CP R77 Multi-DomainSecurityManagement AdminGuide
CP R77 Multi-DomainSecurityManagement AdminGuide
Management
R77
Administration Guide
11 March 2014
Classification: [Protected]
© 2014 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of
relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional
improvements, stability fixes, security enhancements and protection against new and evolving attacks.
Latest Documentation
The latest version of this document is at:
(http://supportcontent.checkpoint.com/documentation_download?ID=24807)
To learn more, visit the Check Point Support Center (http://supportcenter.checkpoint.com).
For more about this release, see the R77 home page
(http://supportcontent.checkpoint.com/solutions?id=sk92965).
Revision History
Date Description
10 December 2013 Updated Configuring Secondary Multi-Domain Server or a Multi-Domain Log Server
(on page 31)
Updated Deleting a Multi-Domain Server (on page 32)
Removed IPS-1 sensor
Added Running CLI Commands in Automation Scripts (on page 143)
UpdatedConnecting to a Remaining Multi-Domain Server (on page 90)
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:[email protected]?subject=Feedback on Multi-Domain Security Management
R77 Administration Guide).
Contents
Important Information............................................................................................................ 3
Terms ...................................................................................................................................... 9
Multi-Domain Security Management Overview .................................................................. 10
Key Features ..................................................................................................................... 10
Basic Architecture ............................................................................................................. 11
The Multi-Domain Server ................................................................................................... 12
Domain Management Servers ........................................................................................... 13
Log Servers ....................................................................................................................... 14
Multi-Domain Log Server .............................................................................................. 15
Domain Log Server ....................................................................................................... 15
Security Policies ................................................................................................................ 15
Global Policies .............................................................................................................. 15
The Management Model .................................................................................................... 15
Introduction to the Management Model ......................................................................... 15
Management Tools ....................................................................................................... 15
High Availability ................................................................................................................. 17
Deployment Planning .......................................................................................................... 18
Multi-Domain Security Management Components Installed at the NOC ............................ 18
Using Multiple Multi-Domain Servers ................................................................................. 18
High Availability ............................................................................................................ 18
Multi-Domain Server Synchronization ........................................................................... 19
Clock Synchronization .................................................................................................. 19
Protecting Multi-Domain Security Management Networks ................................................. 19
Logging & Tracking............................................................................................................ 19
Routing Issues in a Distributed Environment ..................................................................... 19
Platform & Performance Issues ......................................................................................... 19
Enabling OPSEC ............................................................................................................... 20
IP Allocation & Routing ...................................................................................................... 20
Virtual IP Limitations and Multiple Interfaces on a Multi-Domain Server ........................ 20
Multiple Interfaces on a Multi-Domain Server ................................................................ 20
Deploying Multi-Domain Security Management ................................................................ 21
Deployment Overview ....................................................................................................... 21
Setting Up Your Network Topology.................................................................................... 21
Protecting the Multi-Domain Security Management Environment ...................................... 22
Standalone Security Gateway/Security Management Server ........................................ 22
Domain Management Server and SmartDomain Manager ............................................ 22
Security Gateways Protecting a Multi-Domain Server ................................................... 23
Making Connections Between Different Components of the System ............................. 24
The Multi-Domain Security Management Trust Model ....................................................... 24
Introduction to the Trust Model ..................................................................................... 24
Secure Internal Communication (SIC) ........................................................................... 25
Trust Between a Domain Management Server and its Domain Network ....................... 25
Trust Between a Domain Log Server and its Domain Network ...................................... 25
Multi-Domain Server Communication with Domain Management Servers..................... 25
Trust Between Multi-Domain Server to Multi-Domain Server ........................................ 25
Using External Authentication Servers .......................................................................... 26
Re-authenticating when using SmartConsole Clients .................................................... 26
CPMI Protocol............................................................................................................... 27
Configuring the Primary Multi-Domain Server .................................................................... 28
Enabling IPv6 Support ....................................................................................................... 28
Disabling IPv6 Support ...................................................................................................... 29
Using SmartDomain Manager ........................................................................................... 30
Launching the SmartDomain Manager .......................................................................... 30
Multiple Multi-Domain Server Deployments ....................................................................... 30
Synchronizing Clocks.................................................................................................... 30
Configuring Secondary Multi-Domain Server or a Multi-Domain Log Server ................. 31
Changing an Existing Multi-Domain Server or Multi-Domain Log Server ....................... 32
Deleting a Multi-Domain Server .................................................................................... 32
Licensing ........................................................................................................................... 33
Licensing Overview ....................................................................................................... 33
The Trial Period ............................................................................................................ 33
License Types............................................................................................................... 33
Managing Licenses ....................................................................................................... 34
Administrator Management................................................................................................. 36
Creating or Changing an Administrator Account ................................................................ 36
Administrator - General Properties ................................................................................ 36
Configuring Authentication ............................................................................................ 38
Configuring Certificates................................................................................................. 38
Entering Administrator Properties ................................................................................. 39
Deleting an Administrator .................................................................................................. 39
Defining Administrator Properties ...................................................................................... 39
Defining Administrator Groups - Flow ................................................................................ 39
Creating a New Group .................................................................................................. 39
Changing or Deleting a Group ...................................................................................... 39
Managing Administrator Account Expiration ...................................................................... 40
Working with Expiration Warnings................................................................................. 40
Configuring Default Expiration Settings ......................................................................... 42
Working with Permission Profiles....................................................................................... 42
Configuring Permissions ............................................................................................... 43
Managing Permission Profiles....................................................................................... 44
Showing Connected Administrators ................................................................................... 45
Global Policy Management ................................................................................................. 47
The Need for Global Policies ............................................................................................. 47
The Global Policy as a Template ....................................................................................... 48
Global Policies and the Global Rule Base ......................................................................... 48
Global SmartDashboard .................................................................................................... 49
Introduction to Global SmartDashboard ........................................................................ 49
Global Services............................................................................................................. 49
Dynamic Objects and Dynamic Global Objects ............................................................. 49
Applying Global Rules to Security Gateways by Function ............................................. 50
Synchronizing the Global Policy Database.................................................................... 50
Creating a Global Policy Using Global SmartDashboard ................................................... 50
Global IPS ......................................................................................................................... 51
Introduction to Global IPS ............................................................................................. 51
IPS in Global SmartDashboard ..................................................................................... 51
IPS Profiles ................................................................................................................... 52
Subscribing Domains to IPS Service ............................................................................. 52
Managing IPS from a Domain Management Server ...................................................... 53
Managing Global IPS Sensors ...................................................................................... 54
Assigning Global Policy ..................................................................................................... 54
Assigning the First Global Policy ................................................................................... 54
Assigning Global Policies to VPN Communities ............................................................ 54
Re-assigning Global Policies ........................................................................................ 54
Viewing the Status of Global Policy Assignments ......................................................... 56
Global Policy History File .............................................................................................. 57
Configuration ..................................................................................................................... 57
Assigning or Installing a Global Policy .......................................................................... 57
Reassigning/Installing a Global Policy on Domains ....................................................... 58
Reinstalling a Domain Policy on Domain Gateways ...................................................... 58
Remove a Global Policy from Multiple Domains............................................................ 59
Remove a Global Policy from a Single Domain ............................................................. 59
Viewing the Domain Global Policy History File .............................................................. 59
Setting Policy Management Options ............................................................................. 59
Global Names Format ................................................................................................... 60
Domain Management ........................................................................................................... 61
Creating a Domain - Wizard .............................................................................................. 61
Configuring General Properties..................................................................................... 62
Domain Properties ........................................................................................................ 62
Assigning a Global Policy ............................................................................................. 62
Assigning Administrators .............................................................................................. 62
Assign GUI Clients ........................................................................................................ 63
Version and Blade Updates .......................................................................................... 63
Creating Domain Management Servers ........................................................................ 64
Creating a Domain - CLI .................................................................................................... 64
Configuring Domain Selection Groups ............................................................................... 65
Configuring Existing Domains ............................................................................................ 65
Defining General Properties .......................................................................................... 65
Defining Domain Properties .......................................................................................... 65
Assign Global Policy Tab .............................................................................................. 65
Assigning Administrators .............................................................................................. 66
Defining GUI Clients ..................................................................................................... 68
Version and Blade Updates .......................................................................................... 68
Deleting a Domain ............................................................................................................. 69
Creating a Domain Management Server - Wizard ............................................................. 69
Creating a Domain Management Server - CLI ................................................................... 70
Changing a Domain Management Server .......................................................................... 71
Deleting a Domain Management Server ............................................................................ 72
VPN with Multi-Domain Security Management .................................................................. 73
Overview ........................................................................................................................... 73
Authentication Between Security Gateways .................................................................. 73
VPN Connectivity .............................................................................................................. 73
Global VPN Communities .................................................................................................. 74
Security Gateway Global Names .................................................................................. 74
VPN Domains in Global VPN ........................................................................................ 75
Access Control at the Network Boundary ...................................................................... 75
Joining a Security Gateway to a Global VPN Community ............................................. 75
Configuring Global VPN Communities ............................................................................... 76
Enabling a Domain Gateway to Join a Global VPN Community .................................. 76
High Availability ................................................................................................................... 78
Overview ........................................................................................................................... 78
Multi-Domain Server High Availability ................................................................................ 78
Multiple Multi-Domain Server Deployments .................................................................. 78
Multi-Domain Server Status .......................................................................................... 79
Multi-Domain Server Clock Synchronization ................................................................. 80
The Multi-Domain Server Databases ............................................................................ 80
How Synchronization Works ......................................................................................... 81
Configuring Synchronization ......................................................................................... 82
Domain Management Server High Availability ................................................................... 83
Active versus Standby .................................................................................................. 84
Adding a Secondary Domain Management Server ....................................................... 85
Domain Management Server Backup Using a Security Management Server ................ 85
Configuration ..................................................................................................................... 87
Adding another Multi-Domain Server ............................................................................ 87
Creating a Mirror of an Existing Multi-Domain Server.................................................... 88
First Multi-Domain Server Synchronization ................................................................... 88
Restarting Multi-Domain Server Synchronization .......................................................... 88
Changing a Standby Multi-Domain Server to an Active Multi-Domain Server ................ 89
Automatic Synchronization for Global Policies Databases ............................................ 89
Add a Secondary Domain Management Server ............................................................ 89
Mirroring Domain Management Servers with mdscmd .................................................. 89
Automatic Domain Management Server Synchronization ............................................. 90
Synchronize ClusterXL Security Gateways ................................................................... 90
Failure Recovery ............................................................................................................... 90
Recovery with a Functioning Multi-Domain Server ........................................................ 90
Recovery from Failure of the Only Multi-Domain Server ............................................... 91
Logging in Multi-Domain Security Management................................................................ 93
Logging Domain Activity .................................................................................................... 93
Exporting Logs .................................................................................................................. 94
Log Export to Text ........................................................................................................ 94
Manual Log Export to Oracle Database ........................................................................ 94
Automatic Log Export to Oracle Database .................................................................... 95
Log Forwarding ............................................................................................................. 95
Cross Domain Logging ................................................................................................. 95
Logging Configuration ....................................................................................................... 96
Setting Up Logging ....................................................................................................... 96
Working with Log Servers ............................................................................................. 96
Setting up Domain Security Gateway to Send Logs to the Domain Log Server ............. 99
Synchronizing Domain Log Server and Domain Management Server ........................... 99
Configuring a Multi-Domain Server to Enable Log Export ........................................... 100
Configuring Log Export Profiles .................................................................................. 100
Choosing Log Export Fields ........................................................................................ 100
Log Export Troubleshooting ........................................................................................ 101
Using SmartReporter .................................................................................................. 101
Monitoring .......................................................................................................................... 102
Overview ......................................................................................................................... 102
Monitoring Components in the Multi-Domain Security Management System ................... 103
Exporting the List Pane's Information to an External File ............................................ 103
Working with the List Pane.......................................................................................... 103
Verifying Component Status ............................................................................................ 103
Viewing Status Details ................................................................................................ 104
Locating Components with Problems .......................................................................... 105
Monitoring Issues for Different Components and Features .............................................. 105
Multi-Domain Server ................................................................................................... 105
Global Policies ............................................................................................................ 106
Domain Policies .......................................................................................................... 106
Security Gateway Policies .......................................................................................... 106
High Availability .......................................................................................................... 106
Global VPN Communities ........................................................................................... 107
GUI Clients ................................................................................................................. 107
Using SmartConsole........................................................................................................ 107
Log Tracking ............................................................................................................... 107
Tracking Logs using SmartView Tracker ..................................................................... 107
Real-Time Network Monitoring with SmartView Monitor.............................................. 108
SmartReporter Reports ............................................................................................... 109
Architecture and Processes .............................................................................................. 110
Packages in Multi-Domain Server Installation .................................................................. 110
Multi-Domain Server File System .................................................................................... 110
Multi-Domain Server Directories on /opt and /var File Systems ................................... 110
Structure of Domain Management Server Directory Trees .......................................... 111
Check Point Registry .................................................................................................. 111
Automatic Start of Multi-Domain Server Processes ..................................................... 112
Processes ....................................................................................................................... 112
Environment Variables ................................................................................................ 112
Multi-Domain Server Level Processes ........................................................................ 113
Domain Management Server Level Processes ........................................................... 113
Multi-Domain Server Configuration Databases ................................................................ 113
Global Policy Database............................................................................................... 114
Multi-Domain Server Database ................................................................................... 114
Domain Management Server Database ...................................................................... 114
Connectivity Between Different Processes ...................................................................... 114
Multi-Domain Server Connection to Domain Management Servers............................. 114
Status Collection ......................................................................................................... 115
Collection of Changes in Objects ................................................................................ 115
Connection Between Multi-Domain Servers ................................................................ 115
Large Scale Management Processes ......................................................................... 116
UTM-1 Edge Processes .............................................................................................. 116
Reporting Server Processes ....................................................................................... 116
Issues Relating to Different Platforms .............................................................................. 116
High Availability Scenarios .......................................................................................... 116
Migration Between Platforms ...................................................................................... 116
Multi-Domain Security Management Commands and Utilities ....................................... 118
Cross-Domain Management Server Search .................................................................... 118
Overview..................................................................................................................... 118
Searching ................................................................................................................... 118
Copying Search Results ............................................................................................. 119
Performing a Search in CLI ......................................................................................... 119
P1Shell ............................................................................................................................ 120
Overview..................................................................................................................... 120
Starting P1Shell .......................................................................................................... 120
File Constraints for P1Shell Commands...................................................................... 121
Multi-Domain Security Management Shell Commands ............................................... 121
Audit Logging .............................................................................................................. 124
Command Line Reference ............................................................................................... 125
cma_migrate ............................................................................................................... 125
cpmiquerybin .............................................................................................................. 125
dbedit .......................................................................................................................... 126
mcd bin | scripts | conf ................................................................................................ 127
mds_backup ............................................................................................................... 127
mds_restore ................................................................................................................ 128
mds_user_expdate ..................................................................................................... 128
mdscmd ...................................................................................................................... 129
mdsenv ....................................................................................................................... 138
mdsquerydb ................................................................................................................ 139
mdsstart ...................................................................................................................... 139
mdsstat ....................................................................................................................... 140
mdsstop ...................................................................................................................... 140
merge_plug-in_tables ................................................................................................. 140
migrate_global_policies .............................................................................................. 141
Configuration Procedures ........................................................................................... 141
Running CLI Commands in Automation Scripts.............................................................. 143
Introduction to Automation Scripts ................................................................................... 143
Creating a Domain Management Server ..................................................................... 143
Working with dbedit ......................................................................................................... 144
Introduction to dbedit .................................................................................................. 144
Using Automation Scripts ............................................................................................ 145
Create or Modify Policy Objects (Hosts, Networks) ..................................................... 146
Changing a Rule Base ................................................................................................ 149
Pushing the Security Policy to Security Gateways ...................................................... 152
Error Codes in dbedit .................................................................................................. 152
Using XML to Export Settings for a Domain Management Server .................................... 153
Index ................................................................................................................................... 155
Secondary Multi-Domain Server
All Multi-Domain Servers in a High Availability
Terms deployment created after the Primary
Multi-Domain Server.
