CP R81.10 LoggingAndMonitoring AdminGuide
CP R81.10 LoggingAndMonitoring AdminGuide
LOGGING AND
MONITORING
R81.10
Administration Guide
[Classification: Protected]
Check Point Copyright Notice
© 2021 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
Important Information
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the
latest functional improvements, stability fixes, security enhancements and protection against
new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
Date Description
Table of Contents
Glossary 14
Introduction 25
Getting Started 26
Logging and Monitoring Clients 26
Understanding Logging 28
Dynamic Log Distribution 28
Log Storage 29
Dedicated Domain Log Servers 31
Daily Logs Retention 31
Deploying Logging 34
Enabling Logging on the Security Management Server 34
Deploying a Dedicated Log Server 34
Configuring the Security Gateways for Logging 34
Enabling Log Indexing 35
Disabling Log Indexing 35
Deploying SmartEvent 37
SmartEvent Licensing 37
Enabling SmartEvent on the Security Management Server 37
System Requirements 38
Installing a Dedicated SmartEvent Server 38
Configuring the SmartEvent Components in the First Time Configuration Wizard 38
Connecting R81.10 SmartEvent to R81.10 Security Management Server 39
Advanced Configuration for a dedicated SmartEvent Server that is also a Correlation Unit 39
Connecting R81.10 SmartEvent to R81.10 Multi-Domain Server 40
Configuring SmartEvent to use a Non-Standard LEA Port 41
Configuring SmartEvent to read External Logs 42
Deploying a Domain Dedicated Log Server 43
Introduction 43
Procedure for an R81.10 Multi-Domain Environment 43
Procedure for an R77.x Multi-Domain Environment 44
Administrator Permission Profiles 48
Configuring Permissions for Monitoring, Logging, Events, and Reports 48
Multi-Domain Security Management 48
Add_field 240
Dictionary 246
The Parsing Procedure 247
Glossary
A
Administrator
A user with permissions to manage Check Point security products and the network
environment.
API
In computer programming, an application programming interface (API) is a set of
subroutine definitions, protocols, and tools for building application software. In general
terms, it is a set of clearly defined methods of communication between various software
components.
Appliance
A physical computer manufactured and distributed by Check Point.
Audit Log
A record of an action that is done by an Administrator.
Bond
A virtual interface that contains (enslaves) two or more physical interfaces for
redundancy and load sharing. The physical interfaces share one IP address and one
MAC address. See "Link Aggregation".
Bonding
See "Link Aggregation".
Bridge Mode
A Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
CA
Certificate Authority. Issues certificates to gateways, users, or computers, to identify
itself to connecting entities with Distinguished Name, public key, and sometimes IP
address. After certificate validation, entities can send encrypted data using the public
keys in the certificates.
Certificate
An electronic document that uses a digital signature to bind a cryptographic public key to
a specific identity. The identity can be an individual, organization, or software entity. The
certificate is used to authenticate one identity to another.
CGNAT
Carrier Grade NAT. Extending the traditional Hide NAT solution, CGNAT uses improved
port allocation techniques and a more efficient method for logging. A CGNAT rule
defines a range of original source IP addresses and a range of translated IP addresses.
Each IP address in the original range is automatically allocated a range of translated
source ports, based on the number of original IP addresses and the size of the translated
range. CGNAT port allocation is Stateless and is performed during policy installation.
See sk120296.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
A Security Gateway that is part of a cluster.
Cooperative Enforcement
Integration of Endpoint Security server compliance to verify internal network
connections.
CoreXL
A performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to stick
to a particular FWK daemon is done at the first packet of connection on a very high level,
before anything else. Depending on the SecureXL settings, and in most of the cases, the
SecureXL can be offloading decryption calculations. However, in some other cases,
such as with Route-Based VPN, it is done by FWK daemon.
Correlation Unit
A SmartEvent software component that analyzes logs and detects events.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can
automatically update Check Point products for the Gaia OS, and the Gaia OS itself. For
details, see sk92449.
Custom Report
A user defined report for a Check Point product, typically based on a predefined report.
DAIP Gateway
A Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway where the IP
address of the external interface is assigned dynamically by the ISP.
Data Type
A classification of data. The Firewall classifies incoming and outgoing traffic according to
Data Types, and enforces the Policy accordingly.
Database
The Check Point database includes all objects, including network objects, users,
services, servers, and protection profiles.
Distributed Deployment
The Check Point Security Gateway and Security Management Server products are
deployed on different computers.
Domain
A network or a collection of networks related to an entity, such as a company, business
unit or geographical location.
Event
A record of a security or network incident that is based on one or more logs, and on a
customizable set of rules that are defined in the Event Policy.
Event Correlation
A procedure that extracts, aggregates, correlates and analyzes events from the logs.
Event Policy
A set of rules that define the behavior of SmartEvent.
Expert Mode
The name of the full command line shell that gives full system root permissions in the
Check Point Gaia operating system.
External Network
Computers and networks that are outside of the protected network.
External Users
Users defined on external servers. External users are not defined in the Security
Management Server database or on an LDAP server. External user profiles tell the
system how to identify and authenticate externally defined users.
Firewall
The software and hardware that protects a computer network by analyzing the incoming
and outgoing network traffic (packets).
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restrictive shell (role-based administration controls the number of commands
available in the shell).
Gaia gClish
The name of the global command line shell in Check Point Gaia operating system for
Security Appliances connected to Check Point Quantum Maestro Orchestrators and for
Security Gateway Modules on Scalable Chassis. Commands you run in this shell apply
to all Security Gateway Module / Security Appliances in the Security Group.
Gaia Portal
Web interface for Check Point Gaia operating system.
Hotfix
A piece of software installed on top of the current software in order to fix some wrong or
undesired behavior.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPv4
Internet Protocol Version 4 (see RFC 791). A 32-bit number - 4 sets of numbers, each set
can be from 0 - 255. For example, 192.168.2.1.
IPv6
Internet Protocol Version 6 (see RFC 2460 and RFC 3513). 128-bit number - 8 sets of
hexadecimal numbers, each set can be from 0 - ffff. For example,
FEDC:BA98:7654:3210:FEDC:BA98:7654:3210.
Link Aggregation
Technology that joins (aggregates) multiple physical interfaces together into one virtual
interface, known as a bond interface. Also known as Interface Bonding, or Interface
Teaming. This increases throughput beyond what a single connection could sustain, and
to provides redundancy in case one of the links should fail.
Log
A record of an action that is done by a Software Blade.
Log Server
A dedicated Check Point computer that runs Check Point software to store and process
logs in Security Management Server or Multi-Domain Security Management
environment.
Management Interface
Interface on Gaia computer, through which users connect to Portal or CLI. Interface on a
Gaia Security Gateway or Cluster member, through which Management Server connects
to the Security Gateway or Cluster member.
Management Server
A Check Point Security Management Server or a Multi-Domain Server.
Multi-Domain Server
A computer that runs Check Point software to host virtual Security Management Servers
called Domain Management Servers. Acronym: MDS.
Network Object
Logical representation of every part of corporate topology (physical machine, software
component, IP Address range, service, and so on).
Open Server
A physical computer manufactured and distributed by a company, other than Check
Point.
Predefined Report
A default report included in a Check Point product that you can run right out of the box.
Report
A summary of network activity and Security Policy enforcement that is generated by
Check Point products such as SmartEvent.
Rule
A set of traffic parameters and other conditions in a Rule Base that cause specified
actions to be taken for a communication session.
Rule Base
Also Rulebase. All rules configured in a given Security Policy.
SecureXL
Check Point product that accelerates IPv4 and IPv6 traffic. Installed on Security
Gateways for significant performance improvements.
Security Gateway
A computer that runs Check Point software to inspect traffic and enforces Security
Policies for connected network resources.
Security Policy
A collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over SSL,
for secure communication. This authentication is based on the certificates issued by the
ICA on a Check Point Management Server.
Single Sign-On
A property of access control of multiple related, yet independent, software systems. With
this property, a user logs in with a single ID and password to gain access to a connected
system or systems without using different usernames or passwords, or in some
configurations seamlessly sign on at each system. This is typically accomplished using
the Lightweight Directory Access Protocol (LDAP) and stored LDAP databases on
(directory) servers. Acronym: SSO.
SmartConsole
A Check Point GUI application used to manage Security Policies, monitor products and
events, install updates, provision new devices and appliances, and manage a multi-
domain environment and each domain.
SmartDashboard
A legacy Check Point GUI client used to create and manage the security settings in
R77.30 and lower versions.
SmartEvent Server
Server with enabled SmartEvent Software Blade that hosts the events database.
SmartUpdate
A legacy Check Point GUI client used to manage licenses and contracts.
Software Blade
A software blade is a security solution based on specific business needs. Each blade is
independent, modular and centrally managed. To extend security, additional blades can
be quickly added.
SSO
See "Single Sign-On".
Standalone
A Check Point computer, on which both the Security Gateway and Security Management
Server products are installed and configured.
System Counter
SmartView Monitor data or report on status, activity, and resource usage of Check Point
products.
Traffic
Flow of data between network devices.
Users
Personnel authorized to use network resources and applications.
VLAN
Virtual Local Area Network. Open servers or appliances connected to a virtual network,
which are not physically connected to the same network.
VLAN Trunk
A connection between two switches that contains multiple VLANs.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer
or cluster with virtual abstractions of Check Point Security Gateways and other network
devices. These Virtual Devices provide the same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide
the functionality of physical network devices. It holds at least one Virtual System, which
is called VS0.
Introduction
From R80, logging, event management, reporting, and monitoring are more tightly integrated than ever
before. Security data and trends easy to understand at a glance, with Widgets and chart templates that
optimize visual display. Logs are now tightly integrated with the policy rules. To access logs associated with
a specific rule, click that rule. Free-text search lets you enter specific search terms to retrieve results from
millions of logs in seconds.
One-click exploration makes it easy to move from high-level overview to specific event details such as type
of attack, timeline, application type and source. After you investigate an event, it is easy to act on it.
Depends on the severity of the event, you can ignore it, act on it later, block it immediately, or toggle over to
the rules associated with the event to refine your policy. Send reports to your manager or auditors that show
only the content that is related to each stakeholder.
In this release, SmartReporter and SmartEvent functionality is integrated into SmartConsole.
With rich and customizable views and reports, R80 introduced a new experience for log and event
monitoring.
The new views are available from two locations:
n SmartConsole > Logs & Monitor
n SmartView Web Application. Browse to: https://<Server IP Address>/smartview/
Where Server IP Address is IP address of the Security Management Server or SmartEvent Server.
Getting Started
This section introduces the logging and monitoring clients, and explains how to install and configure logging
and monitoring products.
SmartConsole > Analyze events that occur in your environment with customizable views and reports.
Logs & Monitor The Logs view replaces the SmartView Tracker and SmartLog GUI clients.
SmartView Web It has the same real-time event monitoring and analysis views as SmartConsole,
Application with the convenience of not having to install a client.
Browse to: https://<Server IP>/smartview/, where <Server IP> is IP
address of the Security Management Server or SmartEvent Server.
SmartEvent n For initial settings - configure the SmartEvent Correlation Unit, Log Server,
Domains and Internal Network.
n For the correlation policy (event definitions)
n For Automatic Reactions
Understanding Logging
Security Gateways generate logs, and the Security Management Servers generates audit logs, which are a
record of actions taken by administrators. The Security Policy that is installed on each Security Gateway
determines which rules generate logs.
Logs can be stored on a:
n Security Management Server that collects logs from the Security Gateways. This is the default.
n Log Server on a dedicated machine. This is recommended for organizations that generate a lot of
logs.
n Security Gateway. This is called local logging.
Note - Logs can be automatically forwarded to the Security Management Server or Log Server, according to
a schedule, or manually imported with the Remote File Management operation via CLI (fw fetchlogs). The
management servers and log servers can also forward logs to other servers.
To find out how much storage is necessary for logging, see the new appliance datasheet.
A Log Server handles log management activities:
n Automatically starts a new log file when the existing log file gets to the defined maximum size.
n Stores log files for export and import.
n Makes an index of the logs to enable faster responses to log queries.
Notes:
l SmartLog Indexing mode is not enabled by default after upgrade or new installation, on Smart-
1 205, Smart-1 210, or Open Servers with less than 4 cores.
l To change SmartLog mode from Indexing to Non-Indexing on a Domain Management Server
or Domain Log Server, edit the Domain Server object on the Domain level. There is no option
to change the entire Multi-Domain Server or Multi-Domain Log Server to Non-Indexing mode.
An Administrator can configure Backup Log Servers. If all Primary Log Servers are disconnected, the
Security Gateway starts to send logs only to the first configured Backup Log Server. If the first Backup Log
Server is also disconnected, the Security Gateway sends logs to the second configured Backup Log Server,
and so on.
Log Storage
SmartEvent and Log Server use an optimization algorithm to manage disk space and other system
resources. When the Logs and Events database becomes too large, the oldest logs and events are
automatically deleted according to the configured thresholds.
In SmartConsole, open the Security Gateway or Check Point host for editing, and open Logs > Storage.
