Check Point Security Administration III NGX Searchable
Check Point Security Administration III NGX Searchable
All rights reserved. Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor,
ClusterXL, Cooperative Enforcement, ConnectControl, Connectra, CoSa, Cooperative Security Alliance, FireWall-1,
Fire Wall-1 GX, Fire Wall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity,
InterSpect, IQ Engine, Open Security Extension, OPSEC, Policy Lifecycle Management, Provider-1, Safe@Home,
Safe@Office, SecureClient, SecureKnowledge, SecurePlatform, SecuRemote, SecureServer, SecureUpdate, SecureXL,
SiteManager-1, SmartCenter, SmartCenter Pro, Smarter Security, SmartDashboard, SmartDefense, SmartLSM,
SmartMap, SmartUpdate, Smart View, Smart View Monitor, Smart View Reporter, Smart View Status, Smart ViewTracker,
Sofa Ware, SSL Network Extender, True Vector, UAM, User-to-Address Mapping, User Authority, VPN-1, VPN-1
Accelerator Card, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1
VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Pro, Zone Labs, and the Zone Labs logo, are trademarks or registered
trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are
trademarks or registered trademarks of their respective owners. The products described in this document are protected
by U.S. Patent No. 5,606,668, 5,835,726, and 6,496,935 and may be protected by other U.S. Patents, foreign patents, or
pending applications.
Information in this document is subject to change without notice. Companies, names, and data used in examples herein
are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any
means, electronic or mechanical, for any purpose, without the express permission of Check Point Software
Technologies, Ltd.
Check Point
S O F T W A R E T E C H N O L O G I E S LTD.
CONTENTS
1 C h e c k Point S e c u r i t y A d m i n i s t r a t i o n N G X III 1
Course Objectives 1
Course Layout 2
Prerequisites 2
Recommended Setup for labs 3
Recommended Lab Topology 4
IP Addresses 5
Lab Terms 7
Lab Stations ..8
Default Rule Base 9
2 General T r o u b l e s h o o t i n g M e t h o d s 11
Objectives 11
Key Terms 12
Troubleshooting Guidelines 13
Identifying the Problem 13
Collecting Related Information 14
Listing Possible Causes 15
Testing Causes Individually and Logically 15
Consulting Various Reference Sources 15
What to Check Before Installing VPN-1 NGX 16
IP Forwarding 16
Routing 17
Connectivity 18
IP Forwarding and Boot Security 20
SIC and ICA Issues .....21
SIC Port Use 21
Root Causes 22
Logging SIC 26
Aquaforest TIFF Junction Evaluation
Debugging SIC 26
Maintaining SIC ....27
Using fwm sic_reset .........31
Network Address Translation ......32
Client-Side Destination NAT 32
Debugging NAT 33
Collecting Data 36
Rule Base Issues 36
NAT Issues 36
Anti-Spoofing Issues 36
SmartDashboard Issues 37
Logging Issues ..37
Cluster Issues 38
Security Server Issues 38
OPSEC Server Issues 39
LDAP Issues 39
Core Dump and Dr. Watson Issues 40
Review ...43
Review Questions 44
Review Answers 45
3 File M a n a g e m e n t . 47
Objectives 47
Key Terms .....48
cpinfo 49
Overview .....49
cpinfo File .....50
Info View 52
Opening SmartDashboard in Info View .......59
objects 5 0.C andobjects.C 61
objects_5 0.C 61
objects.C .....61
Object Properties in objects_5_0.C 62
DbEdit 63
Aquaforest TIFF Junction Evaluation
objects_5_0.C Editing 65
GuiDBedit 67
fwauth.NDB 72
$FWDIR/lib/*.def Files ..73
Example 73
Modifying *.def Files 74
Log Files 75
Active Log Files 75
Audit Log Files 76
Log Mechanism ....76
Troubleshooting Logging Issues 77
Maintaining Logs and Log-Buffer Queue 78
Configuring Object Properties 78
Debugging Logging 81
Analysis Tools 81
Debugging Log 81
Lab 1: Using cpinfo 83
Lab 2: Analyzing cpinfo in Info View 89
Lab 3: Using GuiDBedit 93
Lab 4: Using fw logswitch and fwm logexport 101
Review 107
Review Questions 108
Review Answers 109
4 Protocol A n a l y z e r s 111
Objectives Ill
Key Terms 112
tcpdump 113
tcpdump Syntax 113
tcpdump and Expressions 115
Using tcpdump 116
Viewing tcpdump Output 117
snoop 119
Using snoop 119
Reading snoop Output 120
iii
Aquaforest TIFF Junction Evaluation
5 N G X D e b u g g i n g Tools .......159
Objectives 159
Key Terms 160
fw ctl debug 161
fw ctl kdebug 161
Kernel Modules 162
fw ctl debug Flags 164
Debugging fwd/fwm 169
fwd Daemon 169
fwm Process 169
Debugging 169
fwd/fwm Debug Switches 170
Debugging without Restarting fwd/fwm 170
Debugging by Restarting fwd/fwm 172
Stopping fwd debug 173
Aquaforest TIFF Junction Evaluation
6 fw a d v a n c e d c o m m a n d s . 185
Objectives 185
Key Terms 186
fw Commands 187
fw tab Command 188
fw tab Options 188
Table Attributes 189
fw tab Examples ..194
fw ctl Commands 197
fw ctl install 197
fw ctl uninstall 197
fw ctl iflist 197
fw ctl arp 198
fw ctl pstat 198
fw ctl conn 205
Other fw Commands 207
fw sam 207
fw lichosts 210
fw log 210
fw repairlog 211
fw mergefiles 211
fw fetchlogs 212
fw Advanced Commands 214
fwfwd 215
fw fwm 215
fw fetchlocal 216
fw unloadlocal 217
fw dbloadlocal ..217
V
Aquaforest TIFF Junction Evaluation
fw defaultgen . 218
fw getifs 219
fw stat .....219
fwm Commands 222
Use :.... 222
fwm load ...223
fwm dbload 224
fwm logexport 225
fwm dbexport/fwm dbimport 227
fwm lock admin 228
Lab 7: Using fw ctl pstat 229
Lab 8: Using fw stat, fwm load, and fw unloadlocal 231
Review 233
Review Questions 233
Review Answers ...235
8 V P N D e b u g g i n g Tools 257
.257
KeyTe .258
.259
.259
.264
.268
.270
.271
.271
.271
.272
.275
.276
on a VPN .281
.289
291
11 C I u s t e r X L 407
Objectives 407
Key Terms 408
Configuration Recommendations 409
Recommendations for CIusterXL 409
Recommendations for State Synchronization 410
Troubleshooting CIusterXL 412
cphaprob 412
cphaprob state 414
cphaprob -a if 417
cphaprob -i list 418
cphaprob -d <device> -s problem -t 0 register 419
cpstat ha -f all 420
fw ctl debug -m cluster 421
Kernel Flags 424
fwha_enable_if_probing and fwha_monitor_if_link_state 424
fwha_restrict_mc_sockets (0 by Default) . 425
fwha_use_arp__packet queue (0 by Default) 426
fwha send gratuitous arp var 426
ix
X
Aquaforest TIFF Junction Evaluation
1!
a Check Point
SOFTWARE TECHNOLOGIES LTD.
Welcome to the Check Point Security Administration NGX III course. This
course offers comprehensive training to enhance enterprise knowledge of
VPN-1 NGX, network planning, route-based VPN, and troubleshooting
procedures. Follow along as the class progresses, and take notes for future
reference.
Course Objectives
l
Aquaforest TIFF Junction Evaluation
Course Layout
COURSE LAYOUT
11111111111111111111111111111111111111111111111111
This course is designed for CCSEs who manage and support installations of
VPN-1 NGX, and who need the tools to troubleshoot and maintain these
installations. This course is also designed for CCSEs seeking their Check Point
Certified Security Expert Plus NGX (CCSE Plus NGX) certification.
• Systems administrators
• Security managers
• Network engineers
Prerequisites
Before taking this course, Check Point recommends you take these courses:
Check Point Security Administration NGX I (Rev 1.1) and Check Point Security
Administration NGXII Rev 1.1. You must pass the CCSE NGX exam before
pursuing the CCSE Plus NGX certification.
Check Point also strongly suggests you have the following knowledge base:
2
Aquaforest TIFF Junction Evaluation
The following is a sample setup for the hands-on labs that supplement this
handbook:
• The Internet servers (www.jowrczYv.ep) cannot communicate directly with
the Internet. These servers have private IP addresses. Each Security Gateway
and Internet server has a unique IP address.
• You will use the following passwords in this course:
abcl23 — Windows platforms
qazl23 — SecurePlatform Pro
Your instructor may provide additional passwords:
• This handbook and course use the following conventions for interface
assignments on the Security Gateway in this course:
— ethO is assigned as the external interface.
— ethl is assigned as the internal interface.
— eth2 is assigned as the sync network/leased-line interface.
— All interface-naming schemes are based on a SecurePlatform
installation.
3
Aquaforest TIFF Junction Evaluation
webtoronto fwtoronto
10.1.3.103/24 fwint: 10. 1. 3. 1/24 fwint: 10. 2. 4. 1 /24 10.2.4 104/24
default gateway fw ext: 172. 23.103. 1 /16 fw ext: 172, 24.104. 1 /16 default gateway
10.1.3.1124 fwsync: 192.168. 22.103 /24 fwsync: 192.168. 22.104/24 10.2.4.1 /24
default gateway default gateway
172,23.103.2/16 ^ 172.24.104.2/16 ^
I — - - - - - - J
dalfas
int: 10. 5. 9. 1 /24
ext: 172. 29.109. 1 /16
172.21.101.2/16 default gateway
172.22.102.2/16 172.29.109.2/16
172.23.103.2/16
172 24.104.2/16
172.25,105.2 /16
172.26.106.2/16
172.27.107.2/16
172.28.108.2/16
172.29.109.2 /16
webzurich fwsydney Hub websydney
10.3.5,105/24 fw int: 10. 3. 5. 1/24 fwint: 10. 4. 6. 1 /24 10.4.6.106/24
default gateway fw ext: 172. 25.105. 1 /16 fw ext: 172. 26.106. 1 /16 default gateway
10.3.5.1124 fwsync: 192.168. 22.105 /24 fwsync: 192 168. 22 106 /24 10.4.6.1 /24
default gateway default gateway
172 25.105.2/16 172.26.106.2 /16
4
Aquaforest TIFF Junction Evaluation
IP A d d r e s s e s
The table below lists the IP addresses of the Security Gateways in the NGX lab
topology:
fw external 172.21.101.1/16
fw sync 192.168.22.101/24
fw external 172.22.102.1/16
fw sync 192.168.22.102/24
fw external 172.23.103.1/16
fw sync 192.168.22.103/24
fw external 172.24.104.1/16
fw sync 192.168.22.104/24
fw external 172.25.105.1/16
fw sync 192.168.22.105/24
5
Aquaforest TIFF Junction Evaluation
fw external 172.26.106.1/16
fw sync 192.168.22.106/24
fw external 172.27.107.1/16
fw sync 192.168.22.107/24
fw external 172.28.108.1/16
fw sync 192.168.22.108/24
This table lists the IP addresses of the Web servers in the NGX lab topology:
6
Aquaforest TIFF Junction Evaluation
Lab Terms
7
8
Aquaforest TIFF Junction Evaluation
The Rule Base below is the default Rule Base used throughout this handbook.
Create this Rule Base now, if your instructor has not already created it for you.
Note that this Rule Base has been created for city sites Rome and Oslo.
Substitute your city site, based on your classroom's topology.
IS NBT 1
! 1 | NetBIOS Rule | "k Any | * Any | [ * j Any Traffic w bootp |@ drop | - None
1 i tin ;
I
i SSH A c c e s s Rule j m fwoslo i [ * j Any Traffic | ssh I accept | J] Log
:_Oslo j • Madrid
5 i Partner Cities Rule ! ! [ * ] Any Tr« : http I accept | M Log
:_Madrid j • Oslo
9
Recommended Setup for labs
10
Aquaforest TIFF Junction Evaluation
21
a
Q Check Point
t*®*5* S O F T W A R E T E C H N O L O G I E S LTD.
Objectives
li
Aquaforest TIFF Junction Evaluation
Key Terms
IP forwarding
Default Filter
Initial Policy
Secure Internal Communications (SIC)
Source NAT
Destination NAT
Core file
12
Aquaforest TIFF Junction Evaluation
TROUBLESHOOTING GUIDELINES
11111111111111111111111111111111111111111111111111
The variety, flexibility, and complexity of the Check Point product suite can
make every problem seem unique. Despite the challenges inherent in
maintaining and administering rapidly evolving security and connectivity
solutions, standard troubleshooting methods are still relevant. Apply the
guidelines in this section when troubleshooting NGX issues.
I d e n t i f y i n g the Problem
FAILOVER EXAMPLE
For example, when testing CIusterXL failover, start a continuous Ping from an
internal host to a host outside of the cluster. Unplug the external interface from
the primary member; two Pings are lost, then the Ping continues. This behavior
is not a problem, but is the way CIusterXL is supposed to work. However, if
after unplugging the external interface from a working primary member, the
Ping continues successfully but new connections cannot pass through the
cluster, the problem is probably related to gratuitous ARP.
• Determine the desired activity: New connections traverse the active cluster
member. This is not occurring.
• Determine what is happening, in observable and objective terms: Ping
requests are replied to, but connections cannot be established.
13
Aquaforest TIFF Junction Evaluation
Gratuitous ARP can be a probable cause in this issue, since Ping is not as reliant
on each machine having a proper MAC address for IP resolution. In this
specific situation when the failover occurs (unplugging the interface), both
machines are issuing gratuitous ARP replies to announce they have the cluster
IP address assigned. This can create potential problems, such as if interim
switches or routers do not correctly register the updated ARP cache
information, or if a switch did not forward the updated ARP information to an
upstream router. This ""pollutes" the ARP cache of all local machines. Since the
Ping request is looking for its ultimate destination IP upstream of the cluster,
the cluster member at which the Ping packet arrives will simply forward the
Ping to the destination.
In the case of a TCP/IP connection, such as HTTP, the routing mechanism will
not be able to forward the packet through the router. This is because the
indirect-connection mechanism will not be able to determine which cluster
member is actually using the IP address as the next hop.
C o l l e c t i n g Related Information
Collect log messages, error messages, core files, Dr. Watson output, and
relevant information from related documentation. Verify the configuration of
components displaying the same symptoms.
In the failover example stated earlier, the problem occurred when attempting to
initiate a failover in a CIusterXL configuration. Changes before the problem
occurred are currently unknown, other than the specific change initiated by
unplugging the interface of the cluster member. Information related to other
changes can be determined from examining NGX logs. Examining audit logs
may show that another Administrator was working with the cluster object or
specific cluster members. Examining system logs of that cluster member may
show further information as to possible changes in the configuration.
Debugging or examining process error logs can indicate if this is a
configuration issue, or perhaps is a more serious problem.
14
Aquaforest TIFF Junction Evaluation
L i s t i n g Possible Causes
Using the information gathered from symptoms and documentation, try to find
as many potential causes for each symptom. Put the most likely cause first on a
list, and organize the others in a similar fashion.
The goal is to narrow the list to a few causes, starting from the most likely to the
least likely causes. From the example failover issue, is this the only cluster
experiencing this issue? If the cluster is disabled, does this problem persist? Are
all connections blocked, or only some types? Does any other type of traffic
other than ICMP cross the cluster?
Release notes, Web sites, mailing lists, SecureKnowledge, and Check Point
Technical Support are common reference sources. See Check Point's Web site
for these sources: www. checkpoint. com
15
Aquaforest TIFF Junction Evaluation
Verify routing on the gateway system at the OS level. If VPN-1 NGX is already
installed on the gateway, stop the firewall services.
IP F o r w a r d i n g
When a UNIX machine boots with more than one IP interface active, it will
route among interfaces by default. When an NGX Gateway is installed on
UNIX, IP forwarding may be disabled. IP forwarding is the operating system's
ability to forward packets from one interface to another. Manually enable IP
forwarding for testing.
ENABLING/DISABLING IP FORWARDING
16
Aquaforest TIFF Junction Evaluation
Routing
For the immediate internal network, it is sufficient to point the default gateway
of each internal network's machine to the IP address of the internal interface of
the NGX Gateway.
17
Aquaforest TIFF Junction Evaluation
Connectivity
To test connectivity with the NGX Gateway in place. Ping through the Gateway
from internal nodes to nodes on the external side of the Gateway, or Ping to the
upstream router. Run a Ping test as follows:
5. If the Ping can only reach the external interface of the Gateway, Ping from
the Gateway to a known Internet site.
6. If you can Ping from the Gateway to the Internet, but cannot reach the
Internet from an internal network, IP forwarding may not be enabled on the
Gateway's OS.
7. If you can Ping all the way through, install a simple Rule Base with
necessary rules (for example, outbound HTTP), then browse known
Internet sites.
18
Aquaforest TIFF Junction Evaluation
%
Q.) One internal host behind an NGX Gateway cannot connect to
the Internet. This host has just been added to the internal network.
All other hosts from the same network segment can connect to the
Internet, as usual. In the Rule Base, there is a rule accepting
outbound HTTP traffic for the entire network, and the rule is
tracked as "Log". When you open Smart View Tracker, you find
no logs from that problematic host. What is the next reasonable
step for troubleshooting this problem?
A.) Check the routing table on that host, and make sure the
default-gateway setting is correct. Test connectivity, using Ping
or traceroute, from the host to the Gateway, or beyond.
Q.) You find a log indicating HTTP is accepted, the source is that
host, and the rule number is correct. But the host's browser
displays "page cannot be displayed". What is the next reasonable
step for troubleshooting this problem?
19
IP FORWARDING AND BOOT SECURITY
8
nartView Tracker. You
ep to take?
A.)
20
Aquaforest TIFF Junction Evaluation
Communication takes place over SIC, which uses the following ports:
• Port 18209 is used for communication between NGX Gateways and ICAs
(status, issue, or revoke).
• Port 18210 pulls Certificates from an ICA.
• Port 18211 is used by the cpd daemon on an NGX Gateway to receive
Certificates.
21
Aquaforest TIFF Junction Evaluation
Root C a u s e s
As a baseline for troubleshooting SIC and ICA related issues, test the
following:
• Connectivity: Is any traffic (not just SIC) able to reach the Gateway?
Are the necessary ports open and/or available?
• Domain name and IP resolution: Although SIC is completely NAT-tolerant,
Check Point recommends eliminating this possibility, by verifying if there
has been a DNS or IP address change on the network regarding the
SmartCenter Server and/or any interim routers or Gateways
• Time: If the SmartCenter Server and the Security Gateway are located in
different time zones, verify that this is not causing the conflict
• Certificate Revocation List (CRL): Verify that the SIC Certificate is not in
the CRL, or that the CRL is still reachable for current Certificates.
22
Aquaforest TIFF Junction Evaluation
View the existing Certificate assigned to the object to verify that Certificate
information is correct for the object. View the certificate in SmartDashboard by
selecting the VPN > Certificates List property of the specific Check Point
Gateway. Select the Certificate to examine, and click the View button. The
Certificate View screen displays:
23
Aquaforest TIFF Junction Evaluation
Check Point also includes the ICA Management Tool in VPN -1 NGX, which
can be configured on a SmartCenter Server and used independently of
SmartDashboard to view and manage Certificates:
|Of xf
J^ Check Point
We Secure the internet
•^'im^'to ; ! 3 Q-'-steds
The CRL and Certificates can also be viewed from the CLI using the
vpn crlview command. The syntax for the command is:
24
Aquaforest TIFF Junction Evaluation
To determine whether SIC is listening to the cpd ports, use the following
commands:
To verify the Gateway is listening for the SmartCenter Server, use the cpd -d
command. The output is below:
25
Aquaforest TIFF Junction Evaluation
If you run cpd -d without >& and the output filename, the output
displays on-screen.
Maintaining SIC
If the FQDN for the SmartCenter Server is not correct, the ICA cannot initialize
successfully. Make sure the FQDN has the correct hostname and domain name.
Make sure the SmartCenter Server's hostname is entered correctly in the hosts
file.
27
On the SmartCenter Server, make sure its hosts file has the new hostname and
SYNCHRONIZING CLOCKS
28
Aquaforest TIFF Junction Evaluation
%
Q.) Your SmartCenter Server is behind your organization's
perimeter Gateway, with Static NAT configured on the perimeter
Gateway. You have a new NGX Gateway in another city, and you
must set up SIC. When you try to initialize SIC, you receive the
error "initialized but not trusted". What are reasonable steps to
troubleshoot this error?
A.) Check the hosts file on the remote Gateway, and make sure
the SmartCenter's hostname resolves to its public IP address.
Check if there is any rule in the Policy blocking traffic between
the SmartCenter Server and remote Gateway.
RESETTING SIC
The term "resetting SIC" is often used interchangeably for two different
actions. Each has a different level of severity associated with it, depending on
the context.
29
30
Aquaforest TIFF Junction Evaluation
Using f w m sic_reset
Resetting SIC on the ICA (SmartCenter Server) can have serious implications
for Policy installation, logging, and other important daily functions, such as
VPN. Therefore, Check Point does not recommend resetting SIC on an ICA in
most situations, especially in an enterprise environment where multiple remote
Gateways are communicating through a VPN, using Certificates issued by the
ICA. When you reset SIC on an ICA, VPN tunnels will be interrupted, because
all IKE Certificates are to be destroyed before the ICA can be reset. After the
ICA SIC is reset, you must reset SIC on all managed Gateways.
In some unusual situations, using the fwm sie_reset command is necessary, for
example, when the SmartCenter Server's IP address or hostname is changed.
31
Aquaforest TIFF Junction Evaluation
Destination NAT is used when the IP address of the machine receiving the
connection is translated. This address is also known as the "server" side of the
connection. An example of this would be a statically translated Web server
behind a Security Gateway.
C l i e n t - S i d e D e s t i n a t i o n NAT
Before VPN-1 NGX, all NAT occurred at the "server side" of the kernel, i.e., on
the outbound side of the kernel closest to the server. When NAT occurs in this
configuration, address spoofing and routing must be configured correctly.
As of VPN-1 NGX, the default method for Destination NAT is "client side",
where NAT occurs on the inbound interface closest to the client. Assume the
client is outside the Gateway, and the server is inside the Gateway with
automatic Static NAT configured. When the client starts a connection to access
the server's NAT IP address, the following happens to the original packet in a
client-side NAT:
ORIGINAL PACKET
1. The packet arrives at the inbound interface, and passes Security Policy
rules.
2. If accepted, the packet is entered into the connections table.
3. The packet is matched against NAT rules for the destination. The packet is
translated if a match is found.
32
Aquaforest TIFF Junction Evaluation
4. The packet arrives at the TCP/IP stack of the NGX Gateway, and is routed
to the outbound interface.
5. The packet goes through the outbound interface, and is matched against
NAT rules for the source.
6. NAT takes place, if a match is found for translating the source.
7. The packet leaves the Security Gateway.
REPLY PACKET
Debugging NAT
fw ctl debug is the primary command for observing the NGX kernel's actions
on a packet. It is also used for configuring debugging on almost any action that
VPN-1 NGX can take on a packet or connection. The standard format for the
command is as follows:
fw c t l debug
Running this command from the CLI produces a list of currently running
modules and debugging flags. When the command is issued with an argument
following it, the default kernel module acted on is the fw module.