Domain
1. A network or group of networks that is
associated with a specified entity, such as a
company, business unit or organization. 2. In
Multi-Domain Security Management. A network
managed by a Check Point Domain Management
Server.
Gateway
A computer or appliance that controls
communication between different networks.
Multi-Domain Server
A physical server that contains system
information and policy databases for all Domains
in an enterprise environment.
Permissions Profile
A predefined group of SmartConsole access
permissions assigned to Domains and
administrators. This feature lets you configure
complex permissions for many administrators with
one definition.
In This Section:
Key Features ........................................................................................................... 10
Basic Architecture ................................................................................................... 11
The Multi-Domain Server ........................................................................................ 12
Domain Management Servers ................................................................................ 13
Log Servers ............................................................................................................. 14
Security Policies ...................................................................................................... 15
The Management Model ......................................................................................... 15
High Availability ....................................................................................................... 17
Key Features
Centralized Management Administrators with applicable permissions can manage multiple
Domains from a central console. Global policies let administrators
define security rules that apply to all Domains or to groups of
Domains.
Domain Security Virtual IP addresses for each Domain Management Server make
sure that there is total segregation of sensitive data for each
Domain. Although many Domains are hosted by one server, access
to data for each Domain is permitted only to administrators with
applicable permissions.
High Availability Multi-Domain Security Management High Availability features make
sure that there is uninterrupted service throughout all Domains. All
Multiple Multi-Domain Servers are synchronized and can manage
the deployment at any time. Multiple Domain Management Servers
give Active/Standby redundancy for individual Domains.
Scalability The Multi-Domain Security Management modular architecture
seamlessly adds new Domains, Domain Management Servers,
Security Gateways, and network objects into the deployment. Each
Multi-Domain Server supports up to 250 Domains.
Basic Architecture
Multi-Domain Security Management uses tiered architecture to manage Domain network deployments.
• The Security Gateway enforces the security policy to protect network resources.
• A Domain is a network or group of networks belonging to a specified entity, such as a company,
business unit, department, branch, or organization. For a cloud computing provider, one Domain
can be defined for each customer.
• A Domain Management Server is a virtual Security Management Server that manages security
policies and Security Gateways for a specified Domain.
• The Multi-Domain Server is a physical server that hosts the Domain Management Server
databases and Multi-Domain Security Management system databases.
• The SmartDomain Manager is a management client that administrators use to manage domain
security and the Multi-Domain Security Management system.
The Multi-Domain Servers and SmartDomain Manager are typically located at central Network Operation
Centers (NOCs). Security Gateways are typically located together with protected network resources, often
in another city or country.
Item Description
B Headquarters Domain
C UK Development Domain
1 Security Gateway
3 Multi-Domain Server
Item Description
1 Multi-Domain Server
4 GUI clients
5 Licenses
6 Software packages
7 Network objects
9 Global policies
10 Global IPS
A Multi-Domain Server can host a large amount of network and policy data on one server. To increase
performance in large deployments, distribute traffic load, and configure high availability, you can use
multiple Multi-Domain Servers.
Item Description
B Headquarters Domain
C UK Development Domain
1 Security Gateway
After you define a Domain Management Server, you define Security Gateways, network objects, and
security policies using the basic procedures in the R77 Security Management Administration Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24830). You manage Security
Gateways using the Domain Management Server SmartDashboard.
You must define routers to communicate between Domain Security Gateways and Domain Management
Servers. Traffic must be allowed between the Multi-Domain Servers, network, Security Gateways and
Domain Security Gateways. It should also be allowed for SmartConsole Client applications and Domain
Management Server connections. Access rules must be set up as appropriate in Domain Security Gateway
rule base.
If you are using Logging (see "Logging in Multi-Domain Security Management" on page 93) or High
Availability (on page 78) Domain network, you must configure routing to support these functions.
Log Servers
This section shows how log servers operate in a Multi-Domain Security Management deployment.
Item Description
A Domain A
B Domain B
1 Security Gateway
2 Multi-Domain Server
Security Policies
A Security Policy is a set of rules that are enforced by Security Gateways. In a Multi-Domain Security
Management deployment, administrators use Domain Management Servers to define and manage security
policies for Security Gateways included in Domains.
Global Policies
Global policies are a collection of rules and objects that are assigned to all Domains, or to specified groups
of Domains. This is an important time saver because it lets administrators assign rules to any or all Domain
Security Gateways without having to configure them individually.
Management Tools
The SmartDomain Manager
Administrators use the SmartDomain Manager to manage the Multi-Domain Security Management and to
open the SmartConsole client applications for specific Domains. The SmartDomain Manager has many
views to let administrators see information and do various tasks.
SmartDashboard Toolbar
You can use the SmartDashboard toolbar to do these actions:
Icon Description
Open the SmartDashboard menu. When instructed to select menu options, click this
button to show the menu.
For example, if you are instructed to select Manage > Users and Administrators,
click this button to open the Manage menu and then select the Users and
Administrators option.
Open a policy package, which is a collection of Policies saved together with the same
name.
Icon Description
Open SmartConsoles.
High Availability
Note - The current version supports multiple Domain Management Servers for each Domain.
Multi-Domain Security Management High Availability gives uninterrupted management redundancy for all
Domains. Multi-Domain Security Management High Availability operates at these levels:
• Multi-Domain Server High Availability - Multiple Multi-Domain Servers are, by default,
automatically synchronized with each other. You can connect to any Multi-Domain Server to do
Domain management tasks. One Multi-Domain Server is designated as the Active Multi-Domain
Server. Other Multi-Domain Servers are designated as Standby Multi-Domain Servers.
You can only do Global policy and global object management tasks using the active Multi-Domain
Server. In the event that the active Multi-Domain Server is unavailable, you must change one of the
standby Multi-Domain Servers to active.
• Domain Management Server High Availability - Multiple Domain Management Servers give
Active/Standby redundancy for Domain management. One Domain Management Server for each
Domain is Active. The other, fully synchronized Domain Management Servers for that Domain,
are standbys. In the event that the Active Domain Management Server becomes unavailable, you
must change one of the standby Domain Management Servers to active.
You can also use ClusterXL to give High Availability redundancy to your Domain Security Gateways. You
use SmartDashboard to configure and manage Security Gateway High Availability for Domain Management
Servers.
In This Section:
Multi-Domain Security Management Components Installed at the NOC ................ 18
Using Multiple Multi-Domain Servers ...................................................................... 18
Protecting Multi-Domain Security Management Networks ..................................... 19
Logging & Tracking ................................................................................................. 19
Routing Issues in a Distributed Environment .......................................................... 19
Platform & Performance Issues .............................................................................. 19
Enabling OPSEC..................................................................................................... 20
IP Allocation & Routing ........................................................................................... 20
High Availability
When deploying many complex Domain networks, you can implement High Availability failover and recovery
functionality:
• Multi-Domain Server High Availability makes sure that at least one backup server is available for
continuous SmartDomain Manager access, even if one of the Multi-Domain Servers is not
available.
• For Domain Management Server High Availability, you need at least two Multi-Domain Servers.
You then create two or more Domain Management Servers. These Domain Management Servers
are the Active and Standby Multi-Domain Servers for the Domain Security Gateways.
Clock Synchronization
Multi-Domain Server (including dedicated Multi-Domain Log Servers) system clocks must be synchronized
to the nearest second. When adding another Multi-Domain Server to your deployment, synchronize its clock
with the other Multi-Domain Server before installing the Multi-Domain Security Management package.
Use a synchronization utility to synchronize Multi-Domain Server clocks. We recommended that you
automatically synchronize the clocks at least once a day to compensate for clock drift.
Enabling OPSEC
Multi-Domain Security Management supports OPSEC APIs on the following levels:
• Security Gateway level — Security Gateways managed by Multi-Domain Security Management
support all OPSEC APIs (such as CVP, UFP, SAM etc.)
• Domain Management Server level — Domain Management Servers support all OPSEC
Management APIs. This includes CPMI, ELA, LEA and SAM.
• Domain Log Server level— Log servers support all logging OPSEC APIs. This includes ELA and
LEA.
In This Section:
Deployment Overview ............................................................................................. 21
Setting Up Your Network Topology......................................................................... 21
Protecting the Multi-Domain Security Management Environment .......................... 22
The Multi-Domain Security Management Trust Model ........................................... 24
Configuring the Primary Multi-Domain Server ........................................................ 28
Enabling IPv6 Support ............................................................................................ 28
Disabling IPv6 Support ........................................................................................... 29
Using SmartDomain Manager ................................................................................. 30
Multiple Multi-Domain Server Deployments ............................................................ 30
Licensing ................................................................................................................. 33
Deployment Overview
This topic summarizes the steps to deploy Multi-Domain Security Management.
1. Install and create the Primary Multi-Domain Server. You also configure Multi-Domain Server
administrators and GUI Clients at this time. See the R77 Installation and Upgrade Guide for detailed
procedures.
2. Install SmartDomain Manager and SmartConsole Clients.
3. Install the Multi-Domain Server license. You can postpone this step until the trial period ends after 15
days. See Licensing (on page 33) to learn more.
4. Install and configure Multi-Domain Log Servers and secondary Multi-Domain Servers as needed.
See Multiple Multi-Domain Server Deployments (on page 30) to learn more.
5. Install and configure Security Gateways to protect your Multi-Domain Security Management network.
Define and install the security Policy.
Item Description
A Primary Domain
B Mirror Domain
1 Active Domain Management Servers
2 Primary Multi-Domain Server
3 Mirror Multi-Domain Server
4 Mirror Domain Management Servers
5 Security Gateways
Domain Management Server status collection. Each Domain Management Security Gateway
Domain Management Server collects status data from Server, Domain
Domain Management
its Domain Security Gateways. If a Domain has two or Management
Server-HA
more Domain Management Servers, the first Domain Server-HA
Management Server collects status from the peer
("Mirror") Domain Management Servers.
With more than one Multi-Domain Server, enable each Multi-Domain Servers Multi-Domain Servers
Multi-Domain Server to collect status data from the
others.
Enable Domain level High Availability synchronization Domain Management Domain Management
protocol, for Mirror Domain Management Servers and Server Server-HA
for synchronizing Domain Management Servers of the
Domain Management Domain Management
same Domain.
Server-HA Server
Multi-Domain Security Management systems must establish safe communication between the various
components of the Multi-Domain Security Management deployment. Secure Internal Communication (SIC)
makes sure that this communication is secure and private.
The ICA creates certificates for all other Multi-Domain Servers, and for Multi-Domain Security Management
administrators. Administrators also need to establish trusted communication with the Multi-Domain Servers.
You can compel administrators to re-authenticate every time a new GUI client is launched and connects to:
• a specific Domain Management Server
• all Domain Management Servers created on this system in the future
• this Multi-Domain Server or Multi-Domain Log Server
The instructions for each are listed below.
CPMI Protocol
The CPMI (Check Point Management Interface) protocol is a generic open protocol that allows third party
vendors to interoperate with Check Point management products. The client side of CPMI is included in the
OPSEC SDK documentation, so third-party products can integrate with the Domain Management Servers.
See the CPMI guide in the OPSEC SDK documentation.
Important - You must always assign an IPv4 address to a Multi-Domain Server, Multi-Domain Log
Server or Domain Management Server. The IPv6 address is optional.
• IPv6 Address - Enter the IPv6 address.
• Domain Management Server IPv6 Address Range - Enter a range of valid IPv6 addresses for
automatic assignment to new Domain Management Servers.
• If your Multi-Domain Server is installed on Gaia, make sure that you also activate IPv6 with the Gaia
WebUI or CLI. See the R77 Installation and Upgrade Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24831) for instructions.
5. On the Licenses tab, add a valid license for this Multi-Domain Server.
6. On the Additional Information tab:
• Optional: Change the Status Checking Interval.
Sets the interval for getting status information from Multi-Domain Servers, the Multi-Domain Log
Server and Domain Management Servers (default = 300 seconds).
• Optional: Click Enable SmartLog to enable the SmartLog feature for all Domains on this
Multi-Domain Server.
Demo Mode
You can open the SmartDomain Manager in Demo mode. This mode does not require authentication or a
connection to the Multi-Domain Server. Use the Demo mode to experiment with different objects, views,
modes and features before you create a production system. The Demo mode includes several
pre-configured sample Domains, Domain Management Servers, Security Gateways and policies.
Operations performed in Demo mode are stored in a local database. You can continue a Demo session
from the point at which you left off in a previous session.
Synchronizing Clocks
All Multi-Domain Server system clocks must be synchronized to the second to ensure proper operation.
Before creating a new Multi-Domain Server, you must first synchronize the new computer clock with other
Multi-Domain Server platforms in the system.
You can synchronize Multi-Domain Server clocks using any synchronization utility. It is recommended that
all the Multi-Domain Server clocks be synchronized automatically at least once a day to compensate for
clock drift.
Important - You must synchronize existing Multi-Domain Server clocks with the newly installed
Secondary Multi-Domain Server before starting this procedure.
Important - You must always assign an IPv4 address to a Multi-Domain Server, Multi-Domain Log
Server or Domain Management Server. The IPv6 address is optional.
• IPv6 Address - Enter the IPv6 address.
• Domain Management Server IPv6 Address Range - Enter a range of valid IPv6 addresses for
automatic assignment to new Domain Management Servers.
•If your Multi-Domain Server is installed on Gaia, make sure that you also activate IPv6 with the Gaia
WebUI or CLI. See the R77 Installation and Upgrade Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24831) for instructions.
5. Click Communication to establish SIC trust. Enter the Activation Key that you defined while installing
the Multi-Domain Server or Multi-Domain Log Server.
6. Click Initialize. If SIC trust succeeds, the Trust State field shows Trust established.
If you are setting up a High Availability deployment, a prompt appears asking you to do an Initial
synchronization. This operation synchronizes the primary and secondary Multi-Domain Servers.
7. Optional: Click Enable SmartLog to enable the SmartLog feature for all Domains on this Multi-Domain
Server.
8. Click Yes to start the synchronization. When the synchronization finishes, click OK to continue.
9. If you created a new Multi-Domain Server, you can now connect directly to it.
10. On the Licenses tab, add a valid license for this Multi-Domain Server.
11. On the Additional Information tab:
• Optional: Change the Status Checking Interval.
Sets the interval for getting status information from Multi-Domain Servers, the Multi-Domain Log
Server and Domain Management Servers (default = 300 seconds).
• Optional: Click Enable SmartLog to enable the SmartLog feature for all Domains on this
Multi-Domain Server.
5. Install the database on all defined Domain Management Servers and log servers.
6. Install policies on Security Gateways used as a source for getting policies or log receivers.
Licensing
Licensing Overview
This Multi-Domain Security Management version uses a simplified licensing model that matches its scalable
architecture. This lets you purchase licenses according to the size and complexity of your deployment. You
only purchase the management Software Blade licenses that you need. You can always add additional
licenses as your deployment grows.
Multi-Domain Security Management uses the Check Point Software Blade architecture. You install and
license management Blades on the Multi-Domain Server. For an environment that uses multiple
Multi-Domain Servers, you must install the Blades on each Multi-Domain Server.
Dedicated log servers (Multi-Domain Log Servers and Log Servers) have their own special licenses.
License Types
This section includes details about the various license types in a Multi-Domain Security Management
deployment. Refer to the User Center for current information about license types and bundles.