Configure these fields:
n Measure free disk space in - Choose MBytes or Percentage.
n When disk space is below <number> Mbytes, issue alert - Get an alert when the available disk
space for logs and log index files is below this threshold. This value must be at least 5 MB greater
than the value of ...stop logging in the Additional logging options page.
n When disk space is below <number> Mbytes, start deleting old files - Delete the oldest logs and
log index files when the available disk space is below this threshold. This value must be at least 5 MB
greater than the ...issue alert value.
n Run the following script before deleting old files - Enter a path to the script.
These options and examples are for a Security Management Server, SmartEvent Server, or Log
Server:
n When disk space is below <number> Mbytes, start deleting old files -The available space in the
logs partition is checked every 1 minute. Once the threshold is reached, the log disk maintenance
occurs: deleting the oldest day of log and index data and repeating until reaching above configured
threshold.
Daily logs retention
n Keep indexed logs for no longer than <number> days - Occurs daily at midnight. Deleting oldest
index files by days, keeping today + the configured number of index days (14 = 14 days + today).
n Keep log files for an extra <number> days - Occurs daily at midnight. Deleting oldest log files by
days, keeping today + the configured number of index days + extra log days (3664 = 14 [from index
settings] + 3650 days + today). As 3664 is more than 10 years, effectively keeping all log files.
Note - The max summary value of both indexed logs and log files is 3664.
For these examples, the administrator enables these thresholds:
n When disk space is below [5000] Mbytes, start deleting old files
n Daily logs retention
n Keep indexed logs for 14 days
n Keep log files for an extra 6 days (6 + 14 = 20 days of log files)
Example 1:
The server has 3000 MBytes of free disk space, and 5 days of logs and index files.
The server deletes logs and index files, one day at a time, until there is 5000 Mbytes of free disk space.
Example 2:
The server has 10 GBytes of free disk space and 30 days of logs and index files.
The server deletes all log files older than 20 days ago (6 + 14), each day at midnight.
The server deletes all index files older than 14 days ago, each day at midnight.
Example 3:
A server produces 1GB of logs and 1GB of index files each day. The server now has 35 days of logs and 30
days of index files and only 2.5GB of free disk space left. The configured disk space threshold is 5GB, which
means the server is now 2.5GB below the threshold.
The index files threshold is 14 days.
The log file threshold is 20 days.
When the disk space threshold (5GB) is reached, disk space maintenance deletes logs and index data until
there is again more than 5GB of free space. In this example:
1. Logs from day one are deleted first, as they are older. Three days of the oldest logs are deleted to
clear 3GB of logs and leave 6GB of free space on the drive, 1GB above the threshold, leaving the
server with 32 log days and 30 index days.
2. The server still has more than 14 days of index files - an extra 16 days (30 days of index files now)
And more than 20 days of logs – an extra 12 days (32 days of log files now).
At midnight, the extra log & index files are deleted until only the current day’s log files plus the last 20
days remain.
Index days are deleted until only the current day’s index plus the last 14 days remain.
The deletion of three days of logs left 5.5GB of free space.
The deletion of 12 log file days + 16 index file days frees up a total of 28GB (12 + 16) of space.
33.5GB of space is now free.
The daily logs retention occurs every day at midnight keeping the chosen number of days of log +
index data.
Most likely, this means it will never reach the log disk space threshold. But if the log disk space
threshold is again reached, the log disk maintenance process repeats to make sure space never runs
out.
You do not need to configure each domain individually, as we can use default values for each domain.To do
so, add a domain called default and specify what values you want as the default.
Best Practice - Add default values even if all of the domains are individually configured. This helps if you
added a new domain and forgot to edit this file, or if there is a mistake in a domain name.
If default values are not configured, all domains that are not configured in the file take the largest value
written in the file configured for that specific index type.
Domain_ other-
audit files firewallandvpn other resources smartevent
name smartlog
Domain1 3650 20 15 14 14 14 14
Domain2 3650 20 30 14 14 14 14
default 3650 30 14 14 14 14 14
Deploying Logging
You can enable logging on the Security Management Server (enabled by default), or deploy a dedicated Log
Server.
After you deploy the Log Server, you must configure the Security Gateways for logging.
You must execute the Install Database function on the remote Log Server when you:
n Enable or disable a logging related blade or function, including Log Indexing in a server object.
n Add a new Log Server to the system.
n Change a Security Gateway's Log Server.
n Change a Log Server's log settings or make any other Log Server object change.
n Change anything in the Global Properties that might affect the Log Server.
Deploying SmartEvent
SmartEvent Server is integrated with the Security Management Server architecture. It communicates with
Log Servers to read and analyze logs. You can enable SmartEvent on the Security Management Server or
deploy it as a dedicated server.
Only a Security Management Server can also work as a SmartEvent Server. In a Multi-Domain environment,
you must install SmartEvent on a dedicated server.
You must execute the Install Database function on the remote SmartEvent Server when you:
n Enable or disable a SmartEvent Server blade, including Log Indexing in a server object.
n Add a new SmartEvent Server to the system.
n Change a SmartEvent Server log settings or make any other SmartEvent Server object change.
n Change anything in the Global Properties that might affect the SmartEvent Server.
SmartEvent Licensing
You can deploy SmartEvent in these ways:
n As part of the SmartEvent - A renewable one year license is included with the SmartEvent package.
n As a dedicated server - You can purchase a perpetual license for a SmartEvent Server.
System Requirements
For versions earlier than R81, the SmartEvent Server from one version can be managed by multiple
management versions.
Management Server support for SmartEvent Server
Management Server version
SmartEvent
R77.30 R80 R80.10 R80.20 R80.30 R80.40
Server version
R77.30
R80
R80.10
R80.20.M1
R80.30
R80.40
Starting from R81, SmartEvent server can only be managed by a Security Management Serverof the same
version. Managing SmartEvent by a lower version of the Security Management Server is no longer
supported.
To use SmartEvent, see the requirements in the R81.10 Release Notes.
To connect R81.10 SmartEvent Server and SmartEvent Correlation Unit to R81.10 Security
Management Server:
1. In SmartConsole, create a new Check Point Host object for the dedicated SmartEvent Server.
2. In the Version field, select R81.10.
3. Create a SIC trust with the dedicated SmartEvent Server.
4. On the Management tab, enable these Software Blades:
n Logging & Status
n SmartEvent Server
n SmartEvent Correlation Unit
5. On a dedicated SmartEvent Server that is not a Log Server (recommended):
In the Logs page, make sure that Enable Log Indexing is not selected.
This ensures that Firewall connections (which are not relevant for views and reports) are not indexed.
6. Click OK.
7. Publish the SmartConsole session.
8. Click Menu > Install Database > select all objects > click Install.
Note - For R77.30 Security Gateways and lower: activate the Firewall session for the network activity report.
See "Exporting Views and Reports" on page 65.
Advanced Configuration for a dedicated SmartEvent Server that is also a Correlation Unit
Connecting an R81.10 SmartEvent Server and SmartEvent Correlation Unit to a specific Domain
on an R81.10 Multi-Domain Server
See also Advanced Configuration for a dedicated SmartEvent Server that is also a Correlation Unit in
"Connecting an R81.10 SmartEvent to an R81.10 Security Management Server" on page 53.
Note - For Security Gateways R77.30 and lower: activate the Firewall session for the network activity report
in "Exporting Views and Reports" on page 65.
a. In Policy tab > Network Objects, double-click the SmartEvent Server object.
b. Change the LEA port No parameter to <new_port_number>.
7. Install the Event Policy on the Correlation Unit: Actions > Install Event Policy
8. On the SmartEvent Server
a. Run: cpstop
b. Open $FWDIR/conf/fwopsec.conf in a text editor.
c. Change these parameters:
lea_server auth_port <new_port_number>
lea_server port 0
Log Servers on the Domain Management Server level are not yet
supported in R80.x
cp -v $CPDIR/tmp/.CPprofile.sh{,_BKP}
> EOF
e. Follow the instructions in the R80.40 Installation and Upgrade Guide to upgrade all the
servers "with CPUSE".
2. Upgrade all Multi-Domain Servers to R81.10.
See the R81.10 Installation and Upgrade Guide > chapter "Upgrade of Multi-Domain Servers and
Multi-Domain Log Servers" > select the applicable section to upgrade "from R80.20 and higher" >
select the applicable section to upgrade "with CPUSE".
3. On each Multi-Domain Security Management Server, run this script in the Expert mode:
$MDS_FWDIR/scripts/configureCrlDp.sh
reboot
6. On each Multi-Domain Security Management Server, run this script in the Expert mode:
7. Reboot all the Domain Dedicated Log Servers and the SmartEvent Servers:
reboot
Advanced Upgrade
a. Run the Pre-Upgrade Verifier, as detailed in the R80.40 Installation and Upgrade Guide.
n For Multi-Domain Servers:
See the chapter "Upgrade of Multi-Domain Servers and Multi-Domain Log Servers" >
select the applicable section to upgrade "from R80.10 and lower" > select the
applicable section to upgrade "with Advanced Upgrade".
n For Log Servers:
See the chapter "Upgrade of Security Management Servers and Log Servers" >
section "Upgrading a Dedicated Log Server from R80.10 and lower" > select the
applicable section to upgrade "with Advanced Upgrade".
n For SmartEvent Servers:
See the chapter "Upgrade of Security Management Servers and Log Servers" >
section "Upgrading a Dedicated SmartEvent Server from R80.10 and lower" > select
the applicable section to upgrade "with Advanced Upgrade".
b. Fix all the errors, except the one specified for Log Servers on a Domain Management
Server:
c. In your active shell window, run this command in the Expert mode:
export PUV_ERRORS_AS_WARNINGS=1
d. Follow the instructions in the R80.40 Installation and Upgrade Guide to upgrade all the
servers "with Advanced Upgrade".
2. Upgrade all Multi-Domain Servers to R81.10.
See the R81.10 Installation and Upgrade Guide > chapter "Upgrade of Multi-Domain Servers and
Multi-Domain Log Servers" > select the applicable section to upgrade "from R80.10 and lower" >
select the applicable section to upgrade "with Advanced Upgrade".
3. On each Multi-Domain Security Management Server, run this script in the Expert mode:
$MDS_FWDIR/scripts/configureCrlDp.sh
reboot
6. On each Multi-Domain Security Management Server, run this script in the Expert mode:
7. Reboot all the Domain Dedicated Log Servers and SmartEvent Servers:
reboot
n An administrator with permissions on all Domains. Select the Domains in SmartEvent, in Policy >
General Settings > Objects > Domains. This type of administrator can install a Policy, and can see
events from multiple Domains.
To configure the SmartEvent Server to read logs from this Log Server:
1. Configure SmartEvent to read logs from the Log Server.
2. In SmartEvent or in the SmartConsole event views, make a query to filter by the Product Name field.
This field uniquely identifies the events that are created from the syslog messages.
To connect R81.10 SmartEvent Server and SmartEvent Correlation Unit to R81.10 Security
Management Server:
1. In SmartConsole, create a new Check Point Host object for the dedicated SmartEvent Server.
2. In the Version field, select R81.10.
3. Create a SIC trust with the dedicated SmartEvent Server.
4. On the Management tab, enable these Software Blades:
n Logging & Status
n SmartEvent Server
n SmartEvent Correlation Unit
5. On a dedicated SmartEvent Server that is not a Log Server (recommended):
In the Logs page, make sure that Enable Log Indexing is not selected.
This ensures that Firewall connections (which are not relevant for views and reports) are not indexed.
6. Click OK.
7. Publish the SmartConsole session.
8. Click Menu > Install Database > select all objects > click Install.
Note - For Security Gateways R77.30 and lower: activate the Firewall session for the network activity report.
See "Exporting Views and Reports" on page 65.
Advanced Configuration for a dedicated SmartEvent Server that is also a Correlation Unit
https://<Server IP Address>/smartview/
Item Description
1 Open Log View - See and search through the logs from all Log Servers. In SmartConsole
only, you can also search the logs from a specific Log Server.
Open Audit Logs View - See and search records of actions done by SmartConsole
administrators.
These views come from the Log Servers. All other Views/Reports (except the Compliance
View) come from the SmartEvent Server.
2 Views -The list of predefined and customized views. A view is an interactive dashboard made
up of widgets. The view tells administrators and other stakeholders about security and network
events. Each widget is the output of a query. Widgets can show the information as a chart,
table, or some other format. To find out more about the events, double-click a widget to drill
down to a more specific view or raw log files.
Compliance View -Optimize your security settings and ensure compliance with regulatory
requirements.
3 Reports -The list of predefined and customized reports. A report consists of multiple views.
There are several predefined reports, and you can create new reports. A report gives more
details because it consists of multiple views. Reports can be customized, filtered, generated
and scheduled. You cannot drill down into a report.
4 Favorites - Use this view to collect the views and reports you use the most.
Recent - Shows the most recently opened report or view.
Item Description
5 Switch to Table View or Thumbnails View -The Table view is the default for Views and
Reports. The Thumbnails view is the default for the Favorites , Recent, and Logs.
8 Catalog (New Tab) - Open a Catalog (new tab) and select Log View, Audit View, Views, or
Reports. In the Logs & Monitor view, click the (+) tab to open a catalog of all views and reports,
predefined and customized. To open a view, double-click the view or select the applicable
view and click Open from the action bar.
