CP R70 Provider1 Admin Guide
CP R70 Provider1 Admin Guide
Administration Guide
Version R70
March 9, 2009
© 2003-2009 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying,
distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written
authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or
omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer
Software clause at DFARS 252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Chapter 1 Introduction
The Need for Provider-1 ................................................................................... 22
Management Service Providers (MSP) ........................................................... 23
Data Centers .............................................................................................. 25
Large Enterprises ........................................................................................ 25
The Check Point Solution ................................................................................. 28
Basic Elements........................................................................................... 29
Point of Presence (POP) Network Environment............................................... 33
Managers and Containers............................................................................. 35
Log Managers ............................................................................................. 38
High Availability ......................................................................................... 40
Security Policies in Provider-1 ..................................................................... 40
The Management Model ................................................................................... 42
Introduction to the Management Model......................................................... 42
Administrators ............................................................................................ 42
Management Tools ...................................................................................... 44
The Provider-1 Trust Model............................................................................... 50
Introduction to the Trust Model .................................................................... 50
Secure Internal Communication (SIC) ........................................................... 50
Trust Between a CMA and its Customer Network ............................................ 51
Trust Between a CLM and its Customer Network ............................................ 52
MDS Communication with CMAs .................................................................. 52
Trust Between MDS to MDS......................................................................... 53
Authenticating the Administrator .................................................................. 53
Authenticating via External Authentication Servers......................................... 54
Setting up External Authentication ............................................................... 55
Re-authenticating when using SmartConsole Clients....................................... 56
CPMI Protocol ............................................................................................ 58
Table of Contents 5
MDS Containers.......................................................................................... 67
Choosing your deployment for MDS Managers and Containers ......................... 68
MDS Clock Synchronization ......................................................................... 69
Setting up the Provider-1 Environment .............................................................. 70
A Typical Scenario ...................................................................................... 70
A Standalone Provider-1 Network ................................................................. 71
A Distributed Provider-1 Network ................................................................. 72
Provider-1 Network with Point of Presence (POP) Center ................................ 73
Hardware Requirements and Recommendations.................................................. 75
Provider-1 Order of Installation ......................................................................... 76
Licensing and Deployment................................................................................ 77
The Trial Period .......................................................................................... 77
Considerations............................................................................................ 77
Further Licensing Detail .............................................................................. 79
Miscellaneous Issues ....................................................................................... 83
IP Allocation & Routing ............................................................................... 83
Network Address Translation (NAT) .............................................................. 84
Enabling OPSEC ......................................................................................... 85
6
Plug-in Status .......................................................................................... 123
High Availability Mode .............................................................................. 123
Plug-in Mismatches .................................................................................. 123
Configuration................................................................................................. 126
Configuring a New Customer ...................................................................... 126
Creating Administrator and Customer Groups............................................... 130
Changing Administrators............................................................................ 130
Modifying a Customer’s Configuration ......................................................... 132
Changing GUI Clients ................................................................................ 132
Deleting a Customer.................................................................................. 133
Configuring a CMA .................................................................................... 133
Starting or Stopping a CMA........................................................................ 133
Checking CMA Status................................................................................ 133
Deleting a CMA ........................................................................................ 134
Table of Contents 7
Viewing the Customer’s Global Policy History File ........................................ 163
Global Policies Tab ................................................................................... 163
Global Names Format................................................................................ 164
8
Creating a Mirror of an Existing MDS .......................................................... 210
Initializing Synchronization between MDSs.................................................. 211
Subsequent Synchronization for MDSs........................................................ 211
Selecting a Different MDS to be the Active MDS .......................................... 212
Automatic Synchronization for Global Policies Databases.............................. 212
Add a Secondary CMA ............................................................................... 212
Mirroring CMAs with mdscmd .................................................................... 213
Automatic CMA Synchronization................................................................. 213
Synchronize ClusterXL Gateways ................................................................ 214
Failure Recovery in High Availability Deployments............................................. 215
Recovery with a Functioning Manager MDS ................................................. 215
Recovery from Failure of the Only Manager MDS.......................................... 217
Table of Contents 9
GUI Clients .............................................................................................. 250
Using SmartConsole to Monitor Provider-1 Components..................................... 252
Log Tracking ............................................................................................ 252
Tracking Logs using SmartView Tracker....................................................... 252
Real-Time Network Monitoring with SmartView Monitor ................................ 253
Eventia Reporter Reports ........................................................................... 255
10
CPperfmon - Solaris only ........................................................................... 286
cpmiquerybin ........................................................................................... 294
dbedit...................................................................................................... 296
export_database........................................................................................ 297
mcd bin | scripts | conf .............................................................................. 299
mds_backup............................................................................................. 299
mds_restore ............................................................................................. 300
mds_user_expdate .................................................................................... 301
mdscmd................................................................................................... 301
mdsenv.................................................................................................... 315
mdsquerydb ............................................................................................. 315
mdsstart .................................................................................................. 317
mdsstat ................................................................................................... 317
mdsstop................................................................................................... 318
merge_plugin_tables ................................................................................. 318
migrate_assist .......................................................................................... 319
migrate_global_policies ............................................................................. 320
Table of Contents 11
12
Preface P
Preface
In This Chapter
13
Who Should Use This Guide
14
Summary of Contents
Summary of Contents
This guide describes the installation, configuration and management of Provider-1.
It contains the following chapters:
Chapter Description
Chapter 1, “Introduction” Chapter 1 covers the need for Provider-1, and
different elements and deployments of the
Provider-1 system.
Chapter 2, “Planning the Chapter 2 covers pre-installation considerations.
Provider-1 Environment”
Chapter 3, “Provisioning Chapter 3 covers installation of the Provider-1
Provider-1” system.
Chapter 4, “Customer Chapter 4 covers the initial configuration.
Management”
Chapter 5, “Global Policy Chapter 5 covers setting up Global Policies for
Management” Customers.
Chapter 6, “Working in the Chapter 6 covers administration on the Customer
Customer’s Network” level.
Chapter 7, “VPN in Chapter 7 covers logging and tracking.
Provider-1”
Chapter 8, “High Availability” Chapter 8 covers setting up Virtual Private
Networks.
Chapter 9, “Logging in Chapter 9 covers monitoring the status of the
Provider-1” Provider-1 system.
Chapter 10, “Monitoring in Chapter 10 covers the different types High
Provider-1” Availability available for Provider-1.
Chapter 11, “Architecture Chapter 11 covers the file and directory
and Processes” structure of the Provider-1 system.