Domain Management Server licenses are associated with their Multi-Domain Server. You can freely move
licenses among Domain Management Servers on the same Multi-Domain Server, but you cannot move
licenses to a different Multi-Domain Server.
The number of QoS Security Gateways managed by a Domain Management Server is unlimited and
requires no special license.
VSX Licenses
VSX Virtual Systems can use Domain Management Server licenses without any additional licensing
requirements. If you are managing only one Virtual System in a Domain, you can purchase a special
one-Domain license.
Managing Licenses
You can use SmartUpdate to manage licenses for Multi-Domain Servers, Domain Management Servers,
Domain Security Gateways, and Software Blades. SmartUpdate lets you add licenses to a central repository
and assign them to components as necessary.
You can also manage Domain Management Server component and blade licenses directly from the Domain
Management Server Configuration Window from the SmartDomain Manager General view. If you save
your licenses in the SmartUpdate central repository, you can get these licenses from the repository by using
this window.
License Violations
A license violation occurs when the trial license or an evaluation, or other time-limited license expires. When
a license violation occurs, syslog messages are sent, pop-up alerts show in the SmartDomain Manager, and
audit entries in SmartView Tracker show the nature of the violation. In addition, the status bar of the
SmartDomain Manager shows a license violation message.
If a Multi-Domain Server is in the license violation state, you cannot define any new Domain Management
Servers. Otherwise the system continues to function normally. Licenses are enforced separately for each
Multi-Domain Server. This means that if there is a license violation for one Multi-Domain Server, all other
Multi-Domain Servers will continue to operate normally if their licenses are valid.
In This Section:
Creating or Changing an Administrator Account .................................................... 36
Deleting an Administrator ........................................................................................ 39
Defining Administrator Properties ........................................................................... 39
Defining Administrator Groups - Flow ..................................................................... 39
Managing Administrator Account Expiration ........................................................... 40
Working with Permission Profiles............................................................................ 42
Showing Connected Administrators ........................................................................ 45
Administrator Permissions
Multi-Domain Manages the Multi-Domain Security Management deployment, including all Domains,
Superuser Multi-Domain Servers, Domain Management Servers, and administrator accounts.
Multi-Domain superusers can do these tasks for Multi-Domain Servers:
• Add, edit or delete Multi-Domain Servers and Multi-Domain Log Servers.
• Allow or block access the SmartDomain Manager.
Domain Manages networks for all Domains using the SmartDomain Manager and SmartConsole
Superuser clients. Domain superusers can create, edit and delete Domains as well as see all
Domain network objects.
Domain superusers can manage Global Managers, Domain Managers and None
administrators. They cannot configure the Multi-Domain Server environment or manage
Multi-Domain Superusers.
Global Manager Manages global policies, global objects and specified Domain networks. Global
managers can see information or do actions according to their permissions profile
settings.
Global managers can manage Domain Managers and None administrators. Global
managers can only see network objects in their assigned Domains. They cannot create
new Domains.
Domain Manages specified Domain networks. Domain managers can use SmartConsole clients
Manager to see information or do actions according to their permissions profile settings.
Domain Managers can manage None administrators. They cannot access the Global
SmartDashboard to manage global objects and global policies.
None Do not have permissions to manage Multi-Domain Security Management or use the
SmartDomain Manager. None administrators can manage specified Domain networks,
using the SmartConsole clients.
Multi-Domain Security Management includes tools for managing expiration dates and warning
administrators of impending expirations. Administrators can manage expiration dates for other
administrators with a lower level administrator type. Typically, Multi-Domain Security Management or
Domain superusers do these management tasks.
To configure the expiration date:
1. In the Add or Edit Administrator window, go to the General Properties pane.
2. Do one of these steps to set the expiration date:
• Select Expire at and then select an expiration date using the calendar control.
OR
• Select Never expires to prevent this administrator account from expiring.
You can configure the default expiration dates ("Configuring Default Expiration Settings" on page 42)
that appear in this window in the Multi-Domain Security Management window.
Configuring Authentication
All administrators must authenticate to log in to the SmartDomain Manager and manage the Multi-Domain
Security Management deployment. Select and configure an authentication method for this administrator.
To select and configure the authentication method:
1. In the SmartDomain Manager, create a new administrator or double-click an existing administrator.
2. In the Add or Edit Administrator window, go to the Authentication pane.
3. Select and configure one of these authentication methods:
• Undefined - Administrators are not authenticated or are authenticated by a certificate created in the
Certificates pane.
• SecurID - Administrators enter a one-time password as displayed on the SecurID smart card.
• Check Point Password - Administrators enter the Check Point products password.
Enter and confirm the password.
• OS Password - Administrators authenticate using their operating system password.
• RADIUS - Administrators authenticate by a password defined on the specified RADIUS server.
• TACACS - Administrators authenticate by a password defined on the specified TACACS server.
Configuring Certificates
You can create a certificate that let administrators connect to the Multi-Domain Server and Domain
Management Servers. You can also revoke an existing certificate.
To create a certificate:
1. In SmartDomain Manager, create a new administrator or double-click an existing administrator.
2. In the Add or Edit Administrator window, go to the Authentication pane.
3. Click Generate and save.
4. In the message box, click OK to continue.
5. Enter and confirm the certificate password.
6. Save the certificate.
To revoke an existing certificate:
1. In SmartDomain Manager, create a new administrator or double-click an existing administrator.
2. In the Add or Edit Administrator window, go to the Authentication pane.
3. Click Revoke.
Deleting an Administrator
To delete an administrator:
1. In the SmartDomain Manager, go to the Administrators pane.
2. Right-click an existing administrator and then select Delete Administrator.
3. Click Yes in the confirmation window.
2. In the Administrator Selection Groups window, select a group and then click Edit.
3. Select administrators from the Not in Group list and then click Add.
The administrators show in the In Group list.
To delete an administrator selection group:
1. In the SmartDomain Manager, select Manage > Selection Groups > Administrator Groups.
2. In the Administrator Selection Groups window, select a group and click Edit.
3. In the confirmation window, click OK.
Note - Account expiration has no effect on operating system administrators. Operating system
administrators are different from administrators defined in SmartDomain Manager and can
continue access the command line.
SmartDomain Manager includes tools for managing expiration dates and warning administrators of
impending expirations.
Log In Warning
This warning message opens after you log in to the SmartDomain Manager if your administrator account is
about to expire.
Speak to the administrator responsible for managing your administrator account to update the expiration
date. If you have the applicable permissions, you can change the expiration date ("Configuring the
Expiration Date" on page 37) in your own account.
The administrator can disable this warning message by selecting the Do not show this again option. She
can re-enable the warning by selecting Enable administrator expiration warning from the SmartDomain
Manager Manage menu.
To use the Expired Accounts window, you must activate this feature ("Configuring Default Expiration
Settings" on page 42) in the Administrator Global Properties pane in the Multi-Domain Security
Management Properties window. By default, the Expired Accounts window is activated.
To open the Expired Accounts window, click the link.
Icon Description
Account is active.
To change administrator account settings, select an administrator and then click Edit.
To deactivate expiration warnings for one administrator account, select the account and then click Ignore.
To deactivate expiration warnings for all administrator accounts, do the procedure for setting default
expiration parameters.
Configuring Permissions
This section includes procedures for creating, changing and deleting permission profiles. Administrators with
the applicable permissions can create, edit or delete permissions profiles.
To create or change a permissions profile:
1. Select the Menu icon > Manage > Manage Permissions Profiles.
2. In the Permissions Profile window, click New or select an existing Permissions Profile.
3. In the Permissions Profile Properties window, configure permissions profile settings.
Note - You can also create a new permissions profile while assigning a profile to an administrator in a
Domain.
To delete an existing permissions profile:
1. In SmartDashboard, select Manage > Manage Permissions Profiles.
2. In the Permissions Profile window, click Delete.
3. Click Yes to confirm.
To configure permissions profile settings:
1. In the Allow access via section, select one of these options:
• Management Portal and SmartConsole Applications - Permissions to use SmartConsole
applications and the Management Portal to connect a Domain Management Server.
• Management Portal only - Permissions to connect to a Domain Management Server only with the
Management Portal.
2. In the Permissions section, select one of these options:
• Read/Write All - Full access to all Check Point products.
• Read DLP logs - Permissions to:
See all fields of DLP logs in SmartView Tracker.
See incident messages and captured data. User emails can be read if they violate corporate
Data Loss Prevention rules.
Send or discard quarantined user emails from SmartView Tracker. With the Customized
option you can assign a subset of these permissions as necessary. For example,
administrators can see the field content in DLP logs but not see the actual content of
incidents.
• Read Only All - Read-only access to all Check Point products.
• Customized - Configure access to specified Check Point products and select the access type for
each product or blade.
Note - You cannot merge a default profile with an administrator-defined profile. If you try to do
this, an error message shows.
Item Description
Step 1 Administrator creates or changes global policy
Step 2 Administrator assigns global policy to Domain
Step 3 Domain Management Server rule base inherits global policy rules
Step 4 Domain Management Server installs policy to Security Gateways
10 Network Operations Center
11 Multi-Domain Server
12 Security Gateway
A, B, C Domain networks
Global policies can be assigned to one or more Domains. Once Global Policies are assigned to a Domain
Management Server, they become part of the Domain Management Server rule base. The entire Domain
Management Server rule base, including assigned global rules, can then be installed onto selected Security
Gateways.
Global SmartDashboard
Introduction to Global SmartDashboard
The Global SmartDashboard is used to maintain the Global Policy Rule Base. You use it to configure rules
and network objects at the Multi-Domain Security Management system level.
SmartDashboard differs from Global SmartDashboard in that it operates only at the Domain level and below.
After a Global Policy is assigned to a Domain, SmartDashboard for the Domain Management Server will
show global rules automatically inserted either above or below editable Domain rules. The Domain
administrator can create or edit Domain rules using SmartDashboard, and then install the Policy onto the
Security Gateway.
When a Global Policy is assigned to a Domain, the global rules are read-only in the Domain
SmartDashboard. Domain administrators cannot edit global rules or Global Objects from SmartDashboard.
Global Services
Default services defined by a Security Gateway are available for global use. Other services need to be
defined. To avoid conflicts, make sure that you define services with unique names, which should not be the
same as in the Domain Management Server databases.
Note - Global security rules can be installed on Security Gateways, Edge Security Gateways,
SmartProvisioning Profiles, and Open Security Extension (OSE) devices.
Once she has created a Global Policy including this rule, she assigns/installs it for specific Domains and
their Security Gateways. Each Domain administrator must create a group object with the same name as in
the Domain Management Server database. This is done through SmartDashboard. In this way, local
administrators translate the dynamic global object into sets of network object from the local database.
For details about using SmartDashboard, see the R77 Security Management Administration Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24830). The differences between the
SmartDashboard and the Global SmartDashboard are as follows:
Feature Domain SmartDashboard Global SmartDashboard
Rule Base Local, applying to the Domain Global, applying to multiple networks of all
network only. Domains assigned this Global Policy.
Domain Security Rules and Global Global Rules and a place holder for Domain
Rules (in Read Only mode) if the rules.
Global Policy is assigned to the
Domain.
Not associated with the Domain Automatically added to all of the assigned
other security policies. security policies of Domains.
Each Domain policy is All the assigned Domain policies share the global
independent, with its own rules. rules.
Network Objects Local to this network only. Global to multiple networks of all Domains
assigned this Global Policy.
Saving a Security Adds the security policy to the list Adds the Global Policy to the Global Policies
Policy of Domain security policies. database (and displays it in the Global Policies
Tree of the SmartDomain Manager).
Global IPS
Introduction to Global IPS
You can manage IPS protections for multiple Domains by including IPS profiles in Global Policies. You
then assign a global policy to each Domain Management Server. You can include multiple IPS Profiles in a
global policy. Administrators can assign any of the IPS profiles included in the global policy to specified
Security Gateways managed by a Domain Management Server. Administrators can also make some limited
changes to IPS profiles using the Domain Management Server SmartDashboard.
The global nature of Global IPS refers to the ability to set IPS Profiles for all subscribed Domains from the
Global SmartDashboard. However, the Domain Management Server administrator for each Domain can
assign different profiles to each Security Gateway and modify the IPS protections in certain ways once
they have been installed. So in this case, the term global does not imply read only, as it does in the case of
the Global Security Policy.
Note - You must have an Enterprise Software Subscription to update IPS protections. Enterprise
Software Subscriptions are available for purchase at the User Center
(http://usercenter.checkpoint.com).
IPS Profiles
An IPS Profile is a complete set of configured IPS protections that can be applied to multiple Security
Gateways. On the Domain Management Server, multiple IPS Profiles can be assigned to suit Security
Gateways that are exposed to different types of threats.
Global SmartDashboard supports multiple IPS Profiles. Changes made to IPS protections for a Global
Profile are replicated when the Global Policy is assigned to Domain Management Servers that are
subscribed to the IPS Service.
To learn more, see the R77 IPS Administration Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24806).
Note - Merge and Override IPS subscriptions are no longer supported in Multi-Domain Security
Management.
Note - If you select Remove Global Policy, Global IPS will be removed from the Domain
Management Server regardless of the check box setting.
Note - To configure a Domain for IPS, see Subscribing Domains to IPS Service (on page 52).
Important - You cannot reassign global policies to any Security Gateway on which a policy
was never installed (such as a new Security Gateway). Automatic policy installation will fail if
no policy was previously installed on that Security Gateway.
To ensure that policy installation on a Security Gateway succeeds when re-assigning a global
policy, you must first install a policy on that Security Gateway using the Domain Management
Server SmartDashboard.
1. From the Global Policy page in the SmartDomain Manager, right-click a Domain and select
Reassign/Install Global Policy.
2. In the Reassign/Install Global Policy window, enable the Reassign Global Policy option.
3. To automatically install policies on Domain Security Gateways, select one or more Security Gateways
from the list.
4. Click OK to finish.
Important Exception - If you reassign a global policy to a Domain containing one or more
Security Gateways with no installed policy, global policy installation succeeds on those
Security Gateways with an installed policy. The new global policy does not install on Security
Gateways with no installed policy. This occurs even when the Install Security Policy if it can
be installed on all Security Gateways option is enabled.
This can result in some Security Gateways in a Domain enforcing the new global policy, while
others continue to enforce the old (or no) global policy.
from the Global Policy. Changes may be made to a Global Policy, after which the Global Policy is
reassigned to one of more Domains. When a Domain Management Server then installs the updated policy
to the Domain Security Gateways, any modifications to global and local objects/ rules are updated on the
selected Security Gateways.
The assign and install procedure are two different processes. The administrator can re-assign a Global
Policy without installing a local policy to Domain Security Gateways.
In this window, each Domain is displayed under the Global Security Policy to which it is assigned, or under
the category No Global Policy. The time and date at which the Global Policy was assigned to each Domain
is reported, and a status indicator shows whether that assignment is the most up-to-date version of the
Global Policy.
When a change is made in Global SmartDashboard, either to a Global Security Policy or to the Global IPS,
the change will be reflected in the Global Policy state of each Domain assigned the relevant Policy. (A green
check mark indicates that the Policy is up-to-date, while a red exclamation mark indicates that since the
Policy was assigned, it has changed, and should be reassigned.)
Configuration
Assigning or Installing a Global Policy
To assign, reassign, install or remove policies for Domains, you must be a Superuser (either a Domain
Superuser or a Multi-Domain Security Management Superuser. All these actions are performed in the
SmartDomain Manager, using the Global Policies view.
You cannot assign a Global Policy to a Domain if a Read/Write SmartDashboard is logged in to the Domain
Management Server. First, close SmartDashboard and then assign the Global Policy. You can, however,
assign a Global Policy to a Domain if there is a Read Only SmartDashboard logged in to the Domain
Management Server. The changes won't be displayed in SmartDashboard until it is disconnected from and
then reconnected to the Domain Management Server.