Views
Views shows an interactive dashboard made up of widgets. Each widget is the output of a query. A Widget
pane can show information in different formats, for example, a chart or a table.
SmartView and SmartEvent come with several predefined views. You can create new views that match your
needs, or you can customize an existing view.
Item Description
1 Widget - The output of a query. A Widget can show information in different formats, for
example, a chart or a table. To find out more about the events, you can double-click most
widgets to drill down to a more specific view or raw log files.
2 Options - Customize the view, restore defaults, Hide Identities, copy the view, export the view.
3 Query search bar - Define custom queries using the GUI tools, or manually entering query
criteria. Shows the query definition for the most recent query. Click Query Syntax to open the
online Help for more information.
Reports
A report consists of multiple views and a cover page. There are several predefined reports, and you can
create new reports. A report gives more details than a view. Reports can be customized, filtered, generated
and scheduled. You cannot drill down into a report.
Note - For Security Gateways R77.30 and lower, the ability to generate reports on Firewall and VPN activity
is integrated into SmartConsole. To enable this functionality, activate the Firewall session event on the
SmartEvent Policy tab. Select and enable Consolidated Sessions > Firewall Session. For more
information, see "Connecting an R81.10 SmartEvent to an R81.10 Security Management Server" on
page 53.
2. Double click on a technique that is the darkest shade of red. You can now drill down further.
3. Review the different malicious emails/file downloads and click one of the logs.
4. Inside the log, you can review the entire list of MITRE ATT&CK tactics and techniques used by the
attacker for the specific attack.
5. When locating the technique (for example, Service Execution under Execution) go to
https://attack.mitre.org/
To enable the Network Activity Report for Security Gateways R80.10 and higher:
In SmartConsole, in the Access Control Policy rule, add per Session to the Track settings. See "Tracking
Options" on page 103.
To enable the Network Activity Report for Security Gateways R77.30 and lower:
1. In SmartConsole, open the Logs & Monitor view.
2. Click the (+) to open a new tab.
3. In the External Apps section, click SmartEvent Settings & Policy link.
4. In the SmartEvent GUI client > Policy tab, select and expand Consolidated Sessions.
5. Select Firewall Session.
Note - This configuration increases the number of events per day by about five times. To avoid a
performance impact, make sure the hardware can handle the load.
Sharing Reports
You can share a report you created with your team, without export or import. If a regular admin shares a
view or report, it is shared with all the admins on the domain. A super admin for the Multi-Domain Server can
share with all users under all domains.
To share a report:
1. In SmartConsole, open Logs & Monitor and click + to open a new tab.
2. Click Reports and select a report.
3. Click Actions and select Share.
Note - A Super User can take ownership of reports or views created by other administrators via the take
ownership feature.
Permissions when an owner shares a view/report:
Owner + + + +
Super User + - + -
To schedule a report:
1. In SmartConsole, open the Logs & Monitor view.
2. Click the + tab to open a new tab.
3. Click Views or Reports.
4. Select a view or a report.
5. Select Actions > Schedule PDF or Schedule CSV.
The Schedule page of the Export settings window opens.
6. Define the recurrence pattern.
7. Define the Period and Filter.
8. Optional: Configure email settings to get the scheduled view or report automatically. Click Send by
email.
3. In a report, you can edit the report or the current view in the report.
n To add or remove, click the relevant icon in the edit toolbar (becomes available when in edit
mode):
n To add a widget or arrange the "Widgets" on page 74 in the view, use Drag & Drop or expand..
n Define filters. (see "Widgets" on page 74).
Note - If you change the timeframe, the data changes according to the start and stop times. The timeframe
and search bar are not saved with the view or report definition. Define them as needed when generating the
view or report. See "Opening a View or Report" on page 62.
View Settings
Views can be configured according to these options:
1. Enter a title.
2. To show more results, this option allows a table to spread across multiple pages when saved to PDF.
The No page limit option shows all the results for the selected table query, spread across as many
pages as required.
3. Select what you want to display when this control has no data:
n Remove the page
n Show a default or custom message.
4. Select to use the view as a template and add filter and sort criteria.
Use the view as a basis for generating duplicate views with more granularity.
Use Case:
The Active Users predefined view shows all active users. You want to see a more granular view per user:
1. Open the Active Users view and click Options > View settings.
The View Settings window opens.
2. Select Use View as template.
3. For Filter each view by, select User.
4. Select Number of values. For example, 5.
5. Click OK.
6. Go to Options > Export > Export to PDF.
7. The view is exported. Wait until a message shows the view was successfully exported.
8. Click Download.
The report shows all widgets in the view filtered according to each user.
Report Settings
Reports can be configured according to these options:
Mail server settings in SmartConsole and SmartView are shared for all email interactions. For each
SmartConsole administrator, configure them one time.
n Connection encryption (Optional) - if required by the email server, choose SSL or TLS.
6. Click OK.
Define the email recipients every time you run the view or report, or one time for scheduled reports.
Widgets
You can customize the widgets to optimize the visual display. To customize widgets, switch to edit mode.
Click Options > Edit. You can copy a widget and use it in another view.
n To save changes, click Done.
n To cancel changes, click Discard.
n To restore the predefined view to the default values, click Options > Restore Defaults.
Note - Restore Defaults option is only available after you modify a predefined view.
To add a Widget:
1. Double-click a view or report to open it.
2. Click Options > Edit.
3. Click Add Widget and select the widget type.
Chart Settings:
a. Enter a title.
b. Select a chart type: vertical bar, horizontal bar, pie, area or line.
c. Select a data category for the X axis.
d. Define how the Top Values are calculated (by number of logs, or by traffic).
e. Set a limit for how many top values to show.
f. Optional: click Series - Split the results into colored groups with different values for the series.
g. Optional: click Customize and define axis titles and legend position.
Timeline Settings:
a. Enter a title.
b. Select a timeline graphical presentation: vertical bar, doughnut, area or line.
Note - In R81 GA the last field is called Samples and accepts integer values.
In R81 + R81 JHA (from sk170114) the field is called Resolution and is a drop-down list with
predefined values
c. Select the data to count.
d. Advanced - split the results into colored groups, with different values for the Series.
e. Define the time-granularity. Enter the number of bars or doughnuts to show.
Table Settings:
a. Enter a title.
b. Manage columns: add, edit, remove, and change the order.
c. Select a column on the left and define its settings:
n Enter the number of top values to show.
n Select how values are sorted.
d. Select this option to group results with the same value in one row.
Map Settings:
a. Enter a title.
b. Enter the number of Top Countries to mark.
c. Select to mark Top Source Countries, Top Destination Countries, or both.
d. Define how to find the Top Countries (for example, by number of logs or by traffic).
The infographic widget shows large meaningful values. For example:
Infographic Settings:
a. Enter a title
b. Select a field to count. Selecting None means all the logs that match the filter criteria are
counted.
c. Define filter criteria.
This critieria is in addition to the inherited filters for the report and view layers.
For more, see Filters in "Widgets" on page 74.
apps
attacks
hosts
gateway
traffic
usercheck
users
install-policy
publish
ips
anti-bot
anti-virus
threat-emulation
Container Settings:
a. Enter a title.
b. Optional: filter at the container level. The filter applies to all internal widgets.
c. Select the widget order inside the container: Horizontal, Vertical, Grid or Tabs.
After the container is added to the view, you can configure it further.
Use this window to add textual explanations to the View text box.
4. Click OK.
5. Select filters for the widget in addition to the inherited filters from the report and view layers. See
Filters in "Widgets" on page 74.
6. Configure settings for the widget.
To customize a widget:
1. In the view where the widget is located, click Options > Edit.
2. Go to the required widget and click the wheel icon to edit the image properties:.
4. Click Done.
7. Click Done.
Note - When you copy a widget to another view or report, the copied widget does not
include the filter of the original view or report, only the filter defined for the copied
widget.
8. Click Done.
Note - When you copy a view to another report, the copied view does not include the
filter of the original report, only the filter of the copied view.
Filters
The search bar is used to apply on-demand filters, but you can also save filters with the view / report
definition.
Logging
SmartConsole lets you transform log data into security intelligence. Search results are fast and immediately
show the log records you need. The Security Gateways send logs to the Log Servers on the Security
Management Server or on a dedicated server. Logs show on the SmartConsole Logs & Monitor Logs tab.
You can:
n Quickly search through logs with simple Google-like searches.
n Select from many predefined search queries to find the applicable logs.
n Create your own queries using a powerful query language.
n Monitor logs from administrator activity and connections in real-time.
Item Description
3 Query search bar - Define custom queries in this field. You can use the GUI tools or manually
enter query criteria. Shows the query definition for the most recent query.
4 Log statistics pane - Shows top results of the most recent query.
5 Results pane - Shows log entries for the most recent query.
Note - On a Security Management Server with the "Enable Log Indexing" option not selected, and a
dedicated Log Server with "Enable Log Indexing" option selected: When you connect with SmartConsole
to the Security Management Server, the Logs view shows the logs of individual log files. It is not possible
to get a unified view of all the logs.
Tracking Options
Select these options in the Track column of a rule:
n None - Do not generate a log.
n Log -This is the default Track option. It shows all the information that the Security Gateway used to
match the connection. At a minimum, this is the Source, Destination, Source Port, and Destination
Port. If there is a match on a rule that specifies an application, a session log shows the application
name (for example, Dropbox). If there is a match on a rule that specifies a Data Type, the session log
shows information about the files, and the contents of the files.
n Accounting - Select this to update the log at 10 minutes intervals, to show how much data has passed
in the connection: Upload bytes, Download bytes, and browse time.
Note - When upgrading from R77.X or from R80 versions to R81.10, there are changes to the behavior of
the options in the Track column. To learn more see sk116580.
Log Generation
n per Connection - Select this to show a different log for each connection in the session. This is the
default for rules in a Layer with only Firewall enabled. These are basic Firewall logs.
n per Session - Select this to generate one log for all the connections in the same session (see "Log
Sessions" on page 102). This is the default for rules in a Layer with Application & URL Filtering or
Content Awareness enabled. These are basic Application Control logs.
Alert:
For each alert option, you can define a script in Menu > Global properties > Log and Alert > Alerts.
n None - Do not generate an alert.
n Alert - Generate a log of type Alert and run a command, such as: Show a popup window, send an
email alert or an SNMP trap alert, or run a user-defined script as defined in the Global Properties.
n SNMP - Generate a log of type Alert and send an SNMP alert to the SNMP GUI, as defined in the
Global Properties.
n Mail - Generate a log of type Alert and send an email to the administrator, as defined in the Global
Properties.
n User Defined Alert - Generate a log of type Alert and send one of three possible customized alerts.
The alerts are defined by the scripts specified in the Global Properties.
Log Sessions
A session is a user's activity at a specified site or with a specified application. The session starts when a
user connects to an application or to a site. The Security Gateway includes all the activity that the user does
in the session in one session log (in contrast to the Security Gateway log, which shows top sources,
destinations, and services).
2. In the Log Details, click the session icon (in the top-right corner) to search for the session log in a
new tab.
For example, paste this into the query search bar and click Enter:
layer_uuid_rule_uuid:*_46f0ee3b-026d-45b0-b7f0-5d71f6d8eb10
Packet Capture
You can capture network traffic. The content of the packet capture provides a greater insight into the traffic
which generated the log. With this feature activated, the Security Gateway sends a packet capture file with
the log to the Log Server. You can open the file, or save it to a file location to retrieve the information a later
time.
For some blades, the packet capture option is activated by default in Threat Policy.
Running Queries
Click Auto - Refresh (F6). The icon is highlighted when Auto-Refresh is enabled.
The query continues to update every five seconds while Auto-Refresh is enabled. If the number of logs
exceeds 100 in a five-second period, the logs are aggregated, and the summary view shows.
4. Click Add.
5. Select fields to remove from the Selected Fields column.
6. Click Remove.
7. Select a field in the Selected Fields.
8. Click Move Up or Move Down to change its position in the Results Pane.
9. Double-click the Width column to change the default column width for the selected field.
You can enter query criteria directly from the Query search bar.
You can use the column headings in the Grid view to select query criteria. This option is not available in the
Table view.
You can enter query criteria directly in the Query search bar. You can manually create a new query or make
changes to an existing query that shows in the Query search bar.
As you enter text, the Search shows recently used query criteria or full queries. To use these search
suggestions, select them from the drop-down list.
Most query keywords and filter criteria are not case sensitive, but there are some exceptions. For example,
"source:<X>" is case sensitive ("Source:<X>" does not match). If your query results do not show the
expected results, change the case of your query criteria, or try upper and lower case.
When you use queries with more than one criteria value, an AND is implied automatically, so there is no
need to add it. Enter OR or other boolean operators if needed.
Criteria Values
Criteria values are written as one or more text strings. You can enter one text string, such as a word, IP
address, or URL, without delimiters. Phrases or text strings that contain more than one word must be
surrounded by quotation marks.
