CP R80.30 LoggingAndMonitoring AdminGuide
CP R80.30 LoggingAndMonitoring AdminGuide
Administrator
Event Correlation
Audit Log
Event Policy
Cluster
External Network
Cluster Member
Internal Network
Configure
IPS
Cooperative Enforcement
Log
Correlation Unit
Log Server
Custom Report
Management Server
Database
Network
DLP
Policy
Software Blade
Predefined Report
Report
Traffic
VPN
Security Cluster
Security Gateway
VPN Tunnel
Security Policy
SmartConsole
SmartEvent Server
https://<Server IP>/smartview/ <Server
IP>
https://
https://
$RTDIR/scripts/SmartEvent_R80_change_dbsync_mode.sh
cpstart
cpconfig
(2) Administrator
\Global
$RTDIR/scripts/SmartEvent_R80_change_dbsync_mode.sh
cpstart
$INDEXERDIR/log_indexer_custom_settings.conf
cpstop
$FWDIR/conf/fwopsec.conf
access_list
$RTDIR/smartview/conf
$RTDIR/scripts/stopSmartView
$RTDIR/scripts/startSmartView
# evstop
$INDEXERDIR/log_indexer -days_to_index
< >
days_to_index
# evstart
https:// /smartview/
cover-company-logo.png
$RTDIR/smartview/conf
https:// /smartview/
https:// /smartview/
https:// /SmartView/
type:Session
layer_uuid_rule_uuid:*_<UID>
layer_uuid_rule_uuid:*_46f0ee3b-026d-45b0-b7f0-5d71f6d8eb10
Selecting Query Fields
[ :]
[ :] AND|OR|NOT [ :] ...
source:<X> Source:<X>
"John Doe"
"Log Out"
"VPN-1 Embedded Connector"
IP Addresses
NOT Values
NOT <field>:<value>
NOT src:10.0.4.10
Log Queries
severity
app_risk
protection
protection_type
confidence_level
action
blade product
destination dst
origin orig
service
source src
user
<field name>:<values>
rule:7.1
source:192.168.2.1
action:(Reject OR Block)
192.168.2.133 10.19.136.101
192.168.2.133 OR 10.19.136.101
AND NOT
source:(192.168.2.1 OR 192.168.2.2) AND destination:17.168.8.2
17.168.8.2
fwsyslog_enable
$FWDIR/modules/fwkern.conf
fwsyslog_enable=0
fwsyslog_enable
fwsyslog_nlogs_counter = 21
# fw ctl zdebug
# fw ctl set size fwsyslog_print_counter 1
fwsyslog_nlogs_counter = 21
# fw ctl zdebug
# fw ctl set size fwsyslog_print_counter 1
https:// /smartview/
https:// /smartview/
[seam_event_table_field]
send_snmp
$CPDIR/lib/snmp/
DisplayString
Any
Any
fw sam fw sam_policy
[Expert@MGMT:0]# sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
-v fw sam
-o
-s < >
-t < >
-f < >
-C
-n
-i
-I
-src
-dst
-any
-srv
[Expert@MGMT:0]# sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r |
a}] -a {d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
-v2
-v fw sam
-O
-S < >
-t < >
-f < >
-n < >
-c "< >"
-o < >
sam_alert
-l {r | a}
r
a
None
-a {d | r| n | b | q |
i}
d
r
n
b
q
i
-C
-ip
-eth
-src
-dst
-any
-srv
threshold_config
threshold_config
$FWDIR/conf/thresholds.conf
threshold_config
threshold_config,
threshold_config
Configure Thresholds
cpwd_admin
cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command
"cpd_admin stop"
cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command
"cpd"
Creating a Custom Gateway Status View
cpstat
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o <Polling
Interval> [-c <Count>] [-e <Period>]] <Application Flag>
-d
-h < >
< >
localhost
-p < >
-s < >
-f < >
-c < >
cpstat os -f perf -o 2
-c < >
-o < >
< >
< >
< >
< >
cpstat os -f perf -o 2 -c 2
-e < >
-o < >
-c < >
cpstat os -f perf -o 2 -c 2 -e 60
< >
os
persistency
thresholds
threshold_config
ci
https_inspection
cvpn
fw
vsx
vpn
blades
identityServer
appi
urlf
dlp
ctnt
antimalware
threat-emulation
scrub
gx
fg
ha
polsrv
ca
mg
cpsemd
cpsead
ls
PA
--------------------------------------------------------------
|Flag |Flavours |
--------------------------------------------------------------
|os |default, ifconfig, routing, routing6, |
| |memory, old_memory, cpu, disk, perf, |
| |multi_cpu, multi_disk, raidInfo, sensors, |
| |power_supply, hw_info, all, average_cpu, |
| |average_memory, statistics, updates, |
| |licensing, connectivity, vsx |
--------------------------------------------------------------
|persistency |product, TableConfig, SourceConfig |
--------------------------------------------------------------
|thresholds |default, active_thresholds, destinations, |
| |error |
--------------------------------------------------------------
|ci |default |
--------------------------------------------------------------
|https_inspection |default, hsm_status, all |
--------------------------------------------------------------
|cvpn |cvpnd, sysinfo, products, overall |
--------------------------------------------------------------
|fw |default, interfaces, policy, perf, hmem, |
| |kmem, inspect, cookies, chains, |
| |fragments, totals, totals64, ufp, http, |
| |ftp, telnet, rlogin, smtp, pop3, sync, |
| |log_connection, all |