For Domains that already have a Global Policy, the option will be to Reassign/Install Global Policy.
1. Select a Domain, then choose Manage > Assign/Install Global Policy, or right-click the Domain and
select Assign/Install Global Policy.
The Assign/Install Global Policy window lets you select a policy to be installed.
2. Select one or more Security Gateways. A policy must already have been installed on the Security
Gateways, or the operation will not work.
3. Click OK.
The Global Policy is assigned to the Domain Management Server and the Domain policy is re-installed
on the selected Security Gateways.
You can also define what occurs if policy installation is not successful on some network objects or Security
Cluster members, but is successful on others. These options can make sure that all network objects and
Security Cluster members enforce the correct policy.
Important Exception - If you assign a global policy to a Domain Management Server where
one or more Security Gateways do not have an installed policy:
• The local policy installation succeeds on those Security Gateways with an installed
policy.
• The global policy does not install on Security Gateways with no installed policy.
• Some Security Gateways in this Domain will enforce the new local policy, while others
enforce the old (or no) local policy.
This problem occurs if you select the Install Security Policy only if it can be installed on all
Security Gateways option.
In This Section:
Creating a Domain - Wizard.................................................................................... 61
Creating a Domain - CLI ......................................................................................... 64
Configuring Domain Selection Groups ................................................................... 65
Configuring Existing Domains ................................................................................. 65
Deleting a Domain .................................................................................................. 69
Creating a Domain Management Server - Wizard .................................................. 69
Creating a Domain Management Server - CLI ....................................................... 70
Changing a Domain Management Server .............................................................. 71
Deleting a Domain Management Server ................................................................. 72
Note - If you want to enable Check Point QoS, you must use Customized Domain Creation.
This option is not available if you use the Simplified mode.
Domain Properties
You can enter information in Domain Properties fields. These fields typically contain contact information or
other descriptive data about the Domain. Superusers can define the fields that show in the Administrator
Properties window.
Assigning Administrators
Superusers are automatically assigned to all Domains with full read/write privileges. You cannot remove or
assign them, nor can you change their permission profiles.
You assign global manager and domain manager administrator accounts to specified Domains. You assign
a permissions profile to administrators while assigning them to the new Domain. These administrators can
manage the Domain according to their administrator type and permissions profile.
You can only assign administrators to new domains if you use the Customized Domain Creation wizard
option. If you use the Simplified wizard option, only superusers are assigned to the new Domain. You can
add more administrators later.
To assign a permissions profile to a new Domain:
1. Select one or more administrators.
2. Click Add to move the selected administrators from the Not Assigned list to the Assigned list.
You can create a new permissions profile or see an existing permissions profile from this window:
• To create a new permissions profile ("Configuring Permissions" on page 43), click Configuration
> Add New Permissions Profile.
• To see an existing permission profile, click Configuration > View Permissions Profile.
You can also do these actions in the Domain Assigned Administrators window:
• To select all administrator accounts in a group, click Select by Group.
• To remove administrators from the Assigned list, select them and then click Remove.
• To add a new administrator account, click New Admin. The Add Administrator window opens.
Argument Description
DomainName Name of the Domain to which the Domain Management Server is assigned.
The name cannot include spaces or special characters (except for the
underscore character).
-t target Optional: Name of the Multi-Domain Server that the Domain Management
ServerName Server is assigned to. This argument is necessary only if you assign the
Domain Management Server to a remote Multi-Domain Server.
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must use this
argument when you work with a Domain Management Server on a remote
Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p Credentials of the Superuser for the remote Multi-Domain Server. These
password arguments are necessary to log in to the remote Multi-Domain Server. Make
sure that you do not show the password during remote login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old form of this command (mdscmd addcustomer) is still supported in this
release.
network objects contained in groups. Reference objects are also copied to the Domain Management Server
databases. Administrators can see them individually or as members of a group.
Although you can change global settings later, we recommend that you do so carefully. Consider the
following scenario:
A Domain assigns a Global Policy including all Global Objects. All objects are copied to the global database.
If a Global Policy is re-assigned with only those objects applicable to the assigned Global Policy, extraneous
objects not used by the Global Policy are removed from the database. In this case, if the removed objects
are required by Domain security rules or objects, the assignment operation will terminate with an error
message showing these missing objects.
To assign a Global Policy, define these configuration settings:
• Assign all Global Objects - Assigns all Global Objects to this Domain.
• Assign only Global Objects that are used in the assigned Global Policy - Assigns only those
Global Objects required by the Domain Global Policy.
• Subscribe Domain to IPS service - Adds the global IPS profiles to the Domain IPS profiles list.
IPS profiles defined for individual Domains are not affected.
• Create a database version - If activated, saves a snapshot of settings before assigning a Global
Policy. This allows you to go back to an earlier state.
Assigning Administrators
In this window, you assign administrators to, or remove administrators from Domains. Administrators
assigned to a Domain can manage that Domain according to their permissions. Superusers are
automatically assigned to new Domains with full read/write permissions. You cannot remove them or change
their permissions.
Deleting a Domain
When you delete a Domain, all Domain Management Servers assigned to this Domain are also deleted.
To delete a domain using the SmartDomain Manager:
1. In the General tab, click Domain Contents.
2. Right-click the applicable Domain and select Delete Domain.
To delete a domain using the Multi-Domain Server CLI:
Description
Use this command to delete an existing Domain. When deleting a Domain, you also delete the Domain
Management Servers.
Usage
mdscmd deletedomain <DomainName> -m <ServerName> -u <user> -p <password>
Argument Description
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management
Server on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
Note - The old version of this command (mdscmd deletecustomer) is still supported.
Argument Description
DomainName Name of the Domain to which the Domain Management Server is assigned.
The name cannot include spaces or special characters (except for the
underscore character).
-t target Optional: Name of the Multi-Domain Server that the Domain Management
ServerName Server is assigned to. This argument is necessary only if you assign the
Domain Management Server to a remote Multi-Domain Server.
Argument Description
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must use this
argument when you work with a Domain Management Server on a remote
Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p Credentials of the Superuser for the remote Multi-Domain Server. These
password arguments are necessary to log in to the remote Multi-Domain Server. Make
sure that you do not show the password during remote login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old form of this command (mdscmd addcustomer) is still supported in this
release.
Argument Description
DomainName Domain that contains the Domain Management Server
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management Server
on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old version of this command (mdscmd deletecma) is still supported.
Overview
Branch offices need to connect with other branch offices. Partner sites also need to establish local and
remote communication. Once connectivity has been established, the connections must be secure and have
high levels of privacy, authentication, and integrity.
Only legitimate traffic must be allowed to enter a Domain internal network, and traffic must be inspected for
potentially harmful content. Inside a Domain network, different levels of access must be defined so that
sensitive data is only available to the right people.
VPN Connectivity
These trusted entities create VPN trust in a Multi-Domain Security Management deployment:
• Certificates issued by a Domain Management Server Internal Certificate Authority (ICA).
• External third party Certificate Authority servers (using OPSEC connectivity).
• Pre-shared secrets.
The Domain Management Server ICA issues certificates used by Domain Security Gateways to create SIC
trust. The primary Multi-Domain Server issues certificates to authenticate administrators.
The procedure for establishing Global VPN Communities automates part of the step-by-step process of
establishing Externally Managed Security Gateways for each Security Management Server and exchanging
certificates manually.
Note - Make sure that your format string always generates a unique name for global Security
Gateways.
If all conditions of the rule are met, the rule is matched and the connection allowed.
When assigning a global policy to one or more Domains, global objects are copied to the database of the
Domain Management Server. Whether all the global objects in the database are copied, or only those
related to the global policy, is configurable per Domain using the Domain Configuration window. Rules
belonging to the global policy package being assigned are being added above and below the rules inside all
local policies defined in that Domain Management Server database.
For more information about global policies, see Global Policy Management (on page 47).
Considerations
When using the "install policy" command for Domain Management Server Security Gateways, they receive
the latest Domain Management Server policy, including the most recent Global Policy. Changes may be
made to a global policy, after which the global policy is reassigned to one of more Domains. When a Domain
Management Server then installs the updated policy to the Domain Security Gateways, any modifications to
global and local objects/ rules are updated on the selected Security Gateways.
The assign and install procedure are two different processes. The administrator can re-assign a global
policy without installing a local policy to Domain Security Gateways.
During the re-assign operation, Security Gateways that participate in Global VPN Communities are provided
the CA certificate for other Domains participating in the community. Certificates are automatically installed in
the certificate database of the Domain Management Server assigned a global policy.
For each participating Domain, other than the Domain Management Server Domain, a global "CA Server"
object is created in the Domain Management Server database, representing the certificate authority of the
peer Domain. The existence of this object allows for authentication by 'Matching Criteria' to work. If by
chance the certificate of the peer Domain has already been imported manually into the database, the
'Matching Criteria' references the existing certificate.
Note - Security Gateways enabled for global use do not show in the SmartDomain Manager
under a Domain Management Server this is assigned to all global objects, with these
exceptions:
• Global services always show if they are used in global rules
• Security Gateways show under a Domain Management Server that is part of a VPN
Community or rules associated thereto.
Overview
Note - The current version supports multiple Domain Management Servers for each Domain.
Multi-Domain Security Management High Availability gives uninterrupted management redundancy for all
Domains. Multi-Domain Security Management High Availability operates at these levels:
• Multi-Domain Server High Availability - Multiple Multi-Domain Servers are, by default,
automatically synchronized with each other. You can connect to any Multi-Domain Server to do
Domain management tasks. One Multi-Domain Server is designated as the Active Multi-Domain
Server. Other Multi-Domain Servers are designated as Standby Multi-Domain Servers.
You can only do Global policy and global object management tasks using the active Multi-Domain
Server. In the event that the active Multi-Domain Server is unavailable, you must change one of the
standby Multi-Domain Servers to active.
• Domain Management Server High Availability - Multiple Domain Management Servers give
Active/Standby redundancy for Domain management. One Domain Management Server for each
Domain is Active. The other, fully synchronized Domain Management Servers for that Domain,
are standbys. In the event that the Active Domain Management Server becomes unavailable, you
must change one of the standby Domain Management Servers to active.
You can also use ClusterXL to give High Availability redundancy to your Domain Security Gateways. You
use SmartDashboard to configure and manage Security Gateway High Availability for Domain Management
Servers.
Item Description
A Domain A
B Domain B
1 Active Domain Management Servers
2 Primary Multi-Domain Server
3 Mirror Multi-Domain Server
4 Mirror Domain Management Servers
5 Security Gateways
Item Description
1 Multi-Domain Servers
2 System databases
3 Synchronization path
certificate from the Domain ICA, this information must be synchronized between all of the Domain
Management Servers.
Item Description
A Primary Multi-Domain Server
B Secondary Multi-Domain Server
1 Active Domain Management Server
2 Standby Domain Management Server
3 Domain Management Server high availability
4 Multi-Domain Server database high availability
Configuring Synchronization
Using SmartDomain Manager to Synchronize Multi-Domain Servers
High Availability is managed using the SmartDomain Manager High Availability View. You can perform all
management High Availability tasks and view the status of these actions after a configurable delay.
The Sync Status displays synchronization statuses for Multi-Domain Servers and Domain Management
Servers. Synchronization takes a while to update the status. The default is 5 minutes.
Multi-Domain Server synchronization status is applicable for the Global Policies database. The ICA
database is synchronized automatically when new certificates are created for administrators, Multi-Domain
Servers or Multi-Domain Log Servers. When the database contents change because of operations in the
Global SmartDashboard, synchronization starts during the next Global Policies database synchronization.
Note - Redundant Multi-Domain Servers may use different operating systems. All
Multi-Domain Servers, however, must use the same Multi-Domain Security Management
version.
You can create all redundant Domain Management Servers at the same time, or add additional Domain
Management Servers at a later time. Once the Domain Management Servers have been initialized and
synchronized, there is no functional difference between them.
You do not have to assign all active or all standby Domain Management Servers to the same Multi-Domain
Server. A Multi-Domain Server can host a mixture of active and standby Domain Management Servers,
allowing you to distribute the traffic load.
Item Description
A Primary Domain
B Secondary Domain
1 Active Domain Management Server
2 Primary Multi-Domain Server
3 Secondary Multi-Domain Server
4 Standby Domain Management Server
5 Security Gateways
You make security policy changes using the active Domain Management Server using the Domain
Management Server SmartDashboard. By default, standby Domain Management Servers are automatically
synchronized with the active Domain Management Server. You can optionally configure the system to use
manual synchronization.
You must define GUI clients and administrators locally on the Security Management Server. The backup
process cannot export this data from a Domain Management Server to a Security Management Server.
Item Description
A Primary Multi-Domain Server
B Secondary Multi-Domain Server
C Security Management Server used for Domain Management Server backup
1 Active Domain Management Server
2 Standby Domain Management Server
3 Domain Management Server high availability
4 Multi-Domain Server database high availability
5 Domain Management Server high availability to Security Management Server backup
3. In the Domain Management Server SmartDashboard, create a network object that will represent the
secondary backup Security Management Server.
a) Select Manage > Network Objects > Check Point > New > Host
b) In the Check Point Host window, select Secondary Management Station under Check Point
Products. This automatically selects the Log Server.
4. From the object created in step 3 establish secure communication with the secondary backup Security
Management Server.
5. From SmartDashboard access the Policy menu, select Management High Availability and press the
Synchronize button.
To setup a backup Security Management Server from an existing Security Management
Server:
1. Migrate the existing Security Management Server to the Domain Management Server.
See "Upgrading Multi-Domain Security Management" in the R77 Installation and Upgrade Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24831).
2. Perform a fresh Security Management Server installation as a secondary Security Management Server
on an existing or new machine.
3. Using cpconfig to select an activation key that will be used to establish secure internal communication
(SIC) between the Domain Management Server and Security Management.
4. Create a network object in the Domain Management Server that will represent the secondary backup
Security Management Server.
a) Select Manage > Network Objects > Check Point > New > Host
b) In the Check Point Host window, check Secondary Management Station under Check Point
Products. This automatically selects Log Server as well.
5. From the object created in step 4 establish secure communication with the secondary backup Security
Management Server.
6. From SmartDashboard access the Policy menu, select Management High Availability and press the
Synchronize button.
Configuration
Adding another Multi-Domain Server
These steps are described in greater detail in the section Creating a Primary Multi-Domain Server (see
"Configuring the Primary Multi-Domain Server" on page 28).
1. Synchronize the system clock of the new Multi-Domain Server computer with all other Multi-Domain
Servers computers' system clocks.
2. Run the Multi-Domain Server installation script to install the Multi-Domain Server.
3. When prompted if this is a primary Multi-Domain Server, enter No.
4. During the configuration phase, add a Multi-Domain Server license, and enter the SIC Activation Key.
This Activation Key is required to send the SIC certificate to the new Multi-Domain Server from the
primary Multi-Domain Server.
5. In the SmartDomain Manager connected to the first Multi-Domain Server, define a new Multi-Domain
Server. Assign it the IP address of the Leading Interface you selected for it in the configuration phase.
Send the new Multi-Domain Server a certificate by the Initialize Communication option. Use the same
Activation Key you entered in the configuration of the new Multi-Domain Server.
6. Do an "Initial synchronization" for this Multi-Domain Server when prompted. Your new Multi-Domain
Server is now ready for use.
For example, to mirror Domain Management Servers only for Domains that have only one Domain
Management Server, run:
mdscmd mirrormanagement -s FirstServer -t SecondServer -c 2
Failure Recovery
Multi-Domain Security Management includes capabilities that enable recovery in many cases of a failed
Multi-Domain Server in a High Availability deployment. Specifically, in the case of a failed Multi-Domain
Server, you can promote a secondary Domain Management Server to become a primary Domain
Management Server.