33
FW CTL DEBUG A R G U M E N T S
-buf
s«i,rersi"use<iby,he<iebosproc"sfor
+ <flag name>
-m
i ™ „ h m 0 d U l e ! W , l l b e " a E 8 e , i m , h e
kdebug -f >&
dTetdh?,,0ere0f,hedeb"8S,n8!e!"°",0,he
34
35
Aquaforest TIFF Junction Evaluation
Collecting Data
COLLECTING DATA
i I I I i I I I I i II II1 I I i iI Ii I I I I i I I I I i I I I I i I I i I I I I I i I I i I
To begin troubleshooting an issue with an NGX Rule Base, collect the relevant
log records, fw monitor capture file, and cpinfo file.
NAT Issues
• cpinfo file
• Network-configuration diagram
• fw monitor
• fw ctl debug, as follows:
fw ctl debug -buf
A n t i - S p o o f i n g Issues
• cpinfo file
• Network-configuration diagram
• fw monitor capture file
36
Aquaforest TIFF Junction Evaluation
Collecting Data
SmartDashboard Issues
This will set the fwm to debug "on the fly" and write the output to
$FWDIR/log/fwm.elg
Logging Issues
37
Aquaforest TIFF Junction Evaluation
Collecting Data
C l u s t e r Issues
S e c u r i t y Server Issues
• cpinfo file
• Error messages from the SmartCenter Server's logs and console
• fw monitor -u
(The -u switch configures fw monitor to capture traffic and include the
UUID of the connections and objects involved in that session).
• Appropriate log files from the Security Gateway's $FWDIR/log directory:
ahttpd.elg
aftpd.elg
asmtpd.elg
38
OPSEC
1. CVP/UFP servers:
to the CVP i
to the UFP!
fwopsec. conf file
cvp.conf file on the CVP serv
2. : fwd debug by
fw debug fwd on
fw debug fwd
LDAP
1. ; LDAP t
LDAP log i
fw moni md LDAP
2. :NGX [LDAP : the ]
LDAP bra
fwd debug
39
Aquaforest TIFF Junction Evaluation
Collecting Data
3. To verily if the core dump was caused by VPN-1 NGX, run the command:
• file core
The output is the executable filename that caused the core dump:
• cpinfo, while the system is in the state that caused the core
• Full description of the problem
DR. W A T S O N O U T P U T
• Fresh Dr. Watson file (drwtsn32. log); this file should contain only the current
instance of Dr. Watson output.
• cpinfo taken from the system while in the status causing the Dr. Watson error
• Full description of the problem
• user. dmp file
• memory.dmp file
• system, dmp file for blue screen of death
QA
user. dmp or memory. dmp?
41
Aquaforest TIFF Junction Evaluation
Collecting Data
42
REVIEW
43
44
Aquaforest TIFF Junction Evaluation
Review
46
V#
31
Aquaforest TIFF Junction Evaluation
Q Check Point
tfi®*5* S O F T W A R E T E C H N O L O G I E S LTD.
Objectives
1. Collect data using the cpinfo utility, for off-line viewing and
troubleshooting using the Info View utility.
2. Use DbEdit or GuiDBedit to view and manipulate *.c and *.def files and
observe their impact on Security Gateway functionality.
3. Manage the fwauth.NDB file to maintain the user database.
4. Use log commands to observe and manipulate log files.
47
Key Terms
• cpinfo
objects J J . C
objects.C
DEEDIT
48
FILES
$HDIR/ conf
$FWDIR/lib
$FWDIR/;
$FWDIR/log
Once cpinfo runs, it may take some time to complete. Do not stop
A 09
in the cpinfo file.
cpinfo File
WINDOWS
The resulting file will not be compressed or encoded. Compress this file using a
ZIP utility, if the cpinfo file is sent to Check Point Technical Support for
analysis. The output on a Windows server is a*.txt file, which you can view
with a text editor.
Aquaforest TIFF Junction Evaluation
cpinfo
UNIX
To extract the cpinfo. uue file from a UNIX platform, run the following:
5. tar -xvf fw. tar, to expand the directories into the following:
conf/
lib/
state
database/
log/
51
Aquaforest TIFF Junction Evaluation
cpinfo
InfoView
A quick and easy way to look at a customer's Rule Base and objects is to open
SmartDashboard using a cpinfo output file. This is done by using InfoView, a
Check Point utility. InfoView is only available for Check Point Certified
Support Partners (CSPs) with valid CSP login credentials. To view cpinfo from
InfoView, open the InfoView window first, and drag cpinfo output to the
InfoView window:
- i P j Xj
y File Edit View Tools Analysis Window
« n jf'ji!Hi^iiT:::i^i W d H i
C : \ W I N D G W 3 \ F W 1 \R 6 0 \ f w 1
Host File WEB,,. Not t e s t e d
C : \ P r o g r a m Files\CheckPomfc'tCPShared\R60 " Hosts
File Title
• CP c o m p o n e n t s License-Object WEB,,, Mot t e s t e d
•• CP P r o d u c t k e y s
Duplicate O b j e c t s W E B , . , Not t e s t e d
VPN-1 Version I n f o r m a t i o n ( " C : \ W I N D O W S \ F W l \ F
FireWall-1 M a n a g e m e n t ( f w m ) Version I n f o r m a t i o n
\ |jj||l A l 1 I n t e r f a c e s WEB... Not t e s t e d
FireWall-1 Version I n f o r m a t i o n ( " C : \ W I N D O W S \ F ' < r ^
m > ... WEB... Not t e s t e d
C P S h a r e d Version I n f o r m a t i o n ( " C : \ P R O G R A ~ l \ C I
FireWall-1 S t a t u s ( " C : \ W I N D O W S \ F W i \ R 6 O \ f w i \ t
T
E x p o r t e d L o g file: f w . a d t l o g
FireWall-1 Statistics WEB,., Not t e s t e d
' NUM"
cpinfo Loaded in InfoView
52
Aquaforest TIFF Junction Evaluation
cpinfo
INFORMATION TESTING
Depending on the problem you are troubleshooting, you can look for different
information in cpinfo. The right panel of Info View displays a list of information
you can test, for example, hostname, licensing, and duplicate objects. Info View
gives you quick results, but not detailed information. Detailed information can
be found in the left pane of Info View. Test items and their purpose are shown in
the table below:
Support HotFix Verify whether there are HotFixes installed on the machine.
53
Thel
• A
it
:is a
J to <
a cpinfo file.
TEXT INFORMATION
54
Aquaforest TIFF Junction Evaluation
cpinfo
n rp Product keys -
• M i Hi l E M
FUJI
key: Auth 0
key: Encryption 1
key: FireWall 0
key: F1DIR C : \ WINDCMS\ FTJ1\ R60\ f wl
key: FWHanagement 1
key: IsConfigured 1
key: Management 1
key: Primary 1
key: ProductNaKie FireWall-1
key: Unlimit 1
SecuReraote
d
For Help., p r e s s F i
55
Aquaforest TIFF Junction Evaluation
cpinfo
SYSTEM INFORMATION
FireWall-1 Version I n f o r m a t i o n
CPShared Version I n f o r m a t i o n
»I ' "
date
hostname
uname -a
SecurePlatform Version
hostid
OS d a t a f r o m file ; / e t c / i s s u e
uptime
ps a u x w w
v m s t a t i 10
Isdev -C
Additional S y s t e m i n f o r m a t i o n
env
df 4
df -1= / o p t / C P s u i t e - R 6 0 / f w 1
Package M a n a g e r R e p o r t ( r p m )
List PCI devices
Free M e m o r y I n f o r m a t i o n
Slab I n f o r m a t i o n ( s l a b i n f o )
Additional M e m o r y I n f o r m a t i o n ( m e m i n f o )
Additional C p u I n f o r m a t i o n ( c p u m f o )
I P Interfaces jj !
System Information
Interface information can also be found in cpinfo. ifconfig -a gives a list of all
interfaces and status, fw c t l if l i s t is a list of interfaces bound to the NGX
kernel. If fw ctl i f l i s t and ifconfig -a outputs have discrepancies, that means
some interfaces are not recognized by the NGX kernel, which can cause various
problems, such as Policy installation failure or traffic dropped. The interface
names and IP addresses in the ifconfig -a list must be identical to the ones in
the Topology screen of the gateway object. Make sure you obtain correct
interfaces by names and IPs, when clicking the get button from the Topology
screen in the Gateway object.
56
Aquaforest TIFF Junction Evaluation
cpinfo
FireWall-1 V<
CPShared «
System I n f o r m a t i o n
F W - 1 fi
ll-l Tables
II-1 Tables - Short Format
: The n u m b e r of tables; 296
FireWall-1 Tables - Log Format
57
Aquaforest TIFF Junction Evaluation
cpinfo
FIREWALL-1 TABLES
InfoTab Screen
58
Aquaforest TIFF Junction Evaluation
cpinfo
Opening S m a r t D a s h b o a r d in I n f o V i e w
+ J CW
\; INDOWS\FW 1 't,R60\fw 1
+ JC; 'i.PROGRA--1 \ CHECKP~ 1 \CPShared\R 6 0
Fiie Title
CP c o m p o n e n t s
t. CP Product keys
+ System Information
VPN-1 Version I n f o r m a t i o n ( " C : \ W I N D O W S \ F '
Fire W a l l - 1 M a n a g e m e n t ( f w m ) Version I n f o r r r
F i r e W a l l - 1 Version I n f o r m a t i o n ( " C : \ W I N D O W
C P S h a r e d Version I n f o r m a t i o n ("Ci'iPROCRA-
•• F i r e W a l l - 1 S t a t u s ( " C ; \ W I N D O W S \ F W 1 \R60\f
+ IP I n t e r f a c e s
T h e n u m b e r o f Kernel Tables: - 1
• F i r e W a l l - 1 Tables ("C:\WIMDOW5'i,FWl\R6Q\f
1 Fire W a l l - 1 Tables ("C: \ WINDOWS',FW 1 'iRSO'if^JTy
F i r e W a l l - 1 Tables - Log F o r m a t jrj
Hostname Highlighted
2. Click the SmartDashboard icon on the top button, then click Explicit:
SmartDashboard Icon
59
Aquaforest TIFF Junction Evaluation
cpinfo
3. Select the correct FwPolicy.exe file on your local drive, from where you
installed SmartConsole:
? .x
Look in: j w PROGRAM zi ma &
Jasmjielp
;'jcpml_dir
jhtdocs |frp|gv
^CPRegSvr
jFwPolicy
FwPolicy.exe Selected
60
Aquaforest TIFF Junction Evaluation
objects_5_0.C
As objects_5_0.C is the master file that fwm recognizes for its normal operation.
The file must be created as part of an NGX installation. This file is either newly
created on installation of VPN-1 NGX, or is upgraded from VPN-1/FireWall-1
4.1.
objects.C
61
Aquaforest TIFF Junction Evaluation
Object Properties in o b j e c t s _ 5 _ 0 . C
objects_5__0.C is a master list of properties. The objects listed in the file are
definitions of how VPN-1 NGX manipulates traffic that passes through its
kernel to the real-world resources represented by those objects. The properties
of these objects further define how VPN-1 NGX inspects and manipulates this
traffic. The file starts with global properties, followed by SmartCenter Server
object properties, then gateway-object properties, and other objects' properties.
The following is gateway object fwoslo's Certificate property:
-=afi!*jj
Fite Edit View Insert Format Help
objects_5_0.C Properties
62
Aquaforest TIFF Junction Evaluation
DbEdit
To modify objects_5_0.C, use the DbEdit utility, which allows the creation,
modification, and deletion of objects. The utility is located in the $FWDIR/bin
directory. objects_5J).C is modified using the following syntax:
Option Explanation
63
Aquaforest TIFF Junction Evaluation
DBEDIT COMMANDS
Command Explanation
create Creates an object with its default values; this command does not
commit the object to the database. The create command may use
an extended or owned object.
update Updates the database with the object; this command checks object
validity and will issue an error message; invalid fields can be
modified using the modify command.
delete Deletes an object from the database, and from the client-implicit
database
quit Quits and updates the database with modified objects that are not
yet committed
[fieldjiame] = Field_A.Field__B
64
Aquaforest TIFF Junction Evaluation
SYNTAX
o b j e c t s _ 5 _ 0 . C Editing
65
6. To: ; the
The in 5 O.Ci by
66
Aquaforest TIFF Junction Evaluation
GuiDBedit
GuiDBedit, also known as the Cheek Point Database Tool, is a graphical based
utility that can be used to manipulate the configuration files of VPN-1 NGX, in
the same way that DbEdit is used from the command line. The GuiDBEdit.exe
file is installed in the C:\Program Files\CheckPoint \SmartConsole\R6O\PROGRAM
directory with the SmartDashboard executable, but no link is created for the file
in the start menu's Check Point group.
<0
Tables j Queries] ^ISSLl^llES^
W e d Mar 0 8 1 8 : 4 1 : 2 2 2 0 0 6
Fri Mar 03 1 6 : 2 6 : 5 2 2 0 0 6
Thu Mar 0 2 2 1 : 3 7 : 2 7 2 0 0 6
jfwtoronto Thu Mar 0 2 2 1 : 3 7 : 1 4 2 0 0 6
Jjfwrome Thu Mar 0 2 2 1 : 3 7 : 0 8 2 0 0 6
L a r g e Scale M a n a g e r N
| et_Madrid Thu Mar 0 2 2 0 : 3 1 : 1 8 2 0 0 6
M a n a g e d Objects lExt_Madrid Thu Mar 0 2 2 0 : 3 1 : 1 1 2 0 0 6
Thu Mar 0 2 2 0 : 1 3 : 4 8 2 0 0 6
;jno_vpn_domain Fri F e b 0 3 1 9 : 5 8 : 0 7 2 0 0 6
•«*•» sites_obiects j]Extjroronto Fri F e b 0 3 1 9 : 2 1 : 2 2 2 0 0 6
sI Fri F e b 0 3 1 9 : 1 5 : 5 3 2 0 0 6
1 Tue Jar
Tue J a n 3 1 2 2 : 2 8 : 4 7 2 0 0 6
m us qos Tue J a n 3 1 2 2 : 2 8 : 1 5 2 0 0 6
E" S Read-Only Configuration Tue J a n 3 1 2 1 : 4 1 : 1 7 2 0 0 6
~~ Reporting Tue J a n 3 1 2 1 : 4 1 : 1 7 2 0 0 6
dynanic.object Tue Jan 3 1 2 1 : 4 1 : 1 7 2 0 0 6
Tue lar, 11 91 -41 '17 -flnfi zJ
H S a n ' S T DAG
{NAT, NULL} NAT
{SNMPN , ULL} SNMP
•{VPNN
, ULL} VPN
add_adtr_ru!e boolean add_adtr_rule
a d d i t i o n a l __products owned object al_products,NULL} additional jwo
•{entrust.: _ c e r t i f i c a t e , c e r t i f i c a t e }
GuiDBedit
67
Aquaforest TIFF Junction Evaluation
Database Tool
NGKR60
i Demo Mode
Usef N a m e
Certificate j
^—>J
Password: |
SmartCercler S « v e r fm22102~
r R e a d Only
Wore Options
Quit
GUIDBEDIT PANES
1. When GuiDBedit opens, it is divided into three panes: The top left pane has
two tabs, Tables and Queries. When the Tables tab is selected, a listing of
the tables available on the SmartCenter Server is visible:
T a b l e ; :| Queries j
s i Table
r+i m Administrators
r+i s Desktop
i+i m Global Properties
i+im Large Scale Manager
n M a n a g e d Objects
r-i m Network. Objects
™ network_objeets
ma sites objects
sofaware_gw_types
:±; e OPSEC
!+• m Other
:+; H Policies
:+; m Provider-1
m QOS
+; m Read-Only Configuration
Tables P a n e
68
Aquaforest TIFF Junction Evaluation
2. The top right pane (Objects pane) shows entries in that table:
Objects Pane
Properties Pane
69
giving a choice between True or False for this property. SelertFaUe, anc
The box is
QUERY TAB
Aquaforest TIFF Junction Evaluation
2. Advanced mode;
<!> i tr. "r,arr«e= a " & !{cotof= red')." to §¥ a8 norwed objects s o r t i n g with *
,
£PMi Quety 5 —
i l i i ^ ^
imuttrn j Found. p— abjeete
i a : t Modified B y ~ —~ - - ~
71
FWAUTH.NDB
72
Aquaforest TIFF Junction Evaluation
$FWDIR/LIB/*.DEF FILES
i I I I I I I i I I i I i I I I I i i i i I I i i i i I i I I I I I I I I I I i I I I I i I I I I i
Modifying *. def files should only be done when absolutely necessary. Before
making any changes to *.def files, the Administrator must know the security
implication of those changes. Check Point recommends confirming with Check
Point Technical Support the impact of *. def modifications on NGX behavior
and functionality.
Changes are made on the SmartCenter Server only. *.def files on a Security
Gateway are irrelevant. Changes made to *.def files on a SmartCenter Server
are transferred to the Gateway during Policy installation. However, the changes
will only apply in the Gateway's kernel, and are not written to the Gateway's
individual *.def files. The actual *.def files on the Gateway remain
unmodified.
Example
Use the command find / -name dcerpc. def on SecurePlatform, to find the
dcerpc.def file located in the following folders:
/opt/CPsui te-R60/fwl/lib/dcerpc.def
/opt/CPsuite-R60/fwl/libsw/dcerpc.def
/opt/CPEdgecmp/lib/dcerpc.def
/opt/CPEdgecinp/libsw/dcerpc. def
/opt/CPngcmp-R60/lib/dcerpc.def
/opt/CPR55WCmp-R60/lib/dcerpc. def
73
$FWDIR/lib/*.def Files
M o d i f y i n g *.def Files
: on an a VPN-1/Firewall-1 NG
. by an N G X !
edit the /opt/CPngcmp-R60/lib/dcerpc. def folder (not in ,
R60/fwl/lib/dcerpc.def):
1. On
3. Modify the*. i l e to ]
Any. ; to
4.
5.
74
Aquaforest TIFF Junction Evaluation
Log Files
LOG FILES
i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
Each time current logs are switched using Smart View Tracker or the
fw logswitch command, the above five log files are generated. If any .ptr file is
missing or corrupted, that particular log file cannot be opened. When saving
switched log files, all five of the above log files need to be saved or archived, to
open that single log file in Smart View Tracker or with the fw log <logfile>
command.
To purge or delete the current log file without saving to a backup file, run this
command:
75
Aquaforest TIFF Junction Evaluation
Log Files
When audit logs are switched in Smart View Tracker or with the logswitch
command, the above four types of log files are generated.
To purge or delete the current audit-log file without saving to a backup file, run
this command:
Log Mechanism
In situations of high load on the SmartCenter Server or log server, the Gateway
fwd daemon (which is responsible for log transfer), has a keep-alive mechanism
for communicating with its log server. The NGX Gateway caches log records in
a dedicated 4,096 KB buffer, as long as the fwd daemon is in communication
with the SmartCenter Server. If no response is received from the Server after a
couple of keep-alive check ups, the Gateway will start logging locally to
$FWDIR/log/fw.log.
76
Aquaforest TIFF Junction Evaluation
Log Files
T r o u b l e s h o o t i n g L o g g i n g Issues
Logging from the Security Gateway to the SmartCenter Server can fail for
numerous reasons. Some possible reasons include:
77
78
Aquaforest TIFF Junction Evaluation
Log Files
1. Edit the /etc/system file on the Gateway and add the set command, as
follows ...
set fw:fw log_bufsize=xxxxx
... Where xxxx is the desired size in bytes (default = 81,920 KB).
2. Reboot the Gateway for the change to take effect.
It is possible to set buffer size on the fly by running
fw ctl set int fw_logJbufsize xxxxx, but the size will not be
persistent across reboots.
79
Log Files
To i size on do the
6. Close 1 Editor.
80
Aquaforest TIFF Junction Evaluation
Debugging Logging
DEBUGGING LOGGING
iiiIiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Analysis Tools
NGX logging unifies various logs for a single connection into one log entry in
Smart View Tracker. These individual logs are retained. However, only unified
logs are displayed in Smart View Tracker. The logs are given serial numbers,
called Log Unification Unique IDs (LUUID). This allows all individual logs
to be sorted together using Smart View Reporter, or other Log Export API
(LEA) OPSEC tools.
In addition to using Smart View Tracker, you may display NGX log records
from the command line. There are four ways to display logs:
1. Initial order: Display unified logs at a specific time. This is the default
mode as it displays in Smart View Tracker:
# fw log -m initial
2. Raw log: Display logs from a single connection produced by any kernel
driver or Security Server, by incremental log records linked with the same
LUUID:
i fw log -m raw
D e b u g g i n g Log
81
Aquaforest TIFF Junction Evaluation
Debugging Logging
T h i s table displays the various debug flags relevant only for debugging logging,
using fwd debug mode:
Flag Explanation
82
Aquaforest TIFF Junction Evaluation
Scenario: In this lab, you will collect configuration files from the NGX
installation.
83
Lab 1: Using cpinfo
1. From your Web server, log in to fwyourcity using an SSH client; once
logged in, log in to Expert Mode.
2. At the Expert Mode prompt for fwyourcity, run the following command:
cpinfo -o fwyourcity.txt
84
Aquaforest TIFF Junction Evaluation
The file collection mns for a few seconds. As cpinfo runs, status messages will
display:
Once cpinfo has finished, the output file fwyourcity.txt will be created in the
default directory for the administrator: /home/admin.
4. Once the file has transferred, end the FTP session and log out of your SSH
client session.
85
Aquaforest TIFF Junction Evaluation
f p E X A M I N E C P I N F O O U T P U T FILE
1. Navigate to the directory to which you transferred fwyourcity. txt, and open
fwyourcity.txt using WordPad.
2. Using the Edit menu's Find selection, look for the following information in
the file:
• Check Point product and operating-system information
• License and version
• objects_5_0.C
The following is partial cpinfo. txt output, listing installed components:
vmmmmmrn
^mMMmtiAi . Dlx
File gdit Jjew Insert Format Help
QMjBj #tal m Mdid
CP c o m p o n e n t s
=1
FireWall-1 Yes Ver:5.0 SP: 9 MB P: 0
SecurePlatform Yes Ver:5.0 SP: 9 MSP: 0
ADVR Yes Ver:5.• SP: 9 MSP: 0
CPinfo Yes Ver:5.0 SP: 9 MSP: 0
FU1_41_BC Unknown
NGCHP Yes Ver:5.0 SP: 9 ISP: 0
PSSUCnip Yes Ver:5.0 SP: 9 MSP: 0
CP S t a t u s - FW
P r o d u c t name: FireWall-1
P o l i c y name: Standard
Policy i n s t a l l time Fri Apr 7 10:44:45 2006
Num. c o n n e c t i o n s : 1
P e a k num. c o n n e c t i o n s : 6
Total accepted packets: 23569
til!
For Help, press ft
86
Aquaforest TIFF Junction Evaluation
The Security Gateway's version and build number can be found in the file
fwyourcity. txt:
..•Mi» M i l Ml
VPN-1 Version I nf o rinat 11
System Information
jJJ
ForHefopwssFl
87
Aquaforest TIFF Junction Evaluation
:anvobj (Any
:color (Blue)
)
:superanyofoj f
: (Any
: color (Blue)
>
}
:serverobj (serverobjj
:translations (translations)
: 3 e r v g e n ()
: l o g - p r o p s {)
:state-act (
: c o m a n n d _ n o t i n s t 2 i r i s t ()
: c o m m a n d _ n o t i n s t 2 d i 3 ()
: corwmand_ins2notinst (status_alert)
:conmand_inst2dis (status_aiert)
: c o m m a n d _ d i s 2 i n s t (1
: c r o m m a n d _ d i s 2 n o t i n s t ()
)
: S P l o b j ()
:version (6.0)
:glotoals (
: (ill
: Adininlnfo ( ^J
1 Jj "
Creates a new document N
'UM
objects_5_0.C
88
Aquaforest TIFF Junction Evaluation
Scenario: In this lab, students will use the fwyourcifcy.txt from the previous lab
and analyze it using the InfoView utility.