Chapter 12, “Commands and Chapter 12 covers useful command line utilities.
Utilities”
Preface 15
Related Documentation
Related Documentation
The current release includes the following documentation
Title Description
Internet Security Contains installation and upgrade procedures for all
Installation and Upgrade products and components included in the Internet
Guide Security Suite. This suite includes Check Point
Security Gateway, Security Management, all
SmartConsole client applications and much more.
High-End Installation and Contains an overview of the High-End Security
Upgrade Guide suite, including Provider-1 and VSX. Explains all
upgrade paths to the current version.
Security Management Explains Security Management solutions. This guide
Administration Guide provides solutions for control over configuring,
managing, and monitoring security deployments at
the perimeter, inside the network, at all user
endpoints.
Firewall Administration Describes how to control and secure network access
Guide and VoIP traffic; how to use integrated web security
capabilities; and how to optimize Application
Intelligence with capabilities such as Content
Vectoring Protocol (CVP) applications, URL Filtering
(UFP) applications.
IPS Administration Guide Describes how to use IPS to protect against attacks.
VPN Administration Guide This guide describes the basic components of a
VPN and provides the background for the
technology that comprises the VPN infrastructure.
16
Related Documentation
Title Description
Eventia Reporter Explains how to monitor and audit traffic, and
Administration Guide generate detailed or summarized reports in the
format of your choice (list, vertical bar, pie chart
etc.) for all events logged by Check Point Security
Gateways, SecureClient and IPS.
SecurePlatform Explains how to install and configure
SecurePlatform Pro SecurePlatform. This guide will also teach you how
Administration Guide to manage your SecurePlatform machine and
explains Dynamic Routing (Unicast and Multicast)
protocols.
Provider-1 Administration Explains the Provider-1 security management
Guide solution. This guide provides details about a
three-tier, multi-policy management architecture
and a host of Network Operating Center oriented
features that automate time-consuming repetitive
tasks common in Network Operating Center
environments.
Preface 17
More Information
More Information
• For additional technical information about Check Point products, consult
Check Point’s SecureKnowledge at http://support.checkpoint.com.
• To view the latest version of this document in the Check Point User Center, go
to: http://support.checkpoint.com.
18
Feedback
Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please
help us by sending your comments to:
[email protected]
Preface 19
Feedback
20
Chapter 1
Introduction
In This Chapter
21
The Need for Provider-1
Secured IT systems are a basic need for modern business environments, and large
deployments face unique security challenges. A large scale enterprise must handle
the challenges of disparate yet interconnected systems. The large scale enterprise
often has corporate security policies that must be tailored to local branch needs,
balanced with vital requirement for corporate-wide access, perhaps between
branches in different countries.
Businesses with a large user base often need to monitor and control access to
confidential internal sites, and to monitor communication failures. Administrators
must be alerted to external attacks, not only on a company-wide basis, but also
more selectively on a department by department, branch by branch basis.
Companies with many branches must face security and access challenges that
small scale businesses do not. For example, an international airline needs to
provide access of varying levels to ticket agents, managers, airline staff, and
customers, through the Internet, intranets both local and international, and through
remote dial-up; all the while preventing unauthorized access to confidential
financial data.
Differentiating between levels of access permissions is critical not only for securing
user transactions, but also for monitoring for attacks, abuse and load management.
Task specialization amongst administrators must also be supported so that security
can be centralized.
Service providers such as Data Centers and Managed Service Providers (MSPs)
need to securely manage large-scale systems with many different customers and
access locations. An MSP must potentially handle separate customer systems with
many different LANs, each with its own security policy needs. The MSP must be
able to confidentially address the security and management needs for each
customer, each with their own system topology and system products. One policy is
not sufficient for the needs of so many different types of customers.
A Data Center provides data storage services to customers and must handle access
and storage security for many different customers, whose requirements for private
and secure access to their data are of critical importance.
22
The Need for Provider-1
We will examine a few basic scenarios: the MSP, the Data Center, and the large
scale enterprise.
Chapter 1 Introduction 23
The Need for Provider-1
24
The Need for Provider-1
Data Centers
The data service provider is a type of service center, a company that provides
computer data storage and related services, such as backup and archiving, for other
companies. For example, let’s examine the network of a fictitious Data Center:
Figure 1-2 Example of a Data Center
Similar to the MSP, the Data Center manages its own environment, whereas
individual customer administrators and customers cannot have access to other
customers' environments.
Large Enterprises
Businesses that expand through lateral and horizontal integration, such as
conglomerates or holding companies, face security policy challenges due to the
diverse nature of their subsidiaries’ businesses. In these complex environments,
security managers need the right tools to manage multiple policies efficiently.
Central management of security policy changes, which are enforced by the different
Security Gateways throughout the system, ensure that the entire corporate IT
architecture is adequately protected.
Let’s look at a sample deployment for an automotive manufacturing concern:
Figure 1-3 Conglomerate’s network
Chapter 1 Introduction 25
The Need for Provider-1
26
The Need for Provider-1
For Big Bank, different types of permissions and access management are required
to protect internal networks and separate them from external networks accessible to
users.
Figure 1-4 Big Bank’s network
Chapter 1 Introduction 27
The Check Point Solution
28
The Check Point Solution
Basic Elements
In This Section
The Provider-1 system is designed to manage many widely distributed gateways, for
networks that may belong to different customers, different companies, or different
corporate branches.
The primary element of a security system is the gateway, the Security Gateway.
Administrators decide how this Security Gateway is to be managed and apply a
security policy, with rules that determine how communication is handled by the
Security Gateway.
A Customer Management Add-On (CMA) is a virtual customer management. The
CMA manages customer Security Gateways. Through the CMA, an administrator
centrally creates and deploys policies on customer gateways.
Note - You may have noticed that the term Customer is capitalized in the preceding
sentence. As a convention in this guide, the term Customer will appear as capitalized
whenever referring to elements of the Provider-1 system.
The Multi-Domain Server (MDS) houses the CMAs, as well as all of the Provider-1
system information. It contains the details of the Provider-1 network, its
administrators, and high level customer management information.
The MDS can hold a substantial amount of customer network and policy detail on
a single server, providing a powerful, centralized management node. Multiple MDSs
can be linked in the Provider-1 system to manage thousands of policies in a single
environment, and to provide fail-over capabilities.
The CMA is the functional equivalent of a standalone Security Management server.