6. On each remaining Multi-Domain Server and on each remaining Multi-Domain Log Server, run the
following commands:
mdsstop
mv $MDSDIR/conf/mdsdb/cp-deleted.C $MDSDIR/conf/mdsdb/cp-deleted.C.prepromote
cp $MDSDIR/conf/mdsdb/exported_domains.C
$MDSDIR/conf/mdsdb/exported_domains.C.afterpromote
cp $MDSDIR/conf/mdsdb/exported_domains.C.prepromote
$MDSDIR/conf/mdsdb/exported_domains.C
mdsstart
Applicable network objects and Global Policy assignments are automatically restored in the
SmartDomain Manager.
2. Change the active Domain Management Server from secondary to primary by setting the Multi-Domain
Server environment to the specified Domain Management Server. To do so:
a) Run mdsenv <Domain Management Server name>.
b) Run promote_util.
3. Install a new Primary Multi-Domain Server, and additional Multi-Domain Servers according to your
deployment's needs.
4. Migrate the Multi-Domain Security Management environment from the old deployment to the new one.
For detailed instructions, refer to these sections in the Gradual Upgrade section in the R77 Installation
and Upgrade Guide. (http://supportcontent.checkpoint.com/documentation_download?ID=24831) For
the migration process, use the primary Domain Management Server as the source for each Domain.
As part of the migration process, in SmartDashboard for the new Domain Management Server, make
sure to locate (with Where Used) and to remove all uses of the old deployment's Domain Management
Servers (except the primary Domain Management Server used for migration), and these Domain
Management Server objects themselves. Save the policy.
The Gradual Upgrade process includes migrating Global Policies. Afterwards, remember to re-assign
Global Policies and install policies on all Security Gateways.
5. Mirror new secondary Domain Management Servers according to your needs.
The table below shows the similarities and differences between Domain Management Servers and Log
Servers:
Domain Management Multi-Domain Log Multi-Domain Log Server
Server Server or
Domain Log Server
Function Manages the Security Collects logs from Container for one or more Log
Policy, the User and selected Security Servers
Object Database for the Gateways
Domain Check Point
and OPSEC gateways
Exporting Logs
There are several ways and formats in which a log file can be exported:
Format Environment Export to Event
Log Files
For each Domain Log Server, an Active log file, the fw.log file, is created. Logged data is stored to this file
for a scheduled period or until it reaches a certain size limit, after which the fw.log file is saved with a new
extension, say fw.log.109, and a new file is opened (this process is also known as log "switching"). Once
a log file is closed, it is possible to export the file, automatically or manually.
Export Profiles
Automatic log exports are performed according to a Log Export Profile. This profile defines log export
parameters, such as the schedule and the log fields to be exported. Each Domain Management Server and
Domain Log Server can be assigned a Log Export Profile. The same log profile can be applied to a number
of Domain Management Servers and Log Servers that share the same logging needs.
Logs exports are performed on log files that are not currently open. The file must be inactive and not yet
exported.
Log Forwarding
You can use SmartView Tracker to forward a log file from one Multi-Domain Log Server to another
computer. See the R77 SmartView Tracker Administration Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24847).
Logging Configuration
This section outlines configuration issues of Multi-Domain Security Management logging.
Setting Up Logging
To create a Multi-Domain Log Server:
1. Use the same procedure as for creating a SmartDomain Manager (see "Deploying Multi-Domain
Security Management" on page 21).
2. Using the SmartDomain Manager, create one or more Log Servers per Domain. Each must be on a
different Multi-Domain Server.
Remember to allow communication between the Multi-Domain Security Management network and the
Domain Security Gateways. Add appropriate rules permitting the Log Servers to communicate from the
Multi-Domain Security Management network with the Domain gateways, and install the Policy on the
applicable gateways.
3. Set up each applicable Security Gateway to the send its logs to the new Domain Log Server.
4. Synchronize the new Domain Log Server database with the Domain Management Server database:
Install Database (see "Synchronizing Domain Log Server and Domain Management Server" on page
99).
This must be done so that logs are properly processed.
5. Configure the Multi-Domain Server for log export (see "Configuring a Multi-Domain Server to Enable Log
Export" on page 100).
6. If you want to enable automatic log exporting, create a Log Export Profile (see "Configuring Log Export
Profiles" on page 100) and assign it to the Log Servers and Domain Management Servers (see
"Choosing Log Export Fields" on page 100).
If you experience difficulty, see Log Export Troubleshooting (on page 101).
Argument Description
DomainName Domain to which this Domain Log Server is assigned. The name
cannot include spaces or special characters (except for the
underscore character).
-t target ServerName Optional: Name of the Multi-Domain Server that the Domain
Management Server is assigned to. This argument is necessary only
if you assign the Domain Management Server to a remote
Multi-Domain Server.
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management
Server on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old version of this command (mdscmd addclm) is still supported.
Argument Description
DomainName Name of the Domain to which the Domain Management Server is
assigned. The name cannot include spaces or special characters
(except for the underscore character).
Argument Description
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management Server
on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old version of this command (mdscmd deleteclm) is still supported.
Using SmartReporter
SmartReporter can now produce both Log Based reports and Express reports for Security Gateways
managed by Domain Management Servers. Use SmartReporter to create selected reports for specified
Domains and Security Gateways. Reports can be scheduled at any time, and can be sent by email or
uploaded to an FTP site. SmartReporter must be properly configured to work with Multi-Domain Security
Management. See the "Getting Started" chapter of the R77 SmartReporter Administration Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24813).
Overview
The SmartDomain Manager supports monitoring and maintenance activities. It has a variety of
SmartDomain Manager views that can be used by administrators to confirm that the system is running
smoothly and that management activities are being successfully performed.
By default, management activities receive system confirmation within five minutes. Once confirmation has
been received, Administrators can use status indicators to determine if management activities were
performed successfully. The following status checks can be executed:
Components Status Check
If a status check reveals that management activities were not successful, you can use the SmartDomain
Manager views such as the Critical Notification window to yield further information for troubleshooting
purposes.
It is also possible to use the SmartView Console clients (such as SmartView Tracker and SmartView
Monitor) for monitoring, tracking and troubleshooting purposes.
Filtering
To focus on a specific group of objects that share a certain common denominator (such as their IP address
range, Domain name or the Multi-Domain Server they are installed on), filter any of the List pane's columns
by right-clicking the column heading and selecting Column Filter... from the displayed menu. Additionally:
• To view existing filters, select View > Filter Details.
• To clear all filters, select View > Clear All.
In the Network Objects mode List Pane you can right-click or double-click on a component and execute a
command. For example, you can start, stop, configure or update a selected component. Additionally you can
launch any of the SmartView Console clients and take advantage of their facilities. For example, if a Domain
Security Gateway is behaving sluggishly, launch SmartView Monitor and/or SmartView Tracker from the
said Security Gateway to check what activities are taking place at the Security Gateway so as to determine
the root of the sluggishness.
Status symbols in the List pane include:
Needs Attention Security Gateway At least one of the applications installed on this
Security Gateway is not running properly.
Unknown Security Gateway A status has been received from the server, but
the system does not recognize it.
Multi-Domain • Version
Server
• Operating System
• CPU
• Memory
• Disk
Needs Attention Security Gateway At least one of the applications installed on this Security
Gateway is not running properly.
Not Responding Security Gateway There is either no application installed on this Security
Gateway, or the application is installed, but cannot be
reached.
For each object, the name, status and time of status update is displayed.
Multi-Domain Server
Multi-Domain Servers are managed using their own special view, SmartDomain Manager General View -
Multi-Domain Server Contents mode, for administrator convenience. Only Multi-Domain Security
Management Superuser administrator can use the Multi-Domain Server Contents mode. Other
administrators can use the General > Network Objects view.
For a granular view of Multi-Domain Server activity, the Multi-Domain Security Management Superuser
administrator can launch in Audit mode. In SmartView Tracker you can see:
• the management activity logs generated by the administrator
• the time the log was generated
• the GUI Client source
• the administrator performing the actions, and changes to network objects.
The Multi-Domain Security Management Superuser administrator can also start, stop, add or delete a
Multi-Domain Server.
Global Policies
Domain network systems operate according to the behavior specified in their Security and Global Policy
rules. To see how Global Policies have been applied to Domains in the Multi-Domain Security Management
system, use the Global Policies View - Security Policies mode. This mode displays:
• the Global Policies in the system,
• the Domains and Domain Management Servers that are assigned to these policies,
• the time when the assignment took place,
• the last time that the global policy was modified,
• the status of the assignment operation (whether or not it was successful).
Domain Policies
Checking a Domain Management Server Policy
A Domain Management Server policy may or may not contain global rules, depending on whether a global
policy was assigned to the Domain. Use the Global Policies View - Security Policies mode to check:
• if a Domain Management Server has been assigned a global policy,
• which Global Policy was assigned,
• the time of the assignment,
• the time that the Global Policy was last changed,
• whether the assignment operation was successful.
You can also use the SmartDomain Manager General View - Network Objects mode to see which Domain
policy is assigned to a Domain Management Server.
High Availability
Multi-Domain Security Management implements High Availability on the following levels:
• The Security Gateway level.
• The Domain Management Server level - multiple Domain Management Servers are supported, as
well as an optional backup Security Management Server.
• The Multi-Domain Server level.
Domain Management Server and Multi-Domain Server High Availability are managed through the
SmartDomain Manager High Availability View. The administrator can do all management activities relating
to Multi-Domain Server High Availability through this view, and examine the status of these actions.
Multi-Domain Security Management Administration Guide R77 | 106
Monitoring
In the High Availability - Multi-Domain Server Contents mode, the following information is displayed:
• Multi-Domain Servers Active/Standby (login) status,
• Sync Status. This status displays synchronization statuses for Multi-Domain Servers and Domain
Management Servers. Synchronization can take time to update the status. These are the status
indicators:
• Unknown, no information has been received about this Domain Management Server
synchronization status.
• Never synced, this Domain Management Server has never been synchronized with the other
Domain Management Server.
• Synchronized, this Domain Management Server is synchronized with the other Domain
Management Server.
• Lagging, the data of this Domain Management Server is less updated than the data of the other
Domain Management Server.
• Advanced, the data of this Domain Management Server is more updated than the data of the other
Domain Management Server.
• Collision, the data of this Domain Management Server conflicts with the data of the other Domain
Management Server.
GUI Clients
To see which GUI Clients have been assigned for use, and to which Multi-Domain Servers or Domain
environments they are connected, use the GUI Clients View. In this view information is displayed by default
in a Domain per GUI Client hierarchy, in other words where you can see the GUI Clients and the Domains
assigned to each. You can manage these entities by right-clicking on the GUI Client and selecting to assign
Domains to it. This view can be toggled so that the hierarchy is reversed, in other words where you can see
GUI Clients per Domain. Similarly, by right-clicking on a Domain you can select to assign GUI Clients to it.
Using SmartConsole
Log Tracking
The Multi-Domain Security Management system uses either Domain Management Servers or Log Servers
to gather information about Domain Security Gateway activities. Domain Management Servers and Log
Servers can gather detailed log information from Security Gateways, UTM-1 Edge appliances, and many
OPSEC-certified security applications. This information can then be accessed using the SmartConsole
Clients.
Using Thresholds
SmartView Monitor can be used to configure predefined actions that are triggered when certain changes in
status occur. For instance, a rule can be defined to send an email to a certain address if the load on a
Security Gateway CPU surpasses a threshold that you set.
By default the engine responsible for triggering the events is disabled for Domain Management Servers, but
it can be enabled per Domain Management Server by running the following commands from the root shell of
the Multi-Domain Server machine:
1. Change to the Domain Management Server environment with the command mdsenv <Domain
Management Server Name>
2. cpstat_monitor &
After running this command, thresholds are monitored until the Domain Management Server is stopped.
To permanently enable this functionality for a specific Domain Management Server, you must modify the
value of the registry key that sets whether the cpstat_monitor process auto-starts whenever the Domain
Management Server is started. You can do so by running the following command from the Domain
Management Server environment:
cpprod_util CPPROD_SetValue mds RunCpstatMonitor 1 1 1
Note - To revert to the registry's original setting, enter the following on the Multi-Domain Server
in the Domain Management Server environment:
cpprod_util CPPROD_SetValue mds RunCpstatMonitor 1 0 1
SmartReporter Reports
The SmartReporter delivers a user-friendly solution for auditing traffic and generating detailed or
summarized reports in the format of your choice (list, vertical bar, pie chart etc.) for events logged by
Domain Management Server-managed Security Gateways that are running SmartView Monitor.
SmartReporter produces reports for these Security Gateways.
See the R77 SmartReporter Administration Guide
(http://supportcontent.checkpoint.com/documentation_download?ID=24813).
Package Description
CPCON62CMP-R77 Check Point Connectra CM Compatibility Package
On Linux and SecurePlatform, package names contain the suffix "-00". For example, the full name of
CPsuite-75.20 package for these platforms is CPsuite-R77-00.
All of these packages have pre-defined dependencies between them. Under no circumstances should these
packages be manually removed.
Subdirectory Description
CPInstLog Contains installation and upgrade log files.
Subdirectory Description
CPshared Exists for compatibility with previous versions.
Subdirectory Description
CPsuite-R77 Contains configuration, state and log files for Check Point Security
Gateway management.
CPshrd-R77 Contains the configuration of Check Point SVN Foundation, a well as the
registry files.
CPshrd-R77 Contains the configuration for the SVN Foundation for the Domain owning
this Domain Management Server, as well as links to shared binaries and
library files.
CPEdgecmp Contains configuration files of the CPEdgecmp package for the Domain
owning this Domain Management Server, as well as links to shared
binaries and library files.
CPngcmp-R77 Contains configuration files of the CPngcmp-R77 package for the Domain
owning this Domain Management Server, as well as links to shared
binaries and library files.
Processes
Environment Variables
Different Multi-Domain Server processes require standard environment variables to be defined. The
variables have the following functionality, they:
• Point to the installation directories of different components.
• Contain management IP addresses.
• Hold data important for correct initialization and operation of the processes.
Additionally, specific environment variables control certain parameters of different functions of Multi-Domain
Server.
Multi-Domain Server installation contains shell scripts for C-Shell and for Bourne Shell, which define the
necessary environment variables:
• The C-Shell version is /opt/CPshrd-R77/tmp/.CPprofile.csh
• The Bourne Shell version is /opt/CPshrd-R77/tmp/.CPprofile.sh
Sourcing these files (or in other words, using "source" command in C-Shell or "." command in Bourne
Shell) will define the environment necessary for the Multi-Domain Server processes to run.
Additional environment variables controlling such mechanism as statuses collection mechanism (like
MSP_SPACING_REG_CMAS_FOR_STATUSES) or connection retries (like MSP_RETRY_INTERVAL) are
described later in this chapter.
cpca The Certificate Authority manager process. This process doesn't run on
a Multi-Domain Log Server or Multi-Domain Server.
For proper operation of the Multi-Domain Server all four processes must be running, unless dealing with
configurations where cpca shouldn't be running.
cpca The Certificate Authority manager process. This process doesn't run on log servers
and Multi-Domain Servers.
status_proxy Status collection of SmartLSM Security Gateways. This process runs only on Domain
Management Servers that are activated for Large Scale Management.
sms Manages communication (status collection, logs collection, policy update, configuration
update) with UTM-1 Edge Security Gateways. This process runs only on Domain
Management Servers that manage UTM-1 Edge devices.
For proper operation of the Domain Management Server, at least cpd, cpca, fwd and fwm must be
running, unless dealing with configurations where cpca shouldn't be running. Other processes are required
only for Domain Management Servers using specific functionality for which these processes are responsible.