--------------------------------------------------------------
|vsx |default, stat, traffic, conns, cpu, all, |
| |memory, cpu_usage_per_core |
--------------------------------------------------------------
|vpn |default, product, IKE, ipsec, traffic, |
| |compression, accelerator, nic, |
| |statistics, watermarks, all |
--------------------------------------------------------------
|blades |fw, ips, av, urlf, vpn, cvpn, aspm, dlp, |
| |appi, anti_bot, default, |
| |content_awareness, threat-emulation, |
| |default |
--------------------------------------------------------------
|identityServer |default, authentication, logins, ldap, |
| |components, adquery |
--------------------------------------------------------------
|appi |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|urlf |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|dlp |default, dlp, exchange_agents, fingerprint|
--------------------------------------------------------------
|ctnt |default |
--------------------------------------------------------------
|antimalware |default, scanned_hosts, scanned_mails, |
| |subscription_status, update_status, |
| |ab_prm_contracts, av_prm_contracts, |
| |ab_prm_contracts, av_prm_contracts |
--------------------------------------------------------------
|threat-emulation |default, general_statuses, update_status, |
| |scanned_files, malware_detected, |
| |scanned_on_cloud, malware_on_cloud, |
| |average_process_time, emulated_file_size, |
| |queue_size, peak_size, |
| |file_type_stat_file_scanned, |
| |file_type_stat_malware_detected, |
| |file_type_stat_cloud_scanned, |
| |file_type_stat_cloud_malware_scanned, |
| |file_type_stat_filter_by_analysis, |
| |file_type_stat_cache_hit_rate, |
| |file_type_stat_error_count, |
| |file_type_stat_no_resource_count, |
| |contract, downloads_information_current, |
| |downloading_file_information, |
| |queue_table, history_te_incidents, |
| |history_te_comp_hosts |
--------------------------------------------------------------
|scrub |default, subscription_status, |
| |threat_extraction_statistics |
--------------------------------------------------------------
|gx |default, contxt_create_info, |
| |contxt_delete_info, contxt_update_info, |
| |contxt_path_mng_info, GXSA_GPDU_info, |
| |contxt_initiate_info, gtpv2_create_info, |
| |gtpv2_delete_info, gtpv2_update_info, |
| |gtpv2_path_mng_info, gtpv2_cmd_info, all |
--------------------------------------------------------------
|fg |all |
--------------------------------------------------------------
|ha |default, all |
--------------------------------------------------------------
|polsrv |default, all |
--------------------------------------------------------------
|ca |default, all, cert, crl, user |
--------------------------------------------------------------
|mg |default |
--------------------------------------------------------------
|cpsemd |default |
--------------------------------------------------------------
|cpsead |default |
--------------------------------------------------------------
|ls |default |
--------------------------------------------------------------
|PA |default |
--------------------------------------------------------------
Network interfaces
--------------------------------------------------------------------------------------------------
------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------
------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------
------------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
[Expert@MyGW:0]#
WinEventToCPLog
WinEventToCPLog
WinEventToCPLog
WinEventToCPLog
WinEventToCPLog -s
WinEventToCPLog
WinEventToCPLog
C:\Program Files\CheckPoint\WinEventToCPLog\R65\bin
C:\Program files (x86)
windowEventToCPLog -pull_cert
C:\Program Files\CheckPoint\WinEventToCPLog\R65\bin
C:\Program files (x86)
GetRequest
GetNextRequest GetBulkRequest
SetReques sysContact
sysLocation sysName set
cp_log_export add name [domain-server ] target-
server target-port protocol <(udp|tcp)> format
<(syslog)|(cef)> [optional arguments]
$EXPORTERDIR/targets/ .
apply-now
cp_log_export [command-arguments]
cp_log_export help
openssl req -x509 -new -nodes -key RootCA.key -days 2048 -out
RootCA.pem
mdsenv
cd $EXPORTERDIR/targets/
mkdir certs
RootCA.pem log_exporter.p12
RootCA.pem log_exporter.p12
chmod +r RootCA.pem
chmod +r log_exporter.p12
targetConfiguration.xml
mdsenv
$EXPORTERDIR/targets//targetConfiguration.xml
$FWDIR/log/
true,
false,
<exported>true</exporte
d>)
true,
orig
escaped
elg
false
true,
syslog-ng
$ARCSIGHT_HOME/current/jre/lib/security/cacerts (password
"changeit").