Objectives:
Topics:
89
Aquaforest TIFF Junction Evaluation
[ 5 O P E N CPINFO IN INFOVIEW
HMR
yt|l© Edit Veiw Toofs Analysis Wnidow He>
|
j f ] ti|ii-Ui]?ij iijejfflji®] jr - • msm
Test I . P k h n . ! Stat
+ /opt/CPsuite-R60/fwl
Host File fwoslo Not tested
+ /opfc/CPshrd-R.60 Has Is
/opt/CPEdgecmp
License-Object fwoslo Not tested
File Title
CP components
Y Duplicate Objects fwoslo Not tested
CP Status
CP Product keys
. ^ ^ ^ P All Inter faces fwoslo Not tested
VPN-1 Version Information
FireWall-1 Management (f>
FireWall-1 Version Informs ' V ) l j | j Machine I n t e r f . . . fwoslo Not tested
IP I n t e r f a c e s
:PS
N e t s t a t Information V : ^ Process fwoslo Not tested
A *f
Product '.etsic-n !-,de description Internal Code E
=uk Comments
ggZ FireWall-1 5.9.0 N6 A I (R60) Dallas 591
OsecurePlatf... 5.9,0 NG AI(R60) Dallas ???
O ADVR 5.9,0 NG AI(R60J Dallas ???
O CPinfo 5.9,0 NG AI(R60) Dallas ???
QNGCMP 5.9,0 NG AI(R60) Dallas ???
S RBSWCmp 5.9.0 NG AI (R60) Dallas ???
jj
~iUMr
fwoslo.txt in InfoView
90
Aquaforest TIFF Junction Evaluation
1. Click the System Information tree; the processor type and speed,
environment, and other information, such as routing and ARP are
displayed.
2. Close the System Information tree.
3. Click the CP products key tree to review the Check Point products installed
on your machine:
E m m a M m m a m m m s m :
file Edit View Insert Format Help
DSIHI
...... 5
CPshared
Fll
Provider-1
- i efp, press F;
CP Products Installed
91
Aquaforest TIFF Junction Evaluation
JT H
Configure,j
Explicit Menu
4. Select the path to SmartConsole and check the box Open as read-only:
JJJSJ
Look|re „ , J PROGRAM m & &
CJIvwhois
^jMonitorData
^Preview
Z3CPftegSvr.exe
^ CPSecuremotePW, exe 1 SecureUp
^jSmartCon
^smartMap
,Jutil
H CPlgv.exe
Scpml.exe
2J
File name.' |FwPolicy.e Open
P Open as read-only
92
Aquaforest TIFF Junction Evaluation
Scenario: In this lab, you will use GuiDBedit to create a new service object, a
new group object, and to add a service object into a group object. Also in this
lab, you will use GuiDBedit to modify a global properties
resolve _nrultiple_interf aces value to true.
Objectives:
Topics:
93
Aquaforest TIFF Junction Evaluation
.1 Demo Mode
Certificate: |
J ;
Password 11
P R e a d Only
More Options » i
| OK j Suit |
94
Aquaforest TIFF Junction Evaluation
Tabtei j Querie? \ m
!B1ST
; Q Pead-Only Configuration
' B Reporting
: |B] Services
• |0 SmartMap
GuiDBedit Screen
95
Aquaforest TIFF Junction Evaluation
6. In the Tables pane, open the Services branch and select the services table
object. The Objects pane then populates with all available objects in the
services table:
nsWVajuE™
7. Select an object in the Objects pane, which changes the focus of GuiDBedit
to the Objects pane and populates the Fields pane.
8. From the Objects drop-down menu, select New. The Create Object box
opens.
9. From the Class drop-down menu, select service group, and name the
Object "labervices". Click OK.
Class: |service_group
Object [ l a b s e r v i c e.:j
1 OK 1 Cancel j
96
Aquaforest TIFF Junction Evaluation
The services table automatically refreshes, and in the Objects pane, the focus
will now shift to the newly created labservices object.
10. Use the Create Object box to create a new tcp service called "test-service 1".
11. Highlight the test-service 1 object in the Objects pane, and scroll through
the Fields pane to find the port field.
12. Double-click the port field to edit it. Configure the new service with port
3333 and click OK:
w m m m m i &
Value: f 3 3 3 3 ^
| QK 1 Cancel j
13. Click the Save All Changed Objects button on the menu, to write all
changes to the databases:
14. Highlight the labservices object in the Objects pane. In the Fields pane,
scroll to the container field, right-click, and choose Add. The Add/Edit
element box opens.
15. In the Object drop-down menu, scroll to the test-service 1 object, highlight
it, and click OK. This adds test-service 1 to the service group labservice.
test-service 1 Added
16. Make the change permanent in objectsJ5_0.C. by clicking the Save All
Changed Objects button.
97
Aquaforest TIFF Junction Evaluation
GuiDBedit can also be used to modify specific properties of a given object. You
will modify the resolvemultipleinterfaces property of the firewall global
properties table:
1. In the GuiDBedit Tables pane, open the Global Properties branch and select
the properties table.
2. In the Object pane, select the firewall_properties object.
3. From the toolbar, select the Search menu and choose the Find option. Use
the following information to configure the search:
llllil
B 1D
©firewall.
"-"Wt'ST"""*"
+;• 0
t" HI
Administrators
Desktop
*—; |E3 Global Properties
1
find what; |resolve_multiple_interfaces
- Search in
r Tables P Match string cr#
P Obiecfc P Case sensitive
F Fields
r Values - JP « Li>-
4. Double click resolve multipe interfaces to edit its Boolean value. Select
True and click O K .
98
Aquaforest TIFF Junction Evaluation
5. Click the Save All Changed objects button to save the updated value.
Some properties are global, and some are specific to a
Gateway. To modify properties that are unique to specific
Gateways' locate the object name in the network objects table
in the Network Objects branch of the Tables pane.
99
Lab 3: Using GuiDBedit
100
Aquaforest TIFF Junction Evaluation
Scenario: Even though a logswitch can be configured to run regularly via the
SmartCenter object in SmartDashboard, or can run via the menu in Smart View
Tracker, using the command fw logswitch can sometimes be helpful. In this lab,
you will see that 4-5 log-pointer files are generated with the real . log file when
the fw logswitch command is executed. A distinction between logswitch and
logexport is made in this lab.
Objectives:
Topics:
101
Lab 4: Using fw i
[ 5 R U N FW L O G S W I T C H TO S W I T C H ACTIVE LOG
The
Log file has to:
lab-switch.logaccount
5. If no dappends the(
to the
.loginitialjptr
Aquaforest TIFF Junction Evaluation
T h e following m e s s a g e displays:
103
Lab 4: Using fw logswitch and fwm logexport
2006-04-07_190037.adtlog
2006-04-07_190037.adtlogaccountj)tr
2006-04-07_190037.adtloginitialj)tr
2006-04-07_190037.adtlogptr
105
Aquaforest TIFF Junction Evaluation
Or you can FTP the exported log file to your Web server and view it in
WordPad:
X.
fife Edit View Insert Format fctefp
Jd
F:<r Heip, press F:
106
Aquaforest TIFF Junction Evaluation
Review
REVIEW
i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
107
Aquaforest TIFF Junction Evaluation
Review
Review A n s w e r s
The Policy is compiled with the objects files, and is a binary file on the
Gateway. This information would be retrieved from Policy information on
the SmartCenter Server.
109
Aquaforest TIFF Junction Evaluation
Review
no
Aquaforest TIFF Junction Evaluation
4f
Q Check Point
f®* 5 * S O F T W A R E TECHNOLOGIES LTD,
Objectives
ill
Key Terms
112
Aquaforest TIFF Junction Evaluation
tcpdump
TCPDUMP
i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
tcpdump Syntax
This table explains several of the commonly used switches and their arguments
for tcpdump:
Switch
and Argument Explanation
-C file size Before writing a raw packet to a savefile, check whether the
file is currently larger than file_size and, if so, close the
current savefile and open a new one. savefile after the first
savefile will have the name specified with the -w flag, with a
number after it, starting at 2 and continuing upward. The units
of file size are millions of bytes (1,000,000 bytes, not
1,048,576 bytes).
113
Aquaforest TIFF Junction Evaluation
tcpdump
Switch
and A r g u m e n t Explanation
-r file Read packets from file (which was created with the -w
option). Standard input is used if file is
-s Grab snaplen bytes of data from each packet, rather than the
default of 68. (With the Sun OS NIT, the minimum is actually
96.) 68 bytes is adequate for IP, ICMP, TCP and UDP, but may
truncate protocol information from name-server and Network
File System packets.
Packets truncated because of a limited snapshot are indicated
in the output with " [ | proto] ", where proto is the name of the
protocol level at which the truncation has occurred.
Note that taking larger snapshots both increases the amount of
time it takes to process packets, and effectively decreases the
amount of packet buffering. This may cause packets to be lost.
Limit snaplen to the smallest number that will capture
protocol information required. Setting snaplen to 0 means
using the required length to catch whole packets.
-w Write the raw packets to file, rather than parsing and printing
them. Packets can later be printed with the -r option.
Standard output is used if the file is
114
Aquaforest TIFF Junction Evaluation
tcpdump
t c p d u m p and E x p r e s s i o n s
An expression selects which packets tcpdump will write to the defined output. If
no expression is given, all packets on the network will be dumped. Otherwise,
only packets for which the value of expression is 'true' will be dumped.
type Indicates the thing to which the ID name or number refers; possible
types are host, net and port. For example:
host foo
net 128.3
port 20
proto Restricts the match to a particular protocol; possible protos are ether,
ddi, tr, i p , ip6, arp, rarp, decnet, tcp and udp; for example:
If there is no proto qualifier, all protocols consistent with the type are
assumed, i.e., src foo means (ip or arp or rarp) src foo.
(The latter is not legal syntax).
net bar means (ip or arp or rarp) net bar.
port 53 means (tcp or udp) port 53.
115
Aquaforest TIFF Junction Evaluation
tcpdump
Using tcpdump
The following string captures all traffic coming to all interfaces on Gateway
fwoslo, and writes the output to the file capture:
This will capture all traffic from the network segment connected to ethl on
fwoslo. If there is too much information presented in the capture, tcpdump can
also filter for specific protocols. Suppose that in this environment, you are
attempting to determine the failure of an FTP session through the Security
Gateway fwoslo. From the command line on fwoslo, set tcpdump to filter
specifically for FTP traffic on all interfaces, with the following syntax:
This will show if any FTP related traffic is being "heard" on the interfaces of
fwoslo.
116
Aquaforest TIFF Junction Evaluation
tcpdump
tcpdump -r <filename>
Open the file that was captured using this string ...
15:28:46.724479 fwoslo > 224.0.0.5: OSPFv2-hello 56: [len 44] [tos OxcO]
[ttl 1]
[Expert@fwoslo]#
117
118
Aquaforest TIFF Junction Evaluation
snoop
SNOOP
i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
snoop can also capture and analyze network packets other than IP addresses,
such as DECnet and AppleTalk. However, since VPN-1 NGX does not
recognize other types of packets than IP addresses, information on these other
packets will not be covered in this chapter.
Using snoop
#snoop -o filename
The -o option saves data in binary format to a user-defined file. To view data in
real-time, exclude the -o option.
Next, determine how many packets need to be captured to view the information.
If the number of packets is not determined, snoop will continue gathering
packets until you press CTRL + C, or the system runs out of resources.
In this example, snoop will capture 1,000 packets. This capture will typically
take about 60 seconds on a 10 megabits-per-second network. The type of
capture taken depends on the type of information required. Keep in mind that
snoop can be resource-intensive, depending on the amount of network traffic on
a segment. In some cases, a dedicated server for snoop may be needed.
119
Reading snoop Output
120
Aquaforest TIFF Junction Evaluation
snoop
Below is an example of verbose summary mode, using the same packet as the
previous example. Notice it provides layer 2 (Ethernet), layer 3 (IP), layer 4
(TCP), layer 7 (Telnet), and ACK and SEQ (sequence number):
Verbose mode displays the details of each packet to the bit level in the OSI
model. The example below shows the same packet as the previous examples in
verbose mode. Detailed information of each layer is captured, including layer 2
(Ethernet), layer 3 (IP), and layer 4 (TCP) headers. The syntax for verbose
detailed mode is:
snoop -i -v [filename]
121
Aquaforest TIFF Junction Evaluation
snoop
snoop helps track down "unknown" hosts in a network. An unknown host could
be a dial-up server or gateway configured by a network attacker. Active
measures can determine hosts on the network, but only if the machines are on.
What if a host is on only at night, or has been configured not to reply to ICMP
requests? snoop helps track down rogue hosts, allowing action to be taken.
snoop Limitations
Unlike active measures, but like most sniffers, snoop cannot operate in a
switched network, snoop records packets that cross the designated interface on
a local network segment, but only captures packets in its collision domain.
To monitor all traffic traveling between a network and the Internet, place the
sniffer between the gateway and the border router. This allows capturing of all
Internet traffic. This information is compared to the logs in Smart View Tracker,
to see specifically which segment of the network needs further inspection with
snoop. This comparison is useful when encountering Network Address
Translation and traffic originating behind routers.
122
123
Aquaforest TIFF Junction Evaluation
fw monitor
FW MONITOR
i i i i i i i I i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
Overview
fw monitor Syntax
fw monitor runs from the command line. The following arguments give
information for configuring fw monitor to not only capture and filter traffic
through VPN-1 NGX, but also specify which parts of the kernel chain packets
pass through are also monitored.
Argument Explanation
124
Aquaforest TIFF Junction Evaluation
fw monitor
Argument Explanation
-1 Limits the packet length, and specifies how much of the packet
should be transferred from the kernel; for packets longer than the
specified length, only a prefix will be available for display.
-t When compiling the INSPECT script, includes tcpip. def; allows the
use of tcpip macros in the script
-i After writing each packet, flushes the standard output, if you want to
kill fw monitor but write all data to a file
"P Monitors position in the kernel chain; Note: Using this switch with
the "all" argument can be very resource-intensive.
125
f\v monitor
The INSPECT virtual machine intercepts, analyzes, and takes action on all
communication before it enters a Gateway's OS. Cumulative data from
communication and application states, network configuration, and Security
Policy are used by the virtual machine to enforce the enterprise Policy.
There are four inspection points as a packet passes through the virtual machine:
126
Aquaforest TIFF Junction Evaluation
fw monitor
Unless the -o option is specified, packets are directed to standard output. The
first line displays IP information, and the next lines display protocol-specific
information (for TCP, UDP, or ICMP). If the option -x is used, the lines
following the command show a hexadecimal dump and printable character
display of the packet content. Issuing fw monitor without any arguments will
capture all packets to standard output, which is the CLI.
Filter E x p r e s s i o n s
In a busy system, running fw monitor without any filters can create a great
detail of output, and makes the analysis difficult. The filter expressions are used
to specify packets to be captured. The general syntax is
fw monitor -e "accept <expression>;".
• The first filter captures all traffic from and to the host 172.29.109.1.
• The second filter captures all HTTP traffic on port 80 only.
• The third filter captures only inbound direction before and after the virtual
machine (i and I), and redirects the output to a file.
fw ctl c h a i n
VPN -1 NGX passes each packet through a list of chain modules. Each module
may modify, pass, or drop the packets. You can see this list using the
fw ctl chain command, fw monitor can be inserted in any position in the chain.
127
OUTPUT
in chain (10):
3: 0 (f99a4720) fw i (fw)
fw ctl chain i
be after fw monitor.
fw monitor
fw monitor is inserted into the chain as a chain module so fw monitor can report
on all packets, fw monitor does not change or drop any packets, fw monitor is
inserted into the chain at four different points — in positions minus
0x70000000 and 0x70000000 in inbound, and in the same positions in
outbound. The inbound position captures packets before they pass most of the
chain modules, while the outbound position captures them after they have
passed the chain modules. It is possible to change the position of the monitor.
This is accomplished with the -p parameter.
absolute pos — a signed integer that determines the order in which packets pass
the modules; the packets start with the smallest number and end with the
largest. This number does not depend on the current chain entries.
relative pos — The chain modules are ordered with an ascending number
starting with 0. You can use this number to specify the position from which fw
monitor inserts, fw monitor does not replace the chain module with this number.
The previous module (and all following modules) are moved by one position.
alias (shown in parenthesis) — a short name, which can be used with the -p
parameter
The letter following -p is the position you want to change — either inbound or
outbound, and either first (lowercase) or last (uppercase) position. You may
include this parameter up to four times, to change some or all positions. When
using a relative position, type the position of the module before which you want
the monitor to enter. If you want the position after all modules, use any number
higher than all relative positions. (99 will usually do.) When using an absolute
position, type the position where you want the module. If there is a module at
this position, the command will fail. When using an alias, you can select if you
want the monitor before or after the alias.
129
Jw
RELATIVE POSITION
in chain (15):
130
14: 7f800000 (989a9020) ( f f f f f f f f ) IP Options Restore (ipopt__res)
131
2. fw monitor -pi 4 -o monitor.out:
in chain (17):
132
Aquaforest TIFF Junction Evaluation
fw monitor
133
RELATIVE POSITION USING ALIASES
of fw is to use a module's
in fw ctl This can be done using
lias. For to insert fw monitc
verify, use -pi
monitor:
in chain (17):
134
Aquaforest TIFF Junction Evaluation
fw monitor
135
ABSOLUTE POSITION
in chain (15):
fw monitor
To insert fw monitor after tcp stream (cpas) for the outbound chain:
137
SAMPLING INTERVAL
138
Aquaforest TIFF Junction Evaluation
fw monitor
a ft
FTP server. The FTP server is configured with Static NAT on
your NGX Gateway. You see your customer's FTP connection is
accepted in Smart View Tracker, but you do not know when the
kernel drops this connection or when the FTP server resets the
connection.
Q.) How do you run fw monitor with proper filters, to capture FTP
connections between the server and this client only?
1. Start fw monitor.
139
Aquaforest TIFF Junction Evaluation
Ethereal
ETHEREAL
Using Ethereal
^ ^ • l ^ p l M l i i i l
File Eck aew >jc. Capture Analyze statistics Help
& fe 0 x 0 3 IS * SO 1 1 a. % p E) m m a
<1 1 H
am 69""3i""65" 74 68 Sl'OO'OCT'OO'OO 00"00"08"00"45""00 t let Hi L".
0010 00 30 02 9a 40 00 7f 06 d3 a7 ac I d 6d 01 0a 02
0020 02 66 04 15 00 50 00 82 d9 a7 00 00 00 00 70 02
0030 40 00 3f 0a 00 00 02 04 05 b4 01 01 04 02
Ethereal GUI
The Ethereal GUI consists of three panes: The top pane is an overview, listing
entry ID number, capture time, source and destination address, protocol name
(TCP, UDP, FTP, ICMP), and a packet summary with the following
information:
140
Aquaforest TIFF Junction Evaluation
Ethereal
I
101 5.608204 10.2.2.102 10.2.2.1 TCP 1 5 0 8 > 22 [ A C K ] Seq=0 Ack-5128 Win-1€ f
102 5.608233 10.2.2.102 10.2.2.1 TCP [TCP Dup ACK 101#1] 1508 > 2 2 [ A O ] f
103 5.608263 10.2.2.1 10.2.2.102 SSH Encrypted response packet len=208
104 5.608273 10.2.2.1 10.2.2.102 SSH [TCP Retransmission] Encrypts
Encrypted respor
li •942 .29, 109.1 10.2.2. 102 TCP 104 5 > http i_'syn] seq-G q=0 Ack=0
Ack-Q win-163
107 5 634970 172.29, 109.1 10.2.2. 102 TCP 104 5 > http "SYN] seq=0 ACK-O Win=163
108 5 634989 172. 29. 109.1 10.2.2. 102 TCP 104 5 > http Isyn] seq-0 Ack-0 win=163
109 5 635206 10.2.2. 102 172.29. 109.1 TCP http > 104 5 ;syn, ACK] seq-0 Ack =1 wi
110 5 635231 10.2.2. 102 172.29. 109.1 TCP http > 104 5 "SYN, ACK] seq-0 Ack=1 Wi
111 5 635242 1 0 . 2 . 2 . 102 172.29. 109.1 TCP http > 104 5 I SYN, ACK] Seq=0 Ack =1 wi
112 5 635251 10.2.2. 102 172.29. 109.1 TCP http > 104 5 I SYN, ACK] seq-0 Ack =1 Wi
113 5 635729 172.29. 109.1 10.2.2. 102 TCP 104 5 > http 'ACK] Seq=l Ack-1 win=175
114 5 635746 172.29. 109.1 1 0 . 2 . 2 . 102 TCP TCP Dup ACK 113/1] 104 5 > http [ACK] j
115 5 63 5 75 5 172.29. 109.1 1 0 . 2 . 2 . 102 TCP jrp Dup ACK 113#2] 104 5 ::- http [ACK] J
P.l^li--' . 1 1 3 * * 1 1 f:4 K h t t n fft-t. 1 T i l
Jj
Ethereal Top Pane
The Time field counts in seconds after fw monitor starts. The Time field is
always important for troubleshooting. For example, when a new TCP
connection starts, it starts with a TCP handshake: SYN, SYN-ACK, and ACK.
Check Point's default limit for the whole TCP handshake is 25 seconds (defined
in the tcpstart time-out setting in Global Properties). If you see a SYN packet
from client to server, and the server does not reply with SYN-ACK within 25
seconds, the SYN-ACK will be dropped with a "TCP packet out of state" error.
By looking at the Time field, you can tell if the connection is finished in time.
141
i f i i l f i f f f i l l i p
Aquaforest TIFF Junction Evaluation
Ethereal
A typical TCP connection starts with a TCP handshake: SYN, SYN-ACK, and
ACK. You can observe the TCP handshake in fw monitor without any filtering
expressions. You can see the SYN packet from the client to the server with all
four entries i, I, o, 0 present. You know the packet arrives at the kernel, and
leaves the Gateway successfully.
After the SYN packet leaves the Gateway and gets to the server side, the server
side replies with a SYN-ACK. If the reply is successful, you will see i, I, o, 0.
The client then sends an ACK packet to the previous SYN-ACK, and you see i,
I, o, 0. If you only see SYN but no SYN-ACK, the SYN-ACK packet may not
arrive at the Gateway. There may be some routing issues, or the server may not
be running.
Depending on the switch combination with fw monitor, you may see more or
less lines per packet. If no particular direction or interfaces are filtered,
fw monitor records four lines per packet in Ethereal (i, I, o, 0). If there is any
discontinuity in the flow, packets can be either dropped or rerouted by the
kernel. For example, a packet has entry i, but no I. The packet may have been
dropped by the Rule Base. If you see a packet coming through the inbound
interface (i or I) but not through the outbound interfaces (o or 0), the packet can
be rerouted by the OS.
When you use fw monitor to capture certain types of traffic, start fw monitor
with the proper switches first. Then test the traffic in question, wait until the
problem occurs (connection times out or error messages appear), then return to
the fw monitor CLI and stop fw monitor with CTRL + C. To transfer the monitor
output to a machine running Ethereal, transfer the monitor output in binary.