By default this task attempts to reconnect the Multi-Domain Server to no more than five Domain
Management Servers per iteration. So, a system with 50 Domain Management Servers requires 10 iteration
(of 90 seconds each, by default), so connecting to all the Domain Management Servers could take up to 15
minutes.
To change the maximum number of Domain Management Servers to which the Multi-Domain Server can
connect per cycle, set the MSP_RETRY_INIT_INTERVAL variable to the desired value.
Note - Raising this value makes the Multi-Domain Server connect to all Domain Management
Servers faster during startup, but may overload if it is set too low.
Status Collection
Status collection begins when a SmartDomain Manager connects to a Multi-Domain Server. The
Multi-Domain Server sends all Domain Management Servers a request to start collecting statuses. The
Multi-Domain Server contacts the Domain Management Servers one by one, spacing these requests by one
second, thus preventing the Multi-Domain Server load from peaking when multiple statuses arrive. You can
change this default spacing and set the required spacing in milliseconds, with the environment variable
MSP_SPACING_REG_CMAS_FOR_STATUSES.
Migrate the Global Policies migrate_global_p Run this script without any parameters to see its
Database olicies script usage. The files required before executing this script
are specified in the script's usage. The specified files
should be copied manually to the destination
Multi-Domain Server.
Export a Domain migrate export This script exports the comprehensive database files
Management Server, script into one .tgz file on the source machine that can be
Security Management, or imported to a different Multi-Domain Server.
Global Policy database
from one computer to
another.
Migrate the Domain Import Domain Management Server command from the SmartDomain
Management Server into Manager
the destination
cma_migrate script
environment.
mdscmd migratemanagement utility
Searching
You can access Cross-Domain Management Server search from the General - Domain Contents or from
the General - Network Objects view of the SmartDomain Manager.
To open the Cross-Domain Management Server search window, select Cross-Domain Management
Server Search from the Manage menu, or click the Cross-Domain Management Server Search icon.
Select a query, what you want to search for, and the Domain or Domains to search in. The following queries
are available:
Specified Object query:
• Find network objects by exact name - finds objects defined in the Domain Management Server
database, where the object's name exactly matches the query entry.
• Find network objects by partial name - finds objects defined in the Domain Management
Server database, where the object's name contains the query entry.
• Find network objects by IP address - finds objects defined in the Domain Management Server
database, where the object's IP address matches the query entry.
Results for object queries include object and Domain information.
• Find Policy rules that use a global object - the query entry is a global object name. The query
finds rules in the Domain Management Server Policies, where the global object is part of the rule
definition. This includes cases where the global object is not explicit in the rule definition, but is
included in some object (such as a group or cluster) that appears in the rule.
Results include Domain, Policy and rule information, and the specific rule column where the global
object appears. The first Results column, Object Name, indicates the applicable object as defined in the
rule. This object may be one that includes, but is not identical to, the query entry.
• Find Policy rules that use a global object explicitly - this query is the same as the previous
query, except that the results are limited to rules where the global object is explicit. Rules where
the global object is merely included in some object (such as a group or cluster) that appears in the
rule are excluded.
Results include Domain, Policy and rule information, and the specific rule column where the global
object appears. Two additional Results columns are:
Last in Cell? - Shows whether the object is the sole object in its rule column, so that removing it would
cause the cell content to become Any.
Is Removable? - Show whether you can delete an object.
• Find network objects that use a global object explicitly- the query entry is the name of a
global object. The query finds network objects (such as groups or clusters), defined in the Domain
Management Server database, that contain the global object explicitly.
Results include object and Domain information.
The Object Name Results column indicates the applicable object as defined in the rule. This object may
be one that includes, but is not identical to, the query entry.
Is Removable? - Shows if you can delete the object.
Parameter Description
-f <filename> Searches in Domains listed in file <filename>.
-list <list> Searches in Domains in <list>. <list> should be Domain names separated by
commas (e.g. domain1, domain2).
Parameter Description
-n Specifies that <entry> is the full object name. Available for all values of <query
type>.
Example
To search Domain Management Servers for all Domains for objects containing 'my_gw' in their names:
mdscmd runcrossdomainquery -all query_network_obj -n my_gw
P1Shell
Overview
P1Shell is a command line shell that allows administrators to run Multi-Domain Security Management CLI
commands on the Multi-Domain Server, in both Multi-Domain Server and Domain Management Server
environments, without root permissions. P1Shell authorizes users who are recognized by the Multi-Domain
Server as Multi-Domain Security Management Superusers or Domain Superusers. Lower level Multi-Domain
Security Management administrators must use the SmartDomain Manager (unless they have root
permissions).
P1Shell can be defined as the default login shell for Multi-Domain Security Management users, or it can be
manually started in the CLI.
Multi-Domain Security Management authentication is provided by the Multi-Domain Server, which must be
running for an administrator to be authorized for P1Shell. To make sure non-authorized users cannot start
Multi-Domain Server processes, a password is required for mdsstart. You can set the password in
mdsconfig, and give it only to Multi-Domain Security Management administrators.
P1Shell maintains a connection with the Multi-Domain Server. P1Shell may be disconnected from the
Multi-Domain Server by a SmartDomain Manager user (from the Connected Administrators view of the
SmartDomain Manager), but as soon as P1Shell processes a command, P1Shell will reconnect to the
Multi-Domain Server. The P1Shell user will be notified neither of the disconnecting nor of reconnecting. The
SmartDomain Manager Connected Administrators view will display the reconnected P1Shell user only when
the view is refreshed.
Note - P1Shell settings and commands are defined in configuration files that should not be
changed. Any change to P1Shell configuration files will block P1Shell. If that happens, restore
the files to their original versions to enable access to P1Shell.
Starting P1Shell
To work in P1Shell, it must first be enabled. To enable P1Shell, run:
mdsconfig
and select P1Shell.
To start P1Shell, if it is not your default login shell, run:
p1shell
If the Multi-Domain Server is not running, you will be prompted for the Start-Multi-Domain Server password
to authorize starting the Multi-Domain Server. Then, you will be prompted to enter your Multi-Domain
Security Management user name and password to authorize you for P1Shell.
Note - The mds_backup command is an exception to this rule. The output of the backup is
created at the path: /var/opt/<SeverName>_backups/<timestamp>, where <timestamp> is
the time that the backup started.
Upon starting, P1Shell defines both input and output directories as the user's home directory. They can be
changed for the work session, only within the home directory. Change the directories with the following
commands:
set_inputdir <path>
set_outputdir <path>
where <path> is an existing directory, defined relative to the user's home directory.
To view existing input and output directories, enter:
display_io_dirs
Filenames appearing in commands cannot be paths (/ will be considered an illegal character) and must be
located in the defined input or output directory.
Note - For security reasons, the output directory cannot be soft linked.
cpinfo All
cprlic All
cpstat All
cpstat_monitor All
cpvinfo All
cpwd_admin list
dbedit All
enable_mds_deletio Limited
n
fetch; log;
fw
fetchlogs; For Multi-Domain Security Management
|monitor; Superuser: All
stat; tab; for Domain Superuser: logswitch; debug
mergefiles fwd; debug fwm
dbimport;
fwm
logexport For Multi-Domain Security Management
Superuser: All
for Domain Superuser: load; dbload;
ver; unload; logexport; mds
recalc_lics; mds fwmconnect
rebuild_global_communities_status
cpinstall;
LSMcli
snapshot; All
delete;
revert
mdsenv All
mdsquerydb All
mdsstart_customer All
mdsstat All
mdsstop_customer All
promote_util All
sam_alert All
Audit Logging
P1Shell logs audits in two different ways.
P1Shell saves all audits to a text file:
$MDS_SYSTEM/p1shell/log/p1shell_cmd_audit.log
In addition, P1Shell sends audits to the Multi-Domain Server to be logged. These audits can be viewed in
SmartView Tracker. If the Multi-Domain Server is not running at the time as the audited event, and the
Multi-Domain Server later starts during the same P1Shell session, the audit is then sent to the Multi-Domain
Server. If the Multi-Domain Server is down from the time of the event until the end of the P1Shell session,
the Multi-Domain Server does not receive the audit.
Argument Description
source database directory path The root of the original source database directory; the FWDIR
directory, or a copy of it.
target Domain Management Server The directory of the Domain Management Server that you are
FWDIR directory migrating to.
The target Domain Management Server cannot ever have been
started before running cma_migrate. There is no need to stop
the Multi-Domain Server before running cma_migrate
cpmiquerybin
Description cpmiquerybin utility is the binary core of the Database Query Tool.
(For the Database Query Tool, see mdsquerydb (on page 139).)
This command-line CPMI client connects to the specified database, executes a query and displays results
as either a collection of FW-1 Sets or tab-delimited list of requested fields from each retrieved object. The
target database of the query tool depends on the environment settings of the shell being used by the user.
Whenever the user desires to access one of Multi-Domain Server databases, he/she should execute the
mdsenv command, in order to define the environment variables necessary for database connection. In order
to connect to a database of a certain Domain Management Server, the user should execute mdsenv
command providing Domain Management Server name or IP address as a first parameter. (See also
mdsenv (on page 138).)
Note - A MISSING_ATTR string is displayed when the user specifies an attribute name that does
not exist in one of the objects in query result. The MISSING_ATTR string indicates that that
attribute is missing.
Exit Code
0 when query succeeds, 1 if query fails, or query syntax is bad.
Usage cpmiquerybin <query_result_type> <database> <table> <query> [-a
<attributes_list>]
Argument Description
query_result_type Requested format of the query result. Possible values:
• attr – display values of specified (with –a parameter) field of
each retrieved object
• object – display FW-1 sets containing data of each retrieved
object.
database Name of the database to connect to, in quotes. For instance, "mdsdb" or
"".
query Empty query ("") or a query specifying objects range for retrieval, for
instance name='a*'.
dbedit
Description This utility can be used in Multi-Domain Security Management configuration with the
mdsenv command. Particular commands for accessing the Multi-Domain Server and Domain Management
Server environment are included here.
Usage dbedit –mds
dbedit –s <SeverIP> –d mdsdb -u <Admin> -p <password>
dbedit –s <Domain Management Server_IP> -u <Domain Management Server_Admin> -p
<password>
Argument Description
–mds Access without user name and password. Use this command only for
Domain Management Server or Multi-Domain Server configuration on the
computer on which you run this command.
Examples:
To edit the database that resides on the Multi-Domain Server Global database, use the
following commands:
mdsenv
dbedit -mds
To edit the database that resides on the Multi-Domain Server MDSDB database, use the
following commands:
mdsenv
dbedit –mds –d mdsdb
To edit the Domain Management Server database, use the following command:
mdsenv Domain Management Server_Flower
dbedit 10.10.10.10 -mds
where 10.10.10.10 is the Domain Management Server IP.
To use dbedit on a remote Multi-Domain Server/Domain Management Server, the computer that you are
running the dbedit on must be defined as an authorized GUI Client. The user must be a Multi-Domain
Security Management administrator and provide a user name and password:
dbedit –s 10.10.10.10 -u CANDACE -p ****
where 10.10.10.10 is the Multi-Domain Server or Domain Management Server IP, and **** is a password.
To edit the remote Multi-Domain Server MDSDB database:
dbedit –s 10.10.9.1 –d mdsdb -u ROGER -p ****
where 10.10.9.1 is the Multi-Domain Server IP, ROGER is an administrator and **** is a password.
To edit the remote Domain Management Server database:
dbedit –s 10.10.19.1 -u SAMANTHA -p ****
where 10.10.19.1 is the Domain Management Server IP, SAMANTHA is an administrator and **** is a
password.
mds_backup
The mds_backup command backs up binaries and data from your Multi-Domain Server to the working
directory. This command requires Superuser privileges.
mds_backup executes the gtar command on product root directories containing data and binaries, and
backs up all files except those specified in mds_exclude.dat ($MDSDIR/conf) file. The collected
information is stored in a single .tgz file. This .tgz file name consists of the backup date and time, which is
saved in the current working directory. For example: 13Sep2002-141437.mdsbk.tgz
To perform a backup:
1. Execute mds_backup from any location outside the product directory tree to be backed up. This
becomes the working directory.
2. Upon completion of the backup process, copy the backup .tgz file, together with the mds_restore,
gtar and gzip command files, to your external backup location.
Usage mds_backup [-g -L {all|best} -b {-d <target dir name>} -v -l -h]
mds_backup [-g -b {-d <target dir name>} -v -h]
Syntax
Argument Description
-g Executes without prompting to disconnect GUI clients.
Argument Description
-d Specifies a directory store for the backup file. When not specified, the backup file is stored
in the current directory. You cannot store the backup file in any location inside the product
root directory tree.
-v "Dry run" - Show all files to be backed up, but does not perform the backup operation.
-L Lock databases on the computer being backed up so that SmartDashboard cannot connect
in the Read/Write mode. You must use one of these argument options:
all - If a lock attempt fails on a database (global or local), the backup stops.
best - If a lock attempt fails on a database, the command continues to back up the
database, but does no lock it.
Note: The lock databases option has no effect on SmartDomain Manager clients because
they can only connect in the Read/Write mode.
Comments When using the -g or -b options, make sure that no GUI clients or SmartReporter servers
are connected. Otherwise, the backup file may contain inconsistencies due to database changes made
during the backup process.
It is important not to run mds_backup from any of the directories that will be backed up. For example, when
backing up a Multi-Domain Server, do not run mds_backup from /opt/CPmds-<current releaese>
because it is a circular reference (backing up directory that you need to write into).
Active log files are not backed up, in order to avoid read-during-write inconsistencies. It is recommended to
perform a log switch prior to the backup procedure.
Further Info. The Multi-Domain Server configuration can be backed up without backing up the log files.
Such a backup will usually be significantly smaller in size than a full backup with logs. To back up without
log files, add the following line to the file $MDSDIR/conf/mds_exclude.dat:
log/*
mds_restore
Description Restores a Multi-Domain Server that was previously backed up with mds_backup. For
correct operation, mds_restore should be restored onto a clean Multi-Domain Server installation.
Note - The mds_restore command must use the script that was created in the directory into
which the backup file was created.
Important - In Gaia, you have to run this command in expert mode and in the same directory as
the backup file itself.
mds_user_expdate
Description - Changes multiple administrator expiration dates in one operation. You can do this for
administrators on all Domain Management Servers or for users on one or more specified Domain
Management Server.
Usage - mds_user_expdate
Important
• Disconnect all GUI clients before running the mds_user_expdate command.
If you do not do this, the SmartDomain Manager will overwrite changes done by the command.
• You can use the mds_user_expdate command only on an Active Multi-Domain Server in a
High Availability deployment. You must synchronize your servers and install policies on your Security
Gateways after using this command.
• We recommend that you backup your Multi-Domain Servers before using the mds_user_expdate
command.
mdscmd
Description This command is used to execute different commands on the Multi-Domain Server system.
It connects to a Multi-Domain Server as a CPMI client and causes it to execute one of the specified
commands described below.
Connection parameters [-m serverName -u user -p password] are required to log into a remote
Multi-Domain Server. If these arguments are omitted, mdscmd connects to the local machine. The command
is a CPMI client and has an audit log.
Usage mdscmd <sub command and sub command parameters> [-m <serverName> -u user -p
password]
mdscmd help
Argument Description
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management
Server on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
mdscmd adddomain
Description
Use the mdscmd adddomain command to create a Domain, locally or remotely. If run remotely, add login
details. You can also create the first Domain Management Server with this command.
Syntax
mdscmd adddomain <DomainName> <-n Name | -i IPv4 | -a IPv6> [-t target
<ServerName>][-m <ServerName> -u user -p password]
Argument Description
DomainName Name of the Domain to which the Domain Management Server is assigned.
The name cannot include spaces or special characters (except for the
underscore character).
Argument Description
-a IPv6 Domain Management Server IPv6 address.