Ca.pem
vi $ARCSIGHT_HOME//current/user/agent/agent.properties
syslogng.tls.keystore.file=user/agent/syslog-ng.p12
syslogng.tls.keystore.alias=syslogng-alias
/etc/init.d/arc_connector_name restart
[tcp-ssl:// ]
index =
server.conf
vi /opt/splunk/etc/system/local/server.conf
[sslConfig]
sslRootCAPath = /etc/ssl/my-certs/RootCA.pem
/opt/splunk/bin/splunk restart
source s_network { network(transport("tcp") port(514)
flags(syslog-protocol) ); };
TIME_FORMAT = %s
TIME_PREFIX = time=
MAX_TIMESTAMP_LOOKAHEAD = 15
: (
:command (
:cmd_name (include)
:file_name ("snortPolicy.C")
)
)
:filename ("snort_dict.ini")
cmd_name
command arguments
on_success
on_fail
:command (
:cmd_name (try)
:try_arguments
.
.
:on_success (
:command()
)
:on_fail (
:command()
)
)
try
parse_from start_position
last_position
regexp
add_field
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)")
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (1)
)
)
([0-9]+\.[0-9]+\.[0-
9]+\.[0-9]+) parse_from (start_position)
group_try
try_all
try_all_successively
try_until_success
try_until_fail
group_try
group_try
try_all
try_all_successively
group_try
:command (
:cmd_name (group_try)
:mode (try_until_success)
:(
:command (
.
.
.
:regexp ("(\(|)(login|su)(\)|).* session (opened|closed) for
user ([a-z,A-Z,0-9]*)")
)
)
:(
:command (
.
.
.
:regexp ("(\(|)su(\)|).* authentication failure; logname=([a-zA-Z0-9]*).*
user=([a-zA-Z0-9]*)")
)
)
.
.
.
)
try try
until success
:cmd_name (group_try)
:mode (try_until_success)
: (
….
)
field_name
case
default
:command (
:cmd_name (switch)
:field_name (msgID)
:(
:case (302005)
:command ()
)
:(
:case (302001)
:case (302002)
:command ()
)
:default (
:command()
)
)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (product)
:field_type (string)
:field_value ("Antivirus")
)
)
unconditional_try
message
:command (
:cmd_name (switch)
:field_name (msgID)
(
:case (106017)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("LAND Attack")
)
)
)
:(
:case (106020)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("Teardrop Attack")
)
)
)
.
.
.
)
file_name
:command (
:cmd_name (include)
:file_name ("c:\freeTextParser\device\antivirusPolicy.C")
)
add_field
add_field
field_index
field_index
field_value
Field_name
Src
Dst
proto
s_port
product
service
Action
ifname
User
Field_type
int
uint
string
ipaddr
pri
timestmp
time
string_id
action
ifdir
ifname
protocol
port
Src
Dst
proto
s_port
service
Action
ifname
field_index field_value
field_index field_value
field_index
field_index
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp ("Failed password for ([a-zA-Z0-9]+) from
([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+) port ([0-9]+)")
:add_field (
:type (index)
:field_name (User)
:field_type (string)
:field_index (1)
)
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (2)
)
:add_field (
:type (index)
:field_name (port)
:field_type (port)
:field_index (3)
)
)
[a-zA-Z0-9]+
field_index [0-9]+\.[0-9]+\.[0-9]+\.[0-
9]+
on_success
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("access-list (.*) (permitted|denied|est-allowed)
([a-zA-Z0-9_\([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) -> ")
:add_field (
:type (index)
:field_name (listID)
:field_type (string)
:field_index (1)
)
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
)
:add_field (
:type (index)
:field_name (proto)
:field_type (protocol)
:field_index (3)
)
:add_field (
:type (index)
:field_name (ifname)
:field_type (ifname)
:field_index (4)
)
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (5)
)
:on_success (
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp
("([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) hit-cnt ([0-9]+) ")
:add_field (
:type (index)
:field_name (destination_interface)
:field_type (string)
:field_index (1)
)
)
)
)
field_value
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp ("%PIX-([0-9])-([0-9]*)"))
:add_field (
:type (const)
:field_name (product)
:field_type (string_id)
:field_value ("CISCO PIX")
)
)
Dict_name
.ini ini
[dictionary_name]
Name1 = val1
Name2 = val2
cisco_action] [3com_action]
permitted = accept Permit = accept
denied = reject Deny = reject
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("list (.*) (permitted|denied) (icmp)
([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+) -> ([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+).* packet")
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
:dict_name (cisco_action)