143
Aquaforest TIFF Junction Evaluation
Ethereal
Connection starting points normally start with a SYN packet from a client to a
server. To find the starting point of a connection, click either source or
destination (if either of them is known). In some cases, click the Protocol field,
and monitor entries will line up accordingly.
For example, to look for FTP connections only, you can filter by FTP on the
Protocol field. The filtered output is like the following:
•adSIiS!
fie Edt View 'So Capture Analyze Stattsbcs Help
i ^ ^ l i ei Q* % . m m B M
j Expression.., J £tear I Apply f
Source
Protocol Field
144
Aquaforest TIFF Junction Evaluation
Ethereal
Ethereal can display only specific packets with different colors. The easiest way
to display only specific packets is to select a packet in the overview pane, then
select Follow TCP Stream from the context menu. This will automatically set a
display filter to only display packets of this specific connection, based on
source or destination IP addresses and ports. A separate screen displays the data
exchanged between client and server.
The filter expression is automatically populated in the Filter list in the top pane.
To clear the filter expression, click the Clear button to the right of the Filter box.
Wo , - j "ime
1 j Source j Desunation
105 !5. 634784 172.29.109.1 10.2.2.102 TCP 1045" > h t t p LsrKsSeq=0 A d = u wi n=16384 Len=0
1 0 6 !J. 634942 172.29.109.,1 10.2.2.102 TCP 104 5 > h t t p ;SYN" eq=0 Ack =0 wiri=16384 Leri=0
1 0 7 !J. 634970 172.29.109.1 10.2.2.102 TCP 104 5 ;syn; =0 Ack=0 Win=16384 Len=0
1 0 9 :i. 635206 10.2.2.102 TCP http [SYN, ACK' seq-0 Ack?win-17520 L'
f
110 i.635231 10.2.2.102 172.29.109.1 TCP h t t p > 104 5 I SYN, ack;
s e q = 0 Ack-1 Win=17520 L
in : i. 635242 10.2.2.102 172.29.109.1 TCP h t t p > 104 5 'SYN, ACK; S e q - 0 A c k - 1 Win=17520 L
112 f » . 6 3 5 2 5 1 10.2.2.102 172.29.109.1 TCP h t t p > 104 5 ISYN, ACK' S e q - 0 A.ck-1 w i n = 1 7 5 2 0 L
113 f i. 635729 172.29.109. 1 10.2.2.102 TCP 104 5 > h t t p "ACK] seq= =1 A c k - 1 win=1752G Len=u
114 f i . 6 3 5 7 4 6 172.29.109. 1 10.2.2.102 TCP [TCP Dup ACK 113# KL1 104 5 > h t t p [ACK] s e q = l Ac
115 :i. 635755 172.29.109. 1 10.2.2.102 TCP [TCP Dup ACK 113#2]104 5 > h t t p [ACK] s e q - 1 Ac
1 1 6 f i. 63 5762 172.29.109. 1 10.2.2.102 TCP [TCP Dup ACK 1 1 3 # 3 ] 104 5 > h t t p [ACK] S e q - 1 Ac
1 1 7 :!. 6 3 6 6 3 1 172.29.109. 1 10.2.2.102 HTTP GET / H T T P / 1 . 1
U S :i . 6 3 6 6 3 9 172.29.109. 1 10.2.2.102 HTTP GET / H T T P / 1 . 1
1 1 9 5i. 63664 5 172.29.109. 1 10.2.2.102 HTTP GET /' H T T P / 1 . 1
120 : 1.636651 172.29.109. 1 HTTP GET ,' H T T P / 1 . 1
I^I C 1. 641 1u,7M0? 1 r/Q. i HTTP HTTP/1.1 304 Nnr
wndifipd
<1 , , , ,,. .,.,, , ... • I JLj"
Filter Expression
When Follow TCP Stream is selected, a separate screen appears, which displays
the connection between the server and client on that particular connection. The
TCP stream screen can show whether or not a connection is broken. By
145
Aquaforest TIFF Junction Evaluation
Ethereal
following the TCP stream of a particular FTP packet, the TCP stream screen
can show whether or not that particular connection is broken, as shown below:
wm
Stream Content
|2 20-Webos To ;-2 wsIftp server 57o"."4:EVAL"(31910133iV
2 2 0 - T h u Oct 2 7 1 5 : 0 5 : 5 1 2005
2 2 0 - 2 7 days r e m a i n i n g on e v a l u a t i o n .
220 w e b o s i o >.2 ws_FTP Server 5.0.4. EVAL ( 3 1 9 1 0 1 3 3 1 )
. USER tchunq
331 Password required
PASS a b c l 2 3
2 3 0 user l o g g e d in
TYPE I
200 Type s e t t o ifage.
POPT 2 72,2 9 , 1 0 9 , 1 , 4 . 2 6
200 c o m m a n d successful
R ET P. m c n 11 o r -rt p. c ut
"4UIT
Save As | Print | Entire conversation (351 bytes) : • [ m» ASCII C EBCDIC C Hex Dump C C Arrays C rm
The Follow TCP Stream filter can only use IP addresses and
ports.
146
A.) The monitor file has been sent to you in ASCII i
;send the file in 1
1.1
7. Click Apply.
Aquaforest TIFF Junction Evaluation
Ethereal
148
LAB 5: C O M P A R I N G CLIENT-SIDE NAT
VS. S E R V E R - S I D E NAT WITH FW M O N I T O R
fipCONFIGURE AUTOMATIC STATIC NAT FOR
WWW. VOl/flC/7-KCP
1. Log in to
2. Edit wQbvonrcitfs
3. Open the NAT sere
4.
5. 172.x.x.3 as the NAT IP ;
is 172.22.102.0, and the NAT IP j
172.22.102.3.
6. OK to exit the host
7. Policy > Global properties > NAT i
8. Verify 1 5 is i
9. Verify 1 j ARP.
10. OK to <
11.
4. Use FTP in binary mode to transfer the monitor-output file from your
Gateway to www.yoi4rcity.cp, where Ethereal is installed.
5. Open Ethereal and load the monitor-output file.
6. Analyze the NAT process and locate the point where the NAT IP address
changes into the private IP. In the following screenshot at I (big I), the
destination changes from 172.23.103.3 to 10.1.1.101, which is the private
IP of webrome:
;
file. ! So S-af )tu>e A r slyze St«iistics tMP
NO, | Destnasw3n 1 ''-Jew Colurrm I 3-otocol | I r f o
1 0,. 0 0 0 0 0 0 1 7 2 . 2 3 , . 103 ., 3 1 7 2 . 2 1 , .101,. 3 i etho TCP 1092 > h t t p [SYN;] S e q = 1 1 6 3 4S93 23 -
3 0,. 0 0 0 3 68 1 7 2 . 2 3 , .103,. 3 1 0 . 1 . 1 , . 101 etho TCP 1092 > http [" S R ' 1N' S e q = 1 1 6 3 4 8 9 3 2 8 A
4 0,. 0 0 0 4 2 9 1 7 2 . 2 3 , .103,.3 1 0 . 1 . 1 ,,101 etho TCP 1092 > http |;SYN;I S e q = 1 1 6 3 4 8 9 3 2 8 A
5 0,. 0 0 0 6 3 0 1 0 . 1 . 1 . ,101 1 7 2 . 2 3 . ,103,. 3 etho TCP http > 1092 [! SYN,, ACK] S e q = 2 6 1 7 3 0 3
0 , , 000662 1 0 . 1 . 1 . .101 1 7 2 . 2 3 , , 1 0 3 ,. 3 etho TCP http > 1092 |"SYN,» ACK] 5 e q = 2 € 1 7 3 03
7 0,. 0 0 0 6 7 5 10.1.1,.101 1 7 2 . 2 3 . ,103,, 3 etho 0 TCP http > 1092 ["SYN,, ACK] Seq=2 6 1 7 3 03
8 0,.000693 1 7 2 . 2 1 . , 1 0 1 . .3 1 7 2 . 2 3 . , 103 .3 , o etho TCP http > 1092 [" S Y N ACK] S e q = 2 6 1 7 3 0 3
9 0,. 001662 1 7 2 . 2 3 . , 1 0 3 . ,3 1 7 2 . 2 1 . , 1 0 1 . .3 i etho TCP 1092 > http [- a c k ; S e q = 1 1 6 3 4 8 9 3 2 9 A
10 0 , . 0 0 1 7 1 5 1 7 2 . 2 3 . , 1 0 3 , .3 1 0 . 1 . 1 , ,101 etho i TCP 1092 > http ["ACK" S e q = 1 1 6 3 4 8 9 3 2 9 A
11 0,. 0 0 1 7 3 6 1 7 2 . 2 3 . , 1 0 3 ., 3 1 0 . 1 . 1 .,101 etho TCP 1092 > http [: A C K : S e q = l l b 3 4 8 9 3 2 9 A
12 0 , , 0 0 1 7 5 1 1 7 2 . 2 3 . , 1 0 3 . ,3 1 0 . 1 . 1 .,101 etho TCP 1092 > http ["ACK S e q = 1 1 6 3 4 8 9 3 2 9 A
13 0 . . 0 0 1 9 4 5 1 7 2 . 2 3 . , 1 0 3 . ,3 1 7 2 . 2 1 . ,101., 3 i etho HTTP GET / H T T P / L . 1
14 0 , . 0 0 1 9 7 3 1 7 2 . 2 3 . , 1 0 3 ., 3 10.1.1., 101 etho i HTTP GET / H T T P / 1 . 1
15 0. . 0 0 1 9 3 6 1 7 2 . 2 3 . , 1 0 3 . .3 1 0 . 1 . 1 . ,101 etho HTTP G E T / HTTP/1. 1
16 0 . . 0 0 1 9 9 9 1 7 2 . 2 3 . , 1 0 3 ., 3 1 0 . 1 . 1 . 101 etho HTTP GET / HTTP/1. 1
17 0 . . 0 0 3 4 3 0 1 0 . 1 . 1 . ,101 1 7 2 . 2 3 . 103 ., 3 etho HTTP H T T P / 1 . 1 304 NOt M o d i f i e d
18 0, , 0 0 3 4 4 5 1 0 . 1 . 1 . , 101 1 7 2 . 2 3 . 1 0 3 ., 3 etho HTTP H T T P / I . 1 304 NOt M o d i f i e d
Frame 2 (62 b y t e s on w i r e , 62 b y t e s c a p t u r e d )
. f i r r i v a l T i m e : Apr 2(5, 2 0 0 6 0 9 : 0 3 : 3 0 . 8 0 4 4 8 5 0 0 0
[Time d e l t a f r o m p r e v i o u s p a c k e t : o . 0 0 0 3 2 4 0 0 0 s e c o n d s ]
[Time s i n c e r e f e r e n c e o r f i r s t f r a m e : 0 . 0 0 0 3 2 4 0 0 0 s e c o n d s ]
F r a m e Number: 2
Packet Length: 62 bytes
capture Length: 62 bytes
[Protocols in frame: eth:fwi: ip: tcp]
Direction: I
etho
Type: IP ( o x o s o o )
• Internet Protocol, Src: 172.23.103.3
(172.23.103.3), D s t : 10.1.1.101 (10.1.i.101)
Transmission control Protocol, src p o r t : ost Port: http 1092 (1032), (so), s e q : iib:435:2S, ^ci':
oooo
0010 00 30 3d Sf 40 00 7 e i aO b& a c 17 67 03 Oa 0 1
0020 01 65 04 44 00 50 45 7 0 30 00 0 0 00 00 70 02 e.D.PEY
0030 40 00 6a 81 00 00 02 05 b4 0 1 0 1 04 02 i. j . . . . .
151
10.2.2.102 to 172.22.102.3. This occurs at the O (big O) in the
1. Select Glo
2. Under Aut : NAT i
side.
3. Leave the : ARP (
4. Click OK.
5. Install the
1. Log in to 1
2. Ru
3. Select Routing from the menu.
4. Select add a host route.
5. Enter the NAT IP address as the
7. Enter e to ex
8. Enter e to &
0 R U N F W M O N I T O R W H I L E B R O W S I N G NAT I P A D D R E S S
1. to WW by its NAT IP ;
(172.29.109.1).
2.
run fw : NAT
•city's
152
153
Aquaforest TIFF Junction Evaluation
5. Identify the point where the NAT IP changes to the private IP. For inbound,
as shown in the screenshot below, the translation occurs at O (big O), since
it is closest to the server side. (The client side is webdallas, and the server
side is webrome.)
. 0., 000614"" 10.'1.1,,101" 172 .29,.109.,'s"" etho " TCP http" > 13 51"''[SYN,""ACK]""Seq=lS4979J
S 0,,000649 172 .21., 101., 3 172 .29., 109,
,5 etho TCP http > 1351 [SYN, ACK] Seq—15 49 79E
7 0.,000662 172 .21., 101., 3 172 .29,,109.,5 etho 0 TCP http > 1351 [SYN, ACK] Seq=15 4 9 7
8 0,,000677 172 .21., 101., 3 172 . 29. ,5
, 109. o etho TCP http > 1351 [SYN, ACK] Seq=154979S
9 0,,001369 172 .29., 109.,5 172 .21.,101.,3 i etho TCP 1351 > http [ACK] Seq=1550466390
10 0.,001416 172 .29,,109., 5 172 .21.,101.,3 etho I TCP 1351 > http [ACK] Seq=1550466390 ;
11 0.,00143 8 172 . 29.
, 109., 5 172 .21.,101.,3 etho TCP 1351 > http [ACK] Seq=1550466390 y
12 0.i001457 172 .29.,109.,5 10.:1.1.,101 etho TCP 1351 > http [ACK] Seq=1550466390
13 0.,002410 172 .29. 109. 5 172 . 21.
,101.,3 i etho HTTP G E T / HTTP/1 .1
14 0.. 002426 172 .29.,109. 5 172 .21.,101. 3 etho I HTTP G E T ,' HTTP/1.1
15 0. 002 440 172 . 2 9.109. 5 172 . 21.101.,3 etho HTTP G E T ,' HTTP/1. 1
16 0. 002458 172 .29. 109. 5 , ,101
10. 1.1. etho HTTP GET }' HTTP/1. 1
17 0. 004041 10. 1.1. 101 172 .29. 109. 5 etho HTTP HTTP/1.1 304 NOt 1Modified
IS 0. 004059 172 .21. 101. 3 172 .29. 109. 5 etho HTTP HTTP/1. 1 3 04 NOt 1modified
0000 4f 37 65 74 63 31 00 00 00 00 00 00 OS 00 45 00 07ethl.. .. , . . E .
0010 00 30 CI 15 40 00 7e 06 17 2a ac id 6d 05 O a 01
0020 01 65 05 47 00 50 5C 6a 3d 55 00 00 00 00 70 02 .e.G.P\J =u
0030 40 00 7f 40 00 00 02 04 05 b4 01 01 04 02
I File 'Frronitof-titerr.-nafc-grti. out' 31 'B 00.00:11 " ] P : I c S D. 168 M 0:
6. Identify the point where the return packet's source address is translated
from 10.2.2.102 to 172.22.102.3. It is at the I (big I), because this is the
closest point to the server side.
End of lab.
154
Aquaforest TIFF Junction Evaluation
Review
REVIEW
iiiiiiiiiiiiiiIiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
155
Aquaforest TIFF Junction Evaluation
Review
Review A n s w e r s
You have captured all traffic for the FTP server, and are attempting to
determine if the problem lies with the server or with clients connecting
through the Security Gateway. Which of the following would be the best
way to use Ethereal to study the capture?
E.) All of these would useful, but more information about the issue is
necessary to determine the next step.
157
Aquaforest TIFF Junction Evaluation
Review
158
Aquaforest TIFF Junction Evaluation
a Check Point
5*
S O F T W A R E T E C H N O L O G I E S LTD.
Objectives
159
Key Terms
• fw ctl debug
• fw debug fwd
• fw debug fwm
• cpd debug
160
Aquaforest TIFF Junction Evaluation
FW CTL DEBUG
iiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiii
The fw ctl debug command may be used for a variety of reasons, including
performance-baseline measurements, troubleshooting specific issues as they
arise, and server-performance improvement. This debugging tool is very useful
when determining the cause of issues with a Security Gateway.
The fw ctl debug command has many switches that make it possible to see
nearly everything happening in the NGX kernel. How NGX kernel messages
are triggered varies according to the situation. Some messages are issued
whenever a certain condition occurs. Other messages are issued only when a
certain debugging flag is set. It is possible to alter debugging flags, and so
choose which messages will appear. By default, messages are written to the
console in UNIX systems, which usually collects console messages in a log file,
or to the event viewer on Windows. It is possible to change the destination of
the messages.
All debugging flags are grouped into modules. Each module represents a
product or functionality. Some kernel modules are fw, vpn, h323, and cluster.
Each module has a list of debugging flags, each of which can be enabled or
disabled. Some of these flags are on by default, and there is usually no reason to
reset them. Others are off by default, and may be set when debugging messages
are desired. To obtain a list of modules and flags, type fw ctl debug -h.
fw ctl kdebug
161
ex driver filter
q xlate xltrc
sipvm sync ipopt link nat
cifs mgcp cprx mail spii
smtp wap
H323 M O D U L E (VOIP H
162
Aquaforest TIFF Junction Evaluation
Kernel-debugging options: error warning tcp api glue events conns pkts timer
tcpinfo http ftp skinny
Kernel-debugging options: conf if stat select ccp pnote log mac forward df
pivot nokia timer accel drop subs
Kernel-debugging options: driver err topo policy init chain ioctl import
special rtm sort netmasks per__conn perjpckt viewjipdate view_updatel
view^add performance con_conn tabs s_err wd accel
163
Aquaforest TIFF Junction Evaluation
Flag Explanation
-buf [buffer size] Assign buffer size in KB; minimum buffer size is
128 KB; maximum is 8,192 KB.
164
Aquaforest TIFF Junction Evaluation
The following table lists available definitions for fw ctl debug options. While
not comprehensive, this table does define the most commonly used ones.
Contact Check Point Technical Support for further information on options not
defined here.
Option Explanation
cookie With the cookie switch turned on. all cookies in the data structure
holding the packets are shown; cookies are used to avoid the
problems that arise from the various ways operating systems handle
packets; unrelated to the HTTP implementation of cookies; VPN-1
NGX uses cookies as packet fragments for consistency between
operating systems.
crypt With this option turned on, all encrypted/decrypted packets are
printed in cleartext and ciphertext; algorithms and keys in use are also
printed.
filter Shows the packet filtering performed by the kernel, and all data
loaded into the kernel
hold Holding mechanism, and all packets being held or released, shown
when this switch is turned on
ioctl When this switch is turned on, it shows all Input/Output (ioctl)
control messages, such as communication between the kernel and the
daemon, and loading and unloading of VPN-1 NGX.
165
Aquaforest TIFF Junction Evaluation
Option Explanation
machine Shows the actual assembler commands being processed; heavy log
generation
tcpseq Prints TCP sequences being changed when using Network Address
Translation (NAT)
profile Prints the number of packets filtered, and the amount of time spent on
them
166
Jwctl
SYNTAX
169
Aquaforest TIFF Junction Evaluation
Debugging fwd/fwm
The switches in the table below allow a more granular level of control over the
fwm and fwd processes:
Switch Explanation
-d Debug; debugs processes on the NGX server; this logs a great deal of
information in a short time period, and should be used with care.
1. While the fwd process is running, open a Command Line Interface (CLI).
2. From the CLI, type the following:
fw debug [fwd | fwm] on [<env_variable>=<value>]
debU8ged
'
3. or
.e. Using this op , it is i to <
HTTP or FTP To ( ; this type of
run 1
4. Set OPSEC_ _LEVEL=3 to
1
5. Set (or 5, is 1 level) to
6. ; the
fw | fwm
JCLII
3. AI : to create a ]
thisi ;byi
fw fwm
4.
171
Debugging by Restarting fwd/fwm
UNIX
172
Aquaforest TIFF Junction Evaluation
Debugging fwd/fwm
Stopping f w d d e b u g
To redirect fwd output to a file instead of the console, use the following
command:
UNIX
WINDOWS
fw d -d 2> filejiame
When sending the output to a file, the fwd command should run for a short time
only, because the output file quickly becomes very large. If the file becomes too
large, it will be impractical for troubleshooting. Some general debug
information is also stored in the $FWDIR/log/fwd.elg file, including:
173
Aquaforest TIFF Junction Evaluation
Debugging cpd
DEBUGGING CPD
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
cpd is a Check Point generic daemon, which executes code of application add-
ons specified in the Check Point registry, cpd admin is a client utility used to
send administration commands to cpd. cpd config is a configuration utility
used to configure cpd add-ons. cpd is started by cpstart and stopped by cpstop.
Usually Administrators do not start or stop cpd manually.
• Port 18209, used for CA communication (for status, to issue, and revoke)
between the SmartCenter Server and the Security Gateway.
• Port 18210, used to pull Certificates from the CA.
• Port 18211, used by the cpd daemon on the Gateway to receive the
Certificate (by clicking Initialize in SmartDashboard).
On Windows 2000 Server and Windows Server 2003, run the following:
netstat -na | find x18211"
On Solaris or Linux (or SecurePlatform in Expert Mode), run the following:
netstat -na | grep 18211
The output should be:
174
For moi
from the CLI.
Debugging cpd
176
LAB 6: USING CPD AND FWM DEBUGGING
177
S R U N CPD DEBUG ON THE GATEWAY
fpRUN
1.
set 0PSEC_DEBUG_LEVEL=3
set TDERR0R_ALL__ALL=3
2.
fw on
THE PROBLEM
178
Aquaforest TIFF Junction Evaluation
[FPSTOP D E B U G G I N G A N D V I E W T H E O U T P U T
179
Lab 6: Using cpd and fwm Debugging
Aquaforest TIFF Junction Evaluation
Review
REVIEW
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
• fw ctl debug can be used to view almost every function of the NGX kernel,
by configuring the modules (debugging flags grouped according to product
and/or functionality).
• NGX kernel modules are fw, vpn, FG-1 (QoS), h323, BOA, WS, CPAS, and
cluster.
• Debugging the fwd and fwm processes can be useful when troubleshooting
issues related to NAT, security, logging, alerts, Policy installation, OPSEC,
and communication between processes.
• Debugging fwm and fwd can be done by either stopping the process
enabling debugging and then restarting the process, or by passing the debug
command to the running process.
• The cpd process can be configured for a debugging session to assist in
troubleshooting SIC issues, Policy installation, and Check Point/ OPSEC
shared management-product communication.
Review Questions
181
2.
Review
Review A n s w e r s
2. What part of the following debug command sets the level of information
captured from the fwm process written to the *. elg file?
fw debug fwm on 0PSEC_DEBUG_LEVEL=3 TDERR0R_ALL_ALL=5
D.) B & C
3. Which of the following issues can you NOT troubleshoot by debugging the
CPD daemon?
183
Aquaforest TIFF Junction Evaluation
Review
184
Aquaforest TIFF Junction Evaluation
a
Q Check Point
S O F T W A R E T E C H N O L O G I E S LTD,
Various fw commands are very helpful to collect necessary data for maintaining
NGX Security Gateways and troubleshooting problems, fw commands can be
found by typing fw in the command line. Advanced fw commands can be found
by typing fw advanced in the command line.
Objectives
185
Key Terms
fw tab
Symbolic link
fw ctl
Connection Module
fw
FW C O M M A N D S
fw c o m m a n d Explanation
fw logswitch [-h target] Create a new log file. The old log has
[+I-][oldlog]
187
FW TAB COMMAND
fw tab Options
The following is the standard format for the fw tab command, and a table
fw tab [-all |-conf conffile] [-s]-f [-a number][-u][-t tname][-x tname] [-d]
Parameter Explanation
-all
^isssxisjss^^default
-conf <file> Command executed on the targets specified in conf file
-s
number of elements
-m number For each table, displays only its first number of elements
(The default is 16.)