If you do not use the -a argument, the system automatically assigns an address
from a predefined pool of available addresses.
-t target Optional: Name of the Multi-Domain Server that the Domain Management
ServerName Server is assigned to. This argument is necessary only if you assign the
Domain Management Server to a remote Multi-Domain Server.
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must use this
argument when you work with a Domain Management Server on a remote
Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p Credentials of the Superuser for the remote Multi-Domain Server. These
password arguments are necessary to log in to the remote Multi-Domain Server. Make
sure that you do not show the password during remote login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old form of this command (mdscmd addcustomer) is still supported in this
release.
mdscmd addmanagement
Description
This command creates a new Domain Management Server. You must first create at least one Domain
before you can use this command. We recommend that you close SmartDomain Manager before running
this command.
Syntax
mdscmd addmanagement <DomainName> [-n <Name> | -i <IPv4> | -a <IPv6>] [-t target
<ServerName>] [-m <ServerName> -u user -p password]
Argument Description
DomainName Name of the Domain to which the Domain Management Server is
assigned.
Argument Description
-a IPv6 Domain Management Server IPv6 address.
If you do not use the -a argument, the system automatically assigns
an address from a predefined pool of available addresses.
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management
Server on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
Note - The old form of this command (mdscmd addcma) is still supported.
mdscmd addlogserver
Description
Use the addlogserver command to add a Domain Log Server to an existing Domain. To add a Domain
Log Server to a Domain, you must define at least one Domain Management Server.
Syntax
mdscmd addlogserver <DomainName> [-n Name | -i IPv4 | -a IPv6] [-t target
<ServerName>] [-m <ServerName> -u user -p password]
Argument Description
DomainName Domain to which this Domain Log Server is assigned. The name
cannot include spaces or special characters (except for the
underscore character).
-t target ServerName Optional: Name of the Multi-Domain Server that the Domain
Management Server is assigned to. This argument is necessary only
if you assign the Domain Management Server to a remote
Multi-Domain Server.
Argument Description
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management
Server on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old version of this command (mdscmd addclm) is still supported.
mdscmd assignadmin
Description Assigns an administrator to a Domain using the specified permissions profile.
mdscmd assignadmin <administrator name> <administrator profile>
Syntax <domain name>
Parameters Parameter Description
administrator name
Administrator name
administrator
profile Administrator permissions profile
domain name
Name of the Domain to which the administrator is assigned.
Example:
mdscmd assignadmin Reuven Default_Profile NewYorkBranch
mdscmd assignguiclient
Description -
Assigns a GUI client to the specified domain
Syntax
dscmd assignguiclient <domain name> <gui client>
Parameter Description
domain name
Domain name
gui client
Name of a Multi-Domain Security Management gui client used by the specified
Domain
Example
mdscmd assignguiclient NewYorkBranch Telco_Admins
mdscmd deletedomain
Description
Use this command to delete an existing Domain. When deleting a Domain, you also delete the Domain
Management Servers.
Usage
mdscmd deletedomain <DomainName> -m <ServerName> -u <user> -p <password>
Argument Description
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management
Server on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
Note - The old version of this command (mdscmd deletecustomer) is still supported.
mdscmd deletelogserver
Description
Use this command to delete an existing Domain Log Server.
Syntax
mdscmd deletelogserver <DomainName> <-n Name | -i IPv4 | -a IPv6 > -m <ServerName>
-u user name -p password
Argument Description
DomainName Name of the Domain to which the Domain Management Server is
assigned. The name cannot include spaces or special characters
(except for the underscore character).
Argument Description
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management Server
on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old version of this command (mdscmd deleteclm) is still supported.
mdscmd enableglobaluse
Description Use this command to connect a Domain Security Gateway to a Global VPN Community.
Executing this command with a Domain name and a Security Gateway name, creates a global Security
Gateway object and a VPN Domain object for the specific Domain Security Gateway in the Global database.
[-g global name] is used to determine the global Security Gateway object name. If [-g global name]
is omitted, the global name will be gGW1_of_CUST1 for the Security Gateway GW1 and Domain CUST1.
The VPN domain object will receive the same name as the global Security Gateway object with a
'_Domain' extension.
Usage mdscmd enableglobaluse <DomainName> <gatewayName> [-g <globalName>] [-m
<ServerName> -u user -p password]
Syntax
Argument Description
DomainName Domain to which the Domain Management Server belongs.
-g globalName The global Security Gateway object name. If omitted, the global
name will be gGW1_of_CUST1 for the Security Gateway GW1 and
Domain CUST1
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
mdscmd disableglobaluse
Description Use this command to remove a Domain global Security Gateway object and VPN Domain
object from the global database.
Usage mdscmd disableglobaluse <DomainName> <gatewayName> [-m <ServerName> -u user
-p password]
Syntax
Argument Description
DomainName Specifies the name of the Domain to which the Domain Management
Server belongs.
-u user and -p password Used as a pair, they must specify a valid Superuser administrator
and password for remote login. In addition, the computer on which
the command is executed must be a valid Multi-Domain Server GUI
Client. Beware not to expose your administrator password during
remote login.
mdscmd removeadmin
Description Remove an administrator from the specified domain.
mdscmd removeguiclient
Description Remove a GUI client from the specified domain
mdscmd startmanagement
Description
Use this command to start an existing Domain Management Server.
Syntax
mdscmd startmanagement <DomainName> <-n name | -i IPv4 | -a IPv6 > -m <ServerName>
-u user name -p password
Argument Description
DomainName Name of the Domain to which the Domain Management Server is
assigned. The name cannot include spaces or special characters
(except for the underscore character).
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management Server
on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old version of this command (mdscmd startcma) is still supported.
mdscmd stopmanagement
Description
Use this command to stop a running Domain Management Server.
Syntax
mdscmd stopmanagement <DomainName> [-n <Name> | -i <IPv4> | -a <IPv6>] -m
<ServerName> -u user name -p password
Argument Description
DomainName Name of the Domain to which the Domain Management Server is
assigned. The name cannot include spaces or special characters
(except for the underscore character).
-m ServerName Remote Multi-Domain Server host name or IPv4 address. You must
use this argument when you work with a Domain Management Server
on a remote Multi-Domain Server.
The remote Multi-Domain Server must be defined as a GUI client.
-u user and -p password Credentials of the Superuser for the remote Multi-Domain Server.
These arguments are necessary to log in to the remote Multi-Domain
Server. Make sure that you do not show the password during remote
login.
You must use at least one these arguments to identify the Domain Management Server:
• -n DomainName
• -i IPv4
• -a IPv6
When you create a new object, you can use one or more of these arguments to manually define the name or
IP address.
You must configure ranges of IPv4 and IPv6 addresses on your Multi-Domain Server for automatic address
assignment to work. If no ranges are defined or there are no available IP addresses available, the command
will fail.
The -t, -m and -u arguments are necessary only when you assign a Domain Management Server to a
different, remote Multi-Domain Server (not the one on which you run the mdscmd command).
Note - The old version of this command (mdscmd stopcma) is still supported.
mdscmd migratemanagement
Description
Use this command to migrate/import an existing source database (from a Security Management Server or
Domain Management Server) into another Domain Management Server.
You can use mdscmd migratemanagement to import files created using the export_database tool.
Usage
mdscmd migratemanagement <DomainName> <-l path> <-n name>
Argument Description
DomainName Domain to which the new Domain Management Server belongs.
-n name New Domain Management Server into which the source database
information is migrated.
-l path Path containing the conf directory migrated into the new Domain
Management Server.
Example
Migrate a source database from an NGX R65 version Domain Management Server, named MyFirstDMS,
into the Domain Management Server BestDomain, defined for the Domain BestDomain:
mdscmd migratemanagement BestDomain -l/opt/CPmds-R65/Domains/
MyFirstDMS/CPfw1-R65 -n BestDomain
See also cma_migrate (on page 125).
Note - The old version of this command (mdscmd mirrrorcma) is still supported.
mdscmd mirrormanagement
Description
Use this command to mirror the Domain Management Server configuration from one Multi-Domain Server to
another Multi-Domain Server. This command is used to create Domain Management Server High
Availability. This command parses all Domains and checks which Domains have a single Domain
Management Server defined. If a Domain has a Domain Management Server on the source Multi-Domain
Server, a secondary Domain Management Server is created on the target Multi-Domain Server.
Syntax
mdscmd mirrormanagement -s source_mds -t target_mds [-m ServerName -u user -p
password]
Argument Description
-s source_mds Multi-Domain Server the mirroring is performed from.
-u user and -p password Used as a pair, they must specify a valid Superuser administrator and
password for remote login. In addition, the computer on which the
command is executed must be a valid Multi-Domain Server GUI Client.
Beware not to expose your administrator password during remote login.
Note - The old version of this command (mdscmd mirrorcma) is still supported.
mdsenv
Description This command prepares the shell environment variables for running Multi-Domain Server
level command lines or specific Domain Management Server command lines. Without an argument, the
command sets the shell for Multi-Domain Server level commands (mdsstart, mdsstop, and so on).
Argument Description
Name Domain Management Server name. If given, the command prepares the
shell for the Domain Management Server command line.
mdsquerydb
Description The mdsquerydb command runs the Database Query Tool. The purpose of the Database
Query Tool is to allow advanced users to create UNIX shell scripts which can easily access information
stored inside the Check Point Security Management Server databases. These include the Global Database
(which are usually accessed from the Global SmartDashboard), Multi-Domain Server Database (usually
accessed from the SmartDomain Manager) and the Domain Management Server databases (usually
accessed from SmartDashboard).
Just as the mdscmd tool allows users to write UNIX shell scripts that add, remove or alter specified
Multi-Domain Security Management database objects, the Database Query Tool allows users to access the
information related to these database objects. The command is used with specific arguments to perform
various queries on Security Management Server databases.
Usage mdsquerydb key_name [-f output_file_name]
Argument Description
key_name Query key, which must be defined in the pre-defined queries configuration
file.
-f output_file_nam Write query results to file with the specified file name, instead of to the
standard output.
mdsstart
Description This command starts the Multi-Domain Server and all Domain Management Servers. You
can reduce the time it takes to start and stop the Multi-Domain Server if you have many Domain
Management Servers. To do so, set the variable NUM_EXEC_SIMUL to the number of Domain Management
Servers to be launched or stopped simultaneously. When this variable is not defined, the system attempts to
start or stop up to 10 Domain Management Servers simultaneously.
Argument Description
-m Starts only the Multi-Domain Server and not the Domain Management
Servers.
mdsstat
Description This command utility gives detailed information on the status of the processes of the
Multi-Domain Server and Domain Management Servers, the up/down status per process.
Usage mdsstat [-h] [-m] [<Name>]
Argument Description
-h Displays help message.
Name The name of the Domain Management Server whose status is tested.
Status:
up: The process is up.
down: The process is down.
pnd: The process is pending initialization.
init: The process is initializing.
N/A: The process's PID is not yet available.
N/R: The process is not relevant for this Multi-Domain Server.
mdsstop
Description This command stops the Multi-Domain Server and all the Domain Management Servers.
You can reduce the time it takes to start and stop the Multi-Domain Server if you have many Domain
Management Servers. To do so, set the variable NUM_EXEC_SIMUL to the number of Domain Management
Servers to be launched or stopped simultaneously. When this variable is not defined, the system attempts to
start or stop up to 10 Domain Management Servers simultaneously.
Usage mdsstop [-m]
Argument Description
-m Stop the Multi-Domain Server without stopping Domain Management
Servers.
merge_plug-in_tables
Description The merge_plug-in_tables utility is included in the export_database utility. It
searches for all Domain Management Server or Version and Blade Updates and merges the plug-in tables
with the Domain Management Server or Security Management tables.
In Linux and, the merge_plug-in_tables tool runs automatically when you run the export_database tool
and its output becomes part of the Domain Management Server database .tgz file.
If you have a Security Management running on FreeBSD, IPSO 6.x, or Windows, use
merge_plug-in_tables to consolidate plug-in data before migrating.
migrate_global_policies
Description This utility transfers (and upgrades, if necessary) the global policies database from one
Multi-Domain Server to the global policies database of another Multi-Domain Server.
migrate_global_policies replaces all existing Global Policies and Global Objects. Each of the existing
Global Policies is saved with a *.pre_migrate extension.
If you only migrate the global policies (without the Domain Management Servers) to a new Multi-Domain
Server, you should disable any Security Gateways that are enabled for global use.
You can migrate global policies from these Multi-Domain Security Management versions:
• R71.30 and later minor releases
• R75.x
• R76.x
• R77.x
You can use migrate_global_policies to import files created using the export_database tool.
Usage migrate_global_policies <path>
Argument Description
path The fully qualified path to the directory where the global policies files,
originally exported from the source Multi-Domain Server
($MDSDIR/conf), are located.
Configuration Procedures
Description There is one primary command to configure the thresholds in the command line,
threshold_config. You must be in expert mode to run it. After you run threshold_config, follow the
on-screen instructions to make selections and configure the global settings and each threshold.
Usage threshold_config
When you run threshold_config, you get these options:
• Show policy name - Shows you the name configured for the threshold policy.
• Set policy name - Lets you set a name for the threshold policy.
• Save policy- Lets you save the policy.
• Save policy to file - Lets you export the policy to a file.
• Load policy from file - Lets you import a threshold policy from a file.
• Configure global alert settings - Lets you configure global settings for how frequently alerts are
sent and how many alerts are sent.
• Configure alert destinations - Lets you configure a location or locations where the SNMP alerts
are sent.
• View thresholds overview - Shows a list of all thresholds that you can set including: The
category of the threshold, if it is active or disabled, the threshold point (if relevant), and a short
description of what it monitors.
• Configure thresholds - Open the list of threshold categories to let you select thresholds to
configure.
update network_objects Saves the changes for the net-internal objects and
net-internal updates the Security Management Server database
with SmartDashboard, there can be problems in the database. The -globallock option does not let
SmartDashboard or a dbedit user make changes to the database.
When the -globallock option is enabled, dbedit commands run on a copy of the database. After you
change the database and run the savedb command, it is saved and committed on the actual database. You
can use the savedb command multiple times in a dbedit script.
At the end of a script, it is good practice to run these commands:
update_all
savedb
Note - Make sure that the script in the text files does not contain blank lines. Otherwise the script
will stop with an error.
Initial Configuration
1. Create a text file with an automation script ("Create or Modify Policy Objects (Hosts, Networks)" on page
146). The script can create and configure the necessary objects and rules for the Security Policy.
2. Make a database revision of the management. Use this revision if there is a problem with the script and
to identify unauthorized changes to the database.
3. Run fwm load and install the policy on one or more Security Gateways ("Pushing the Security Policy to
Security Gateways" on page 152).
mdsenv Cust_CMA
send_command –s Cust_CMA –u admin –p adminpw –o db_change_since_last_save
dbedit –globallock -s Cust_CMA -u admin -p adminpw -f
dbedit_modifypolicy_objects.txt
fwm load Standard examplegw
Networks
You can use a script to manage database objects that include:
• Networks
• Hosts
• Address Ranges
These are sample scripts that show how to create and configure the database objects.
Creating a Network
Create an object for the database that represents a network. This sample script creates the network
net-internal with the IP address 190.0.2.0.
# Create the object (of type network)
create network net-internal
# Configure the network IP address
modify network_objects net-internal ipaddr 192.0.2.0
# Configure the netmask (in dotted decimal notation) of the network
modify network_objects net-internal netmask 255.255.255.0
# Add a comment to describe what the object is for (optional)
modify network_objects net-internal comments "Created by fwadmin with dbedit"
Creating a Host
This sample script creates the host host-10 with the IP address 192.0.2.10.