But unlike the Security Management server, the CMA is a manager, located on the
MDS. Although many CMAs can be stored on the same MDS, CMAs are completely
Chapter 1 Introduction 29
The Check Point Solution
isolated from each other, providing absolute customer privacy. In a large enterprise,
each CMA may manage branch or department Security Gateways, depending on the
security resolution required by the corporate security policy.
CMAs are located inside the Provider-1 environment. The Security Gateway can be
located in a separate network, in a separate city or country.
Figure 1-5 Distributed Management Configuration
30
The Check Point Solution
Each CMA can manage more than one Security Gateway. TravelAgency has its own
private CMA, that manages both of TravelAgency’s Security Gateways. Typing.Com
also has its own private CMA, which manages its Security Gateway. TravelAgency
cannot access information about the Typing.Com environment, nor about the
service provider’s environment.
Notice that Provider also has a CMA to manage its own Security Gateway.
Figure 1-6 How CMAs manage Security Gateways
Chapter 1 Introduction 31
The Check Point Solution
own CMA. The Paris and Nice branches are both managed by another CMA.
Although the MDS and the gateways themselves are in different cities and
countries, management is centralized and handled by the IT department in the
London office.
Figure 1-7 Enterprise deployment
Multi-Domain GUI
Provider-1 administrators use the Multi-Domain GUI (MDG) as the primary interface
to handle customer security management. The MDG has many “views” tailored to
display information relevant to specific tasks.
32
The Check Point Solution
The MDG manages the entire Provider-1 environment, and provides an easy way to
incorporate customers and their networks into the Provider-1 system. It is used to
update Customer and gateway information, and to assign and navigate between
global policies. Using the MDG, administrators can provision and monitor security
through a single console, and oversee rules, policies, logs, statuses, and alerts for
hundreds of customers.
Chapter 1 Introduction 33
The Check Point Solution
Leased lines to the POP service center provide secured Internet access for
customers. All Provider-1 components, such as the MDS and the MDG (the
administrative GUI), are located on the service provider’s premises. Customers
dial-in to receive services, and connect to the Internet via the POP center. Although
their usage is monitored and protected, they do not have to be involved in any of
the security management.
All aspects of security and access are completely maintained by the MSP, using
CMAs on the MDS to manage the gateway in the POP center. The CMAs in the MDS
do this by managing the security policies for the Security Gateways that protect
customer access.
Figure 1-8 A simple model of a POP configuration
For some MSPs, using VSX technology to provide customer Security Gateways is a
cost-saving solution. When setting up a POP site using VSX, individual security
domains can be aggregated on a single platform, substantially minimizing hardware
investment. Provider-1 has special features which enable CMAs to manage the
security policies for the VSX virtual gateways, protecting customer sites from
intrusion. For more information, see the VSX Administration Guide.
34
The Check Point Solution
Chapter 1 Introduction 35
The Check Point Solution
Housing too many CMAs on a single Container can lead to performance issues. See
“Hardware Requirements and Recommendations” on page 75 to calculate the
proper balance. Using Containers, multiple MDSs can cascade to manage
thousands of CMAs in a single environment.
Multiple administrators can simultaneously access the system via the MDG by
connecting to the same, or different, MDS Managers. Administrators can access the
entire Provider-1 system from each of the Managers, as all system information is
stored on each Manager.
Let’s look at a Provider-1 environment for a service provider that handles numerous
small customers, and several large-scale customers.
Figure 1-10 Multiple MDSs in the service provider environment
This service provider needs a robust system with many Containers to handle the
large amount of information stored for all of its Customers. There are two MDS
Managers in this system. One is housed as a standalone Manager, whereas the
other is housed with a Container on the same server. There are also two other
Containers, which are managed by the MDS Managers. Another computer runs the
MDG, the Provider-1 graphical management tool. Administrators can login to any
Manager, and see the entire system via the MDG.
36
The Check Point Solution
MDS Synchronization
Manager synchronization (for Provider-1 system information) is performed at the
MDS level. MDS Managers are “mirrors” of each other. If there is more than one
MDS Manager in the system, each Manager will contain all the information
regarding the Provider-1 management system such as administrator hierarchy,
Customer and network information.
MDS Managers contain three databases: MDS, Global Policy and ICA. The MDS
Manager’s MDS database (general information) is synchronized whenever changes
are made. The Global Policy database is synchronized either at configurable
intervals and/or events, or it is synchronized manually. Interconnected, mutually
redundant MDS Managers form a robust management system providing non-stop
access, without the need to deploy dedicated hardware or software redundancy.
MDG management activities can be performed using any of the MDS Managers.
MDS Manager synchronization does not mirror CMA-specific data. For example,
internal domains and Customer level policy rules are known only at the CMA level,
so they are not synced by MDS Managers. To enable CMA failover, you must set up
CMA High Availability. CMA High Availability synchronization is separate from MDS
synchronization.
Figure 1-11 MDS Synchronization in an Enterprise network
Chapter 1 Introduction 37
The Check Point Solution
Log Managers
Multi-Domain Log Module
The Multi-Domain Log Module (MLM) is an optional server that is dedicated to log
collection, separating critical management activities from logging traffic. It thereby
provides the infrastructure for further data-mining activities and improves
performance for large deployments by offloading log processing activities from the
MDS. It is recommended for systems with many CMAs or a heavy logging load.
Redundant log infrastructures can be created by designating an MLM as a primary
log server and the MDS as a backup. In the event that the MLM cannot be reached,
logs are redirected to the MDS. It is possible to have multiple MLMs in the
Provider-1 network. The MLM is controlled by the MDG, and maintains Customer
Log Modules (CLMs), with a separate log repository for each Customer.
Let’s look at Big Bank. Big Bank is expanding and has opened a number of new
branches. It has decided to track activity in its system to satisfy security
requirements. It has created an environment with three MDS’s. The system
administrators have set up an MDS Manager/Container with a second Container to
manage Security Gateways throughout the different bank branches. They have also
set up an MLM to track activity.
Figure 1-12 A simple system with an internal MLM
38
The Check Point Solution
Chapter 1 Introduction 39
The Check Point Solution
High Availability
CMA High Availability
CMA High Availability is implemented by using two or more CMAs to manage one
Customer network, one in Active mode, the others in Standby. Implementing
management High Availability guarantees fail-over capability. At any given time,
only one CMA is Active, while the Standby CMAs are synchronized with the Active
CMA.
Data synchronization between the CMAs greatly improves fault tolerance and
enables the administrator to seamlessly activate a Standby CMA when required.