188
Aquaforest TIFF Junction Evaluation
fw ctl Commands
Table A t t r i b u t e s
A table has a list of associated attributes. Following are some of the attributes a
table may have:
Attribute Explanation
expires <time> Amount of time the table entry is allowed to stay in the
table (seconds)
hashsize <size> Size of the hash table: this value should be the power of
2 closest to the size of the table
189
Aquaforest TIFF Junction Evaluation
fw ctl Commands
TABLE STRUCTURE
Many tables store entries representing connections. A table has two possible
representations:
1. The first five fields (src_ip, sport, dst_ip, dport, IP protocol) follow a
common standard. An example of these five fields is shown below, plus the
meaning of each field:
<c7cb4764, 0000008a, c7cb47ff, 00000050, 00000006 ... >
In most cases, connections in other tables contain the same five key fields,
but will store different field values. These first five fields are known as the
key part of the table entry.
190
Aquaforest TIFF Junction Evaluation
fw ctl Commands
CONNECTIONS-TABLE EXAMPLE
fw tab -t connections
dynamic, id 8158, attributes: keep, sync, expires 60, refresh, limit 25000,
hashsize 65536, kbuf 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30,
free function 71f88108 0
191
(up to the are the key of the
d4968d33 Source IP
d496cldc Destination IP
00000011 IP protocol
192
Aquaforest TIFF Junction Evaluation
fw ctl Commands
The fields following the semicolon are the values of the entry:
7 00020001 type/r_ctype
8 00020001 flags/r_cflags
193
Jwtab
SYMBOLIC LINK
! HAQAri Hr nflflAnftni
U^JULIUL, UUUUUOUi,
000003fc, d496cldc, 00000011> (00000006)
in 1
<0, cli.ent-ip, IP
<0, server-ip, IP
<1, server-ip, IP
fw tab
FW TAB -U -S
fw tab -u -s
Q tO : to
This isi
^ S5SSS
: -U
In a
a
Aquaforest TIFF Junction Evaluation
fw ctl Commands
jfVALS indicates how many entries are in the table. The #SLINKS field contains the
number of symbolic links for each table. Symbolic links are not included
(counted) as entries in the connections table. A size limit of 25,000 for the
connections table means that the table can hold 25,000 "real" connections, plus
up to eight symbolic links per connection.
fw tab -t <table_name> -f
Using cptfmt
localhost:
fw tab - t -s
A table's size
(#VALS)is an a certain type of traffic is under
heavy load. ] size is 25,000, by default. If a
'is 25,000 most of the time, it
Aquaforest TIFF Junction Evaluation
FW CTL C O M M A N D S
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
USE
fw ctl install
The fw ctl install command binds interfaces to the kernel. If you run this
command, it does not display any messages, it just returns the prompt. That
means the interfaces are bound to the kernel successfully.
fw ctl uninstall
fw ctl iflist
The fw ctl iflist command displays interfaces bound to the kernel, fw ctl
iflist is useful after the fw ctl install or fw ctl uninstall commands have
been applied. When fw ctl install is applied, fw ctl iflist should display all
active interfaces. Those interfaces' configurations (IP address, subnet mask,
and anti-spoofing group) should be obtained successfully in the gateway
object's Topology screen. Following is an example of fw ctl iflist output:
0 : ethl
1 : eth2
197
fw ctl if list is run after fw ctl uninstall, the output should be empty.
fw ctl arp
Aquaforest TIFF Junction Evaluation
fw ctl Commands
KERNEL MEMORY
Total memory allocated: 6291456 bytes in 1535 4KB blocks using 1 pool
Total memory bytes used: 161356 unused: 6130100 (97.44%) peak: 191656
A pool of 6,291,456 bytes (6 MB) is allocated by the Gateway kernel for its
internal hash-table items and other kernel-data structures. 6 MB is the default
kernel memory. The kernel memory can be adjusted in the gateway object's
Capacity Optimization screen:
Reset to Defaults
199
Aquaforest TIFF Junction Evaluation
INSPECT
INSPECT:
This information relates to the activity of the virtual machine. The figures relate
to virtual-machine operations, lookups and records in tables, and the number of
packets inspected.
COOKIES
Cookies:
0 chain free
VPN-1 NGX uses cookies to represent packets. These statistics relate to the
code that handles those cookies, and is used only for heuristic tuning of the
code.
CONNECTIONS
Connections:
201
FRAGMENTS
Fragments:
6 fragments, 3 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
to Oft
Of the 145 Owe 312]
TCP/UDP, 14 TCP/UDP
OUTPUT EXAMPLES
(hmem) statistics:
allocated: 6291456 bytes in 1535 4KB blocks using 1
bytes used: 161356 unused: 6130100 (97.44%) peak:
used: 68 unused: 1467 (95%) peak: 76
24693 alloc, 0 failed alloc, 22079 free
Aquaforest TIFF Junction Evaluation
fw ctl Commands
Kernel stacks:
131072 bytes total, 8192 bytes stack size, 16 stacks,
1 peak used, 3956 max stack bytes used, 3956 min stack bytes used,
0 failed stack calls
INSPECT:
33250 packets, 8233028 operations, 189240 lookups,
0 record, 2290321 extract
Cookies:
3647246 total, 0 alloc, 0 free,
3320 dup, 3742299 get, 3862 put,
3655403 len, 6 cached len, 0 chain alloc,
0 chain free
Connections:
2965 total, 1278 TCP, 1683 UDP, 4 ICMP,
0 other, 256 anticipated, 52 recovered, 3 concurrent,
41 peak concurrent, 3658055 lookups
Fragments:
6 fragments, 3 packets, 0 expired, 0 short,
203
0 0 0 failures
NAT:
167/0 forw, 145/0 be 312
0 icmp, 14-14 alloc
Sync:
memory (hmem)
Total allocated: 3145728 bytes in 767 4KB blocks using 1 pool
Total bytes used: 3141632 unused: 4096 (1%) peak: 3141632
Total blocks used: 740 unused: 27 (4%)
4301 alloc, 129 failed alloc, 2219 free
emory (kmem) statistics:
bytes used: 3768249 peak: 3936541
Allocations: 1840 alloc, 0 failed alloc, 1533 free, 0 failed free
fw ctl Commands
fw ctl conn
There are entities within and without the Gateway that monitor or manipulate
network traffic. The NGX infrastructure uses the connections table to store
information (also called opaque data). These tables also receive notifications of
connection-related events, such as connection starting, stopping, etc. These
entities are called Connection Modules.
Every Connection Module is registered with a unique ID. Run fw ctl conn on
the Gateway to see the Connection Modules currently registered. The
Connection Module's ID is important to verify if a Gateway has installed the
same products in the same order as another Gateway, when configured in a
cluster. If cluster members' Connection Module unique IDs are different in the
fw ctl conn table, the cluster may fail over for what appears to be unknown
reasons.
Connectivity level 0:
205
206
Aquaforest TIFF Junction Evaluation
Other fw Commands
OTHER FW COMMANDS
I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
fw sam
USE
sam [-v] [-s <sam server>] [-S <server sic name>] [-f <fw host>]
[-t <timeout>] [-1 <log>] [-C] [-e <key=val>]+ -{n|i|I|j|J|b|q} <criteria>
sam [-v] [-s <sam server>] [-S <server sic name>] [-f <fw host>] -M -ijnbq
{<criteria> | all}
sam [-v] [-s <sam server>] [-S <server sic name>] [-f <fw host>] -D
OPTIONS
-C Cancel.
-M Monitor.
-D Delete all.
-v Verbose
-s Server for connection
-S Secure Internal Communications (SIC) name of server
-f Name of target host/group
-t Time-out in seconds
-1 Either nolog, longjioalert, or long__alert
-e Rule information; keys are name, comment and originator.
-i Reject.
-I Reject and close.
-j Drop.
-J Drop and close.
207
Aquaforest TIFF Junction Evaluation
Other fw Commands
-n Notify,
-b Bypass,
-q Quarantine.
CRITERIA
src <ip>
dst <ip>
any <ip>
subsrc <ip> <net mask>
subdst <ip> <net mask>
subany <ip> <net mask>
srv <src ip> <dst ip> <service> <protocol>
subsrv <src ip> <net mask> <dst ip> <net mask> <service> <protocol>
subsrvs <sre ip> <net mask> <dst ip> <service> <protocol>
subsrvd <src ip> <dst ip> <net mask> <service> <protocol>
dstsrv <dst ip> <service> <protocol>
subdstsrv <dst ip> <net mask> <service> <protocol>
srcpr <ip> <protocol>
dstpr <ip> <protocol>
subsrcpr <ip> <net mask> <protocol>
subdstpr <ip> <net mask> <protocol>
generic <key=val>+
208
Aquaforest TIFF Junction Evaluation
Other fw Commands
EXAMPLES
The following command will reject packets from 172.29.109.1 in the next 10
minutes:
The following command will drop and notify packets from 172.29.109.1:
sam: request for 'Monitor Inhibit Drop Notify src ip 172.29.109.1 on All'
acknowledged
sam: fwoslo (0/1) successfully completed 'Monitor Inhibit Drop Notify src ip
172.29.109.1 on All' processing:
sam: request for 'Monitor Inhibit Drop Notify src ip 172.29.109.1 on All'
done
209
Other fw
fw l i c h o s t s
fw log
S
i accept, but do not use any nam
10:13:45 ctl weboslo >daemon logjsysjnessage: Log file has been purged;
product: VPN-1 & FireWall-1;
fw : is as :
fw [-u]
EXAMPLE
211
Other Jw
8 Y 8
iS]
EXAMPLE
To fetch a log file on a remote Gateway from the SmartCenter Server, the
ame is fwoslo, as shown in th:
fw
%
Q.) You have a remote VPN-1 Pro Gateway running on
i Pro in another city. When yoi
the i
ow do ;
in:
A.):
fw logswitch -h <SecurePlatform_h
fw fetchlogs <SecurePlatform_host>
command prompt. The following table lists those commands and a brief
explanation for each of them:
fw advanced C o m m a n d Explanation
fw stat
fw hastat
P
ha stat
fw fgstat
?gCsUtrdC0mPatlbleVerS10n0f
fw Advanced Commands
fw advanced C o m m a n d Explanation
fw fwd
Starts the VPN-1 daemon. Do not run this command directly. The fwd daemon
is automatically started when running cpstart.
fw fwm
Check Point recommends using the cpconfig tool, fw fwm. fwm must be running
on the SmartCenter Server. If there is an Administrator already defined by
cpconfig, creating another one using the fwm command is not allowed, fwm is
used for adding, updating and deleting administrators.
USE
Option Explanation
215
EXAMPLES
To« , type:
fwm -a fwadmin -s -
To ( .type:
fwm -r fwadmin
: 123";
Howard
fw fetchlocal
by the fwc
i (the INSPECT compiler) into tb
i of the INSPECT-ML filter code in t Policy is
USE
fw fetchlocal -d <dir>
Aquaforest TIFF Junction Evaluation
fw Advanced Commands
OPTION
Option Explanation
EXAMPLE
fw u n l o a d l o c a l
fw dbloadlocal
fw dbloadlocal loads the database on the local machine, by moving the database
file from the /temp to /state directory. This command is performed
automatically by a number of other commands (fw dbload for example), after
moving files from the SmartCenter Server to the Gateway.
USE
fw dbloadlocal <-d>
OPTION
Option Explanation
217
fw Advanced Commands
fw d e f a u l t g e n
\
USE
EXAMPLE 1
EXAMPLE 2
218
Aquaforest TIFF Junction Evaluation
fw Advanced Commands
fw getifs
The fw getifs command is used for fetching interfaces from a remote Gateway.
USE
fw getifs <module_name>
OPTION
Option Explanation
EXAMPLE
fw getifs fwoslo
fw stat
fw stat displays the status of target hosts in various formats. The default format
displays the following information for each host: host name, Rule Base (or
Gateway) filename, date and time loaded, the interface installed on, and
direction loaded.
USE
219
Jw Advanced
OPTIONS
Option Explanation
-all
in the default system
-long
d^sptays number^o™
-short
interface'Rule Base
-inactive
fomLTan^^
targets
if t a r g e t s is not
EXAMPLES
[Expert^SecurePlatform]#fw stat
fw stat -1 fwoslo
P
[ "lnPOrt]] router access list.
fwm Commands
fwm load
USE
fwm load [-p <product>] [-S] [-0 <product_option>] [-vN] [-m] [-r] [-a | -c
conf-file] <rule-base name> <targets>
OPTIONS
option Explanation
-vN Retrieve the Security Policy from the version repository. N is the
Version ID.
-m All Or None (works only for modules with the same version)
EXAMPLE
223
The following i
Policy On:
on
CPMAD
on NGX R60
Compiled OK.
Installing VPN-1/FireWall-1
VPN-1/FireWall-1 policy
VPN-1/FireWall-1 policy
f w m dbload
fwm
224
Aquaforest TIFF Junction Evaluation
fwm Commands
fwm logexport
The fwm logexport command exports a log file, by default the active log (fw. log)
to an ASCII format. This is so the file can be open in other platforms, like
WordPad or Excel, fw logexport does not switch logs. If you run fw logexport
for current active logs (fw.log), the fw.log file stays the same and logs are not
moved or purged. Details can be found by typing fwm logexport -h on the
command line.
USE
fwm logexport [-d delimiter] [-i filename] [-0 filename] [-f|-t] [-x
startJ30S] [-y endjpos] [—z] [-n] [-p] [-a] [-u unification_scheme_file] [-m
(initial | semi | raw) ]
OPTIONS
Options Explanation
-f Only in case of active log file; upon reaching end of file, wait for new
records and export them.
225
226
227
Option Expianation
229
Aquaforest TIFF Junction Evaluation
1. While logged in to the NGX Security Gateway in Expert Mode, run the
following:
1. Use the less command to view the pstat. txt file, and identify the following
portions of the file:
— Amount of hash-kernel memory, used and available
— Number of packets inspected
— Number of fragments, and how many expired
Based on this output, is the Gateway overloaded or underused?
230
Aquaforest TIFF Junction Evaluation
Objectives:
Topics:
231
Aquaforest TIFF Junction Evaluation
1. Open the command line on the SmartCenter Server, and type the
following ...
fwm load Standard fwyourcity
... Where "Standard" is the Policy name, and fwyourcity is the target
gateway object.
If you logged into the Gateway via an SSH session, your
session will terminate abruptly, as fwm load does not preserve
connections during a Policy install. Log in again and continue
with the lab.
End of lab.
232
Aquaforest TIFF Junction Evaluation
Review
REVIEW
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
• The fw tab command and its subcommands are used to directly access and
manipulate the state tables in the NGX kernel's virtual memory, the core of
Check Point Stateful Inspection technology.
• The fw ctl command and subcommands are used to view kernel information
from SmartCenter Servers or Security Gateways, and can also be used to
perform some kernel-level configuration changes and debugging.
• Other fw commands that provide more granular control over VPN-1 N G X
include:
fw sam — used to manipulate the SAM database
fw lichosts — displays the number of protected hosts behind a Gateway
fw log — used to view and manipulate active log files
fw repairlog — rebuilds .ptr files for corrupted log files
fw mergefiles — merges two switched (not active) log files into one
fw fetchlogs — used to retrieve log files from a remote Gateway
• fw advanced commands provide command-line methods for more direct
access to the N G X daemon, and for working with specific aspects of
VPN-1 N G X .
• fwm commands provide an alternate command-line method of performing
many SmartCenter Server tasks.
Review Questions
233
Aquaforest TIFF Junction Evaluation
Review
Review Answers
3. Which of the following switches used with the fwm logexport command will
export the active file into a comma-delineated file, without resolving IP
addresses?
235
Aquaforest TIFF Junction Evaluation
Review
236
Aquaforest TIFF Junction Evaluation o
Q Check Point
71
SOFTWARE TECHNOLOGIES LTD.
NGX Security Servers inherit the folding process from previous versions of
VPN-1. The HTTP Security Server provides URL screening and content
checking (by incorporating CVP and UFP applications). Although more
functionality from Security Servers is being incorporated into the kernel with
each revision of VPN-1, troubleshooting specific Security Server processes can
still indicate causes of issues.
Objectives
237
Key T e r m s
Folding
fwssd
fwauthd.conf
238
Aquaforest TIFF Junction Evaluation
Overview
When an NGX kernel matches a connection to a Security Server rule, the kernel
folds the connection to the relevant Security Server. Folding is how a Security
Server redirects packets. The Security Server opens a connection to the Server
to which the client tried to connect. The packet leaving the Security Server has
the source IP of the NGX Security Gateway. The outbound kernel translates the
source I P to the IP address of the client that originally opened the connection. If
the client is configured in the Rule Base for Hide or Static NAT, the source IP is
translated, as configured in the Rule Base.
If clients use the HTTP Security Server as a proxy, connections leave the
Gateway with the Gateway's IP address as the source IP. No Network Address
Translation (NAT) occurs.
TRANSPARENT CONNECTIONS
The default behavior of HTTP, FTP, and Telnet Security Server connections
have been changed to transparent in VPN-1 NGX. Only the SMTP Security
Server is still non-transparent by default. In other words, if no Hide or Static
NAT is involved, and if the client does not set the Gateway as the proxy, packets
leave the Gateway with the original client's IP address. The only exception is
the SMTP Security Server: The packet leaves the Gateway with the source IP
address as the Gateway's IP address, instead of the original client's IP address.
To change this behavior, modify the following properties from true to false in
$FWDIR/conf/objects_5_0.C:
http_transparent_server_connection
rlogin_transparent_server_connection
telnet_transparent__server_connection
239
240
Aquaforest TIFF Junction Evaluation
3. The packet's destination address is changed to the NIC address (so it will be
sent to Security Server).
4. The connection table is updated with two new entries, which allows the
client following the packets to continue without examination:
<125.32.2.3,1234,180.3.42.3,80,TCP>
The Security Server then sends the packet to its original destination using the
FWXAUTH table.
241
Content-Security Rule Order
242
Aquaforest TIFF Junction Evaluation
The following table lists differences between H T T P 1.0 and H T T P 1.1. This
information can be useful when troubleshooting H T T P Security Server related
issues.
Multiple requests Allowed, but the client cannot Allowed; the client can
per connection send multiple request; it must wait send multiple requests,
for each response to return before even before the first
submitting another request. response has returned.
The Server has to return
the responses in the
same order they were
sent.
243
Aquaforest TIFF Junction Evaluation
The following is a scenario where the HTTP Security Server is configured with
a CVP server on a loaded network:
Security
Gateway
CP00332
244
Aquaforest TIFF Junction Evaluation
There is not an executable file for each Security Server. Instead, each Security
Server links to the fwssd executable. Under Windows NT, for example, looking
at the Task Manager will not show the Security Server to which each process
belongs. To find out which process belongs to each Security Server, proceed as
follows:
• Look for the relevant Security Server's process identifier (PID) in the
$FWDIR/tmp directory. For example, the HTTP Security Server PID will be
written in the in.ahttpd.pid file.
• Once you know the PID number, look for the number on the Windows Task
Manager > Processes tab. On UNIX platforms, such as Solaris and
SecurePlatform, the process number is found in $FWDIR/tmp. The CPU and
memory use can be observed in real time by running the top command.
Editing f w a u t h d . c o n f
FWAUTHD.CONF EXAMPLE
245
Troubleshooting Security Server
Listing P o s s i b l e C a u s e s
246
Aquaforest TIFF Junction Evaluation
SECURITY SERVERS
CVPSERVERS
• Overloaded CPU
• Memory issue
• Possible known/unknown issue
I d e n t i f y i n g Issue Sources
One of the best ways to understand where the issue lies is by eliminating
possibilities:
1. Change the rule so the HTTP resource is not used. Replace it with a
standard HTTP service. This way, HTTP connections are passed through
the kernel and not folded to the Security Server. If this solves the problem,
the problem is with the HTTP Security Server: Proceed with step 3. If it
does not solve the problem, proceed with step 2.
2. Change the rule to use the HTTP resource again, instead of the standard
HTTP service. Do not configure the resource with the CVP server. Under
this configuration if the problem does not exist, you know the issue is with
the interaction with the CVP server.
3. When the problem occurs, run the following:
• top (on UNIX) or Task Manager (on Windows)
Notice which process number is in charge for CPU and memory use.
Check $FWDIR/tmp to find the PID of the relevant Security Server process.
247
248
Aquaforest TIFF Junction Evaluation
T D _ E R R O R _ A L L _ A L L Flag
FTP Security S e r v e r s
249
250
252
Aquaforest TIFF Junction Evaluation
Review
REVIEW
i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
253
is
254
A.J fw debug in.ahttpd on TDERROR_ALL_s_to_c_read=3
B.) fw debug in.ahttpd on TDERRORJLLL client to_server_mgr=3
C.) fw debug in.ahttpd on TDERROR_ALL_cvp_to_server_mgr=3
D.) fw debug in.ahttpd on OPSEC DEBUG_LEVEL=3
Aquaforest TIFF Junction Evaluation
Review
Review Answers
1. The default behavior for Security Servers in VPN-1 NGX is to leave the
source IP address of a connection untranslated. To which of the following
configurations will the source IP be translated by a Security Server?
256
Aquaforest TIFF Junction Evaluation
Q Check Point
SOFTWARE TECHNOLOGIES LTD,
IKE negotiation consists of two phases, Phase 1 (Main mode), and Phase 2
(Quick mode). The negotiation process in both modes can be observed in
ike.elg by an internal Check Point utility called IKEview. This chapter covers
guidelines for analyzing ike. elg, and instructions for collecting ike. elg and
vpnd.elg data.This chapter assumes a basic comprehension of encryption,
cryptography applications (algorithms and hash methods), and configuration of
site-to-site VPNs using either pre-shared secrets or Certificates.
Objectives
1. Identify and explain the two phases of the IKE negotiation process.
2. Use V P N debugging tools for common troubleshooting practices.
3. Use V P N log files and the vpn debug command to troubleshoot V P N
connections.
4. Use troubleshooting tables as general guidelines for troubleshooting V P N
issues.
257
Key Terms
IKE Basics
IKE BASICS
I I I i i I i i i i i I I I i i i i I I I I I I I i I i I i i I I I I i i I i i i I I I I I i I I i
Phase 1
Phase 1 (Main mode) negotiates encryption methods, (i.e., DES, 3DES, etc.),
the hash algorithm (SHA1 and MD5), and establishes a key to protect messages
of an exchange. The following describes the stages of the Phase 1 process:
259
Aquaforest TIFF Junction Evaluation
IKE Basics
EXAMPLE
The IKE exchange uses six packets for Phase 1 (Main mode) and three packets
for Phase 2 (Quick mode):
1. For Main mode packet 1, the initiator 172.24.104.1 proposes the following
information:
• Encryption algorithm: AES-CBC
• Key length: 256 bit
• Hash algorithm: SHA1
• Authentication method: pre-shared key
msz M l -JOfxjj
Edit v»» Special Help
BHB| o i x u i s i e i
Ly
MM
XI
260
Aquaforest TIFF Junction Evaluation
IKE Basics
. - X
Fife Edit View Specal Help
m m o j x i * l a a & j
"I
jT
172.24,104, iiMatn Mode\MM packet 2 (H:?2:O0)\5ecyr«ty Associafon^propUtranl
261
Aquaforest TIFF Junction Evaluation
IKE Basics
3. Packets 3 and 4 perform key exchanges and include a large number never
used before, called a nonce. A nonce is a set of random numbers sent to the
other party, signed and returned to prove the party's identity. These two
packets are not generally used in troubleshooting a key exchange with
IKE view.
j j a j ojyiTiasigj
fTlKEDSwTOlr
;-172 24.104.1
£ • f 1 M ain M ode == Wed J an 4 2006 From. 14 22 00 T o 14 22.00 Next. P a y i o a d t Mmi
:e
t! MM packet 1 |14 22:001 Reserved: 0
+ MM packet 2 114.22:00) Length: 00 8 4 (1JS).
