://supportcontent.checkpoint.com/solutions?id=sk133
312
• https://linux.die.net/man/1/bash
https://linux.die.net/man/1/bash
• https://linux.die.net/man/1/nohup
https://linux.die.net/man/1/nohup
export Exports the management database and applicable Check
Point configuration.
import Imports the management database and applicable Check
Point configuration that were exported from another
Management Server.
-l Exports and imports the Check Point logs without log indexes
in the $FWDIR/log/ directory.
Note - The command can export only closed logs (to which
the information is not currently written).
-x Exports and imports the Check Point logs with their log
indexes in the $FWDIR/log/ directory.
Important:
• This parameter only supports Management Servers and
Log Servers R80.10 and higher.
• The command can export only closed logs (to which the
information is not currently written).
-n Runs silently (non-interactive) using the default options for
each setting.
Important:
• If you export a management database in this mode and
the specified name of the exported file matches the name
of an existing file, the command overwrites the existing
file without prompting.
• If you import a management database in this mode, the
command runs cpstop automatically.
Security Management Administration Guide R80.20 | 498
Command Line Reference

Parameter Description
--exclude-uepm-postgres-d Does not back up the PostgreSQL database during the export
b operation.
Does not restore the PostgreSQL database during the import
operation.
--include-uepm-msi-files Backs up the MSI files from the Endpoint Security
Management Server during the export operation.
Restores the MSI files from the Endpoint Security
Management Server during the import operation.
/<Full Path>/ Absolute path to the exported database file.
<Name of Exported File> During the export operation, specifies the name of the output
file. The command automatically adds the *.tgz extension.
During the import operation, specifies the name of the
exported file. You must also add the *.tgz extension in the
end.

Example 1 - Export operation succeeded


[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export

You are required to close all clients to Security Management Server


or execute 'cpstop' before the Export operation begins.

Do you want to continue? (y/n) [n]? y

Copying required files...


Compressing files...

The operation completed successfully.

Location of archive with exported database: /var/log/Migrate_Export.tgz

[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.20/migrate-2018.06.14_11.03.46.log
[Expert@MGMT:0]#

Example 2 - Export operation failed


[Expert@MGMT:0]# ./migrate export /var/log/My_Migrate_Export
Execution finished with errors. See log file
'/opt/CPshrd-R80.20/log/migrate-2018.06.14_11.21.39.log' for further details
[Expert@MGMT:0]#

Security Management Administration Guide R80.20 | 499


Command Line Reference

queryDB_util
Description
Searches in the management database for objects or policy rules.
Important - This command is obsolete for R80 and higher. Use the mgmt_cli (on page 496)
command to search in the management database for objects or policy rules according to search
parameters.

Security Management Administration Guide R80.20 | 500


Command Line Reference

rs_db_tool
Description
Manages DAIP gateways in a DAIP database.

Syntax
• To add an entry to the DAIP database:
[Expert@MGMT:0]# rs_db_tool [-d] -operation add -name <Object Name> -ip <IPv4
Address> -ip6 <Pv6 Address> -TTL <Time-To-Live>

• To fetch a specific entry from the DAIP database:


[Expert@MGMT:0]# rs_db_tool [-d] -operation fetch -name <Object Name>

• To delete a specific entry from the DAIP database:


[Expert@MGMT:0]# rs_db_tool [-d] -operation delete -name <Object Name>

• To list all entries in the DAIP database:


[Expert@MGMT:0]# rs_db_tool [-d] -operation list

• To synchronize the DAIP database:


[Expert@MGMT:0]# rs_db_tool [-d] -operation sync

Note - You must run this command from the Expert mode.

Parameters
Parameter Description
-d Runs the command in debug mode.
Use only if you troubleshoot the command itself.
-name <Object Name> Specifies the name of the DAIP object.
-ip <IPv4 Address> Specifies the IPv4 address of the DAIP object
-ip6 <IPv6 Address> Specifies the IPv6 address of the DAIP object.
-TTL <Time-To-Live> Specifies the relative time interval (in seconds), during which the
entry is valid.

Security Management Administration Guide R80.20 | 501


Command Line Reference

sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the
information received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined
Alerts mechanism.
Notes:
• VSX Gateway does not support Suspicious Activity Monitoring (SAM) Rules. See sk79700
http://supportcontent.checkpoint.com/solutions?id=sk79700.
• You must run this command in Expert mode on the Management server.
• See fw sam (on page 445) and fw sam_policy (on page 452).

Syntax for SAM v1


[Expert@MGMT:0]# sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}

Parameters for SAM v1


Parameter Description
-v Enables the verbose mode for the fw sam command.

-o Specifies to print the input of this tool to the standard output (to
use with pipes in a CLI syntax).
-s <SAM Server> Specifies the SAM Server to be contacted. Default is localhost.
-t <Time> Specifies the time (in seconds), during which to enforce the
action. The default is forever.
-f <Security Gateway> Specifies the Security Gateway, on which to run the operation.
Important - If you do not specify the target Security Gateway
explicitly, this command applies to all managed Security
Gateways.
-C Cancels the specified operation.
-n Specifies to notify every time a connection, which matches the
specified criteria, passes through the Security Gateway.
-i Inhibits (drops or rejects) connections that match the specified
criteria.
-I Inhibits (drops or rejects) connections that match the specified
criteria and closes all existing connections that match the
specified criteria.
-src Matches the source address of connections.
-dst Matches the destination address of connections.