With High Availability, should a CMA fail for any reason, a Standby CMA can
continue operation without service interruption.
The High Availability scheme requires one Primary CMA and at least one Secondary
CMA, which are housed separately, on different MDS computers. Administrators
make security policy changes through the Active CMA. If policy changes are made
with the Active CMA, the Standby CMAs can be set up to synchronize automatically
to reflect these changes.
These CMAs must be synchronized in order to maintain the same information. It is
possible to configure the High Availability feature to synchronize automatically for
each policy installation operation, on each policy save operation and on any other
scheduled event. If the Active CMA’s data has not been synchronized with the
Standby CMAs, you can still use the Standby CMAs, which are updated until the
moment of the last synchronization.
40
The Check Point Solution
Chapter 1 Introduction 41
The Management Model
Administrators
It is important, for security purposes, that there be different types of administrative
authority. Administrators with authority over the entire system are needed in order
to manage the entire Provider-1 system. But there also must be a level of
administration authority which only applies to the customer environment and not to
the Provider-1 system.
It is inappropriate for an administrator who remotely manages a Security Gateway
in a particular customer network to have authority over or access to the entire
Provider-1 system. This could be a serious security breach, as a customer’s internal
staff would have access to other customer networks. For example, it would not be
appropriate for an MSP to allow an administrator of one of its customers to have
the authority to shut down an MDS Manager or delete all the superusers from the
system.
In the Provider-1 environment, four types of administrators have been designated to
handle different levels of responsibility. While there is a need for administrators
with the authority to create and manage the entire Provider-1 environment, not
every administrator in the system has this level of complete control. The following
table shows permissions by type of administrator.
42
The Management Model
Administrator Permissions
Provider-1 Provider-1 Superusers manage the entire Provider-1 system and
Superuser can oversee all the networks of all Customers in the Provider-1
system. They can use all MDG tools relating to Customer and MDS
management, and can manage all other administrators. Provider-1
Superusers have sole permission to manage and change the MDSs.
They can:
• Add, edit or delete MDSs, including manager servers,
containers, High-Availability servers, logging servers, etc.
• Enable or disable a computer’s permission to access the
MDG.
Customer Customer Superusers can manage the networks of all Customers in
Superuser the system, using the MDG and SmartConsole tools. They can use
all MDG tools relating to Customer management; create, edit and
delete Customers; and see all the network objects for all of the
Customers. Customer Superusers can manage Customer Managers
and None Administrators. However, they cannot manage or change
the MDS environment or manage Provider-1 Superusers.
Chapter 1 Introduction 43
The Management Model
Management Tools
In This Section
44
The Management Model
Multi-Domain GUI
Administrators use the Multi-Domain GUI (MDG), the interface through which
Provider-1 administrators handle Customer security management. The general view
is shown below:
Figure 1-14 MDG - The General View
Administrators use the MDG to manage the Provider-1 environment and monitor
Customers’ networks. This tool provides an easy way to add Customers and their
networks to the Provider-1 management system. Administrators can create, update,
change and delete Customers, CMAs information; assign licenses; view and assign
policy policies, which are stored centrally on the MDS. Through a single console,
administrators can provision and monitor security, by assigning and overseeing
rules, policies and logging setups, as well as monitoring logs, statuses, and alerts
for hundreds of customers.
The MDG also is used to create administrators of all four types and assign their
permissions. The MDG can even be used to designate which other computers can
be entrusted to run the MDG. Administrators can create a logging setup by adding
an MLM (Log Containers) to the Provider-1 management system, and designating a
Chapter 1 Introduction 45
The Management Model
46
The Management Model
The service provider’s Provider-1 Superuser administrator, Rosa, uses the installation
CD and command line utilities to configure and set up the entire Provider-1
environment. Then, she uses the MDG and the Global SmartDashboard to manage
the global policies. As a Provider-1 Superuser, Rosa is responsible for everything to
do with the physical layout of the service provider’s environment, and managing all
the highest level security authorizations.
Figure 1-15 Rosa sets up the Provider-1 environment
Rosa knows that her Provider-1 environment will run a large system, with hundreds
of Customers, and it will not be possible for one administrator to handle all the
activity. It is time to start considering staffing issues. Customer Superusers can
handle all Customer specific management activities. They can create/delete/edit
Customers and create edit or delete CMAs. Rosa authorizes Martin to be a Customer
Superuser. Now Martin can add customers to the system.
Figure 1-16 Martin adds customers to the Provider-1 environment
Chapter 1 Introduction 47
The Management Model
Martin starts adding customers into the system. Each customer needs a security
policy to monitor the customer network’s gateway, the Security Gateway. The work
is really piling up! Now that the customer base is expanding, it is time for Martin,
as a Customer Superuser, to add more customer administrators.
Martin authorizes Tony to be a Customer Manager for the customers Accountant and
Pharmacy2Go. Customer Managers can handle many Customer specific management
activities. They can add, edit or delete their Customer’s CMAs. They can start or
stop their Customer's CMAs and CLMs. They can also import their Customer’s CMAs
to another server, and create customer security rules. It’s time for Tony to create
security policies for Pharmacy2Go and for Accountant.
Figure 1-17 Tony creates security rules for customers
The company Pharmacy2Go has a resident IT manager, Sandrine, who handles local
network maintenance and security. Tony works with Sandrine to ensure that
Pharmacy2Go’s network is running securely and safely.
As a Customer Manager, Tony can authorize None administrators, who are outside of
the Provider-1 management environment, but may administer customer Security
Gateways themselves. Tony adds Sandrine to the list of administrators as a None
administrator, so that she can use SmartConsole applications to monitor and track
activity in Pharmacy2Go’s network.
48
The Management Model
Chapter 1 Introduction 49
The Provider-1 Trust Model
50
The Provider-1 Trust Model
Chapter 1 Introduction 51
The Provider-1 Trust Model
52
The Provider-1 Trust Model
SIC is used for remote (not on the same host) communication, whereas SIC local is
used for a host’s internal communication. SIC local communication does not make
use of certificates.
The ICA creates certificates for all other MDSs, and for Provider-1 administrators.
Administrators also need to establish trusted communication with the MDSs.
Chapter 1 Introduction 53
The Provider-1 Trust Model
For management purposes, administrators use the certificates provided by the MDS
ICA to establish trusted communication to manage the CMAs. This is because every
CMA also trusts the MDS ICA for administrator management activities using a
communication medium, CPMI. This means that administrators do not need to have
certificates issued to them for every CMA that they communicate with.