Key D a t a ;
MM pac+et 3114.22 00)
• Header bo m o s £4 42 5t7a a£ «Sa 3 5 •Sa ? b 6 a lc
m
•• Nonce
?£ ad 53 afi
? 5 5 4 4a d.3
df
tod
90 4e
ue i i
•T b a
Of
36
7 a 3 t 9e 6 a
3£ 81
S;
+ MM packet 6 114.22,00]
Q u i d Mode —• W e d Jar. 4 2006 From: 14 22:00 To: 14-22:00
S3 m 7a 4b 31? •A id lc Ills €2 23 bd ae
a « 5b 59 L-- 8d 23 i i cc 67 2b u . d d d7 90 50
22 10 52 7d 09 60 33
t J J
zj
l72,24,104.ip»Modef#Tpacket 3 ( 1 4 : 2 2 : 0 0 ) ^
Phase 1 Packet 3
262
Aquaforest TIFF Junction Evaluation
IKE Basics
4. Packets 5 and 6 perform authentication between the peers of the tunnel. The
peer's IP address shows in the ID field under MM packet 5:
gfrjcj a j x j i i g t s j
. 11.E Debugging Into im fayioad jJ^j
ft 172.24.104.1
- f-i Main Mode ==.- Wed J an 4 21 6 From. 14 22:00 To 14 22:00 |HexC P a y l o a d : Hash
t! MM p a d e t 1 II4.22.001 •Reaerwed;
v MM p a d e t 2114.22.001 'Length; 00 0c (12)
v MM pact-et 3 |14 22 001 ilD t - j p e : ID_I PV4_AI»DP.
i Service f f p e : Sot- s p e c i f i e d (Cij
+: MM packer 4114 22 001
;Service p o t t : JJofe s p e c i f i e d <0)
- MM pad-et 5 I I 4 22.001
\m P a t a t ac l<5 6€ 01 a72.22.i02.it
: Header
Hash
+ MM packet G 1.14 22.001
t 0 uid- M ode == - W e d J an 4 2006 From: 14.22 00 T o: 14.2;
Phase 1 Packet 5
5. Packet 6 shows the peer has agreed to the proposal and has authenticated
the initiator:
&\U\ o x.iuvL
: IKE Debugging Into W packet. 6 (14:22:00)- Wed Jan 4 2 D0«
B- 172.24.104.1
r- Pi Main Mode == - W e d Jan 4 2006 From: 14 22:00 To: 14.22:00 Transport:
+ MM packet 1 f14:22.00) PeerIP; a c i ^ t t.01
MM packet 2 (14 22 00) FeerPort: 500
t MM packet 3 f14 22:001 Peer Base: ft.na.adrid
T MM packet 4 (14:22:00)
» R e c e i v e d from p e e r 1 7 2 . 2 4 . 1 0 4 . 1
- MM packet 5 (14:22:00)
= - Header
: " ID
Ha:h
Hach
L Quick Mode —> W e d Jan 4 2006 From: 14:22:00 To: 14:22:00
J j ^Zi
172.24.104.1 W a n Mode\MM packet 6 CH;22:D0}
Phase 1 Packet 6
263
264
Aquaforest TIFF Junction Evaluation
IKE Basics
JU.Li J 1
Phase 2 Packet 1
o x •
172.22,102.1
i "I Man Mode —; Wed Jan 4 2006 From. 09-51-06 7C- 09-51:06
- f? Ouic> Mode ==.- Wed Jan 4 2006 From 09 51 06 To: 09:51 06
- 0M packet 1 109.51 06) - (10.2.4.0 255.255.255.0l - (10.2.2.0
IKE Basics
'^MMmmm'
: Ik E Debugging Into ID V i y i o a d
172 22.102.1
ft PI M a n Mode ==• W e d Jan 4 2006 From 09 51 JUS T 0 09 51 06 .Next Payloadt
f ' l Quick Mode == W e d Jan 4 2006 From 09 51 06 To 09 51 06 Fesetved:
QM pact et 1 (09 51 061 • 110.2 4 0 255.255.255 0) - (10.2 2.0 2 L e n g t h : 0 0 10 {16}
- Header ID t y p e : II>_IP¥4_MJJR_30B1ET
S e r a . c e type: N o t s p e c i f i e d (0)
• •• Hash
Setwise poet: . Mot s p e c i f i e d (0)
If Secmfy fistociation
; - propl PR 0 T 0 J PS E C_E S P I.99 6d 52 49 I
ID D i t a : Oa 02 02 0 0 tt It tf 00 (10,2.2,0 25.5.255.255.C
Irani ESP_AES
- Nonce
jJ
172.22. t02,HQufcMtodeVQM packet 1 (09:51:06;) - (10.2.4,0 2S5.255.255.0) - ao.2.£.0 25S.255.2S5.OniO
266
Aquaforest TIFF Junction Evaluation
IKE Basics
3. Packet 2 from the responder agrees to its own subnet or host ID, and
encryption and hash algorithm:
.suE*!--
Fife Ed* Special Hete
stim^mmm
II1 E Debugging Into jQH p a c k e t 2 ( 0 9 : S i : 0 6 1 - Wed J a » 4 200«
172.22.102.1
+ • Pi Main Mode ==. W e d Jan 4 2006 From. 09.51 06 To- 09 51.06
-- Ouict Mode == W e d Jan 4 2006 From 03 51 -06 To 09-51 06 (10.2. 4.0 255. 2SS. 255,0; - {10.2,2.0 25.5,255.255.0)
f OM pacl et 1 109-51 061 -110 2 4 0 255 255 255 Ol -1'10.2.2.0 2
ll»P
Header -PeerIP: aci6t.601
|PeerPort: .
; Hash
;pees: Name: fwoslo
Security Ac;ooation
- propl PR 0 T 0 J PS E C_E S P fac 02 ec 6t I
P e c e i ^ e d f r o i s p a e : 1~2. 2 2 . i i 1 . L
tranl ESP_AES
. - Nonce
• OM packet 3(09:51:061
Phase 2 Packet 2
ma it*i» will
• IKE Debugging Into 1 packet 3 (09:51:06)- f e d Jan 4 2006
El-172.22.102.1
+ Pi Mam Mode ==/ W e d Jan 4 2006 From. 09 51 06 To. 09:51 C Transport: TOP
Quick Mode ==-> W e d Jan 4 2006 From- 09:51 06 To 09:51 C PeerIP: ac!6S601
+ 0M packet 1 (09:51:061 -110 2.4.0 255.255.255 01 • (10.2.2. PeerPort:
it OM packet 2 f09;51 06) - [10.2 4.0 255.255.255.01 - (10 2.2. Peer Bame:
• Sent to peer 1 7 2 . 2 2 . 1 0 2 . 1
- Header
- Hash
j j i i i .Zi-
Phase 2 Packet 3
267
Aquaforest TIFF Junction Evaluation
IKE Basics
Q.) You have a site-to-site VPN between two Check Point NGX
Gateways. They are managed by their own SmartCenter Servers.
&7\ You see a lot of IKE Phase 1 failures in Smart View Tracker. You
t\ run IKE debug on one Gateway and find out only one packet in
Main mode is transferred. There is no packet in Main mode after
packet 1. What is the next step to check the VPN configuration
that might caused this problem?
269
TROUBLESHOOTING OVERVIEW
Aquaforest TIFF Junction Evaluation
The ike.elg and vpnd.elg files contain information about the negotiation
process for IKE encryption. VPN debug logging is enabled using the
vpn debug on command. The output of the debugging commands writes to two
different locations, depending on what is being debugged:
vpn debug on [debug topic] = [debug level] sets the specified TDERROR topic to the
specified level, without affecting any other debug settings. This may be used to
turn specific topics on or off.
vpn debug contains multiple utilities for troubleshooting vpn issues. The
following lists all options for the command:
271
VPN Debugging Tools
VPN Debugging Tools
Option Explanation
vpn compreset
VPN D E B U G ON ! OFF
vpn debug on - Turn on vpn debug, and write the output to vpnd.elg.
vpn debug ikeon — Turn on ike debug and write the output to ike.elg.
V P N TU
vpn tu is short for vpn tunnelutil., and is useful for deleting specific IPSec or
IKE SAs to a specific peer or user without interrupting other VPN activities.
The vpn tu command displays these options:
vpn tu Options
WINDOWS
set VPN_DEBUG=1
UNIX
274
Aquaforest TIFF Junction Evaluation
Comparing SAs
The following is a quick process to verify that you and a potential VPN partner
are configured correctly:
1. Enable VPN debugging on both your and your partner's sites with
vpn debug on.
2. Use vpn tunnelutil (vpn tu) to remove all SAs for either the peer with
which you are about to create the tunnel, or all tunnels.
3. Have your peer initiate the tunnel from its site to yours.
4. Use vpn tunnelutil (vpn tu) to remove all SAs for either the peer with
which you are about to create the tunnel, or all tunnels.
5. Initiate the tunnel from your site to your peer.
6. Disable debugging on both sites.
7. Examine ike. leg and vpnd.elg, as they will now contain records of the SA
sent by your NGX installation, as well as what was received from your
partner site.
275
Aquaforest TIFF Junction Evaluation
Troubleshooting Tables
TROUBLESHOOTING TABLES
i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i
W h e n t r o u b l e s h o o t i n g ... ... U s e t h e s e t o o l s
• VPN Community
• Network Address Translation
276
Aquaforest TIFF Junction Evaluation
Troubleshooting Tables
ENCRYPTION-TROUBLESHOOTING FLOW
... C h e c k t h e s e t o o l s f o r
If t h i s i s s u e a r i s e s ... information and possible causes
277
Troubleshooting Tables
max_subnet_f orjrange.
• ^ ^ p a c k e t f b r
Troubleshooting
280
Aquaforest TIFF Junction Evaluation
LAB 9: R U N N I N G IKE D E B U G G I N G ON A
SITE-TO-SITE VPN
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Scenario: In a site-to-site VPN between two cities using pre-shared secrets, run
ike debug on both Gateways, and analyze the output using IKE view. Transfer
ike.elg from the Gateway to the internal Web server (www.yowre/^.cp) where
IKE view is installed. Each city site is a distributed environment, where the city
Gateway is managed by its own SmartCenter Server.
Objectives.
Topics:
• Using IKEview
281
282
Aquaforest TIFF Junction Evaluation
11. Enter the partner city's internal network object for the VPN Domain setting:
General Properties
Get
NAT
. VPN
Name i IP Address Network Mask IP Addresses behi
VPN Advanced erhli 172.24.104.1 255.255.0.0 E xternal
• • Link Selection ethl 10.2.4.1 255.255.255.0 This Network
eth2 192.168.22.104 255,255.255,0 This Network
VPN Domain
Manually defined U ^ T ^ ^ . I
| OK ] Cancel j Help j
283
Aquaforest TIFF Junction Evaluation
General V P N Properties
- Participating Gateway-:
IKE lPhas-e 1 j Properties
Tunnel Management
.£ Advanced Settings Perform key exchange encryption with: ] AESC'SG j^j
Si J Jii
| OK ] Cancel J Help j
4. Open the Shared Secret screen (under Advanced Settings), and check the
box Use only Shared Secret for all External members.
284
Aquaforest TIFF Junction Evaluation
5. Enter the shared secret (abcl23) for your partner city's gateway object:
Advanced VPN Pr
Wire Mode
Remove j
J Jj
helD
285
Aquaforest TIFF Junction Evaluation
GeneTr A d v a n c e d V P N Properties
Participating Gateways
VPN Properties IKE {Phase 1]
•• Tunnel Management
U$e Diffie-Heliman group
- Advanced Settings
•• Excluded Services
Shared Secret
Renegotiate IKE security associations every j1440 ^ mriutes
• Wire Mode
f Use aggressive mode
IPsec (Phase 2j - - - - - - -
i h b b ^ K S I ^ B
r Disable NAT inside the VPN community
J Jj
Heip
7. Click OK.
1. Verify that the network object for your city site's internal network object
(for example, net oslo for the fwoslo gateway) is selected as the VPN
Domain in the Topology screen of your city's gateway object.
2. Click OK.
286
Aquaforest TIFF Junction Evaluation
1. Log in to your city's Gateway via SSH, or locally via the console.
2. Change to Expert Mode and run the command cd $FWDIR/log to change to
the $FWDIR/log directory.
7. In SmartDashboard, add a rule like the following to your Rule Base after
the Stealth Rule:
VPN Rule
11. Transfer ike. elg to your Web server, where the IKEview utility is installed.
287
Aquaforest TIFF Junction Evaluation
mm oixiijaasif
- PS Mam Mode Tue Apr 11 2006 From 13 5 * ) W fayloai
+ MM packet 1 f13 56:20)
- Pi Mam Mode ==> Tue Apr 11 2006 From: 13'5 Nex t Payload: imm
- MM packet 1 (13:58:46) Reserved:
Header Lengths 0 0 10 <16}
I -Z Security Association IB t y p e : XD_I f ¥ 4 _ M ® > R _ S Q B 1 E T
Service typet H o t a p e c i f i e d JO)
V propl PROTOJSAK.MP
Service port: Hoc s p e c i f i e d (0)
• tranl KEYJK.E
Vendor ID
+ MM packet 2 f13'5&461
t. MM packet 3 (13:58:46)
+ MM packet 4113:58:46)
t MM packet 5 (13.58:46)
+ MM packet 6 (13:58 461
f"- OuickMode ==, Tue Apr 11 2006 From. 13:E
- 0M packet 1 (13:58:46) • (10.2 2.0 255 255
Header
Hash
+: Security Association
Nonce
ID
(O
+1- OM packet 2 (13 58.46) - (10.2.2.0 255 2 5 5 ^
<L_ . J Ji -Li
d
172.24, 104.l',Q.jicl<Mode\QM packet 1 U3;58,46> - (10.2.2.0 2!55.255,255.0)-(10.2.1.0 255.255.255<0}\ID ; F'lJM ::
288
Aquaforest TIFF Junction Evaluation
Review
REVIEW
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
• IKE encryption consists of two modes, Phase 1 (Main mode) and Phase 2
(Quick mode).
• When troubleshooting IKE VPN issues, the first step is to verify that IKE
packets are arriving at the VPN Gateway in SmartView Tracker.
• If no packets are listed in SmartView Tracker, use fw monitor to verify
whether VPN traffic is arriving at the Gateway.
• U s e vpn debug ikeon to run debugs on a V P N tunnel. E x a m i n e the ike.elg
file for the captured debugging information.
• vpn tu (the VPN tunnel utility) can be used to reset IKE SA when testing a
tunnel.
• IKE Phase 1 consists of six packets, where the encryption and hash method
are negotiated, and the first DH key is determined.
• IKE Phase 2 consists of three packets, where the IKE SAs are negotiated, the
shared secret for exchanging the security algorithm is determined, and a
second DH key is determined.
8
ike.elg and vpnd.elg are the V P N log files.
• The vpn command has many subcommands that can be used to troubleshoot
VPN related issues.
R e v i e w Questions
289
mask.
Aquaforest TIFF Junction Evaluation
Review
Review Answers
2. The Quick mode packet 1 error "No Proposal Chosen" can be caused by all
of the following, except?
291
Aquaforest TIFF Junction Evaluation
Review
292
Aquaforest TIFF Junction Evaluation
91
Q Check Point
(S®*5* S O F T W A R E T E C H N O L O G I E S LTD.
Objectives
293
Key T e r m s
• sr_service
• srfw monitor
• sc debug on
• sc log
294
Aquaforest TIFF Junction Evaluation
Necessary Ports
NECESSARY PORTS
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
If control connections are enabled in the Security Policy's Global Properties, all
of the following ports are opened automatically, except UDP 2746. If you do
not have control connections enabled in Global Properties, these ports will need
to be specified in the Rule Base.
Port Purpose
UDP 259 RDP (necessary only for MEP resolving and dynamic interface
resolving)
TCP 18231 Policy Server login (seen on the network using SSL if
SecureClient has an IP address in VPN Domain; not necessary to
open this port if SecureClient is not in the VPN Domain.)
IP protocol 50 ESP (the actual encrypted data; not necessary to allow this if
using UDP encapsulation)
295
Port Purpose
TCP 18231
address is not inrtie VPN Domain)
296
Packet Flow
PACKET FLOW
Aquaforest TIFF Junction Evaluation
Overview
In some cases, the internal or private IP address needs to be the main IP, for
example, for control-connection or routing issues. Sometimes, the firewall does
not have a public IP address, because it is behind a NAT device.
SecuRemote/SecureClient traffic must enter from a DMZ or internal WAN
interface. In these situations, SecuRemote/SecureClient must address packets to
the firewall's internal interfaces, so need for interface resolving arises.
STATIC-INTERFACE RESOLVING
IP address ranges are calculated for each firewall interface in the Topology
screen (including this network and any groups defined). These allowed
interface ranges are downloaded to userc. C when creating or updating a site.
SecuRemote/SecureClient chooses the range to which its own physical IP
belongs, then attempts to connect to the corresponding interface. Static-
interface resolving is controlled by the property :resolve_interface_ranges in
objects.C (VPN-1/FireWall-1 4.1), objectsJJ.C (VPN-1/FireWall-1 NG and
above), and is on by default. The disadvantages of static-interface resolving are
as follows:
• SecureClient may choose the wrong interfaces, if the Gateway has multiple
external interfaces.
• SecureClient may choose the wrong interface, because its own physical IP
(behind NAT) fits into the wrong allowed interface range.
• Static-interface resolving does not accommodate firewalls that are statically
translated behind an Internet router.
299
300
Aquaforest TIFF Junction Evaluation
Outgoing R o u t e Selection
W h e n initiating a tunnel the outgoing interface will be selected by the
operating system.
Tracking ;
Outgoing hrtf tract i r g ]None z!
301
Aquaforest TIFF Junction Evaluation
1. Main address: The IP address on the general screen will be used for
SecuRemote/SecureClient to connect. W h e n the m a i n IP is selected as the
link-selection m e t h o d , the ip_resolution_mechanism property will have the
main IP as the value in objects_5_0.C under the g a t e w a y - o b j e c t section, as
s h o w n below:
EEsaaraiMBMmmtmsfc-- • .-^j*,
file Edit View Insert Format Help
ip_resolution_mechanism in objects_5_0.C
302
Aquaforest TIFF Junction Evaluation
xj
Fii- E'Jt: F s;ucl he.:
•MB|«|B>! Mi H - i m - I N :
:keep_I-F_flag_SR (false)
: copy DF f l a g SP. (false)
:allowed i n t e r f a c e r a n g e s (
: (172.22.102.1
:allowed range (
• I
:type (machines range)
:ipaddr_first (0.0.0.0)
:ipaddr_last ( 2 5 5 . 2 5 5 . 2 5 5 ,. 2 5 5 )
)
)
:is ext (true)
:is natted (false)
)
Allowed_interfaces_ranges in userc.C
2. Selected address from the topology table: You can specify an IP address
from the Topology screen. SecuRemote/SecureClient will try to connect to
that IP as long as routing allows. After connecting, all VPN traffic to the
VPN Domain is sent through this specific interface. When a specific IP
address is selected as a link selection method, the : ipjresolutionjnechanism
property's value is single_VPN_IP in objects_5J).C. userc.C has that specific
IP address in the : allowed_interfacej:anges property.
If an NGX Gateway has multiple external interfaces, use ongoing probing. The
SecureClient probes all interfaces listed in the Topology, of the object and
connects to the first one that responds. The SecureClient stays connected to that
IP, until the IP stops responding.
303
304
Connect t o ^ P r e ^ G X G a t e w a y ^ *
1
i!
M a i n address M a i n address
S . ^ d a d d r c s s , ™ ^ Ongoing probing
Mam IP
1 5 0 1 1 6
f o S o r ^ " ^
3. Run from the place where the cpinfo.exe is located while the SecureClient
is running:
cpinfo -o output_file
4. cpinfo output can be viewed in Info View.
IKE debug
ike. elg can be opened and analyzed using the IKEview utility.
307
SecuRemote/Securedient Debugging Tools
Aquaforest TIFF Junction Evaluation
sc log Debug
sr_service_tde. log
sr_gui_tde.log
sr_watchdog_tde.log
sc log oil
sc log off
309
6. :fw ctl debug , to
, run srfw ctl debug -m fw drop.
To see all i : -m
i no i ctl debug -m.
Aquaforest TIFF Junction Evaluation
1. In the SecureClient Settings > Advanced screen, click the button Enable
logging.
2. Restart the SecureClient.
3. Recreate the problem, and test traffic.
4. From the Settings > Advanced screen, click the Save logs button.
5. A . tgz file with time and date stamp will be saved in folder UserLogs in the
user's Temp folder (e.g., C:\Documents and Settings\johndoe\Local
Settings\Temp\UserLogs\SC_logs_xxxxx. tgz).
. iPl x j
.1 See | ? y p e
1 KB Text Document 1 1 / 1 6 / 2 0 0 5 7 : 5 1 AM
C j S C J o g s _ l 6_Nov_ 0 5 . 7 . 5 0 _ 5 5 313KB WinZip File 1 1 / 1 6 / 2 0 0 5 7 : 5 0 AM
1
SecureClient .tgz Output
311
Aquaforest TIFF Junction Evaluation
-iQixn
File Actions Options Help
e ^ ^ J #
Mew Open Favorites ••' Extract View Checkout
Jj
Selected 0 fifes, 0 b y t e s T o t s ! 18 files, 4,924KB $
6. To disable logging, clear the box Enable logging in the Settings >
Advanced screen.
7. Stop and start the SecureClient.
312
Aquaforest TIFF Junction Evaluation
Troubleshooting Table
TROUBLESHOOTING TABLE
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
... E x a m i n e t h e s e possible
If t h i s i s s u e a r i s e s d u r i n g ... c a u s e s a n d c h e c k t h e listed tools
313
c a u s e s l n d check ?he Hsted tools
Troubleshooting Table
... E x a m i n e t h e s e p o s s i b l e
If this issue arises d u r i n g ... c a u s e s a n d c h e c k t h e listed t o o l s
315
• Verify Office Mod
ipassignment.conf
RADIUS
DHCP
IP pool configuration
316
Aquaforest TIFF Junction Evaluation
Troubleshooting Table
317
Troubleshooting Table
Aquaforest TIFF Junction Evaluation
L A B 10: O B S E R V I N G IKE N E G O T I A T I O N
BETWEEN A GATEWAY AND SECURECLIENT
I I 1 I I 1 I I I I 1 1 1 I I I I I I I I I I I I 1 I 1 I 1 I I I I I 1 I I I I I 1 I 1 1 I I I I I
Objectives:
Topics:
319
[ ^ D E T E R M I N E R O L E S FOR T H E LAB SCENARIO
. be 1
site. If you are the ; to 1
site, skip to
OfficeJet
10.XX+7.0
4. OK to i ; the
5. OK to (
320
3. Click OK to close tb
2. the:
3. ; All Users is
in] i User
4. a •to 1
- Net_osio ,:H:F
I the
the : is 1 a * on the]
: be (
1.
2. rule to 1
3.