Phrase examples
n "John Doe"
n "Log Out"
n "VPN-1 Embedded Connector"
IP Addresses
IPv4 and IPv6 addresses used in log queries are counted as one word. Enter IPv4 address with dotted
decimal notation and IPv6 addresses with colons.
Example:
n 192.0.2.1
n 2001:db8::f00:d
You can also use the wildcard '*' character and the standard network suffix to search for logs that match IP
addresses within a range.
Examples:
n src:192.168.0.0/16 (shows all records for the source IP 192.168.0.0 to 192.168.255.255 inclusive)
n src:192.168.1.0/24 (shows all records for the source IP 192.168.1.0 to 192.168.1.255 inclusive)
n src:192.168.2.* shows all records for the source IP 192.168.2.0 to 192.168.2.255 inclusive
n 192.168.* shows all records for 192.168.0.0 to 192.168.255.255 inclusive
NOT Values
You can use NOT <field> values with Field Keywords in log queries to find logs for which the value of the
field is not the value in the query.
Syntax
NOT <field>: <value>
Example
NOT src:10.0.4.10
Wildcards
You can use the standard wildcard characters (* and ?) in queries to match variable characters or strings in
log records. You can use more than the wildcard character.
Wildcard syntax:
n The ? (question mark) matches one character.
n The * (asterisk) matches a character string.
Examples:
n Jo? shows Joe and Jon, but not Joseph.
n Jo* shows Jon, Joseph, and John Paul.
If your criteria value contains more than one word, you can use the wildcard in each word. For example, 'Jo*
N*' shows Joe North, John Natt, Joshua Named, and so on.
Note – Using a single ‘*’ creates a search for a non-empty value string. For example assetname:*
Field Keywords
You can use predefined field names as keywords in filter criteria. The query result only shows log records
that match the criteria in the specified field. If you do not use field names, the query result shows records
that match the criteria in all fields.
This table shows the predefined field keywords. Some fields also support keyword aliases that you can type
as alternatives to the primary keyword.
Keyword
Keyword Description
Alias
destination dst Traffic destination IP address, DNS name or Check Point network
object name
source src Traffic source IP address, DNS name or Check Point network
object name
If you use the rule number as a filter, rules in all the Layers with that number are matched.
To search for a rule name, you must not use the Rule field. Use free text. For example:
"Block Credit Cards"
Best Practice - Do a free text search for the rule name. Make sure rule names are unique and not reused in
different Layers.
Examples:
n source:192.168.2.1
n action:(Reject OR Block)
You can use the OR Boolean operator in parentheses to include multiple criteria values.
Important - When you use fields with multiple values, you must:
n Write the Boolean operator, for example AND.
n Use parentheses.
Boolean Operators
You can use the Boolean operators AND , OR , and NOT to create filters with many different criteria. You
can put multiple Boolean expressions in parentheses.
If you enter more than one criteria without a Boolean operator, the AND operator is implied. When you use
multiple criteria without parentheses, the OR operator is applied before the AND operator.
Examples:
n blade:"application control" AND action:block
Shows log records from the Application and URL FilteringSoftware Blade where traffic was blocked.
n 192.168.2.133 10.19.136.101
Shows log entries that match the two IP addresses. The AND operator is presumed.
n 192.168.2.133 OR 10.19.136.101
Shows all log entries from the Firewall, IPS or VPN blades that are not dropped. The criteria in the
parentheses are applied before the AND NOT criterion.
n source:(192.168.2.1 OR 192.168.2.2) AND destination:17.168.8.2
Shows log entries from the two source IP addresses if the destination IP address is 17.168.8.2.
This example also shows how you can use Boolean operators with field criteria.
Log Sessions
A session is a user's activity at a specified site or with a specified application. The session starts when a
user connects to an application or to a site. The Security Gateway includes all the activity that the user does
in the session in one session log (in contrast to the Security Gateway log, which shows top sources,
destinations, and services).
2. In the Log Details, click the session icon (in the top-right corner) to search for the session log in a
new tab.
Tracking Options
Select these options in the Track column of a rule:
n None - Do not generate a log.
n Log -This is the default Track option. It shows all the information that the Security Gateway used to
match the connection. At a minimum, this is the Source, Destination, Source Port, and Destination
Port. If there is a match on a rule that specifies an application, a session log shows the application
name (for example, Dropbox). If there is a match on a rule that specifies a Data Type, the session log
shows information about the files, and the contents of the files.
n Accounting - Select this to update the log at 10 minutes intervals, to show how much data has passed
in the connection: Upload bytes, Download bytes, and browse time.
Note - When upgrading from R77.X or from R80 versions to R81.10, there are changes to the behavior of
the options in the Track column. To learn more see sk116580.
Log Generation
n per Connection - Select this to show a different log for each connection in the session. This is the
default for rules in a Layer with only Firewall enabled. These are basic Firewall logs.
n per Session - Select this to generate one log for all the connections in the same session (see "Log
Sessions" on page 102). This is the default for rules in a Layer with Application & URL Filtering or
Content Awareness enabled. These are basic Application Control logs.
Alert:
For each alert option, you can define a script in Menu > Global properties > Log and Alert > Alerts.
n None - Do not generate an alert.
n Alert - Generate a log of type Alert and run a command, such as: Show a popup window, send an
email alert or an SNMP trap alert, or run a user-defined script as defined in the Global Properties.
n SNMP - Generate a log of type Alert and send an SNMP alert to the SNMP GUI, as defined in the
Global Properties.
n Mail - Generate a log of type Alert and send an email to the administrator, as defined in the Global
Properties.
n User Defined Alert - Generate a log of type Alert and send one of three possible customized alerts.
The alerts are defined by the scripts specified in the Global Properties.
Note - SmartView graphics do not display properly in Internet Explorer. Accessing SmartEvent Server
from the web (SmartView) is supported only from Google Chrome and Mozilla Firefox.
or
https://<Server IP Address>:4434)
l The API documentation portal (https://<Server IP
Address>/api_docs)
l Web SmartConsole (https://<Server IP
Address>/smartconsole)
SmartView advantages:
n Available for non-admin users
n Export up to 1,000,000 logs
n Integrated top statistics and docked card
n Support for High Contrast theme
In SmartView:
SmartView opens by default in the General Overview tab. This shows the statistics, Software Blades,
timelines, and more. Any open tabs from the previous session are retained.
The Audit Logs tab shows audit logs which are changes done in the management.
The Logs > Logs View tab shows blade activities.
In SmartView, you first filter for the application and then by user.
1. Click the + icon to open a new tab.
2. Click Views > Access Control.
3. Right-click the User column and drill down to see the user activity or create a filter for this user in your
current view.
You can schedule for all activities for a user, but cannot set the system to trigger an alert at a certain
threshold.
Note - The default time frames on the SmartView Web Application and
SmartConsole are not synchronized.
6. For Email server settings, select Edit to enter the email server details.
7. Click OK.
Exporting Logs
Apply a filter to select the logs you want to export. Currently, you can only export logs to CSV.
To export logs:
1. In the Logs tab, click Options and select Export > Export to CSV.
The CSV Export window opens.
2. Select the Logs Amount.
3. Select the Exported Columns - All columns or Visible columns.
4. Click OK.
5. A popup window appears when the export process starts.
When you see a message that the exported completed successfully, click Download.
All exported logs also appear in the archive tab.
Procedure
1. Define syslog server objects in SmartConsole.
Instructions
d. Create the Syslog Server object that represents the Syslog server:
i. In the Object Explorer, click New > Server > More > Syslog.
ii. Configure these fields:
n Name - Enter a unique name.
n Host - Select an existing host or click New to define a new computer or
appliance.
n Port - Enter the correct port number on the syslog server (default = 514).
n Version - Select BSD Protocol or Syslog Protocol.
iii. Click OK.
e. Close the Object Explorer.
2. Select the configured syslog server objects in the Security Gateway / Cluster object.
Instructions
3. Configure the logging properties of the Security Gateways / each Cluster Member.
Note - In Cluster, you must configure each Cluster Member in the same way.
The fwsyslog_enable kernel parameter enables or disables the Syslog in Kernel feature on Security
Gateways:
n Value 0 = Disabled (default)
n Value 1 = Enabled
You can enable or disable the Syslog in Kernel feature temporarily (until the Security Gateway
reboots), or permanently (survives reboot).
To see the current state of the Syslog in Kernel feature
a. Connect to the command line on the Security Gateway / each Cluster Member.
b. Log in to the Expert mode.
c. Run:
Output:
n "fwsyslog_enable = 0" means the feature is disabled (default)
n "fwsyslog_enable = 1" means the feature is enabled
To enable the Syslog in Kernel feature temporarily (does not survive reboot)
a. Connect to the command line on the Security Gateway / each Cluster Member.
b. Log in to the Expert mode.
c. Run:
a. Connect to the command line on the Security Gateway / each Cluster Member.
b. Log in to the Expert mode.
c. Edit the $FWDIR/boot/modules/fwkern.conf file:
vi $FWDIR/boot/modules/fwkern.conf
To disable the Syslog in Kernel feature temporarily (does not survive reboot)
a. Connect to the command line on the Security Gateway / each Cluster Member.
b. Log in to the Expert mode.
c. Run:
a. Connect to the command line on the Security Gateway / each Cluster Member.
b. Log in to the Expert mode.
c. Edit the $FWDIR/boot/modules/fwkern.conf file:
vi $FWDIR/boot/modules/fwkern.conf
1. Connect to the command line on the Security Gateway / each Cluster Member.
2. Log in to the Expert mode.
3. Run:
Sample output:
fwsyslog_nlogs_counter = 21
1. Make two command line connections to the Security Gateway / each Cluster Member.
2. In each command line connection, log in to the Expert mode.
3. In the first shell, run:
5. In the first shell, see the counter for each CoreXL Firewall instance and the sum of all CoreXL
Firewall instances.
Sample output:
Event Analysis
Event Analysis with SmartEvent
The SmartEventSoftware Blade is a unified security event management and analysis solution that delivers
real-time, graphical threat management information. SmartConsole, SmartView Web Application, and the
SmartEvent GUI client consolidate billions of logs and show them as prioritized security events so you can
immediately respond to security incidents, and do the necessary actions to prevent more attacks. You can
customize the views to monitor the events that are most important to you. You can move from a high level
view to detailed forensic analysis in a few clicks. With the free-text search and suggestions, you can quickly
run data analysis and identify critical security events.
What is an Event?
An event is a record of a security incident. It is based on one or more logs, and on rules that are defined in
the Event Policy.
An example of an event that is based on one log: A High Severity Anti-Bot event. One Anti-Bot log with a
Severity of High causes the event to be recorded.
An example of an event that is based on more than one log: A Certificate Sharing event. Two login logs with
the same certificate and a different user cause the event to be recorded.
3 SmartEvent Identifies events: Analyzes each log entry from a Log Server, and looks for
Correlation patterns according to the installed Event Policy. The logs contain data from
Unit Check Point products and certain third-party devices. When a threat pattern
is identified, the SmartEvent Correlation Unit forwards the event to the
SmartEvent Server.
6 SmartEvent Shows the received events. Uses the clients to manage events (for
client example: to filter and close events), fine-tunes, and installs the Event Policy.
The clients are:
n SmartConsole
n SmartView Web Application
The SmartEvent components can be installed on one computer (that is, a standalone deployment) or
multiple computers and sites (a distributed deployment). To handle higher volumes of logging activity, we
recommend a distributed deployment. Each SmartEvent Correlation Unit can analyze logs from more than
one Log Server or Domain Log Server.
n Marks log entries that are not stand-alone events, but can be part of a larger pattern to be identified
later.
n Takes a log entry that meets one of the criteria set in the Events Policy, and generates an event.
n Takes a new log entry that is part of a group of items. Together, all these items make up a security
event. The SmartEvent Correlation Unit adds it to an ongoing event.
n Discards log entries that do not meet event criteria.
Policy Tab
Define the Event Policy in the Event Policy tab. Most configuration steps occur in the Policy tab. You define
system components, such as SmartEvent Correlation Unit, lists of blocked IP addresses and other general
settings.
The types of events that SmartEvent can detect are listed here, and sorted into a number of categories. To
change each event, change the default thresholds and set Automated Responses. You can also disable
events.
The Policy tab has these sections:
n Selector Tree - The navigation pane.
n Detail pane - The settings of each item in the Selector Tree.
n Description pane - A description of the selected item.
You can edit the event policy in one of these ways:
n Fine-tune the Event Policy.
n Change the existing Event Definition to see the events that interest you in "Modifying Event
Definitions" on page 130.
n Create new Event Definitions to see the events that are not included in the existing definitions.
Modifications to the Event Policy do not take effect until saved on the SmartEvent Server and installed to the
SmartEvent Correlation Unit.
Revert Changes
You can undo changes to the Event Policy, if they were not saved.
To undo changes: click File > Revert Changes.
Event Threshold
The Event Threshold allows you to modify the limits that, when exceeded, indicate that an event occurred.
Limits include the number of logs, and the timeframe in which they occurred:
Detect the event when more than X logs were detected over a period of Y seconds.
To decrease the number of false alarms based on a particular event, increase the number of logs and/or the
timeframe for them to occur.
Severity
To modify the severity of an event, select a severity level from the drop-down list.