Figure 1-22 SIC between administrators and a customer CMA
54
The Provider-1 Trust Model
Chapter 1 Introduction 55
The Provider-1 Trust Model
1. Generate the file sdconf.rec on the ACE/Server, and configure the user to
use Tokencode only.
2. Copy sdconf.rec to /var/ace/ on each MDS.
3. Edit the file /etc/services and add the following lines:
• securid 5500/udp
• securidprop 5510/tcp
4. Reboot the MDS machines.
Alternatively, instructions 3., 4. and 5. can be performed from the command line
interface (CLI), with the following syntax:
mdscmd setadminauth <administrator name>
<undefined | os | fw1 | securid | tacacs | radius> [authentication
server name]
[-m mds -u user -p password]
56
The Provider-1 Trust Model
Chapter 1 Introduction 57
The Provider-1 Trust Model
CPMI Protocol
The CPMI (Check Point Management Interface) protocol is a generic open protocol
that allows third party vendors to interoperate with Check Point management
products. The client side of CPMI is included in the OPSEC SDK documentation,
so third-party products can integrate with the CMAs. For more information on
CPMI, see the CPMI guide in the OPSEC SDK documentation.
58
Chapter 2
Planning the Provider-1
Environment
In This Chapter
This chapter deals with different aspects required in order to plan and prepare for
setting a first time deployment with Provider-1. In every first time setup there are
general questions that you need to ask yourself, such as
• What do you need to know about the basic components that need to be
installed?
• How should the basic components be deployed and in what order should they
be installed?
• What are the hardware requirements that need to be considered?
• What licenses need to be obtained in order to run the product?
59
• What are other additional requirements that may influence the performance,
strength or security of the environment?
In this chapter, we will deal with many of the questions that you need to consider
when planning your Provider-1 environment.
60
Asking yourself the right questions...
High Availability
If you are supporting many complex Customer networks, you may decide to
implement failover/ recovery capabilities:
• For CMA High Availability, you need at least two container MDSs. By creating two
or more containers, you then create two or more CMAs for each Customer.
These CMAs serve as Active and Standby Management servers for the customer
gateways.
• For MDS High Availability, where there are multiple entry points to the system,
you need at least two Manager MDSs in order ensure MDG access even when
one of the manager MDSs is not available.
62
Asking yourself the right questions...
Setting Up Administrators
Consider which computers administrators will manage the system, and the
administration hierarchy that you want to establish.
Licensing
Once you have determined what sort of server/computer configuration you need, you
will want to ensure that you have the appropriate licenses. For more information,
see “Licensing and Deployment” on page 77.
64
Consider the Following Scenario...
Most enterprise systems and MSPs require event logging and tracking.
Accountability requirements can lead to sizeable log maintenance. By default, logs
will be stored on the Customer’s CMA that manages the gateway which is
generating the logs in the Provider-1 management network. For most systems, in
terms of licensing, it is more cost-effective to dedicate an MLM server to store logs
rather than purchase extra Managers for this purpose. It is recommended that you
implement one or more dedicated log servers (MLMs), depending on the activity
tracking load in the system Provider-1 manages.
For more information about logging, see Chapter 9, “Logging in Provider-1”.
Requirement: GUI Clients & their Platforms
Finally, consider the platforms that will be used to run the GUI tools used to
manage the Provider-1 and Customer environments. The Provider-1 system is
monitored using the MDG and SmartConsole Client applications. GUI Clients
should be deployed either inside or outside of the Provider-1 network to enable
administrators to access the Provider-1 system. The MDG runs only on Windows
platforms but supports MDS’s and their CMAs on any supported platform.
Requirement: Routing & Communication
If GUI Clients are located outside of the Provider-1 network, communication
between these computers and the MDS Manager(s) must be allowed. If MDSs are in
different remote locations, and there is more than one Provider-1 network,
communication between the remote MDSs and the local MDSs must be allowed.
Also ensure appropriate routing to support communication between computers and
servers.
66
MDS Managers and Containers
In This Section
MDS Managers
Use the MDG to connect to the MDS Managers in order to monitor and control the
Provider-1 environment. If more than one MDS Manager is deployed:
• They can provide mutually redundant fail-over capabilities.
• They can be configured to synchronize global policy data either automatically or
manually.
MDS Containers
MDS Containers contain and manage Customer data such as the Customer’s
network objects’ database and security policies, This data is private (per Customer)
and therefore it is not shared. Consider the following:
• “MDS Containers and High Availability” on page 67
• “MDS Containers and Performance Issues” on page 68
different Container than the CMA (see Chapter 8, “High Availability”). The
Customer's Primary CMA should reside on one Container and each Secondary CMA
should reside on another.
68
MDS Managers and Containers
A Typical Scenario
Enterprises usually choose to put the Provider-1 management network in its own
segment, separated from the main enterprise network by a gateway.
Figure 2-3 Separate and Protect Network Segments
Provider-1 servers are often separated from support servers such as Radius, LDAP,
and anti-virus servers. This is not by any means a requirement.
70
Setting up the Provider-1 Environment
72
Setting up the Provider-1 Environment
74
Hardware Requirements and Recommendations
76
Licensing and Deployment
Considerations
Provider-1 Components Installed at the NOC
The following components are deployed at the Network Operation Center:
• Multi Domain GUIs (MDG)
• Multi Domain Servers (MDS), including Multi Customer Log Modules (MLM)
• Customer Management Add-on (CMA)
• Customer Log Module (CLM)
If many CMAs will be supported by the system, or if the CMA load increases, more
MDS Containers are needed, not Managers. CMAs are maintained only on
Containers. Licenses for MLMs (dedicated log servers) are inexpensive, so they are
a cost effective alternative to storing logs by default on Managers/Containers.
The MDS license is per IP, and is based on the following factors:
• The MDS type, whether Manager, Container, combined, or Log Manager (MLM).
• For Containers, the MDS license depends on the number of CMAs managed.
Provider-1’s licensing is geared to match its scalable architecture. Licenses are
matched to needs, and can be purchased to accommodate a growing Customer
base. Components are licensed according to the number of CMAs and Security
Gateways. New CMAs can be seamlessly integrated, by upgrading to a larger
license.