1. Right-click L in 1
2. Click the Pi
3. Click the A
4. Check the b
5. Click OK.
321
^ G A T E W A Y SIDE: START IKE DEBUG ON THE GATEWAY
1. Log in to 1
2. Run th
vpn debug
. in 1
tray.
2. Create an in C:\.
3.
4.
5. Ente
6. Opei
inc:
7. To si
322
Aquaforest TIFF Junction Evaluation
An FTP server is installed on the Windows machine behind each city site's
Gateway.
1. From your SecureClient machine, open an FTP session and log in to your
partner city's FTP server.
2. Type binary.
3. Type hash.
4. Type put ike.elg.
5. Exit the FTP session.
£pREVERSE ROLES
Each side will now perform the steps for the other side of the connection.
Using IKEview, analyze your Gateway's ike.elg, and the ike.elg from your
partner city's SecureClient.
323
Lab 10: Observing IKE Negotiation Between a Gateway and SecureClient
324
Aquaforest TIFF Junction Evaluation
Scenario: Continuing from the last lab, the site that was the SecureClient will
continue in that role for the lab. Once each side has completed its capture, each
side will switch roles and repeat the procedures for the other side. In this lab,
each side will run srfw monitor on the SecureClient desktop and fw monitor on
the corresponding NGX Gateway, and will analyze output using Ethereal.
Objectives:
Topics:
325
f p G A T E W A Y SIDE: R U N F W M O N I T O R O N N G X G A T E W A Y
1. : tO 1
:'s Web
• in the V P N Use FTP or H T T P
2. On 1 ; (CLI) and
i to 1
4. The
[ 3684]
[ 3684] (control-C to
: C T R L + C keys in the C L I .
ROLES
326
Aquaforest TIFF Junction Evaluation
3. Identify the interface direction for outbound and inbound traffic. For
example, for outbound traffic as on lines 55 and 56 (in the No. Column), the
interface directions are o, 0; for inbound traffic on lines 57 and 58, the
interface directions are i, I.
327
Aquaforest TIFF Junction Evaluation
-iptxn
pie Edit View jo Capture Analyze Statistics Haiti
* * SD 1 t : 111 • Q €l •
-J gxprwsmtt- j Gear j Appiv j
T.rne
710 68.568003 10.2.4.104 172.22.102.1 ESP ESP (SPI=0..4442c7a8)
711 68.568147 10.2.3.1 10.2.2.102 TCP [TCP P r e v i o u s segment l o s t ] 1416 :- f t p
712 68.568170 10.2.3.1 10.2.2.102 TCP [TCP Dup AO 711#1] 1416 :• f t p [ACK ] S.
713 68.568183 10.2.3.1 10.2.2.102 TCP [TCP Dup ACK 711#2] 1416 > f t p [ACK] S>
714 75.843 526 10.2.3.1 10.2.2.102 TCP 1429 :> h t t p [RST] Seq-0 Ack=0 wiri=0 Lei
?15 75.8444 57 10.2.4.104 172.22.102.1 ESP ESP (SPI=0x4442c7a8)
717 75.844735 10.2.3.1 10.2.2.102 TCP 1431 > h t t p [SYN] Seq=0 A c k - 0 win=1638<
718 75.844756 10.2.3.1 10.2.2.102 TCP 1431 > h t t p [SYN] Seq-0 Ack=0 win=1638-
719 75.84 5182 10.2.2.102 10.2.3.1 TCP http > 1431 [SYN, ACK] Seq-0 A c k - 1 win-
720 75.845233 10.2.2.102 10.2.3.1 TCP http > 1431 [SYN, ACK] Seq=0 Ack-1 w i n
721 75.845247 10.2.2.102 10.2.3.1 TCP http > 1431 [SYN, ACK] s e q - 0 Ack=l win-
722 75.84 5342 172.22.102.1 10.2.4.104 ESP ESP (SPI=0xdab604eb)
723 75.846218 10.2.4.104 172.22.102.1 ESP ESP (SPI=0x4442c7a8)
724 75.846292 10.2.3.1 10.2.2.102 TCP 1431 ;- h t t p [ACK] Seq=l Ac* =1 win=1731;
72 5 75.846302 10.2.3.1 10.2.2.102 TCP [TCP Dup ACK 724#1] 1431 > h t t p [ A O ]
1L z
'b Frame 716 (62 b y t e s on w i r e , 62 b y t e s c a p t u r e d )
w E t h e r n e t I I , S r c : 00:QQ:00_00:00:QQ ( 0 0 : 0 0 : 0 0 : 0 0 : 0 0 : 0 0 ) , D s t : 4 9 : 6 2 : 6 5 : 7 4 : 6 8 : 3 0 (49:62:65:74:68:30)
Ui i n t e r n e t P r o t o c o l , s r c : 1 0 . 2 . 3 . 1 (10.2.3.1), Dst: 10.2.2.102 (10.2.2.102)
s; Transmission control protocol, src Port: 1431 (1431), mt port: http (SO), seq: o, Ack: 0,. ten: 0
0000 49 62 65 74 68 30 00 00 00 00 uu 08 00 4 5 00 ibet'Hb.
0010
0020
00
02
30
66
cf
05
CC
97
00
00
00
50
80
a9
06
65
51 91 Oa 02 03 01 Oa 02 •
. f . . . P. e
Ci p.
13 f 4 00 00 00 00 70 02
0030 40 00 67 53 00 00 02 04 04 d5 01 01 04 02 gs
Fife: "C; \ftpro.3t\morator_.Mte'A.ayJwosio .out" 316 K8 00:01:21 |P: 342 0; 642 M' 0
fw monitor Output
End of lab.
328
Aquaforest TIFF Junction Evaluation
Review
REVIEW
i I i i I i I I I i I I I I I i I I I i I I I I I I I I I I i I I I i I I i i I I I i I I I i I i i
329
331
Aquaforest TIFF Junction Evaluation
Review
332
Aquaforest TIFF Junction Evaluation
a Check Point
SOFTWARE TECHNOLOGIES
CHAPTER 1 0 ; ADVANCED V P N
LTD.
10:
VPN-1 NGX introduces a new VPN capability, route-based VPN where VPN
traffic is routed within a Community based on static- or dynamic-routing
information. Route-based VPN is done using VPN Tunnel Interfaces (VTI), a
virtual interface on the OS level.
Objectives
333
Key Terms
334
Aquaforest TIFF Junction Evaluation
Route-Based VPN
ROUTE-BASED VPN
Rome Oslo
CPG0551
Route-Based V P N
335
Aquaforest TIFF Junction Evaluation
Domain-Based VPN
DOMAIN-BASED VPN
I I I I i I i i I I I I I i I i I i I I I I I I I I I I i I i i I I I I I I i I I I i I I I i I I i
For example, when two Gateways have configured VPN Domains for their site-
to-site VPN, the two Gateways always route traffic between the two VPN
Domains through the Community, regardless of whether or not there are VTIs.
VTIs can be used at first to serve additional traffic that is not handled by VPN
Domains. This way, an Open Shortest Path First (OSPF) daemon can be set up
to work over a VTI, while the domain-based VPN is still active. Since OSPF
uses Multicast Mode for communication, OSPF works only with VTIs.
337
Aquaforest TIFF Junction Evaluation
OUTBOUND PACKETS
Source Destination
V P N Tunnel Interfaces
INBOUND PACKETS
• An IPsec packet enters the machine coming from the peer Gateway.
• VPN-1 NGX intercepts the packet on the physical interface.
• VPN-1 NGX identifies the originating VPN peer Gateway.
• VPN-1 NGX decapsulates the packet, and extracts the original IP packet.
• VPN-1 NGX detects that a VTI exists for the peer VPN Gateway, and
reroutes the packet from the physical interface to the associated VTI.
• The packet enters the IP stack through the VTI.
Best P r a c t i c e s
339
340
Aquaforest TIFF Junction Evaluation
Configuring N u m b e r e d VTIs
192.168.14.0
Security Gateway A
ext: 214.214.214.1
VTI
Security Security
Gateway B ,/ outer \ Gateway C
ext: 215.215.215.1
VTI: 10.10.0.2 VTI: 10.10,0.4
VTI:
10.10.0.5
192.168.15.0 192.168.16.0
Three NGX Gateways are the minimum required to set up a route-based VPN.
Therefore any Gateway in a route-based VPN topology has two VTIs, one for
each peer. Assume Gateways A, B, and C are setting up VTIs to each other, to
use a route-based VPN.
341
VPN a
FIGURE NOTES
A a n d B, 10.10.0.1 is I as i
IP; i to A. 10.10.0.2 is assigned to B.
A a n d C, 10.10.0.3 is [to A
10.10.0.4 i s ; to G a t e w a y C.
and C, 10.10.0.5 i s ; to B;
10.10.0.6 is ass ito C.
T h e syntax is as fc
vpn shell interface add m <Local VTI IP> <Remote VTP IP> <Peer
name> <VTI
342
Aquaforest TIFF Junction Evaluation
To see the list of VTIs you created, run the command in vpn shell:
For route-based VPN after VTIs are created, it is necessary to add static routes,
pointing to the VTI as the interface to access a peer's internal network. For
example, in the example mesh VPN, any hosts behind Security Gateway A that
need to access the network behind security Gateway C will need to go through a
static route created on Gateway A. This command can be entered via the
Command Line Interface (CLI) as:
Alternately, when adding the command via the CLI, the VTI name can be used:
343
VTIs
1. Log in to Nokia in
2.
3. In 1 FireWall-1.
6. a it is i
Security
Gateway "A"
ext: 214.214.214.1
AWEASI VTI: 10.10.0.1
VTI: 10.10.0.3
Internal Network
10.10.30.0/24
Security Security
Gateway "B" Gateway "C"
ext: 215.215.215.1 exf. 216.216.216.1
VTI: 10.10.0.2 VTI: 10,10.0.4
VTI: 10,10.0.5 VTI: 10.10.0.6
ethl: 10.10.1.1 ethl: 10.10.1.2
1. Using the cpconfig utility, select the option to enable advanced routing.
2. Type Y to enable Advanced Routing.
3. Type Y to restart Check Point services, to enable advanced routing.
346
%
Q.) You have upgraded a Gateway for VPN-1/FireWall-1 NG ^
gence (R55) to VPN-1 NGX (R60) on
How do you make the !
.Pro, so you can use the j
CONFIGURING OSPF
7.
vt-GatewayJ
ip ospf 1 area 0.0.0.0
347
VPN1
vt-Gateway_C as area 0:
ethl
ip ospf 1 area 51.0.0.0
On OSPF as the
1. in
router ospf 1
router-id 215.215.215.1
s ethl as arc
B and Gateway_C i
to each other. That network must belong to area 0, because OSPF
ethl
ip ospf 1 area 0.0.0.0
348
349
350
Aquaforest TIFF Junction Evaluation
Wire Mode
Participating G
VPN Properties Bypass the Fifewaif - - -
• Tunnel Management
- Advanced S ettng-; Allow uninspected encrypted traffic between Wm mode interfaces
- Excluded Services- olti
Shared Secret
Advanced VPN F'r
! i J _ _ J ±1
| OK | Cancet | Help |
351
Aquaforest TIFF Junction Evaluation
Wire Mode
Restart Option* - -
Wife mode
v SufiportV/ire mode {and Wife mode routing- route uninspected
encrypted traffic in VPN routing configurations'!
Select the interfaces where traffic destined to Wire mode communities will
bvpai-i the Firewall
JSSSSL.
Adc
'•y Support NAT traversal (applies to Remote Access and Site to Site connections)
V P N Advanced Screen
J^?...
ethl
_ | Netmask j
10.4 8 1 255 255.255,0
eth'2 132 168.22.101 255.255.255.0
IlIJ^-ZJI ^ 1
Wire Mode
Configure Wire Mode per interface from the Wire mode interfaces screen:
— Click Add in the list Select the interfaces where traffic destined to Wire
mode communities will bypass the Firewall. The internal interfaces on
the Gateway will be listed.
— Highlight particular internal interfaces, or select all internal interfaces.
In the following figure, Gateways B and C have Wire Mode enabled, and have
trusted internal interfaces defined:
internal
Security Network
Gateway B 10.10.20.0 /24
10.10.30.5
CP005Z7
The Community containing Gateways B and C has Wire Mode and Wire Mode
routing enabled. Host 10.10.10.5 (behind Gateway A) sends a packet to
10.10.30.5 (behind Gateway C). Gateway C's Internet connection subsequently
fails, so that when 10.10.30.5 tries to reply to 10.10.10.5, the reply packet from
10.10.30.5 will be routed through Gateway B. Without Wire Mode, Stateful
Inspection would be enforced at Gateway B, and the packet would be dropped
due to "out of state" errors. But with Wire Mode enabled, Gateway B can pass
on the traffic and not enforce Stateful Inspection.
353
354
Aquaforest TIFF Junction Evaluation
The Directional VPN Rule Match is configured in the VPN column of the Rule
Base, which can now contain the format of A > B, where A and B each
represent an interface group. Such a rule would match on traffic entering the
Gateway from interface group A, and leave the Gateway through interface
group B.
Interface Groups
355
Aquaforest TIFF Junction Evaluation
EXAMPLES
This rule accepts FTP traffic intercepted on any of the Gateway's internal
interfaces, which is about to enter a tunnel in Mylntranet VPN Community.
More than one Directional VPN Rule Match condition can be specified in a
single rule. Consider the following rule:
356
Aquaforest TIFF Junction Evaluation
The above rule can be installed on two or more Gateways that are members of
Mylntranet. For each FTP and POP3 connection routed on the tunnel between
them, the same rule would match on one Gateway, when traffic passes from an
internal interface and into the VPN tunnel. The same rule matches on the other
Gateway, when traffic enters the VPN tunnel and passes to the internal
interface.
H I n t e r n a l j i ' l e a r E S f ^ J Communfty_A
I "k Any Internal j s l e a r f S O ^ E j f Community_B
http j © accept ! jj Log
A connection may dynamically change its route without breaking. For example,
the above rule allows HTTP traffic to be initiated from the internal interface
side, and routed into either the CommunityA or C o m m u n i t y B VPN tunnel.
The routing can change dynamically between these two Communities, without
breaking the connection.
357
Aquaforest TIFF Junction Evaluation
Tunnel Management
TUNNEL MANAGEMENT
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Permanent Tunnels — This feature keeps VPN tunnels active, allowing real-
time monitoring capabilities.
Permanent T u n n e l s
• For the entire Community; this option sets every VPN tunnel in the
Community as permanent.
• For a specific Gateway; use this option to configure specific Gateways to
have Permanent Tunnels.
• For a single VPN tunnel; this feature allows configuring specific tunnels
between specific Gateways as permanent.
358
Aquaforest TIFF Junction Evaluation
Tunnel Management
TUNNEL TESTING
A tunnel test is a proprietary Check Point protocol that is used to test whether
VPN tunnels are active. A tunnel-test packet has an arbitrary length, with only
the first byte containing meaningful data — the type field.
1 - Test
2 - Reply
3 - Connect
4 - Connected
Tunnel testing requires two Gateways, one configured as a "Pinger" and one as
a "responder". The Pinger Gateway uses the VPN daemon (vpnd) to send
encrypted tunnel-testing packets to the responder Gateway. The responder
Gateway is configured to listen on port 18234 for special tunnel-testing packets.
The Pinger sends type 1 or 3. The responder sends a packet of identical length,
with type 2 or 4 respectively. During the connect phase, tunnel testing is used in
two ways:
359
Aquaforest TIFF Junction Evaluation
Tunnel Management
VPN Tunnel S h a r i n g
Tunnel-Management Configuration
•till J!
JJLi
Help
360
Aquaforest TIFF Junction Evaluation
Tunnel Management
PERMANENT-TUNNEL CONFIGURATION
To set VPN tunnels as permanent, select Set Permanent Tunnels. The following
Permanent Tunnel modes are then made available:
To make all VPN tunnels of specific Gateways permanent, select On all tunnels
of specific Gateways. Select the specific Gateways you want, and all VPN
tunnels to the specific Gateway will be set as permanent.
Gateway T u r r e t Properte:.
Note: in case of a conflict between tunreel properties of two gateways, the default
funnel properties which ate defined on the community vvl be used
He!o
361
Aquaforest TIFF Junction Evaluation
Tunnel Management
Tracking options can be configured for specific Gateways' VPN tunnels in the
Gateway tunnels properties screen. Use Community Tracking Option as the
default setting. You can select specific tracking options:
HHMM
Set the tract options tot the permanent tunnels of the selected gateways.
SSBS
^ Show ai member gateways
f*• Show orriy specific gateways E d " f o ^ n fjate*vay„
SelectedTLBinel Properties... ;
In the above screenshot, to make the tunnel between Remote-1 -gw and
Remote-3-gw permanent, click in the cell that intersects the Remote-1-gw and
Remote-3-gw where a permanent tunnel is required.
362
Aquaforest TIFF Junction Evaluation
Tunnel Management
i^r — -3
| OK | Cancel- j : . Help j
TRACKING OPTIONS
Several attributes allow for customization of tunnel tests and intervals for
permanent tunnels:
Tunnel Management
3. Click VPN Advanced Properties > Tunnel Management to view the five
attributes:
Attribute Purpose
364
Aquaforest TIFF Junction Evaluation
Tunnel Management
• One VPN tunnel per each pair of hosts; A VPN tunnel is created for every
session initiated between every pair of hosts.
• One VPN tunnel per subnet pair; Once a VPN tunnel has been opened
between two subnets, subsequent sessions between the same subnets will
share the same VPN tunnel. This is the default setting, and is compliant with
the IPSec industry standard.
• One VPN tunnel per Gateway pair; One VPN tunnel is created between peer
Gateways and shared by all hosts behind each peer Gateway.
365
Aquaforest TIFF Junction Evaluation
Tunnel Management
366
Aquaforest TIFF Junction Evaluation
LAB 12: R O U T E - B A S E D V P N U S I N G
STATIC ROUTES
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Scenario: In this lab, you will set up route-based VPNs for the four sites in the
figure below. You will create VTIs on these SecurePlatform Pro Gateways. You
will add static routes on the Gateways, to reach peers' internal networks
through the correct VTI. In this lab, each site has its own SmartCenter Server on
the internal Web server (www.citysite.cp). SmartConsole is installed with the
SmartCenter Server. To provide VPN redundancy, you will enable a third
interface on the Gateway. The third interface will use the IP address
192.168.xx. The third interface from two cities connect to one hub.
fwrome fwoslo
iPartnerCity) (YourCity)
rwtoronto fwmadrid
(PartnerCity) > ^ {PartmrCity)
VTI:192.168.137.32 1/77:192.168.137.42
VTI: 192.168.137.31 <4 *>VTI: 192.168.137.41
Route-Based V P N
367
368
Aquaforest TIFF Junction Evaluation
Default Policy
369
Aquaforest TIFF Junction Evaluation
1. Create externally managed VPN gateway objects for the other three peer
Gateways.
2. Select SecurePlatform Pro as the OS.
3. Select Firewall and VPN in the Check Point products list.
4. In the Topology screen for each fwpartnercity gateway object, select
Manually defined, under VPN domain options.
5. Select the simple group object no vpn domain, and click OK.
6. Save the Policy.
ISiSg
i [ * j A n v Traffic http ^ accept [ j | Loci
370
Aquaforest TIFF Junction Evaluation
VTI A d d r e s s i n g VTI IP
City N a m e VTI N a m e Convention Addresses
371
Lab 12: Route-Based VPN Using Static Routes
The table above divides the standard lab topology (as outlined in
b
the lab topology the "Check Point Security Administration NGX
IIP chapter of this handbook) into two groups of four city sites,
in regards to the VTI IP addressing scheme.
3. Run the vpn shell command to enter vpn shell and configure VTIs.
The syntax for the command is as follows:
vpn shell interface add numbered <Local VTI IP> <Remote VTP IP>
<Peer Gateway object name> <VTIname>
Use the naming and addressing conventions to configure VTI
A
addressing, so VTI IP addresses between fwyourcity and
fwpartnercitys VTIs ends with .xO, the tunnel to the city site
across from yours (according to the topology) ends with .xl,
and the tunnel from your site to your partner site ends with .x2.
Aquaforest TIFF Junction Evaluation
li
Rome VTIs Oslo VTIs
192,168.137Ax 192.168.137.2x
. .11 ^.21
V y
30 .32 .42
Toronto VTIs •40 Madrid VTIs
192.168.137.3x *5T" 192.168.137Ax
.31 ->.41
¥ ¥
.70 .72 .82 .80
Cambridge VTIs Singapore VTIs
192.168.138.7X 192.168.138M
.71 ->.81
373
Aquaforest TIFF Junction Evaluation
4. Verily the VTIs in vpn shell. Using fwrome, for example, the output is
similar to the following:
VPN shell:[/] > show/interface/summary/all
5. Use the .. command to return to the top level of vpn shell, then type quit
to leave vpn shell and return to Expert Mode.
6. Type quit to return to Expert Mode.
[ ^ C O N F I G U R E VTI T O P O L O G Y IN G A T E W A Y O B J E C T
1. After VTIs are created successfully on the four Gateways via the command
line, open fwyourcity's gateway object's Topology screen in
SmartDashboard on the SmartCenter Server.
2. Click the Get button and select Get interfaces with topology. This will
retrieve the newly created VTIs. This example is for fwoslo:
If you attempt to edit VTI interfaces, the VTI interface settings are gray in
the General screen. The screen shows local IP addresses and the remote peer
Gateway's name and IP address.
374
• all VTIs: a VTI
tab. on the
and OK.
; all
[ be set as ;
the VTI.
4. Verify and in the]
375
Lab 12: Route-Based VPN Using Static Routes
Peer Internal
Network and
Your Gateway Netmask Peer VTI Address
1. Add static routes to the internal networks of other sites using sysconfig.
Use the above table for the network address of the internal network, and the
VTI IP address of the peers.
2. Connect via HTTP from each site's internal Web server to another site's
server.
3. Launch SmartView Tracker. Verify HTTP traffic is encrypted and
decrypted by the correct Gateway.
376
Aquaforest TIFF Junction Evaluation
4. The outbound traffic from the local network will show in SmartView
Tracker from the internal interface of your fwyourcity, while inbound traffic
will show as arriving on the VTI from that partner city.
m
: FireWall
NAT - Network Addres
Aufhenticati:-"i
" VPN f" Enabfe Backup Gateway
Early Versions Corr r Enable b a d distribution for Multiple Entry Pont? configurations (Site To Site connection:}
Encryption Propert
P' Enable decrypt on accept for gateway to gateway traffic (relevant only <o poltcie?
• VPN-1 Edge/'Embedde in TradteortatModa)
:+: Remote Access
CRL Brace Period — • — - - -
• SrnartDirectory (LDAP]
-•QoS Grace period before the CRL is v s M p5~3
SmartMap
UserAuthority Grace period after the CRL m m longer vaid: flSOO ^ '.eor.d:
•SE - Open Security E
• Stateful Inspection Grace period extension for Seeufiemote'SecureQient: j3G00
- SmartLSM Profile : :• >. '>Y.t Denial c* ':e r '.'ce prsteoon
± L o g a n d Alert
Reporting Tools Support iK.E DoS protection tfore identified source j Stable-
•OPSEC
Support WE DoS p
. SmartCenter Acce:: "3
SmartDashboard Cu;tc
Jj
2. Click OK.
3. Highlight your Partner Cities Rule, and select Rules > Add Rule > Below.
377
Aquaforest TIFF Junction Evaluation
4. In the rule just created, name the rule "Outbound VPN", and use the
following table to configure it:
Source Any
Destination Any
VPN Any Traffic
Service HTTP, FTP
Action Accept
Track Log
5. Right-click on the VPN column of the rule you have just created, and select
the Edit Cell option.