If the event is based on Threat Prevention logs, the event gets the severity from the protection type, not from
the severity configured here.
Automatic Reactions
When detected, an event can activate an Automatic Reaction. The SmartEvent administrator can create and
configure one Automatic Reaction, or many, according to the needs of the system.
For example: A Mail Reaction can be defined to tell the administrator of events to which it is applied. Multiple
Automatic Mail Reactions can be created to tell a different responsible party for each type of event.
IsLast integer
LastUpdateTime integer
MaxNumOfConnections integer
Name varchar(1024), NumOfAcceptedConnections integer
NumOfRejectedConnections integer
NumOfUpdates integer
ProductCategory varchar(1024)
ProductName varchar(1024)
Remarks varchar(1024)
RuleID varchar(48)
Severity integer
StartTime integer
State integer
TimeInterval integer
TotalNumOfConnections varchar(20)
User varchar(1024)
Uuid varchar(48)
aba_customer varchar(1024)
jobID varchar(48)
policyRuleID varchar(48)
3. Fill out the SNMP Trap parameters of Host, Message, OID and Community name.
The command send_snmp uses values that are found in the file chkpnnt.mib, in the directory
$CPDIR/lib/snmp/. An OID value used in the SNMP Trap parameters window must be defined in
chkpnnt.mib, or in a file that refers it. If the OID field is left blank, the value is determined from
iso.org.dod.internet.private.enterprises.checkpoint.products.fw.fwEvent =
1.3.6.1.4.1.2620.1.1.11.
When the automatic reaction occurs, the SNMP Trap is sent as a 256 byte DisplayString text.
But, if the OID type is not text, the message is not sent.
4. Select Save.
3. In the SmartEvent GUI client Policy tab, in Automatic Reactions, Select Add > External Script.
4. In the Add Automatic Reaction window
where name is a string and value is either free text until a semicolon, or a nested name-value set.
This is a sample event:
Working Hours
Working Hours are used to detect unauthorized attempts to access protected systems and other forbidden
operations after-hours. To set the Regular Working Hours for an event, select a Time Object that you have
configured from the drop-down list.
Exceptions
Exceptions allow an event to be independently configured for the sources, destination, service and other
parameters depending on the event type. For example, if the event Port Scan from Internal Network is set
to detect an event when 30 port scans occur within 60 seconds, you can also define that two port scans
detected from host A within 10 seconds of each other is also an event.
To add an exception:
1. Under Apply the following exceptions, click Add.
2. Select the Source and/or Destination of the object to apply different criteria for this event.
Note - If you do not see the host object listed, you may need to create it in SmartEvent.(see "System
Administration" on page 147).
To match the Event Definition "A", a log from Endpoint Security must match the Action, Event Type, Port,
and Protocol values listed in the Endpoint Security column. A log from a Security Gateway must match the
values listed in its column.
SmartEvent divides this procedure into two steps. The SmartEvent Correlation Unit first checks if the
Product value in the log matches one of the permitted Product values of an Event Definition.
If Log 1 did not contain a permitted Product value, the SmartEvent Correlation Unit compares the log
against Event Definition "B", and so on. If the log fails to match against an Event Definition, it is discarded.
The SmartEvent Correlation Unit checks if the log contains the Product-specific criteria to match the Event
Definition. For example: The product Endpoint Security generates logs that involve the Firewall, Spyware,
Malicious Code Protection, and others. The log contains this information in the field Event Type. If an event
is defined to match on Endpoint Security logs with the event type Firewall, an Endpoint Security log with
Event Type "Spyware" fails against the Event Definition filter. Other criteria can be specified to the Product.
In our example, Log 1 matched Event Definition "A" with a permitted product value. The SmartEvent
Correlation Unit examines if the log contains the necessary criteria for an Endpoint Security log to match.
If the criteria do not match, the SmartEvent Correlation Unit continues to compare the log criteria to other
event definitions.
The logs can come from different log servers and be correlated in the same event.
The Event Candidate tracks logs until the criteria is matched (the criteria is the number of logs in a declared
number of seconds).
Each Event Definition can have multiple event candidates, each of which keeps track of logs grouped by
equivalent properties. In the figure above the logs that create the event candidate have a common source
value. They are dropped, blocked or rejected by a Security Gateway. They are grouped together because
the Event Definition is designed to detect this type of activity that originates from one source. Depending on
the event declaration, if there is a grouping declaration on the source field, it will create a new event
candidate.
When a log matches the event definition, but has properties different than those of the existing event
candidates, a new event candidate is created. This event candidate is added to what can be thought of as
the Event Candidate Pool.
By default, SmartEvent creates a new event candidate for a log with a different source.
To illustrate more, an event defined detects a high rate of blocked connections. SmartEvent tracks the
number of blocked connections for each Security Gateway, and the logs of the blocked traffic at each
Security Gateway forms an event candidate. When the threshold of blocked connection logs from a Security
Gateway is surpassed, that Security Gateway event candidate becomes an event. While this Event
Definition creates one event candidate for each Security Gateway monitored, other Event Definitions can
create many more.
The Event Candidate Pool is a dynamic environment, with new logs added and older logs discarded when
they have exceeded an Event Definition time threshold.
Event Generation
When a candidate becomes an event, the SmartEvent Correlation Unit forwards the event to the Event
Database. But to discover an event does not mean that SmartEvent stops to track logs related to it. The
SmartEvent Correlation Unit adds matching logs to the event as long as they continue to arrive during the
event threshold. To keep the event open condenses what can appear as many instances of the same event
to one, and provides accurate, up-to-date information as to the start and end time of the event.
Right Actions
Description
Click Menu
New New Launches the Event Definition Wizard, which allows you to select how to base
Custom the event: on an existing Event Definition, or from scratch.
Event
Save Save Creates an Event Definition based on the properties of the highlighted Event
As Event As Definition. When you select Save As, the system prompts you to save the
selected Event Definition with a new name for later editing. Save As can also
be accessed from the Properties window.
All User Defined Events are saved at Policy tab > Event Policy > User Defined Events. When an Event
Definition exists it can be modified through the Properties window, available by right-click and from the
Actions menu.
9. Select Next.
10. Optional: Edit the product filters:
n If you added a product you can edit the filters for each product (Edit all product filters), or
those of new products you added (Edit only newly selected productfilters).
n If you did not add other products, edit the filters of existing products (Yes) or skip this step (No,
Leave the original files).
Click Next.
11. Edit or add product filters for each log necessary in the Event Definition filter
a. Select the Log field from the available Log Field list.
b. Click Add to edit the filter.
c. Make sure that the filter matches on All Conditions or Any Conditions.
d. Double-click the Log field and select the values to use in the filter.
Click Next.
12. When you defined the filters for each product, select values for these options to define how
to process logs
n Detect the event when at least__ logs occurred over a period of __ seconds contains the
event thresholds that define the event. You can modify the event thresholds by altering the
number of logs and/or the period of time that define the event.
n Each event definition may have multiple Event Candidates existing simultaneously
allows you to set whether SmartEvent creates distinct Event Candidates based on a field (or
set of fields) that you select below.
Select the field(s) by which distinct Event Candidates will be created allows you to set
the field (or set of fields) that are used to differentiate between Event Candidates.
n Use unique values of the __ field when counting logs directs SmartEvent to count unique
values of the specified field when determining whether the Event Threshold has been
surpassed. When this property is not selected, SmartEvent counts the total number of logs
received.
n Name - Name the Event Definition, enter a Description and select a Severity level. The
text you enter in the Description field shows in the Event Description area (below the event
configurable properties).
n Count logs
This screen defines how SmartEvent counts logs related to this event.
l A Single log - Frequently depicts an event, such as a log from a virus scanner that
reports that a virus is found.
l With this option you can set the fields that are used to group events into Event
Candidates. Logs with matching values for these fields are added to the same
event. For example: Multiple logs that report a virus detected on the same source
with the same virus name are combined into the same event.
l Multiple logs - Required for events that identify an activity level, such as a High
Connection Rate.
l When the event is triggered by multiple logs, set the behavior of Event Candidates:
l Detect the event when at least... - Set the Event Threshold that, when exceeded,
indicates that an event has occurred.
l Select the field(s) by which distinct event candidates will be created - An event
is generated by logs with the same values in the fields specified here. To define
how logs are grouped into Event Candidates, select the related fields here.
l Use unique values of the ... - Only logs with unique values for the fields specified
here are counted in the event candidate. For example: A port scan event counts
logs that include unique ports scanned. Also, the logs do not increment the log
count for logs that contain ports already encountered in the event candidate.
l Advanced - Define the keep=alive time for the event, and how often the
SmartEvent Correlation Unit updates the SmartEvent Server with new logs for the
created event.
n Event Format
When an event is generated, information about the event is presented in the Event Detail
pane.
This screen lets you specify if the information will be added to the detailed pane and from
which Log Field the information is taken.
You can clear it in the Display column. The Event Field will not be populated.
n GUI representation
All events can be configured. This screen lets you select the configuration
parameters that show.
l The Threshold section shows the number of logs that must matched to create the
event. This is usually not shown for one log events and shown for multiple log
events.
l The Exclude section lets you specify the log fields that show when you add an
event exclusion.
l The Exception section lets you specify the log fields that show when you add an
event exception.
Server Event
Category Source Dest Service Reason
Type Name
Server Event
Category Source Dest Service Reason
Type Name
Server Event
Category Source Dest Service Reason
Type Name
Server Event
Category Source Dest Service Reason
Type Name
Server Event
Category Source Dest Service Reason
Type Name
Server Event
Category Source Dest Service Reason
Type Name
Server Event
Category Source Dest Service Reason
Type Name
Server Event
Category Source Dest Service Reason
Type Name
System Administration
To maintain your SmartEvent system, you can do these tasks from the General Settings section of the
Policy tab:
n Adding a SmartEvent Correlation Unit and Log Servers
n Create offline jobs analyze historical log files (see "Importing Offline Log Files" on page 50).
n Adding objects to the Internal Network
n Creating scripts to run as Automatic Reactions for certain events (see "Creating an External Script
Automatic Reaction" on page 149)
n Creating objects for use in filters
Network Objects are the objects that are synchronized from the Management object database as well as
user defined additional objects. These objects from the Management server are added to SmartEvent
during the initial sync and updated at set intervals.
As a best practice, use SmartConsole to add new network or host objects to the Management server.
The customer cannot define the internal network until the initial sync is complete.
Note - The customer cannot define the internal network until the initial sync is complete.
3. In the SmartEvent GUI client Policy tab, in Automatic Reactions, select Add > External Script.
4. In the Add Automatic Reaction window:
a. Give the automatic reaction object a significant name.
b. In Command line, enter the name of the script to run.
Specify the name of the script that is in $RTDIR/bin/ext_commands/ directory.
Use the relative path if needed.
Do not specify the full path of $RTDIR/bin/ext_commands/.
c. Select Save.
where name is a string and value is either free text until a semicolon, or a nested name-value set.
This is a sample event:
SIC is initialized between Security Gateways (3) (local and remote), and the Security Management Server
(2). The Security Management Server then gets status data from the Software Blades with the AMON
(Application Monitoring)protocol. SmartView Monitor (1) gets the data from the Security Management
Server.
To Start Monitoring
To open the monitoring views in SmartConsole:
1. From the Gateways & Servers view, select a Security Gateway.
2. Click Monitor.
The Device and License information window opens and shows:
n Device Status
n License Status
n System Counters
n Traffic
Immediate Actions
If the status shows an issue, you can act on that network object.
For example:
n Disconnect client - Disconnect one or more of the connected SmartConsole clients.
n Start/Stop cluster member - You can see all Cluster Members of a Cluster in SmartView Monitor.
You can start or stop a selected Cluster Member.
n Suspicious Action Rules - You can block suspicious network activity while you investigate the real
risk or to quickly block an obvious intruder.
Viewing Alerts
Alert commands are set in SmartConsole > Global Properties > Log and Alert > Alerts page. The Alerts in
this window apply only to Security Gateways.
To see alerts:
1. Open SmartConsole > Logs & Monitor view > External Apps.
2. Click Tunnel & User Monitoring.
SmartView Monitor opens.
3. Click the Alerts icon in the toolbar.
The Alerts window opens. Use this window to monitor or delete alerts.
To block an activity:
1. In the SmartView Monitor, click the Suspicious Activity Rules icon in the toolbar.
The Enforced Suspicious Activity Rules window opens.
2. Click Add.
The Block Suspicious Activity window opens.
3. In Source and in Destination, select IP or Network:
n To block all sources or destinations that match the other parameters, enter Any.
n To block one suspicious source or destination, enter an IP Address and Network Mask.
4. In Service:
n To block all connections that fit the other parameters, enter Any.
n To block one suspicious service or protocol, click the button and select a service from the
window that opens.
5. In Expiration, set a time limit.
6. Click Enforce.
For example:
Your corporate policy does not allow to share peer2peer file, and you see it in the Traffic > Top P2P Users
results.
1. Right-click the result bar and select Block Source.
The SAM rule is set up automatically with the user IP address and the P2P_File_Sharing_
Applications service.
2. Click Enforce.
3. For the next hour, while this traffic is dropped and logged, contact the user.
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the information
received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined Alerts
mechanism.