Each CMA requires its own CMA-level license. These are obtained per CMA’s IP
address. The exceptions to this are the VSX Bundle license (see “VSX Bundle
License” on page 80). Pro Add-ons for multiple CMAs are purchased in a bundled
product, called Pro Add-ons for MDS. The way to generate the CMA Pro Add-on
licenses in UserCenter is as follows: Perform the “Activate License” operation on
the bundled product, using the IP address of the first CMA, to generate the license
for this CMA. For each additional CMA, perform the "Change IP" operation on the
bundled product, and change to the IP address of this CMA.
Install the generated licenses at the respective CMA level.
The MLM license is comprehensive so there is no need for separate licenses per
CLM. A single license installed on the MLM applies to both the MLM and the CLMs
it maintains. CLMs are per Customer and can receive logs from all of the
Customer’s gateways, regardless of their number. The number of gateways that
report to the same MLM is unlimited.
The MDG does not require a license.
78
Licensing and Deployment
Managing Licenses
Provider-1 uses SmartUpdate to incorporate newer versions and licenses. Required
components and licenses can easily be upgraded using the SmartUpdate view in the
MDG.
Licenses are additive. For example, an MDS Container license for 50 CMAs and an
MDS Container license for 25 CMAs add up to 75 hosted CMAs.
SiteManager-1 Licenses
The SiteManager-1 MDS is a low cost MDS, whose CMAs are limited to managing
specific gateways. SiteManager-1 supports two license schemes:
1. Backwards compatibility license scheme. In this license scheme, each
SiteManager-1 CMA manages only one gateway. The license is installed only at
the MDS level: no local CMA licenses are required.
2. Small Office gateway for 250 protected nodes. In this license scheme, each
CMA can manage only Small Office gateways or gateways protecting 250 hosts.
CMAs are licensed according to the number of gateways they manage. There are
four levels of CMA licenses to enable scalable, cost effective deployment:
• CMA-1 — suitable for a Customer with one gateway.
• CMA-2 — suitable for a Customer with up to two gateways.
• CMA-4 — suitable for a Customer with up to four gateways.
• CMA-U — suitable for a Customer with an unlimited number of gateways.
You do not have to install additional software when you create a CMA in the
Provider-1 network. To add a new CMA, you only need add the CMA’s license, which
is ordered per CMA IP. The number of QoS gateways managed by a CMA is
unlimited and requires no special license.
The CMA manages any of the following:
• Security Gateways on a variety of platforms (Linux, Nokia, AIX, HP, NT, Win2K)
• UTM-1 Edge Gateways
• Bay Networks devices
Gateway Licenses
A Customer’s gateways require licenses. Gateways are licensed according to the
number of nodes at a site. A node is any computing device with an IP address
connected to the protected network.
Provider-1 also supports Quality of Service (QoS) gateways.
80
Licensing and Deployment
CMAs without a CMA-level license use the bundle license. If a CMA-level license is
installed on a specific CMA to allow the management of a regular gateway, then
that CMA stops using the bundle license, and the VSs located on it are not counted
off the bundle license. When a CMA is managing a non-VSX gateway, both a
CMA-level license and container license on the MDS is required.
License Violations
When a license violation is detected, syslog messages are sent, pop-up alerts in the
MDG, and audit entries in the SmartView Tracker stating the nature of the violation,
are generated. In addition, an indication about the license violation appears on the
status bar of the MDG.
While the MDS is in violation, new CMAs, VSXs, VSs or VRs cannot be added to the
MDS.
82
Miscellaneous Issues
Miscellaneous Issues
In This Section
Ensure that interfaces are routable. CMAs and CMA-HA must be able to
communicate with their Customer’s gateways, and CLMs to their Customer’s
gateways.
84
Miscellaneous Issues
Enabling OPSEC
Provider-1 supports OPSEC APIs on the following levels:
• Gateway level — Gateways managed by Provider-1 support all OPSEC APIs
(such as CVP, UFP, SAM etc.)
• CMA level — CMAs support all OPSEC Management APIs. This includes CPMI,
ELA, LEA and SAM.
• CLM level— CLMs (hosted on MLMs) and stand alone Log servers support all
logging OPSEC APIs. This includes ELA and LEA.
86
Chapter 3
Provisioning Provider-1
In This Chapter
Overview page 88
Provisioning Process Overview page 89
Setting Up Your Network Topology page 90
Creating a Primary MDS Manager page 90
Using the MDG for the First Time page 91
Defining a Security Policy for the Gateway page 101
Multiple MDS Deployments page 95
Protecting the Provider-1 Environment page 100
87
Overview
Overview
A successful deployment of Provider-1 depends on careful planning before you
begin to install the product. There are many different questions that you should be
able to answer in order to set up a system that can accomplish the management
tasks that you want it to perform. Refer to Chapter 2, “Planning the Provider-1
Environment”, to help you understand your deployment needs and map out a layout
for your network. Once you have planned your network, it is time to set it up. In this
chapter we will go through the steps to set up and configure your management
network.
Bear in mind that a good system setup needs to be robust, flexible and scalable, so
that it can expand as your business grows. Your deployment should enable you to
add further MDSs using the MDG, or command line utilities. You should also be
able to add administrators, customers, and GUI Clients (computers which are
allowed to run the MDG) at any given time.
88
Provisioning Process Overview
90
Using the MDG for the First Time
1. In the MDG, Select the General View and the MDS Contents page.
92
Using the MDG for the First Time
d. Click Calculate to display your Validation Code. Compare this value with the
validation code that you received in your email. If validation fails, contact
the Check Point licensing center, providing them with both the validation
code contained in the email and the one displayed in this window.
94
Multiple MDS Deployments
In This Section
Synchronizing Clocks
All MDS system clocks must be synchronized to the second to ensure proper
operation. Before creating a new MDS, you must first synchronize the new
computer clock with other MDS platforms in the system.
You can synchronize MDS clocks using any synchronization utility. It is
recommended that all the MDS clocks be synchronized automatically at least once
a day do compensate for clock drift.
5. In the Multi Domain Server Configuration window, enter the following information:
• MDS Name: MDS computer name
• MDS IP Address: MDS Management IP address
• CMA IP address Range: Range of valid IP addresses for CMAs
• Status Checking Interval: Time in seconds between MDS status updates
6. Click Communication to establish SIC trust. Enter the Activation Key that you
specified while installing the MDS or MLM computer.
96
Multiple MDS Deployments
a. Click Initialize. If SIC trust succeeds, the Trust State field displays Trust
established.
98
Multiple MDS Deployments
d. Enter the Activation Key that you specified with the mdsconfig utility.
e. Click Initialize. If SIC trust succeeds, the Trust State field displays Trust
established.