Security Management Administration Guide R80.20 | 502


Command Line Reference

Parameter Description
-any Matches either the source or destination address of
connections.
-srv Matches specific source, destination, protocol and port.

Syntax for SAM v2


[Expert@MGMT:0]# sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r | a}] -a {d | r|
n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}

Parameters for SAM v2


Parameter Description
-v2 Specifies to use SAM v2.
-v Enables the verbose mode for the fw sam command.
-O Specifies to print the input of this tool to the standard output (to
use with pipes in a CLI syntax).
-S <SAM Server> the SAM server to be contacted. Default is localhost
-t <Time> Specifies the time (in seconds), during which to enforce the
action. The default is forever.
-f <Security Gateway> Specifies the Security Gateway, on which to run the operation.
Important - If you do not specify the target Security Gateway
explicitly, this command applies to all managed Security
Gateways.

-n <Name> Specifies the name for the SAM rule.


Default is empty.
-c "<Comment>" Specifies the comment for the SAM rule.
Default is empty.
You must enclose the text in the double quotes or single quotes.
-o <Originator> Specifies the originator for the SAM rule.
Default is sam_alert.
-l {r | a} Specifies the log type for connections that match the specified
criteria:
• r - Regular
• a - Alert
Default is None.

Security Management Administration Guide R80.20 | 503


Command Line Reference

Parameter Description
-a {d | r| n | b | q | i} Specifies the action to apply on connections that match the
specified criteria:
• d - Drop
• r - Reject
• n - Notify
• b - Bypass
• q - Quarantine
• i - Inspect
-C Specifies to close all existing connections that match the
criteria.
-ip Specifies to use IP addresses as criteria parameters.
-eth Specifies to use MAC addresses as criteria parameters.
-src Matches the source address of connections.
-dst Matches the destination address of connections.
-any Matches either the source or destination address of
connections.
-srv Matches specific source, destination, protocol and port.

Example
See sk110873: How to configure Security Gateway to detect and prevent port scan
http://supportcontent.checkpoint.com/solutions?id=sk110873.

Security Management Administration Guide R80.20 | 504


Command Line Reference

threshold_config
Description
You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts. You
can use these thresholds to monitor many system components automatically without requesting
information from each object or device.
You configure these SNMP Monitoring Thresholds only on the Security Management Server,
Multi-Domain Server, or Domain Management Server and install the Access Policy. During policy
installation, the managed a Security Gateway and Clusters receive and apply these thresholds as
part of their policy.
For more information, see sk90860: How to configure SNMP on Gaia OS
http://supportcontent.checkpoint.com/solutions?id=sk90860.

Procedure
Step Description
1 Connect to the command line on the Management Server.

2 Log in to the Expert mode.

3 On Multi-Domain Server, switch to the context of the applicable Domain Management


Server:
[Expert@HostName:0]# mdsenv <Name or IP address of Domain Management
Server>

4 Go to the Threshold Engine Configuration menu:


[Expert@HostName:0]# threshold_config

5 Select the applicable options and configure the applicable settings (see the next table).
Threshold Engine Configuration Options:
---------------------------------------

(1) Show policy name


(2) Set policy name
(3) Save policy
(4) Save policy to file
(5) Load policy from file
(6) Configure global alert settings
(7) Configure alert destinations
(8) View thresholds overview
(9) Configure thresholds

(e) Exit (m) Main Menu

Enter your choice (1-9) :

6 Exit from the Threshold Engine Configuration menu.

7 Stop the CPD daemon:


[Expert@HostName:0]# cpwd_admin stop -name CPD -path
"$CPDIR/bin/cpd_admin" -command "cpd_admin stop"

Security Management Administration Guide R80.20 | 505


Command Line Reference

Step Description
8 Start the CPD daemon:
[Expert@HostName:0]# cpwd_admin start -name CPD -path
"$CPDIR/bin/cpd" -command "cpd"

9 Wait for 10-20 seconds.

10 Verify that CPD daemon started successfully:


[Expert@HostName:0]# cpwd_admin list | egrep "STAT|CPD"

11 In SmartConsole, install the Access Policy on Security Gateways and Clusters.

Threshold Engine Configuration Options


Menu item Description
(1) Show policy name Shows the name of the current configured threshold policy.
(2) Set policy name Configures the name for the threshold policy.
If you do not specify it explicitly, then the default name is
"Default Profile".
(3) Save policy Saves the changes in the current threshold policy.
(4) Save policy to file Exports the configured threshold policy to a file.
If you do not specify the path explicitly, the file is saved in the
current working directory.
(5) Load policy from file Imports a threshold policy from a file.
If you do not specify the path explicitly, the file is imported from
the current working directory.
(6) Configure global Configures global settings:
alert settings
• How frequently alerts are sent (configured delay must be
greater than 30 seconds)
• How many alerts are sent
(7) Configure alert Configures the SNMP Network Management System (NMS), to
destinations
which the managed Security Gateways and Cluster Members
send their SNMP alerts.
Configure Alert Destinations Options:
-------------------------------------
(1) View alert destinations
(2) Add SNMP NMS
(3) Remove SNMP NMS
(4) Edit SNMP NMS