For more information, see the R81.10 CLI Reference Guide - Chapter Security Management Server
Commands - Section sam_alert.
2. Select thresholds.
3. In Action, select:
n none - No alert.
n log - Sends a log entry to the database.
n alert - Opens a pop-up window to your desktop.
n mail - Sends a mail alert to your Inbox.
n snmptrap - Sends an SNMP alert.
n useralert - Runs a script. Make sure a user-defined action is available (in SmartConsole, click
Menu > Global properties > Log and Alert > Alert Commands).
Types of Alerts
n Active alerts are sent when a threshold point is passed or the status of a monitored component is
problematic.
n Clear alerts are sent when the problem is resolved and the component has returned to its normal
value. Clear alerts look like active alerts but the severity is set to 0.
Configuration Procedures
There is one primary command to configure the thresholds in the command line - threshold_config.
You must be in the Expert mode to run it. After you run the threshold_config command, follow the on-
screen instructions to make selections and configure the global settings and each threshold.
When you run threshold_config, you get these options:
n Show policy name - Shows you the name configured for the threshold policy.
n Set policy name - Lets you set a name for the threshold policy.
n Save policy - Lets you save the policy.
n Save policy to file - Lets you export the policy to a file.
n Load policy from file - Lets you import a threshold policy from a file.
n Configure global alert settings - Lets you configure global settings for how frequently alerts are sent
and how many alerts are sent.
n Configure alert destinations - Lets you configure a location or locations where the SNMP alerts are
sent.
n View thresholds overview - Shows a list of all thresholds that you can set including: the category of
the threshold, if it is active or disabled, the threshold point (if relevant), and a short description of what
it monitors.
n Configure thresholds - Opens the list of threshold categories to let you select thresholds to configure.
If you select Configure global alert settings, you can configure global settings for how frequently alerts are
sent and how many alerts are sent. You can configure these settings for each threshold. If a threshold does
not have its own alert settings, it uses the global settings by default.
You can configure these options:
n Enter Alert Repetitions - How many alerts are sent when an active alert is triggered. If you enter 0,
alerts are sent until the problem is fixed.
n Enter Alert Repetitions Delay - How long the system waits between it sends active alerts.
n Enter Clear Alert Repetitions - How many clear alerts are sent after a threshold returns to a regular
value.
n Enter Clear Alert Repetitions Delay - How long the system waits between it sends clear alerts.
If you select Configure Alert Destinations, you can add and remove destinations for where the alerts are
sent. You can see a list of the configured destinations. A destination is usually an NMS (Network
Management System) or a Check PointLog Server.
After you enter the details for a destination, the CLI asks if the destination applies to all thresholds.
n If you enter yes, alerts for all thresholds are sent to that destination, unless you remove the
destination from an individual threshold.
n If you enter no, no alerts are sent to that destination by default. But for each individual threshold, you
can configure the destinations and you can add destinations that were not applied to all thresholds.
For each threshold, you can choose to which of the alert destinations its alerts are sent. If you do not define
alert destination settings for a threshold, it sends alerts to all of the destinations that you applied to all
thresholds.
For each alert destination enter:
n Name - An identifying name.
n IP - The IP address of the destination.
n Port - Through which port it is accessed
n Ver - The version on SNMP that it uses
n Other data - Some versions of SNMP require more data. Enter the data that is supplied for that
SNMP version.
Configure Thresholds
If you select Configure thresholds, you see a list of the categories of thresholds, including:
n Hardware
n High Availability
n Networking
n Resources
n Log Server Connectivity
Some categories apply only to some machines or deployments. For example, Hardware applies only to
Check Point appliances and High Availability applies only to clusters or High Availability deployments.
Select a category to see the thresholds in it. Each threshold can have these options:
n Enable/Disable Threshold - If the threshold is enabled, the system sends alerts when there is a
problem. If it is disabled it does not generate alerts.
n Set Severity - You can give each threshold a severity setting. The options are: Low, Medium, High,
and Critical. The severity level shows in the alerts and in SmartView Monitor. It lets you know quickly
how important the alert is.
n Set Repetitions - Set how frequently and how many alerts will be sent when the threshold is passed.
If you do not configure this, it uses the global alert settings.
n Set Threshold Point - Enter the value that will cause active alerts when it is passed. Enter the
number only, without a unit of measurement.
n Configure Alert Destinations - See all of the configured alert destinations. By default,
active alerts and clear alerts are sent to the destinations. You can change this for each
destination. When you select the destination you see these options
l Remove from destinations - If you select this, alerts for this threshold are not sent to the
selected destination.
l Add a destination - If you configured a destination in the global alert destinations but did not
apply it to all thresholds, you can add it to the threshold.
l Disable clear alerts - Cleared alerts for this threshold are not sent to the selected
destination. Active alerts are sent.
1. On the Security Management Server, install the policy on all Security Gateways.
2. For a local Security Gateway threshold policy or a Multi-Domain Server environment, use
the cpwd_admin utility to restart the CPD process
l Policy name - The name that you set for the policy in the CLI.
l State - If the policy is enabled or disabled.
l Thresholds - How many thresholds are enabled.
l Active events - How many thresholds are currently sending alerts.
l Generated Events - How many not active thresholds became active since the policy
was installed.
n Active Events - Details for the thresholds that are currently sending alerts.
For example, the Security Gateway cannot monitor RAID sensors on a machine that does
not have RAID sensors. Therefore, it shows an error for the RAID Sensor Threshold.
l Threshold Name - The name of the threshold with an error.
l Error - A description of the error.
l Time of Error - When the error first occurred.
Customizing Results
You can create Custom Views, to change the fields that show in the results.
n Interfaces
n Services
n IPs / Network Objects
n QoS Rules
n Security Rules
n Connections
n Tunnels
n Virtual Links
n Packet Size Distribution
Refreshing Views
Results are automatically refreshed every 60 seconds.
To refresh the view earlier, right-click the view name in the Tree and select Run.
To refresh data about an object in the current view, right-click the object in the results and select Refresh.
Gateway Status
Status updates show for Security Gateways and Software Blades. The Overall status of a Security Gateway
is the most important status of its Software Blades.
For example, if statuses of all the Software Blades are OK, except for the SmartEvent blade, which has a
Problem status, the Overall status is Problem.
OK The Security Gateway and all its Software Blades work properly.
Attention At least one Software Blade has a minor issue, but the Security Gateway works.
Problem At least one Software Blade reported a malfunction, or an enabled Software Blade is
not installed.
Waiting SmartView Monitor waits for the Security Management Server to send data from
Security Gateways.
Untrusted Cannot make Secure Internal Communication between the Security Management
Server and the Security Gateway.
System Data
n OS Information - The name, the version name/number, the build number, the service pack, and any
additional information about the Operating System in use.
n CPU - The specific CPU parameters (for example, Idle, User, Kernel, and Total) for each CPU.
Note - In the Gateways Results view the Average CPU indicates the average total CPU usage of all
existing CPOS.
n Memory - The total amount of virtual memory, what percentage of this total is used. The total amount
of real memory, what percentage of this total is used, and the amount of real memory available for
use.
n Disk - Shows all the disk partitions and their specific details (for example, capacity, used, and free).
Note - In the Gateways Results view the percentage/total of free space in the hard disk on which the
Firewall is installed. For example, if there are two hard drives C and D and the Firewall is on C, the
Disk Free percentage represents the free space in C and not D.
To view the status of Check Point applications on the local server or another appliance, the cpstat
command. For more information, see the R81.10 CLI Reference Guide - Chapter Security Gateway
Commands - Section cpstat.
Firewall
n Policy information - The name of the Security Policy installed on the Security Gateway, and the date
and time that this policy was installed.
n Packets - The number of packets accepted, dropped and logged by the Security Gateway.
n UFP Cache performance - The hit ratio percentage and the total number of hits handled by the
cache, the number of connections inspected by the UFP Server.
n Hash Kernel Memory (the memory status) and System Kernel Memory (the OS memory) - The total
amount of memory allocated and used. The total amount of memory blocks used. The number of
memory allocations, and those allocation operations which failed. The number of times that the
memory allocation freed up, or failed to free up. The NAT Cache, including the total amount of hits
and misses.
n Failed - The current failure rate of Phase I IKE Negotiations can be used to troubleshoot (for instance,
denial of service) or for a heavy load of VPN remote access connections. High Watermark includes
the highest rate of failed Phase I IKE negotiations since the Policy was installed. Accumulative is the
total number of failed Phase I IKE negotiations since the Policy was installed.
n Concurrent - The current number of concurrent IKE negotiations. This is useful to track the behavior
of VPN connection initiation, especially in large deployments of remote access VPN scenarios. High
Watermark includes the maximum number of concurrent IKE negotiations since the Policy was
installed.
n Encrypted and Decrypted throughput - The current rate of encrypted or decrypted traffic (measured
in Mbps). Encrypted or decrypted throughput is useful (in conjunction with encrypted or decrypted
packet rate) to track VPN usage and VPN performance of the Security Gateway. High Watermark
includes the maximum rate of encrypted or decrypted traffic (measured in Mbps) since the Security
Gateway was restarted. Accumulative includes the total encrypted or decrypted traffic since the
Security Gateway was restarted (measured in Mbps).
n Encrypted and Decrypted packets - The current rate of encrypted or decrypted packets (measured
in packets per second). Encrypted or decrypted packet rate is useful (in conjunction with
encrypted/decrypted throughput) to track VPN usage and VPN performance of the Security Gateway.
High Watermark includes the maximum rate of encrypted or decrypted packets since the Security
Gateway was restarted, and Accumulative, the total number of encrypted packets since the Security
Gateway was restarted.
n Encryption and Decryption errors - The current rate at which errors are encountered by the Security
Gateway (measured in errors per second). This is useful to troubleshoot VPN connectivity issues.
High Watermark includes the maximum rate at which errors are encountered by the Security Gateway
(measured in errors per second) since the Security Gateway was restarted, and the total number of
errors encountered by the Security Gateway since the Security Gateway was restarted.
n Hardware - The name of the VPN Accelerator Vendor, and the status of the Accelerator. General
errors such as the current rate at which VPN Accelerator general errors are encountered by the
Security Gateway (measured in errors per second). The High Watermark includes the maximum rate
at which VPN Accelerator general errors are encountered by the Security Gateway (measured in
errors per second) since the Security Gateway was restarted. The total number of VPN Accelerator
general errors encountered by the Security Gateway since it was restarted.
n IP Compression - Compressed/Decompressed packets statistics and errors.
QoS
n Policy information - The name of the QoS Policy and the date and time that it was installed.
n Number of interfaces - The number of interfaces on the Check Point QoS Security Gateway.
Information about the interfaces applies to both inbound and outbound traffic. This includes the
maximum and average amount of bytes that pass per second, and the total number of conversations,
where conversations are active connections and connections that are anticipated as a result of prior
inspection. Examples are data connections in FTP, and the "second half" of UDP connections.
n Packet and Byte information - The number of packets and bytes in Check Point QoS queues.
ClusterXL
n Gateway working mode - The Security Gateway works mode as a Cluster Member (Active or not),
and its place in the priority sequence. Working modes are: ClusterXL, Load Sharing, Sync only.
Running modes: Active, Standby, Ready, and Down.
n Interfaces - Interfaces recognized by the Security Gateway. The interface data includes the IP
Address and status of the specified interface, if the connection that passes through the interface is
verified, trusted or shared.
n Problem Notes - Descriptions of the problem notification device such as its status, priority and when
the status was last verified.
OPSEC
n The version name or number, and build number of the Check Point OPSEC SDK and OPSEC
product. The time it takes (in seconds) since the OPSEC Gateway is up and running.
n The OPSEC vendor can add fields to their OPSEC Application Gateway details.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o
<Polling Interval> [-c <Count>] [-e <Period>]] <Application Flag>
Note - You can write the parameters in the syntax in any order.
For more information, see the R81.10 CLI Reference Guide - Chapter Security Gateway Commands -
Section cpstat.
Up The tunnel works and the IDE SA (Phase 1) and IPSEC SA (Phase 2) exist with a
data can flow with no peer gateway.
problems.
Gateway not The Security Gateway is The Security Gateway is not responding.
Responding not responding.
Traffic
Traffic Monitoring provides in-depth details on network traffic and activity. As a network administrator you
can generate traffic information to:
n Analyze network traffic pattern
Network traffic patterns help administrators determine which services demand the most network
resources.
n Audit and estimate costs of network us
Monitoring traffic can provide information on how the use of network resources is divided among
corporate users and departments. Reports that summarize customer use of services, bandwidth and
time can provide a basis to estimate costs for each user or department.
n Identify the departments and users that generate the most traffic and the times of peak activity.
n Detect and monitor suspicious activity. Network administrators can produce graphs and charts that
document blocked traffic, alerts, rejected connections, or failed authentication attempts to identify
possible intrusion attempts.
A Traffic view can be created to monitor the Traffic types listed in the following table.
Services Shows the current status view about Services used through the selected Security
Gateway.
IPs/Network Shows the current status view about active IPs/Network Objects through the selected
Objects Security Gateway.