Deleting an MDS
If you want to delete the MDS, do so only if you are certain that you no longer need
it. If you delete an MDS in error, you will have to reconfigure it from scratch
(including its CMAs and gateways).
To delete an MDS:
1. In the MDG General view MDS Contents mode, right click an MDS and select
Delete Multi Domain Server.
2. Confirm the deletion and click OK.
100
Protecting the Provider-1 Environment
102
Protecting the Provider-1 Environment
3. Using the implied rules as a template, create rules for each customer
permitting services from the source CMAs/CLMs to the Customer gateways, and
from Customer gateways to CMAs/CLMs.
4. Examine your network deployment and decide which components should be
used in rules in order to enable communications, perform status collections and
push/pull certificates. For instance, if the Provider-1 network is distributed,
with different MDSs in remote locations and Security Gateways protecting a
remote Provider-1 network, rules must be defined to enable the MDSs to
communicate with one another. In such a rule the MDSs need to appear in both
the Source and Destination column of the rule. Use Table 3-1 to examine how
to create rules that allows connections between specified components.
104
Protecting the Provider-1 Environment
106
Chapter 4
Customer Management
In This Chapter
107
Overview
Overview
Once the Provider-1 Superuser has set up the MDSs and the Provider-1 system has
been protected with a Security Gateway, it is time to start designating networking
technicians, administrators and resources to manage customers/branches and their
network environments. Customers can now be introduced into the framework. Here
are some considerations that it can be useful to address when creating a customer:
• What type of services does the customer/branch require? Will customer
administrators manage local network security or will security be handled
completely by the Provider-1 environment? Will the Security Gateways be at the
customer location or in a POP center in the Provider-1 environment?
• How complex is the customer’s network environment? How many gateways,
routers, computers, hosts, servers and users?
• What security does the customer require? What level of activity tracking?
• Does the customer require fail-over security management capabilities?
The first step is to create a new “Customer.” The Customer is an entity that is used
to represent a unique set of network objects, policies, logs and other definitions in
the Provider-1 system. Usually, the “Customer” object belongs to either:
• an actual customer, or
• an enterprise branch.
This Customer must be provided with a management server (a CMA), for the
Customer’s physical gateways, routers, and servers. Provider-1 administrators may
find it useful to have contact information, a phone number, email, and host
address, so as to establish contact with Customer staff that know their system.
Building a customer setup allows the administrator assigned to the customer to
bridge the gap between the virtual representation of “the Customer” in the
Provider-1 system, and the actual customer/branch network requiring security and
services.
The Customer needs a CMA, created to actually manage the customer’s Security
Gateways and networks. The CMA is put on an MDS Container, that should be
chosen with an eye towards performance considerations. A customer may have a
very complex network with many computers and users. It is better to create this
Customer on an MDS Container without a heavy load of CMAs and policies.
Administrators must be selected and assigned to handle “Customer” maintenance
within the Provider-1 environment; and to manage activities within the customer’s
internal network.
108
Overview
The internal network must be mapped into SmartDashboard, with security rules
created for it. The network mapping in SmartDashboard must be updated as
necessary to address changes in network structure. These customer network
activities are handled with applications managing the customer network
environment, and are addressed separately in Chapter 6, “Working in the
Customer’s Network”, and in further detail in the Security Management
Administration Guide.
If fail-over management abilities are critical to the customer, one or more
secondary CMAs must be created. For further details about CMA High Availability,
see Chapter 8, “High Availability”.
Customer can be assigned CLMs, servers that are dedicated to collecting a
customer's logs. For more information about customer activity logging, see Chapter
9, “Logging in Provider-1”.
When a Provider-1 environment has many customers, it is wise to create security
policy templates (Global Policies). Global policies are created using the Global
SmartDashboard; this is described in more detail in Chapter 5, “Global Policy
Management”.
110
Creating Customers: A Sample Deployment
Rajan inputs details about GasCompany: name, location, contact details. Carmen
Sanchez is the Customer’s IT manager on-site who is responsible for GasCompany’s
network in Texas, so Rajan inputs Carmen’s contact details. Sally, the administrator
who works just down the hall from Rajan, will want to have them handy. Rajan, as
a Provider-1 Superuser, is automatically an administrator for GasCompany. He now
adds Sally as an administrator. Now Rajan must choose which type of
authorizations to give to Sally.
112
Creating Customers: A Sample Deployment
Assigning a Computer
Using the comprehensive Add Customer Wizard, Rajan assigns permission to Sally
to use her computer to launch SmartConsole applications and the MDG, in order to
manage GasCompany’s network. Rajan does not want every computer to be able to
launch applications for this customer: it would be a security breach.
Figure 4-3 Sally is now a Customer Manager
Assigning a CMA
Rajan names the first CMA GasCompany_CMA. The CMA is a virtual Security
Management server. Rajan chooses an MDS Manager/Container in the service
provider site to “house” the CMA. Even if there were many other customers,
GasCompany does not have a very complex environment, so Rajan is not worried
about putting the Customer on any MDS in the system. Of course, if the system
was full of Customers with major accounts and thousands of supported gateways,
Rajan would think twice about which MDS to use!
To provide it with a virtual IP, which is mapped to the MDS interface, Rajan has
already entered a range of virtual IP addresses for the MDS interface in the MDS
configuration window. The Provider-1 system automatically maps this range to the
MDS interface. Now, using the Add Customer Wizard, Rajan creates the CMA and
uses the Get Automatic IP Address option. The Provider-1 system assigns the first
available virtual IP address to GasCompany_CMA.
The CMA license is already on-hand: Rajan ordered it in advance. Using the Add
Customer Wizard, Rajan imports licensing data and creates the CMA.
GasCompany wants fail-over security, so Rajan uses the Add Customer Wizard to
create a mirror (secondary) CMA named GasCompany_CMA_HA on a different MDS
Container. (The mirror CMA must be created on an MDS other than the one hosting
the primary CMA).
The CMAs are now up and running; they have been “started” by the system.
114
Creating Customers: A Sample Deployment
Rajan has completed the basic steps involved in introducing a customer into the
Provider-1 setup.
Having created a customer’s CMA, it is time to establish a connection between the
Active CMA and the Security Gateways it will manage.
There are two processes involved. Sally, the Customer Manager will launch
SmartDashboard from the CMA and create a gateway object with the IP address of
the gateway. Additionally, the gateway managing the Provider-1 management
network must allow communication between the CMA and the customer’s gateways.