# Create the actual object (of type host_plain)
create host_plain host-10
# Modify the host IP address
modify network_objects host-10 ipaddr 192.0.2.10
# Add a comment to describe what the object is for (optional)
modify network_objects host-10 comments "Created by fwadmin with dbedit"
You can also add the lines to this script to configure Automatic NAT for the host ("Configuring Automatic
NAT" on page 146). The modify commands for this sample rule starts with: modify network_objects
host-10
Network Groups
You can create and use a group object as a container for network and host objects.
Services
Services are objects that are used for network protocols.
Creating a Service
This sample script creates these services:
• tcp_8081 - TCP protocol port 8081
• udp_8082 - UDP protocol port 8082
• inspect_svc - Inspect SVC protocol 6 and with an optional feature that uses the INSPECT
expression
# Create a TCP service
create tcp_service tcp_8081
# Set port 8081 for TCP service
modify services tcp_8081 port 8081
# Create a UDP service
create udp_service udp_8082
# Set port 8082 for UDP service
modify services udp_8082 port 8082
# Create a service of type "other." This can be used for random IP protocols
# as well as services that require more complex INSPECT code for matching.
#
# Create the service of type other
create other_service inspect_svc
# Modify the IP Protocol that matches the service
modify services inspect_svc protocol 6
# (Optional) Modify the INSPECT expression that matches this service.
modify services inspect_svc exp "dport=123”
Service Groups
You can create and use a group object as a container for service objects.
This sample script creates the object mysvc-group for the services SSH and HTTPS.
# Create a group object
create service_group mysvc-group
# Add the individual elements to the group
addelement services mysvc-group '' services:ssh
addelement services mysvc-group '' services:https
Note - Rules in SmartDashboard start with rule number 1. Rules in dbedit start with rule number 0.
This sample script adds this rule to the end of the Rule Base:
Changing a Rule
This sample script changes this rule:
#
# Modify Rule 4
# Previous rule was any any any accept, it will now be any dmz ssh accept
#
modify fw_policies ##Standard rule:3:comments "Allow SSH to firewall with logging"
modify fw_policies ##Standard rule:3:disabled false
rmbyindex fw_policies ##Standard rule:3:track 0
addelement fw_policies ##Standard rule:3:track tracks:Log
rmbyindex fw_policies ##Standard rule:3:action 0
addelement fw_policies ##Standard rule:3:action accept_action:accept
rmelement fw_policies ##Standard rule:3:src:'' globals:Any
addelement fw_policies ##Standard rule:3:src:'' globals:Any
modify fw_policies ##Standard rule:3:src:op ''
rmelement fw_policies ##Standard rule:3:dst:'' globals:Any
addelement fw_policies ##Standard rule:3:dst:'' network_objects:DMZ
modify fw_policies ##Standard rule:3:dst:op ''
rmelement fw_policies ##Standard rule:3:services:'' globals:Any
addelement fw_policies ##Standard rule:3:services:'' services:ssh
modify fw_policies ##Standard rule:3:services:op ''
Note - Rules in SmartDashboard start with rule number 1. Rules in dbedit start with rule number 0.
#
# Delete rule 2 and 3 (delete in reverse order)
#
rmbyindex fw_policies ##Standard rule 2
rmbyindex fw_policies ##Standard rule 1
#
# Add new rule 2
#
addelement fw_policies ##Standard rule security_rule
modify fw_policies ##Standard rule:1:comments "Firewall stealth rule"
modify fw_policies ##Standard rule:1:disabled false
rmbyindex fw_policies ##Standard rule:1:track 0
addelement fw_policies ##Standard rule:1:track tracks:Log
addelement fw_policies ##Standard rule:1:time globals:Any
addelement fw_policies ##Standard rule:1:install:'' globals:Any
rmbyindex fw_policies ##Standard rule:1:action 0
addelement fw_policies ##Standard rule:1:action drop_action:drop
addelement fw_policies ##Standard rule:1:src:'' network_objects:net-internal
modify fw_policies ##Standard rule:1:src:op 'not in'
addelement fw_policies ##Standard rule:1:dst:'' globals:Any
modify fw_policies ##Standard rule:1:dst:op ''
addelement fw_policies ##Standard rule:1:services:'' globals:Any
modify fw_policies ##Standard rule:1:services:op ''
#
# Add New Rule 3 (Old Rule 2)
#
addelement fw_policies ##Standard rule security_rule
modify fw_policies ##Standard rule:2:comments "Allow selected hosts outbound"
modify fw_policies ##Standard rule:2:disabled false
rmbyindex fw_policies ##Standard rule:2:track 0
addelement fw_policies ##Standard rule:2:track tracks:Log
addelement fw_policies ##Standard rule:2:time globals:Any
addelement fw_policies ##Standard rule:2:install:'' globals:Any
rmbyindex fw_policies ##Standard rule:2:action 0
addelement fw_policies ##Standard rule:2:action accept_action:accept
addelement fw_policies ##Standard rule:2:src:'' network_objects:flamer-100
addelement fw_policies ##Standard rule:2:src:'' network_objects:flamer-101
modify fw_policies ##Standard rule:2:src:op ''
addelement fw_policies ##Standard rule:2:dst:'' network_objects:net-internal
modify fw_policies ##Standard rule:2:dst:op 'not in'
addelement fw_policies ##Standard rule:2:services:'' globals:Any
modify fw_policies ##Standard rule:2:services:op ''
#
# Add New Rule 4 (Old Rule 3)
#
addelement fw_policies ##MyPolicy rule security_rule
modify fw_policies ##MyPolicy rule:3:comments "Drop all"
modify fw_policies ##MyPolicy rule:3:disabled false
rmbyindex fw_policies ##MyPolicy rule:3:track 0
addelement fw_policies ##MyPolicy rule:3:track tracks:Log
addelement fw_policies ##MyPolicy rule:3:time globals:Any
addelement fw_policies ##MyPolicy rule:3:install:'' globals:Any
rmbyindex fw_policies ##MyPolicy rule:3:action 0
addelement fw_policies ##MyPolicy rule:3:action drop_action:drop
addelement fw_policies ##MyPolicy rule:3:src:'' globals:Any
modify fw_policies ##MyPolicy rule:3:src:op ''
addelement fw_policies ##MyPolicy rule:3:dst:'' globals:Any
modify fw_policies ##MyPolicy rule:3:dst:op ''
addelement fw_policies ##MyPolicy rule:3:services:'' globals:Any
modify fw_policies ##MyPolicy rule:3:services:op ''
Page 156
I mds_backup • 127
mds_restore • 128
ICA Database for Multi-Domain Servers • 80 mds_user_expdate • 128
Important Information • 3 mdscmd • 129
Installing Policy with a Multi-Domain Server • mdscmd adddomain • 129
152 mdscmd addlogserver • 131
Introduction • 55 mdscmd addmanagement • 130
Introduction to Automation Scripts • 143 mdscmd assignadmin • 132
Introduction to dbedit • 144 mdscmd assignguiclient • 132
Introduction to Global IPS • 51 mdscmd deletedomain • 133
Introduction to Global SmartDashboard • 49 mdscmd deletelogserver • 133
Introduction to the Management Model • 15 mdscmd disableglobaluse • 135
Introduction to the Trust Model • 24 mdscmd enableglobaluse • 134
IP Allocation & Routing • 20 mdscmd migratemanagement • 137
IPS in Global SmartDashboard • 51 mdscmd mirrormanagement • 138
IPS Profiles • 52 mdscmd removeadmin • 135
Issues Relating to Different Platforms • 116 mdscmd removeguiclient • 135
J mdscmd startmanagement • 136
mdscmd stopmanagement • 136
Joining a Security Gateway to a Global VPN mdsenv • 138
Community • 75 mdsquerydb • 139
mdsstart • 139
K mdsstat • 140
Key Features • 10 mdsstop • 140
merge_plug-in_tables • 140
L Merging Identical Permissions Profiles • 45
migrate_global_policies • 141
Large Scale Management Processes • 116
Migration Between Platforms • 116
Launching the dbedit Utility • 144
Mirroring Domain Management Servers with
Launching the SmartDomain Manager • 30
mdscmd • 89
License Types • 33
Monitoring • 102
License Violations • 34
Monitoring Components in the Multi-Domain
Licensing • 33
Security Management System • 103
Licensing Overview • 33
Monitoring Issues for Different Components and
Locating Components with Problems • 105
Features • 105
Locking the Database • 144
Monitoring the Status of a Domain Management
Log Export to Text • 94
Server • 108
Log Export Troubleshooting • 101
Multi Domain Log Server • 9
Log Files • 95
Multi-Domain Log Server • 15
Log Forwarding • 95
Multi-Domain Log Server Configuration -
Log In Warning • 40
Additional Step • 31
Log Server Licenses • 34
Multi-Domain Security Management • 9
Log Servers • 14
Multi-Domain Security Management Commands
Log Tracking • 107
and Utilities • 118
Logging & Tracking • 19
Multi-Domain Security Management
Logging Cache Size • 112
Components Installed at the NOC • 18
Logging Configuration • 96
Multi-Domain Security Management Overview •
Logging Domain Activity • 93
10
Logging in Multi-Domain Security Management
Multi-Domain Security Management Shell
• 93
Commands • 121
M Multi-Domain Security Management System
Database • 80
Making Connections Between Different Multi-Domain Server • 9, 105
Components of the System • 24 Multi-Domain Server Clock Synchronization • 80
Management Tools • 15 Multi-Domain Server Communication with
Managing Administrator Account Expiration • 40 Domain Management Servers • 25
Managing Global IPS Sensors • 54 Multi-Domain Server Configuration Databases •
Managing IPS from a Domain Management 113
Server • 53 Multi-Domain Server Connection to Domain
Managing IPS Profiles • 52 Management Servers • 114
Managing Licenses • 34 Multi-Domain Server Database • 114
Managing Licenses Using SmartUpdate • 34 Multi-Domain Server Database Synchronization
Managing Permission Profiles • 44 • 81
Manual Log Export to Oracle Database • 94 Multi-Domain Server Directories on /opt and
mcd bin | scripts | conf • 127 /var File Systems • 110
Page 157
Multi-Domain Server File System • 110 Remove a Global Policy from a Single Domain •
Multi-Domain Server High Availability • 78 59
Multi-Domain Server ICA Database Remove a Global Policy from Multiple Domains
Synchronization • 81 • 59
Multi-Domain Server Level Processes • 113 Removing Global IPS from a Domain
Multi-Domain Server Licenses • 33 Management Server • 53
Multi-Domain Server Status • 79 Renaming and Deleting a Service • 148
Multi-Domain Server Synchronization • 19 Renaming and Deleting Objects • 147
Multiple Interfaces on a Multi-Domain Server • Reporting Server Processes • 116
20 Resetting Domain Management Servers • 91
Multiple Multi-Domain Server Deployments • 30, Restarting Multi-Domain Server
78 Synchronization • 88
Restoring the High Availability Deployment • 91
N Routing Issues in a Distributed Environment •
Native P1Shell Commands • 124 19
Network Groups • 147 Running CLI Commands in Automation Scripts •
Networks • 146 143
O S
Object Naming Restrictions • 149 Searching • 118
Overview • 73, 78, 102, 118, 120 Secondary Multi-Domain Server • 9
Secure Internal Communication (SIC) • 25
P Security Gateway Global Names • 74
Security Gateway Licenses • 34
P1Shell • 120
Security Gateway Policies • 106
Packages in Multi-Domain Server Installation •
Security Gateways Protecting a Multi-Domain
110
Server • 23
Parameters/Thresholds for Different
Security Policies • 15
Multi-Domain Server functions • 112
Seeing Administrators Using a Permissions
Performing a Search in CLI • 119
Profile • 45
Permissions Profile • 9
Selecting an Administrator Type • 37
Platform & Performance Issues • 19
Service Groups • 148
Primary Multi-Domain Server • 9
Services • 148
Processes • 112
Setting Policy Management Options • 59
Protecting Multi-Domain Security Management
Setting up Domain Security Gateway to Send
Networks • 19
Logs to the Domain Log Server • 99
Protecting the Multi-Domain Security
Setting Up Logging • 96
Management Environment • 22
Setting Up Your Network Topology • 21
Pushing the Security Policy to Security
Showing and Hiding Selected List Pane
Gateways • 152
Columns • 103
R Showing Connected Administrators • 45
Showing Parameters for a Sample Object • 145
Real-Time Network Monitoring with SmartView SmartConsole Client Applications • 16
Monitor • 108 SmartDashboard Toolbar • 16
Re-assigning Global Policies • 54 SmartReporter Reports • 109
Re-assigning Global Policies to Many Different Standalone Security Gateway/Security
Domains • 55 Management Server • 22
Re-assigning Global Policy to one Domain • 55 Standard Check Point Environment Variables •
Reassigning/Installing a Global Policy on 112
Domains • 58 Standby Domain Management Server • 9
Reassigning/Installing a Global Policy to a Standby Multi-Domain Server • 9
Specified Domain • 58 Starting or Stopping a Domain Log Server • 98
Reassigning/Installing a Global Policy to Many Starting P1Shell • 120
Different Domains • 58 Status Collection • 115
Re-authenticating when using SmartConsole Step 1 - In the SmartDomain Manager • 76
Clients • 26 Step 2 - In Global SmartDashboard • 77
Recovery from Failure of the Only Multi-Domain Step 3 - In the SmartDomain Manager • 77
Server • 91 Structure of Domain Management Server
Recovery with a Functioning Multi-Domain Directory Trees • 111
Server • 90 Subscribing Domains to IPS Service • 52
Recreating the Multi-Domain Security Synchronize ClusterXL Security Gateways • 90
Management Deployment • 91 Synchronizing Clocks • 30
Reinstalling a Domain Policy on Domain Synchronizing Domain Log Server and Domain
Gateways • 58 Management Server • 99
Page 158
Synchronizing the Global Policy Database • 50 Working with dbedit • 144
Working with Expiration Warnings • 40
T Working with Log Servers • 96
The Global Policy as a Template • 48 Working with Permission Profiles • 42
The Management Model • 15 Working with the List Pane • 103
The Multi-Domain Security Management Trust
Model • 24
The Multi-Domain Server • 12
The Multi-Domain Server Databases • 80
The Need for Global Policies • 47
The SmartDomain Manager • 15
The Trial Period • 33
To assign to many Domains at one time • 77
To assign to one Domain at a time • 77
To Change the Active Multi-Domain Server • 89
To See the Latest Changes to Permissions
Profiles • 44
To Synchronize a Group of Multi-Domain
Servers • 88
To Synchronize a Single Multi-Domain Server
with Another Multi-Domain Server • 88
Tracking Logs using SmartView Tracker • 107
Traffic Flow and Virtual Link Monitoring • 108
Trust Between a Domain Log Server and its
Domain Network • 25
Trust Between a Domain Management Server
and its Domain Network • 25
Trust Between Multi-Domain Server to
Multi-Domain Server • 25
U
Using Automation Scripts • 145
Using dbedit Commands in a Script • 144
Using External Authentication Servers • 26
Using Multiple Multi-Domain Servers • 18
Using SmartConsole • 107
Using SmartDomain Manager • 30
Using SmartDomain Manager to Synchronize
Multi-Domain Servers • 82
Using SmartReporter • 101
Using the Expired Accounts Window • 40
Using Thresholds • 108
Using XML to Export Settings for a Domain
Management Server • 153
UTM-1 Edge Processes • 116
V
Verifying Component Status • 103
Version and Blade Updates • 63, 68
Viewing Status Details • 104
Viewing the Domain Global Policy History File •
59
Viewing the Status of Global Policy
Assignments • 56
Virtual IP Limitations and Multiple Interfaces on
a Multi-Domain Server • 20
VPN Connectivity • 73
VPN Domains in Global VPN • 75
VPN with Multi-Domain Security Management •
73
VSX Licenses • 34
W
When You Change a Global Policy • 56
Page 159