Security Rules Shows the current status view about the most frequently used Access Control rules.
The Name column in the legend states the rule number as previously configured in
SmartConsole.
Interfaces Shows the current status view about the Interfaces associated with the selected
Security Gateway.
Connections Shows the current status view about current connections initiated through the
selected Security Gateway.
Tunnels Shows the current status view about the Tunnels associated with the selected
Security Gateway and their usage.
Virtual Link Shows the current traffic status view between two Security Gateways (for example,
Bandwidth, Bandwidth Loss, and Round Trip Time).
Packet Size Shows the current status view about packets according to the size of the packets.
Distribution
QoS Shows the current traffic level for each QoS rule.
Note - "Top QoS Rules" view in SmartView Monitor shows that almost all traffic
matches the "No Match" rule when SecureXL is enabled on the Security Gateway.
Refer to sk118720.
System Counters
Monitoring System Counters provides in-depth details about Check PointSoftware Blade usage and
activities. As a network administrator, you can generate system status information about:
n Resource usage for the variety of components associated with the Security Gateway. For example,
the average use of real physical memory, the average percent of CPU time used by user applications,
free disk space, and so on.
n Security Gateway performance statistics for a variety of Firewall components. For example, the
average number of concurrent CVP sessions handled by the HTTP security server, the number of
concurrent IKE negotiations, the number of new sessions handled by the SMTP security server, and
so on.
n Detect and monitor suspicious activity. Network administrators can produce graphs and charts that
document the number of alerts, rejected connections, or failed authentication attempts to identify
possible intrusion attempts.
After you record a view, you can play it back. You can select Play or Fast Play, to see results change faster.
Monitoring Users
This section describes how to monitor users.
Users Solution
The User Monitor is an administrative feature. This feature lets you to keep track of Endpoint Security VPN
users currently logged on to the specific Security Management Servers. The User Monitor provides you with
a comprehensive set of filters which makes the view definition process user-friendly and highly efficient. It
lets you to easily navigate through the obtained results.
With data on current open sessions, overlapping sessions, route traffic, connection time, and more, the User
Monitor gives detailed information about connectivity experience of remote users. This SmartView Monitor
feature lets you view real-time statistics about open remote access sessions.
If specific data are irrelevant for a given User, the column shows N/A for the User.
Unauthorized
Authorized
1. The Endpoint Security client (A) in the internal network (B) opens a connection to the internet (C)
through a Security Gateway (D).
2. Cooperative Enforcement starts to work on the first server's reply to the client.
3. The Security Gateway sees the client's compliance in its tables and queries the Endpoint Security
Management Server (E).
4. When a reply is received, a connection from a compliant host to the internet is allowed.
If the client is non-compliant and Cooperative Enforcement is not in Monitor-only mode, the
connection is closed.
NAT Environments
Cooperative Enforcement is not supported by all the NAT configurations.
For Cooperative Enforcement to work in a NAT environment, the Security Gateway and the Endpoint
Security Management Server must recognize the same IP address of a client. If NAT causes the IP address
received by Security Gateway to be different than the IP address received by the Endpoint Security
Management Server, Cooperative Enforcement will not work.
To configure the SmartEvent Server to read logs from this Log Server:
1. Configure SmartEvent to read logs from the Log Server.
2. In SmartEvent or in the SmartConsole event views, make a query to filter by the Product Name field.
This field uniquely identifies the events that are created from the syslog messages.
Instructions
a. Run:
windowEventToCPLog -pull_cert
Establishing Trust
Establish trust between the Security Management Server and the windows host.
To establish trust:
1. Edit the OPSEC Application that you created in SmartConsole for the Windows events.
2. Select Communication.
3. Make sure that the trust status is Trust Established.
4. Publish the SmartConsole session.
windowEventToCPLog -s, where you are prompted for an administrator name and the administrator
password that to be registered with the windowEventToCPLog service.
The administrator that runs the windowEventToCPLog service must have permissions to access and
read logs from the IP addressed defined in this procedure. This is the IP address of the computer that
sends Windows events.
6. When you configure windowEventToCPLog to read Windows events from a remote machine, log in
as the administrator. This makes sure that the administrator can access remote computer events.
7. Use the Microsoft Event Viewer to read the events from the remote machine.
Log Exporter
Overview
Check Point Log Exporter is an easy and secure method to export Check Point logs over the syslog protocol
from a Management Server / Log Server.
You can configure the Log Exporter settings in SmartConsole or with CLI commands.
You can configure advanced settings in various configuration files.
Log Exporter supports:
n Multiple SIEM applications that can run a Syslog agent.
n Syslog over TCP or UDP.
n Multiple formats (Syslog, CEF, LEEF, JSON, and so on).
n Mutual authentication based on TLS 1.2.
n Export of Security logs, Audit logs, or both.
n Export of links to the relevant log card in SmartView and the log attachment (such as Forensics /
Threat Emulation report).
n Filtering of logs.
Log Exporter is constantly updated. For the most up to date information about the supported versions and
applications, see:
n sk122323 - Log Exporter - Check Point Log Export
n sk144192 - Log Fields Description
Note - The Check Point App for Splunk uses the Log Exporter to seamlessly send logs
from your Check PointLog Server to your Splunk server. This enables you to collect and
analyze millions of logs from all Check Point technologies and platforms. For more
information, see the App for Splunk User Guide.
Procedure:
1. Create a new Log Exporter/SIEM object in SmartConsole.
a. Click Objects > More object types > Server > Log Exporter/SIEM.
b. Configure all relevant settings:
i. Enter the Object Name. This is the name of the new Log Exporter.
ii. In the General section, enter the Target Server, Target Port, and Protocol.
iii. In the Data Manipulation section (optional:
n Select the format for the exported logs.
n Update logs contain on the data that was changed compared to the last log for
the same event. To export all logs with the full data, select Aggregate log
updates before export.
iv. Attachment (optional): Log Exporter does not include attachments by default.
Select one or more options to configure the log attachments:
n Add link to Log Attachment in SmartView.
n Add link to Log Attachment in SmartView.
n Add Log Attachment ID.
c. Click OK.
a. From the left navigation panel, go to the Gateways & Servers view.
b. Open the Management Server or Dedicated Log Server object.
c. From the left tree, click Logs > Export.
d. Click [+] and select the Log Exporter / SIEM object you configured earlier.
e. Click OK.
2. In SmartConsole, click Menu > Install database > select all objects > click Install.
Notes:
n An existing Log Exporter configured in a previous version retains its configuration, but does not show
in SmartConsole unless it is reconfigured.
n If you configure a Log Exporter object in SmartConsole with the same name as an existing Log
Exporter configured in a previous version, the new Log Exporter overrides the existing exporter
configuration (other than filtering and TLS configurations).
Parameters:
Parameter Description
name <Name of Log Exporter Configures the name of the Log Exporter configuration
Configuration> directory in:
$EXPORTERDIR/targets/
target-server <HostName or Configures the target server, to which Log Exporter sends
IP address of Target the exported logs.
Server> You can enter an IP address or an FQDN.
target-port <Port on Configures the listening port on the target server, to which
Target Server> Log Exporter sends the exported logs.
protocol {udp | tcp} Configures the Layer 4 protocol for Syslog traffic - TCP or
UDP.
Parameter Description
--apply-now Optional.
Automatically starts the new Log Exporter instance with
the new settings.
If you do not use this parameter, you must start the new
Log Exporter instance manually with this command:
cp_log_export restart
Important - By default, Log Exporter sends the exported in clear text. To send the
exported logs over an encrypted connection, see "Log Exporter TLS Configuration" on
page 207.
Syntax:
Commands
Name Description
reexport Reset the current position and export all logs again based on the configuration.
Command Arguments
Required
for
Required "show", Required
Required Required "status",
for for
Name Description for "add" for "set" "start",
"delete" "reexport"
command command "stop",
command command
"restart"
comman
d
Required
for
Required "show", Required
Required Required "status",
for for
Name Description for "add" for "set" "start",
"delete" "reexport"
command command "stop",
command command
"restart"
comman
d
Required
for
Required "show", Required
Required Required "status",
for for
Name Description for "add" for "set" "start",
"delete" "reexport"
command command "stop",
command command
"restart"
comman
d
Required
for
Required "show", Required
Required Required "status",
for for
Name Description for "add" for "set" "start",
"delete" "reexport"
command command "stop",
command command
"restart"
comman
d
filter- Export all logs with Optional Optional N/A N/A N/A
action-in a specific action.
The value must be
surrounded by
double quotes ("").
Multiple values are
supported and must
be separated by a
comma.
Important -
This
parameter
replaces any
other filter
configuration
that was
declared
earlier on
this field
directly in the
filtering XML
file. Other
field filters
are not
overwritten.
Required
for
Required "show", Required
Required Required "status",
for for
Name Description for "add" for "set" "start",
"delete" "reexport"
command command "stop",
command command
"restart"
comman
d
filter- Export all logs that Optional Optional N/A N/A N/A
blade-in belong to a specific
Software Blade.
The value must be
surrounded by
double quotes ("").
Multiple values are
supported and must
be separated by a
comma.
Predefined blade
families can be
selected (Access,
TP, Endpoint,
Mobile).
Important -
This
parameter
replaces any
other filter
configuration
that was
declared
earlier on
this field
directly in the
filtering XML
file. Other
field filters
are not
overwritten.
Required
for
Required "show", Required
Required Required "status",
for for
Name Description for "add" for "set" "start",
"delete" "reexport"
command command "stop",
command command
"restart"
comman
d
filter- Export all logs from Optional Optional N/A N/A N/A
origin-in a specific origin.
The value must be
surrounded by
double quotes ("").
Multiple values are
supported and must
be separated by a
comma.
Important -
This
parameter
replaces any
other filter
configuration
that was
declared
earlier on
this field
directly in the
filtering XML
file. Other
field filters
are not
overwritten.
Required
for
Required "show", Required
Required Required "status",
for for
Name Description for "add" for "set" "start",
"delete" "reexport"
command command "stop",
command command
"restart"
comman
d
Run this if you do not already have a trusted CA certificates in the PEM format:
1. Generate the root CA key and do not give it to anyone:
openssl req -x509 -new -nodes -key RootCA.key -days 2048 -out
RootCA.pem
To create a client certificate file in the P12 format (for Log Exporter)
Note - The challenge phrase used in this conversion is required in the "log_
exporter" TLS configuration.
After you created the required certificates, you must update the security parameters on the Check Point
Management Server / Log Server.
To update the security parameters
mkdir -v certificates
cd certificates
chmod -v +r RootCA.pem
chmod -v +r log_exporter.p12
vi targetConfiguration.xml
b. Configure the full path to the new certificate files and the challenge phrase used to create
the P12 certificate.
c. Save the changes in the file and exit the editor.
The Log Exporter configuration for the target server is saved in this file:
Valid / Default
Parameter Description
Values
Destination Parameters
Valid / Default
Parameter Description
Values
<ip></ip> The IP address of the target server that receives Any IPv4
the logs. address or
FQDN
Security Parameters
These are discussed in more detail in "Log Exporter TLS Configuration" on page 207.
Valid / Default
Parameter Description
Values
Source Parameters
<folder></folder> The path where the log files are Default location is
located. $FWDIR/log/
Resolver Parameters
Valid /
Parameter Description Default
Values
Format Parameters
Valid / Default
Parameter Description
Values
Valid / Default
Parameter Description
Values
export_log_ Adds a field to the exported log that represents a link to n true
link SmartView that shows the log card. n false
(default)
export_ Adds a field to the exported log that represents a link to n true
attachment_ SmartView that shows the log card and automatically opens n false
link the attachment. (default)
export_link_ Makes the above two links use a customized IP address n IPv4
ip (for example, for a NATed Log Server). address
n empty
(default)
Filter Parameters
This configuration allows Log Exporter instance to filter out the Security Gateway traffic logs for several
Software Blades (VPN-1 & Firewall-1, HTTPS Inspection, and Security Gateway/Management).
Note:
n Security Gateway session logs are still exported (generated by tracking a
Security Gateway rule per session).
n HTTPS Inspection logs, Security Gateway logs generated not from rules, and
a few NAT update logs are still exported.
Valid / Default
Parameter Description
Values
Format Configuration
Body
<start_ The [
message_ characte
body></start_ r that
message_body> precede
s the log
data
payload.
<end_message_ The ]
body></end_ characte
message_body> r that
follows
the log
data
payload.
<fields_ The '; ' | ' ' � ' ' | ' '
separatator></ delimete (semi (pip (spa 9; (spa (pipe) (spa
fields_ r that colon, e) ce) (<TA ce) ce)
separatator> separate space) B>)
s log
fields.
<field_value_ The : = = = = = =
separatator></ assignm
field_value_ ent
separatator> operator.
Header
Default Default
Parameter Description values for values for
sysl CEF
<header_ The delimeter between the header values and ' ' (space) |
format></header_ the number of values. Every {} is replaced with
format> one value.
Notes:
n To add a constant string to the header, add the string to the <header_
format> tag value.
n To add a new field to the header, add a new header format replacement string
(for example: {}) to the <header_format> tag and add the applicable
information in the <headers> tag.