6. In the VPN Match Conditions screen, select Match Traffic in this direction
only, and click Add.
7. Configure the Directional VPN Match Condition screen as follows:
OK Cancel Help
8. Click OK to close the screen, and click OK again to close the VPN Match
Conditions screen.
9. Set the action as Accept and the tracking as Log.
378
Aquaforest TIFF Junction Evaluation
10. Add a rule below the Outbound VPN rule, named "VPN Inbound Rule".
Use the following information to configure the rule:
Source Any
Destination Any
VPN Mylntranet > Internal clear
Service HTTP, FTP
Action Accept
Track Log
„ http
V P N IriBound Rule k Any ; ^ M\1ntranettgfc> | accept (5] Log
14. Initiate HTTP traffic from webyourcity to one of your partner cities. Have
that partner initiate traffic to you.
379
Aquaforest TIFF Junction Evaluation
15. Locate the traffic in SmartView Tracker. You should see outbound traffic
being logged from fwvourcity's internal interface, while inbound traffic will
be logged from the VTI for that partner city:
I lifflfflflfM—Blif-: < •
... Previous ' ' Next Copy . Less Columns j
Number 1297 I
Date 14Apr2006 j
Time 13:17:23
Product I f s VPN-1 Pro/Express
Interface & ethl
Origin fwoslo (172,22.102.1)
Type 1 Log
Action : Encrypt
Protocol TCP tcp
Service http (80)
Source www.oslo.cp (10.2.2.102)
Destination 10.2.4.104
Rule 6
Current Rule Number 6-Standard
Rule UID {3E04E9FD-C52B-4716-9311-DF4FC2D95E 34 j
Rule Name VPN OutBound Rule
Source Port 1451
User
Encryption Scheme m IKE
VPN Peer Gateway fwmadrid (172.24.104.1)
Encryption Methods ESP: AES-128 + MD5
Community Mylntranet
Subproduct 0 VPN
VPN Feature VPN
Information servicejd: http
Policy Info Policy Name: Standard
Created at: Fri Apr 14 1 3 1 6 31 2006
Installed from: weboslo
Close
380
Aquaforest TIFF Junction Evaluation
Source
Destination
Rule
Current Rule Nui
Rule HID
Rule Name
Source Port
; User
Encryption Scheme ( H IKE
VPN Peer Gateway fwmadrid (172.24.104.1 ]
Encryption Methods ESP: AES-128 + MD5
Community Mylntranet
Subproduct 0 VPN
VPN Feature VPN
Information serviceJd: http
Policy Info Policy Name: Standard
Created at: Fri Apr 1413:28:30 2006
Installed from: weboslo
In this section, three of the four sites in each group participate. The members
participating in the first group include: Rome, Oslo, and Toronto. Madrid will
not participate. For group two, Singapore is not participating. For the
instructions, replace Rome with Zurich, Oslo with Cambridge, and Toronto
with Sydney.
381
Aquaforest TIFF Junction Evaluation
•• General
• Participating Gateways
• V P N Properties Bypass the Firewall
• Tunnel Management
;• A d v a n c e d Settings V Allow uninspected encrypted traffic between W i r e m o d e interfaces
Excluded Services of this Community's members
Shared Secret
A d v a n c e d V P N Pr V Wire mode routing - Allow members to route uninspected
encrypted traffic in V P N routing configurations
| OK | Cancel [ Help J
On fwoslo and fwtoronto, verify in SmartView Tracker that the FTP session
was encrypted:
EB T Jl
pate ; Time . engirt Destination *»!
, :
C
^Ol'l'Uc 1. .;. -2£7-1 B r'\=ro o-.ro i % 2
:2H OH i 7-40.055Si B r 1
;525 ^ArOOlO: 17 41.07El B O'ti: 1 ® i
<525 17 Oil-El B r orvc- i
-1 A:-: 110c
1 7 4.,,;El| B fi/-"'-;.: o-v'c1
: no 4Ar;2001 SI E -X'.r-:- i # 1
1529 ' 4AD 000117 44; ilEl l B i ®i
;
1500 14 AO; 210017 45'ISEl E r-^cvi onec- 1 € H
1501 5 4Ac; 200117 40:17El B f'-Oc-'O-tc- i ® i
1532 :14 Ac-2006 17'47; -QEl B ofir-;. i ® i
: 1533 14Apr20Q6 17,48:14 El B fwtoronto
1534 14Aor2006 17;48;14 El B fwtoronto
1535 14Aot2006 17:48; 14El B fwtoronto
1536 14Apr2006 17:48:14 El E fwtoronto
.4A-200" 17 4,3: IEl S B ^'"tCf'Ontv i #i!
:." . 1;El B f^rororAc: i G-w
.::• :4Ap?'0006 El B 0 (H.
J 54 Q 4Ar^2C05 17 -53:4JEl B fwtoronto 1
= 1541 04#wfi0Sll 17:43:41 Pgg B iliitMS TCP ftp 10,2.2.102 www.toronto.cp
3 542 1 2006 16 El B r<»^.oronr.o i ® .UDP. 1
J 54 1 .•iAcrOOC": i~ 50;10El B f'wf.ororito 1 3 JJDP, SI16 1 : ::.
1544 4Ac?'200", 17 5!;20El E fwtoronto i ® UDP 5116 102,.-0.22.1
U- ,45 4ADr2D0ff 17,52:22 El E rwiororito 1 ® UDP 5116 < o" -,j* •*•• •
i;:4t- 4AD?200C r: •.. El B fwtoronto i © UDP Si 16 1.-2,-18.22 1
154" 4Apr2C0c 17,54:20 El B fwtoronto a ® .UDP. 5116 1*51.. 18.22 1
1540 4Apr200c !"• ,55 20 El B fwtoronto i ® j.iDP SI 16 l'J_,.18.„2 -
1549 l4Apr2C0r. r 56:10 El B fwroronto i ® .UDP, Si 16 1-2,106.22 1
1550 4AD?2005 57,12 El B rwtoronto i ® UDP 8116 i^:,108.12 :
<J • jJEl
Ready Total records m file 1551
383
Aquaforest TIFF Junction Evaluation
Number 855 j
Date 14Apr2Q08
Time 17:47:36
Product S S I VPN-1 Pro/Express
Interface B vt-twoslo
Origin fwrome (172.21.101.1)
Type i Log j
Action V VPN Routing j
Protocol TCP tcp |
Service ftp (21) I
Source www.oslo.cp (10.2.2.102) I
Destination www.toronto.cp (10.1.3.103)
Rule 0 - Implied Rules
Current Rule Number
Rule Name
Source Port 1612
User
Information connectivity level: Wire
dst scheme: IKE
dst methods: ESP: AES-128 + MD5
dst peer gateway: fwtoronto
dst community: Mylntranet
Policy Info Policy Name: Standard
Created at: Fri Apr 14 17-33'25 2006
Installed from: webrome
Close
384
Aquaforest TIFF Junction Evaluation
® fwrome fwoslo A
20
(fiartnerCity) i Yourdity> •
VTI: 192.168.137.11 ^ Vl/77 192.168.137.21
VTI: 192.168.137.12 VTI: 192.168.137.22
192.168.22.101
/ VTI:
192.168.137.10
fwtoronto / fwmadrid
(PartnerCity) ^ V [PartnerCh
(PartnerCity)
VTI 192.168.137.32 T I 192.1i
^ VVTI: 192.168.137.42
VTI: 192.168.137.31 * VTI 192,168.137.41
385
386
Aquaforest TIFF Junction Evaluation
All four members of each group now have the same Wire Mode
configuration.
Name multicast-ospf
IP address 224.0.0.5
Name VTINetworks
Network 192.168.137.0
Address
Network Mask 255.255.255.0
387
Aquaforest TIFF Junction Evaluation
In the Policy, add a rule above the Stealth Rule. Configure it using the
following information:
V' m J
1 NetBIOS Rule * Any ; * Any [*J any Trattic i drop
bootp
np
2 SSH Access Rub -M" Netjjilc B twoslo f*"| Anv Tr attic li :;h HI accept
V VTI_N eWor ti 'B'tw^lo"
3 OSPF Broadcast-M" Synch_0-:lo_MadndD multica?t-Q-:pt j#] Anv Trattic ^ accept 1 Log
4 Stealth Pule •k Any M two ' to f*1 Anv Trattic * Anv (§| drop 1 Loc,
4
N
e tjj-lo
5 Partner Cities Rul-M- Netjvladrid Jt- N et _Ma dnd ' http
-M- Netjjilo „ tie fH accept S L c ,
6 '•••'Pr-.J OutBound:R * Anv : * Anv ,--S Internal .cleareS^ Mylntranet http accept I Log
Z2:
ftp
7 VPN InBound Rul* Any * Anv Mylntranet£§j)tvfi., Internal_clearU: http lf| acceptH Log
Li ttp
8 '.'"/ire Mode Rule •k Any * Any & MvlntranetiS^ Mylntranet 1™. http ^ accept II Log
ttp
9 Internet Access 1 -M" Net_Otlo * Any j"*j Anv Trattic http HI accept B Log
10 Cleanup Rule * air/ * Any * ^ nv @ drop ®Log
388
ss. interfaces and VTIs 3?-
10.0.0.0
172.21.101.1 0.0.0.0
10.0.0.0 0.0.0.0
vt-fWmadrid 0.0.0.0
Oslo ethl
172.22.102.1 0.0.0.0
20.0.0.0 0.0.0.0
0.0.0.0
30.0.0.0
172.23.103.1 0.0.0.0
30.0.0.0 0.0.0.0
0.0.0.0
ethl 40.0.0.0
172.24.104.1 0.0.0.0
40.0.0.0 0.0.0.0
0.0.0.0
ethl 50.0.0.0
172.25.105.1 0.0.0.0
50.0.0.0 0.0.0.0
0.0.0.0
ethl 60.0.0.0
172.26.106.1 0.0.0.0
60.0.0.0 0.0.0.0
0.0.0.0
389
eaper
S
CltySite^
ethl 70.0.0.0
172.27.107.1 eth2 0.0.0.0
70.0.0.0 0.0.0.0
0.0.0.0
ethl 80.0.0.0
172.28.108.1 0.0.0.0
80.0.0.0 0.0.0.0
0.0.0.0
conf 11
1.
390
Lab 13: Dynamic VPN Routing Using OSPF
391
392
Aquaforest TIFF Junction Evaluation
OSPF configuration has now defined how the GateD daemon will handle any
traffic coming to the interfaces and VTIs. Allowing this traffic through
VPN-1 NGX requires reconfiguring anti-spoofmg:
Anti-Spoofing Warning
393
Aquaforest TIFF Junction Evaluation
The Get Topology Results screen opens, showing the interfaces as they are
defined in the fwyourcity object. Since VPN-1 NGX is querying routing
information from the operating system, VTIs are considered interfaces by
anti-spoofing.
394
7. Click OK to close fwyourcity.
8. Save and install the Policy.
( ^ V E R I F Y R O U T E S AND O S P F C O N F I G U R A T I O N
Verify with your classmates that OSPF is configured on all four Gateways. Run
the show ip ospf neighbor and show ip route commands in router privileged
enable
395
Lab 13: Dynamic VPN Routing Using OSPF
396
Aquaforest TIFF Junction Evaluation
1. Start an HTTP or FTP connection from your Web server, to a host behind
one of the V P N Peer Gateways.
2. Observe in SmartView Tracker that the connection is decrypted by the peer
Gateway on the correct VTI.
397
Aquaforest TIFF Junction Evaluation
5. Unplug one side of the leased-line connection between you and your
partner city.
6. Reinitiate an HTTP or FTP connection to your partner city.
398
Lab 13: Dynamic VPN Routing Using OSPF
399
Aquaforest TIFF Junction Evaluation
8. Verify with one of your VPN_peer cities that traffic has passed through its
site, based on the Wire Mode configuration:
400
Aquaforest TIFF Junction Evaluation
Review
REVIEW
i i I I i I I I i i i I I I I I i I i i I I i i i I i I I I i I I i i I i I i I I I i I I I I I I I
401
Aquaforest TIFF Junction Evaluation
Review
Review Q u e s t i o n s
2. A route-based VPN is configured between your site and a partner site for
specific machines on subnets in your internal networks. Each site also has a
standard VPN Domain defined, containing these subnets. Will VPN traffic
be logged in Smart View Tracker as encrypting via the VTI or the VPN
Domain?
A.) The VTI, because the host-based VPN will take precedence over the
subnet-based VPN.
B.) The VPN Domain, because subnet-based VPNs will take precedence over
VTI host-based VPNs.
C.) The VTI, because VTIs take precedence over VPNs in VPN-I NGX.
D.) The VPN Domain, because VTIs only expand the function of VPN
Domains, not replace them.
403
Aquaforest TIFF Junction Evaluation
Review
Review Answers
2. A route-based VPN is configured between your site and a partner site for
specific machines on subnets in your internal networks. Each site also has a
standard VPN Domain defined, containing these subnets. Will VPN traffic
be logged in SmartView Tracker as encrypting via the VTI or the VPN
Domain?
D. The VPN Domain, because VTIs only expand the function of VPN
Domains, not replace them.
3. You have a VPN configured between your NGX Security Gateway and a
partner company's Cisco VPN concatenater. You and your partner
company's Administrator agree that tunnels between these devices need to
be consistently active, and that there also needs to be some redundancy
available in the tunnels. Which of the following configurations would be
best suited for this situation?
405
Aquaforest TIFF Junction Evaluation
Review
406
Aquaforest TIFF Junction Evaluation
Q Check Point
S O F T W A R E T E C H N O L O G I E S LTD.
CHAPTER 1 1 : C L U S T E R X L
This chapter covers best practices for configuring and testing CIusterXL, and
provides troubleshooting steps and commands.
Objectives
407
Key Terms
cphaprob
cpstat
fw ctl debug -m cluster all
408
Aquaforest TIFF Junction Evaluation
Configuration Recommendations
CONFIGURATION RECOMMENDATIONS
iiiiiiiiiiiiiiiiiiiiiiiiii•iiiiiiiiiiiiiiiiiiiiiii
These configuration tips will avert the more common problems resulting from
misconfiguration of CIusterXL.
R e c o m m e n d a t i o n s for CIusterXL
409
411
Aquaforest TIFF Junction Evaluation
Troubleshooting CIusterXL
Switch Explanation
-d <device> The name of the device as it will appear in the output of the
cphaprob list
-s Status to be reported:
ok - <device> is alive,
init - <device> is initializing,
problem - <device> has failed.
state Display the state of this and all other Security Gateways in
the HA configuration.
413
A by <device> should run cphaprob - s ok i to
is nc
in the proces
icphaprob state
to 1
Troubleshooting CIusterXL
In the above example, the pivot machine is identified in the State field. The
pivot machine usually takes 30 percent of cluster traffic. The non-pivot machine
takes 70 percent of cluster traffic.
415
Aquaforest TIFF Junction Evaluation
Troubleshooting CIusterXL
cphaprob -a if
Required interfaces: 3
ethl 172.28.108.3
eth2 10.4.8.3
Interfaces are critical devices. ClusterXL checks the number of good interfaces,
and sets a value of required interfaces to the maximum number of good
interfaces seen since the last reboot. If the number of good interfaces is less
than the required number, ClusterXL initiates failover. A secured interface is
the synchronization interface. All other interfaces are labeled as non-secured.
Required interfaces should be identical to the cluster-member object's topology
information. The virtual cluster-interfaces list should be identical to the cluster
object's Topology screen. The number of required interfaces should be the same
among cluster members. The same is true for the number of required secured
interfaces.
When an interface is down, the interface can neither receive nor transmit CCP
packets. This may happen when an interface is malfunctioning, is connected to
an incorrect subnet, is unable to pick up multicast Ethernet packets, and so on.
The interface may also be able to receive but not transmit CCP packets, in
which case the status field is ready. The displayed time is the number of seconds
that have elapsed since the interface was last able to receive/transmit a CCP
packet. For third-party clustering products, except Nokia IP clustering products,
cphaprob -a if should always show virtual-cluster IP addresses.
417
Troubleshooting ClusterXL
Registration number: 1
Timeout: none
Current state: OK
Registration number: 2
Timeout: 2 sec
Current state: OK
HA yes
HA
HA 2
IIP I St
|athO| 192.168.1.1|Up 01 II 21
[ethl|172.28.108.1|Up 01 01 21
10.4.8.1|Up 01 01 21
!| 10.6.8.1 01 21
|fwd |OK | 01 01 I
IOK | 01 01 I
I Filter IOK | 0| I I
01
fW Ctl -m cluster
is used in < : is
to understand. It is 1
as i
mac
df Decision function
4. Run debug:
fw ctl kdebug -f > <file name>
fw ctl debug 0
fw ctl debug should be run on all cluster members, to;
: all cluste
• is 0Y
Q.)How do youensun
All' b h 1' 1 d d Wh h b
423
KERNEL FLAGS
DEFAULT BEHAVIOR
Aquaforest TIFF Junction Evaluation
Kernel Flags
NEW BEHAVIOR
With the two kernel flags set to true, the kernel includes a checkup of the link
state of all member interfaces. That is, when a cluster member does not receive
CCP packets from an interface, it will make a kernel procedure to check the
state of the interface. If the member discovers the link state is down, the
member will send a message about the link state through working interfaces to
the network, saying that its interface state is down. The standby member can
then change its state to Active, without the Ping mechanism (since no hosts are
available for Ping). The clusters members will then know which cluster has a
problem, and can change their states to active. (The cluster that has the highest
priority will be active.)
f w h a _ r e s t r i c t _ m c _ s o c k e t s (0 by Default)
DEFAULT BEHAVIOR
NEW BEHAVIOR
425
NEW BEHAVIOUR
426
Aquaforest TIFF Junction Evaluation
Kernel Flags
fw_gratuitous_arp_timeout
This flag sets time-out, which is 600 deciseconds by default, equal to 0.1
seconds.
f w _ a l l o w _ c o n n e c t i o n _ t r a f f i c _ d r o p (1 by Default)
When a client and server starts a TCP handshake through a cluster, the SYN
packet arrives at member A. Member A will hold the SYN packet and
synchronize the SYN packet with member B, then pass the SYN packet to its
destination. When a SYN-ACK packet comes from the server to the client, the
SYN-ACK packet arrives at member B. With Flush and ACK, member B has
the SYN table entry, and member B allows SYN-ACK to pass through and
return to the client.
DEFAULT BEHAVIOR
If the ACK packet from the client comes before member B synchronizes
SYN-ACK with member A, by default, member A will drop the packet. This
may result in retransmissions and delays in some applications.
NEW BEHAVIOUR
427
fwha__aIIow_simuItaneous„ping
DEFAULT BEHAVIOUR
NEW BEHAVIOUR
pair as
Aquaforest TIFF Junction Evaluation
Kernel Flags
fwconn_merge_all_syncs
DEFAULT BEHAVIOUR
Some closed connections hang in the connections table for an entire TCP
session time-out, in a Load Sharing configuration. When an NGX cluster
member encounters FIN packets from both sides of a TCP connection, it lowers
the connection's time-out from the TCP session time-out (by default 3,600
seconds) to the TCP end-session time-out (typically set to less than 1 minute).
In Load Sharing configurations with asymmetric routing, one cluster member
can find a certain connection is established, while another member has already
encountered both FIN packets on the same session. When the machine with the
older connections table synchronizes with the machine with the newer
connections table, the more updated machine may increase the connection's
time-out to the TCP session time-out. The connection then stays in the
connections table long after it has closed. Such a scenario is also a possible DoS
attack.
NEW BEHAVIOUR
f w t c p s t r _ r e j e c t _ s y n c e d (On by D e f a u l t )
429
Kernel Flags
Aquaforest TIFF Junction Evaluation
LAB 14: M A N U A L F A I L O V E R U S I N G
CPHAPROB -D DEVICE COMMAND
11111111111111111111111111111111111111111111111111
Scenario: In New mode HA and Load Sharing Pivot mode clusters, test
failover without bringing the active member down. Use the cphaprob -d
<device> -s problem register command to generate failover manually.
Topics:
9
Running cphaprob -d <device> -s problem register to generate failover
• Running cphaprob state to verify cluster-member status
• Running cphaprob -d <device> unregister to reactivate the down member
431
432
Lab 14:
Name
Standard Lab IP
JS2?"
fwrome 172.21.101.1 172.21.101.1
10.1.1.1 10.1.1,1
192.168.22.101 192.168.22.101
433
In 1
Standard Lab IP
Name sssssr1"
fwoslo 172.22.102.1 172.22.102.1
10.2.2.1 10.2.2.1
192.168.22.102 192.168.22.102
In 1
Zurich's i
10.3.7.107 10.3.5.107
434
In 1 Sydney an
Sydney's j
Standard Lab IP
435
[ ^ G E N E R A T E FAILOVER IN NEW MODE HA CLUSTER
-d faildevice -s problem -t 0
The active member now goes down ,due to faildevice reported as a problem,
and the standby member becomes active. The FTP session should continue if
Synchronization is ^
6. Verify cluster status on both members with the <
state
-d faildevice -s ok
-d faildevice
will become active again, because Switch to higher priority Gateway in the
;reen of the cluster object is <
; lab.
436
Lab 14:
L A B 15: RUNNING C P H A S T A R T -D
: cphastart is usei an HA ]
cphastart -d< HAi
-d.
Topics:
;cphastart -d on c
Lcphastart -d<
437
Aquaforest TIFF Junction Evaluation
3. Start the cpha service in debug mode, and redirect the output to a text file:
[expert@cpmodule]#cphastart -d >& hastart.txt
End of lab.
438
Aquaforest TIFF Junction Evaluation
Review
REVIEW
IIIiiIIiIiiIiiiiIiIIiIiIIIiIiIIiIIIIIiIIIIIIIIIiiI
439
Aquaforest TIFF Junction Evaluation
Review
Review Answer
441
Aquaforest TIFF Junction Evaluation
Review
442
Aquaforest TIFF Junction Evaluation
Q Check Point
SOFTWARE TECHNOLOGIES
AI ,
-O
This appendix provides an optional lab for individual practice with DbEdit.
Scenario. In this lab, you will use DbEdit to create a new service object, a new
group object, and add a service object into a group object. Also in this lab, you
will use DbEdit to modify global properties resolve_multiple__interfaces value
to true. This lab is ideal for environments that are not able to take advantage of
the Database Tool (GuiDBedit). It is important to know that Check Point
recommends using the Database Tool utility. When GuiDBedit is not available or
convenient, use DbEdit carefully.
In this lab, you will use dbedit from the SmartCenter Server locally. If this
command is executed at other machines in the network, the SmartCenter
Serve's hostname must be resolvable to its IP address from that host.
Objectives:
Topics.
• Logging in to DBedit
• Modifying global properties
443
S L O G IN TO DBEDIT PROMPT
1. Close all;
2. a I or console.
3. Type dbedit.
4. Enter the hostname of the! ENTER,
since this is:
5. to log in to
6. At
>
: in 5 O.C, by
; 3333:
> _ort 3333
in objects 5 O.C:
>
11. si to 1 : following:
r no s; i them.)
12. : in 5 O.C:
444
Aquaforest TIFF Junction Evaluation
1. From the dbedit prompt, change the property resolve multiple interfaces
value to true, by typing the following:
dbedit > modify properties firewalljproperties resolve muliple_interfaces
true
End of lab.
445
Aquaforest TIFF Junction Evaluation
446