Security Management Administration Guide R80.20 | 506


Command Line Reference

Menu item Description


(8) View thresholds Shows a list of all available thresholds and their current
overview settings. These include:
• Name
• Category (see the next option "(9)")
• State (disabled or enabled)
• Threshold (threshold point, if applicable)
• Description
(9) Configure thresholds Shows the list of threshold categories to configure.
Thresholds Categories
----------------------
(1) Hardware
(2) High Availability
(3) Local Logging Mode Status
(4) Log Server Connectivity
(5) Networking
(6) Resources
Where:

• The "(1) Hardware" category contains:


Hardware Thresholds:
--------------------
(1) RAID volume state
(2) RAID disk state
(3) RAID disk flags
(4) Temperature sensor reading
(5) Fan speed sensor reading
(6) Voltage sensor reading

• The "(2) High Availability" category contains:


High Availability Thresholds:
-----------------------------
(1) Cluster member state changed
(2) Cluster block state
(3) Cluster state
(4) Cluster problem status
(5) Cluster interface status

• The "(3) Local Logging Mode Status" category


contains:
Local Logging Mode Status Thresholds:
-------------------------------------
(1) Local Logging Mode

• The "(4) Log Server Connectivity" category contains:


Log Server Connectivity Thresholds:
-----------------------------------
(1) Connection with log server
(2) Connection with all log servers

Security Management Administration Guide R80.20 | 507


Command Line Reference

Menu item Description

• The "(5) Networking" category contains:


Networking Thresholds:
----------------------
(1) Interface Admin Status
(2) Interface removed
(3) Interface Operational Link Status
(4) New connections rate
(5) Concurrent connections rate
(6) Bytes Throughput
(7) Accepted Packet Rate
(8) Drop caused by excessive traffic

• The "(6) Resources" category contains:


Resources Thresholds:
---------------------
(1) Swap Memory Utilization
(2) Real Memory Utilization
(3) Partition free space
(4) Core Utilization
(5) Core interrupts rate

Thresholds Categories
Category Sub-Categories
(1) Hardware Hardware Thresholds:
--------------------
(1) RAID volume state
(2) RAID disk state
(3) RAID disk flags
(4) Temperature sensor reading
(5) Fan speed sensor reading
(6) Voltage sensor reading
(2) High Availability High Availability Thresholds:
-----------------------------
(1) Cluster member state changed
(2) Cluster block state
(3) Cluster state
(4) Cluster problem status
(5) Cluster interface status
(3) Local Logging Mode Local Logging Mode Status Thresholds:
Status -------------------------------------
(1) Local Logging Mode
(4) Log Server Log Server Connectivity Thresholds:
Connectivity -----------------------------------
(1) Connection with log server
(2) Connection with all log servers

Security Management Administration Guide R80.20 | 508


Command Line Reference

Category Sub-Categories
(5) Networking Networking Thresholds:
----------------------
(1) Interface Admin Status
(2) Interface removed
(3) Interface Operational Link Status
(4) New connections rate
(5) Concurrent connections rate
(6) Bytes Throughput
(7) Accepted Packet Rate
(8) Drop caused by excessive traffic
(6) Resources Resources Thresholds:
---------------------
(1) Swap Memory Utilization
(2) Real Memory Utilization
(3) Partition free space
(4) Core Utilization
(5) Core interrupts rate

Notes
• If you run the threshold_config command locally on a Security Gateway or Cluster
Members to configure the SNMP Monitoring Thresholds, then each policy installation erases
these local SNMP threshold settings and reverts them to the global SNMP threshold settings
configured on the Management Server that manages this Security Gateway or Cluster.
• On Security Gateway and Cluster Members, you can save the local Threshold Engine
Configuration settings to a file and load it locally later.
• The Threshold Engine Configuration is stored in the $FWDIR/conf/thresholds.conf file.
• In a Multi-Domain Security Management environment:
• You can configure the SNMP thresholds in the context of Multi-Domain Server (MDS) and in
the context of each individual Domain Management Server.
• Thresholds that you configure in the context of the Multi-Domain Server are for the
Multi-Domain Server only.
• Thresholds that you configure in the context of a Domain Management Server are for that
Domain Management Server and its managed Security Gateway and Clusters.
• If an SNMP threshold applies both to the Multi-Domain Server and a Domain Management
Server, then configure the SNMP threshold both in the context of the Multi-Domain Server
and in the context of the Domain Management Server.
However, in this scenario you can only get alerts from the Multi-Domain Server, if the
monitored object exceeds the threshold.
Example: If you configure the CPU threshold, then when the monitored value exceeds the
configured threshold, it applies to both the Multi-Domain Server and the Domain
Management Server. However, only the Multi-Domain Server generates SNMP alerts.

Security Management Administration Guide R80.20 | 509

You might also like