Every format has its own predefined fields configuration file that allow to change the name / value of the
exported field, filter out irrelevant fields, and so on.
The Log Exporter format configuration is saved in these files:
Valid / Default
Parameter Description
Values
Rsyslog
Procedure
By default, Rsyslog is not configured to use the RFC 5424 timestamp format. Therefore, you should
manually change the setting on the Rsyslog server for it to be compliant with the Log Exporter output
format.
1. Edit the /etc/rsyslog.conf file:
vi /etc/rsyslog.conf
2. Comment out this line (add the # character in the beginning), if it is not commented out already:
#"$ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat"
$ActionFileDefaultTemplate RSYSLOG_SyslogProtocol23Format
ArcSight
Procedure
To make sure the value of the environment variable ARCSIGHT_HOME is the connector install
directory:
1. Run the certificates manager on the Linux KDE console:
$ARCSIGHT_HOME/current/jre/lib/security/cacerts
vi $ARCSIGHT_HOME//current/user/agent/agent.properties
syslogng.mutual.auth.enabled=true
syslogng.tls.keystore.file=user/agent/syslog-ng.p12
syslogng.tls.keystore.alias=syslogng-alias
/etc/init.d/arc_connector_name restart
Splunk
Procedure
[SSL]
serverCert = <Full path to CA PEM file>
sslPassword = <Challenge Password>
requireClientCert = true
[tcp-ssl://<Port>]
index = <Index>
vi /opt/splunk/etc/system/local/server.conf
[sslConfig]
sslRootCAPath = <Full path to CA PEM file>
[SSL]
cipherSuite = TLSv1+HIGH:TLSv1.2+HIGH:@STRENGTH
/opt/splunk/bin/splunk restart
QRadar
Procedure
2. If this is the only OPSEC LEA client, configure the $FWDIR/conf/fwopsec.conf file to not allow
LEA:
a. Connect to the command line on the Management Server / Log Server with Log Exporter.
b. Log in to the Expert mode.
c. Back up the current file:
cp -v $FWDIR/conf/fwopsec.conf{,_BKP}
vi $FWDIR/conf/fwopsec.conf
From To
Note - Reading logs through LEA, which were configured manually in the SmartLog custom settings file, is
not available in R80.x.
LEEF
Item Vendor Product Version EventID
Version
Note - The time format is not compliant with the official LEEF format.
As there is currently no Epoch time format, Log Exporter with LEEF format is only partially supported.
Logs in Milliseconds
Many users export logs to third parties. In some cases, the volume of logs is so large that several logs arrive
all at the same second. To construct a chain of events from the logs’ arrival, you must know the specific
order the logs arrive. Now you can send the time of arrival in a format that includes milliseconds.
Logs in milliseconds is intended for customers who:
n Use Log Exporter.
n Have environments with high logging rates.
n This feature is disabled by default.
3. To modify an existing exporter to export logs with the milliseconds format, run these commands:
n cp_log_export set name <exporter_name> time-in-milli true
n cp_log_export restart name <exporter_name>
After Log Exporter is configured to export logs in milliseconds, the additional field is added to the time field.
Logs from gateways without the feature enabled are exported with the value 000 for the additional time field.
Use Case
For customers who do not have access to SmartConsole and are familiar with using management APIs. The
API for logs can be used inside a customer's automation script to get logs and run statistics on the logs
without the need to access SmartConsole.
Configuration
For a new logs query:
mgmt_cli show-logs new-query.filter product:<product name> new-query.time-
frame <time-frame> new-query.max-logs-per-request <limit>
Parameter Description
Parameter Description
Parameter Description
query-id Get the next page of the last run query with a specified limit.
Type: String
Limitations:
n The parameter "time-frame" in the API command does not accept the format:
"yyyymmddThhmmssZ" as input.
n The command does not support non-index mode log queries.
To disable Log Exporter from exporting attachment IDs, run these commands:
1. cp_log_export set name <name> [domain-server <domain-server>] export-
attachment-ids false
2. cp_log_export restart name <name> [domain-server <domain-server>]
a. The vendor logging guide, or other documentation that specifies the logs the device can
generate and their structure. Documentation is important to make sure that you found all
possible logs. Usually it is sufficient to write the parsing file.
b. Log samples, as many as possible. Use logs generated from the actual devices to be used
with SmartEvent. Samples are important to examine the parsing file and to tune it
accordingly.
2. Learn and know "The Free Text Parsing Language" on page 237 and the necessary parsing files and
their location on the Log Server (see "The Parsing Procedure" on page 247).
3. Compare existing parsing files of an equivalent product.
4. Select the fields to extract from the log. The fields to extract are different from one device to another.
But devices of the same category usually have equivalent log fields. For example:
Firewall, router and other devices source IP address, destination IP address, source port,
that send connection based logs destination port, protocol, accept/reject indication
: (
:command (
:cmd_name (include)
:file_name ("snortPolicy.C")
)
)
4. Optional: If required.
a. Create a new dictionary file called <device product name>_dict.ini. See "Dictionary" on
page 246.
b. Put it in the directory $FWDIR/conf/syslog/UserDefined on the Log Server.
A dictionary translates values with the same meaning from logs from different devices into a
common value. This common value is used in the Event Definitions.
c. Edit the file $FWDIR/conf/syslog/UserDefined/UserDefinedSyslogDictionaries.C on the Log
Server.
d. Add a line to include the dictionary file. For example:
:filename ("snort_dict.ini")
5. To examine the parsing, send syslog samples to a Check Point Log Server.
Troubleshooting:
If SmartConsole does not show the logs as expected, there can be problems with the parsing files:
n If there is a syntax error in the parsing files, an error message shows. To read a specified error
message, set the TDERROR_ALL_FTPARSER value to 5 before you run the procedure fwd -n.
n If the syslogs show in SmartConsole with 'Product syslog', the log was not parsed properly, but as a
general syslog.
n If the Product field contains another product (not the one you have just added) this means there is a
problem with the other product parsing file. Report this to the Check Point SmartEvent team.
n If the product reports correctly in the log, look for all the fields you extracted. Some of them are in the
Information section. Some fields can be seen only when you select More Columns.
The Commands
Each command consists of these parts:
n cmd_name - the name of the command.
n command arguments - arguments that define the behavior of the command.
n on_success (optional) - the next command executed if the current command execution succeeds.
n on_fail (optional) - the next command executed if the current command execution fails.
Sample
:command (
:cmd_name (try)
:try_arguments
.
.
:on_success (
:command()
)
:on_fail (
:command()
)
)
Try
The try command matches a regular expression against the input string.
Argument Description
parse_ start_position - run the regular expression from the start of the input string.
from last_position - run the regular expression from the last position of the previous
successful command.
add_field One or more fields to add to the result (only if the regular expression is successful).
Group_try
The command group_try executes one or more commands in one of these modes:
n "try_all" tries all commands in the group, and ignores the return code of the commands.
n "try_all_successively" tries all the commands in the group, and ignores the return code of the
commands.
Each command tries to execute from the last position of the earlier successful command.
n "try_until_success" tries all the commands until one succeeds.
n "try_until_fail" tries all the commands until one fails.
The command "group_try" is commonly used when it parses a "free-text" piece of a log, which contains a
number of fields we want to extract.
For example:
%PIX-6-605004: Login denied from 194.29.40.24/4813 to
outside:192.168.35.15/ssh for user 'root'
When you look at see this section of the log, you can use this structure:
'Group_try' Command - Sample 1
:command (
:cmd_name (group_try)
:mode (try_all_successively)
:(
# A "try" command for the source.
:command ()
)
:(
# A "try" command for the destination.
:command ()
)
:(
# A "try" command for the user.
:command ()
)
.
.
.
)
In this example, the first try command in the "group_try" block (for the source) is executed.
If the source, destination and user are not in a specified sequence in the syslog, use the "try_all"
mode instead of "try_all_successively".
In this example, the regular expressions in the different commands try to match more specified logs.
Note - When you add a new device, the first "try" command in the parsing file must use the "try_
until_success" parameter:
:cmd_name (group_try)
:mode (try_until_success)
: (
?
)
Switch
This command enables to compare the result of a specified field against a list of predefined constant values.
Parameter Description
Parameter Description
case One or more case attributes followed by the value with which to compare.
default Execute only if no relevant case is available. The default value is optional.
Unconditional_try
This command is an "empty" command that allows you to add fields to the result without any conditions.
'Unconditional_try' Command - Sample 1
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (product)
:field_type (string)
:field_value ("Antivirus")
)
)
In this example, each message ID is attached with its corresponding "message" field which denotes its
meaning.
:command (
:cmd_name (switch)
:field_name (msgID)
(
:case (106017)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("LAND Attack")
)
)
)
:(
:case (106020)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("Teardrop Attack")
)
)
)
.
.
.
)
Include
This command enables the inclusion of a new parsing file.
file_name The full path plus the file name of the file to be included.
Add_field
Each "add_field" has some parameters:
n Type - The type of the "add_field" command. This parameter has these possible values:
l Index - Part of the regular expression will be extracted as the field. The "field_index" value
denotes which part will be extracted (see "field_index" bullet).
l Const - Add a constant field whose value does not depend on information extracted from the
regular expression. See field_value bullet.
n field_name - the name of the new field.
There are some fields, which have corresponding columns in SmartConsole > Logs & Monitor >
Logs.
This table shows the names to give these fields to show in their Logs & Monitor > Logs column (and
not in the Information field, where other added fields appear):
Src Source
Dst Destination
proto Protocol
product Product
Action Action
ifname Interface
User User
When you name the above fields accordingly, they are placed in their correct column in Logs &
Monitor > Logs.
This enables them to participate in all filtering done on these columns. These fields automatically take
part in existing event definitions with these field names.
n field_type - the type of the field in the log.
This table shows the possible field types.
int
uint
string
ipaddr For IP addresses used with the Src and Dst fields.
timestmp Includes the date and time of the syslog. Supports the format 'Oct 10 2019
15:05:00'.
string_id For a more efficient usage of strings. Used when there is a finite number of
possible values for this field.
action Supports these actions: drop, reject, accept, encrypt, decrypt, vpnroute, keyinst,
authorize, deauthorize, authcrypt, and default.
ifdir 0 - inbound
1 - outbound
The field type of the field names in this table must be as mentioned:
Src ipaddr
Dst ipaddr
proto protocol
s_port port
service port
Action action
ifname ifname
n field_index or field_value - The parameter used depends on the value of the "type" field.
l If the "type" field is index, the "field_index" shows.
l If the "type" field is const, the "field_value" shows.
The "field_index" denotes which part of the regular expression is extracted, according to the
grouping of the patterns.
To make this grouping, write a certain expression in brackets.
In this expression, the number in the "field_index" denotes the bracket number whose pattern is
taken into account.
The pattern for the User, "[a-zA-Z0-9]+", is located in the first pair of brackets. Therefore, the
"field_index" is one.
The pattern for the Source address, "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+", is located in the
second pair of brackets. Therefore, the index is two.
The pattern for the port is in the third pair of brackets.
In each parsed regular expression the maximum number of brackets must be up to nine.
To extract more than nine elements from the regular expression, break the expression into two
pieces.
The first regular expression contains the first nine brackets.
The remaining of the regular expression is in the "on_success" command.
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("access-list (.*) (permitted|denied|est-allowed) ([a-zA-Z0-9_\([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) -> "))
:add_field (
:type (index)
:field_name (listID)
:field_type (string)
:field_index (1)
)
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
)
:add_field (
:type (index)
:field_name (proto)
:field_type (protocol)
:field_index (3)
)
:add_field (
:type (index)
:field_name (ifname)
:field_type (ifname)
:field_index (4)
)
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (5)
)
:on_success (
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp ("([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) hit-cnt ([0-9]+) ")
:add_field (
:type (index)
:field_name (destination_interface)
:field_type (string)
:field_index (1)
)
)
)
)
n dict_name is the name of the dictionary to use to convert the value. If the value is not found in the
dictionary, the value is the result.
The free text parser enables us to use dictionaries to convert values from the log. These conversions
are used to translate values from logs from different devices, with the same meaning, into a common
value, which is used in the event definitions.
Each dictionary file is defined as an .ini file.
In the .ini file the section name is the dictionary name and the values are the dictionary values
(each dictionary can include one or more sections).
[dictionary_name]
Name1 = val1
Name2 = val2
[cisco_action] [3com_action]
permitted = accept Permit = accept
denied = reject Deny = reject
Dictionary
The free text parser enables us to use dictionaries to convert values from the log. These conversions are
used to translate values from logs from different devices, with the same meaning, into a common value,
which is used in the event definitions.
Each dictionary file is defined as an .ini file. In the .ini file the section name is the dictionary name and
the values are the dictionary values (each dictionary can include one or more sections).
[dictionary_name]
Name1 = val1
Name2 = val2
[cisco_action] [3com_action]
permitted = accept Permit = accept
denied = reject Deny = reject
Example
The reference to a dictionary in the parsing file is shown in this table:
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("list (.*) (permitted|denied) (icmp) ([0-9]+\.[0-9]+\.[0-
9]+\.[0-9]+) -> ([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+).* packet")
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
:dict_name (cisco_action)
)
)