This is described further in Chapter 6, “Working in the Customer’s Network”.
Then Rajan, the Provider-1 Superuser, creates appropriate security rules for the
Provider-1 management network gateway to allow communication between the CMA
and the customer’s gateways. This is described briefly in Chapter 3, “Provisioning
Provider-1”.
objects for the gateways, routers, hosts, users, user groups, servers, and other
network components, using SmartDashboard. These activities, which relate
exclusively to a specific customer’s network, are addressed in Chapter 6, “Working
in the Customer’s Network”, and in further detail in the Security Management
Administration Guide.
Communication must also be permitted between the Provider-1 network and the
customer’s gateways. Rajan inserts appropriate rules permitting the CMAs to
communicate from the Provider-1 network with the customer’s Security Gateways.
Once Sally defines gateways and links them to the GasCompany_CMAs, these
gateways are displayed in the MDG. However, information about different individual
customer networks is isolated securely and privately from other customer networks.
The customer network’s details are stored in CMA databases which are isolated
from each other. Only a CMA’s secondary (High Availability) CMA will share access
to the CMA’s customer network information.
116
Creating Customers: A Sample Deployment
118
Setup Considerations
Setup Considerations
IP Allocation for CMAs
Each CMA must have a routable IP address. Every time a CMA is started, a Virtual
network interface for CMA's virtual IP is created. By default, the virtual network
interface will be created on the MDS primary network interface.
During MDS configuration, you may specify a range of virtual addresses for a
Container interface. Then, as you create each CMA, the Provider-1 system can
automatically fetch the next available virtual IP and assign it to the CMA.
Alternatively, rather than fetch from a range, you can designate a particular virtual
IP to a CMA. Keep the CMAs IPs in mind for routing purposes, as you will need to
ensure that your route tables allow communication between CMAs and their
customer gateways.
You do not need to create any of the actual virtual IP interfaces on the server. If
you would like to host the CMA’s IP address on a different network interface, you
can do so by stopping the CMA, removing its virtual IP address definition and
modifying the CMA file vip_index.conf.
Assigning Groups
In some cases, the same operation (such as assigning an administrator or policy)
must be performed to many customers with similar security policy needs. By
default, each time you select customers to apply an operation, you must go through
the entire customers list and check them one by one.
To avoid this time-consuming process and facilitate customer selection, it is
recommended that you use customer selection groups, which easily identify
customers that can be handled simultaneously. Provider-1 has two types of
selection groups: customer groups and administrator groups. As opposed to groups
created through SmartDashboard, these selection groups are not network objects.
Their sole purpose is to facilitate customer or administrator selection.
For details on configuring groups, see “Configuration” on page 126.
Management Plug-ins
In This Section
120
Management Plug-ins
Installing Plug-ins
Management Plug-ins are installed on the MDS from the command line. See the
accompanying documentation for the Plug-in for specific installation instructions.
After installing a Plug-in to each relevant MDS, the MDS(s) must then be restarted
using the commands mdsstop -m/mdsstart -m. At this point the Plug-ins are
available for activation on Customers.
Activating Plug-ins
Plug-ins are activated per Customer from the MDG in the following ways:
• From the Customer Configuration window, when creating a new or modifying an
existing Customer (see Figure 4-8)
Figure 4-7 Plug-ins tab in Customer Configuration window
When a Plug-in is activated for a Customer, if one or more of the Customer’s CMAs
are running, the MDS restarts those CMAs.
If a Plug-in is activated for a Customer with a single CMA, and a second CMA is
added later, the Plug-in will be activated automatically on the new CMA.
In the rare event where a Plug-in is activated for a Customer and it succeeds on
one CMA and not on another, synchronization between the CMAs will fail. In this
condition, the MDG displays an error message with a recommendation of what
needs to be done. The MDG also displays the icon Needs Attention in the
Management Plug-ins View. In many cases this situation can be resolved by
selecting Reactivate All Plug-ins from the Plug-in menu.
Plug-ins can also be deactivated. Once a Plug-in has been activated for a
Customer, and objects have been created, the Plug-in cannot be deactivated until
those objects are removed.
122
Management Plug-ins
Plug-in Status
Once a Plug-in is installed on the MDS, it appears in the Management Plug-ins View
of the MDG (see Figure 4-7).
This View indicates whether a Plug-in is Activated or Not Activated per Customer,
and displays an alert notification of Needs Attention for any Plug-in that has not
been activated properly. For a Plug-in to appear in this View, it must be installed on
at least one MDS.
Plug-in Mismatches
A Plug-in Mismatch occurs in a Provider-1 HA environment under the following
conditions:
• The Plug-in is not installed on every MDS
• The Plug-in is installed on every MDS, but not every MDS was restarted
afterwards.
Plug-in Mismatches are indicated in two places on the MDG. The General View -
MDS Contents mode will display a Plug-in Mismatch on the relevant MDS under the
Status column.
The Plug-ins View will display the MDS Plug-ins Mismatches pane, where the install
status of each Plug-in on each MDS is reported.
Figure 4-10 MDS Plug-in Mismatches pane
Note - The MDS Plug-in Mismatches pane appears only if a Plug-in mismatch exists.
124
Management Plug-ins
To resolve a Plug-in Mismatch, from the MDS Plug-ins Mismatches pane, review the
situation and decide whether you want to:
• Install the Plug-in to any MDSs that display the icon (add graphic), and then
restart those MDSs
• Remove the Plug-in from each MDS that displays the icon (add graphic)
Configuration
In This Section
New Customers are created through the Add Customer Wizard, which takes the
administrator through all the steps needed to create a customer, assign an
administrator and a GUI Client, and create the CMA.
126
Configuration
Customer Details
3. Assign Customer Properties, for example, a contact person, contact e-email, and
contact phone-number.
You can add or delete these information fields via the Manage > Provider-1
Properties, in the Customer Fields tab.
128
Configuration
10. Define the CMA. Select the Container MDS on which this CMA will be
maintained. You can provide a virtual IP address for the CMA, or the Provider-1
system can also produce a virtual IP from a range that you specify per MDS.
You can fetch an IP address (for the MDS) by using the Get Automatic IP Address
button. If you have already set up a host table specifying a name and virtual IP
for the CMA, you can Resolve by Name, fetching the IP address matching the
name of the CMA.
Changing Administrators
To add/delete/edit a customer’s administrators, change administrator permissions,
or edit an administrator's password, you can open the Administrators view and
perform these specialized activities relating to administrators.
130
Configuration
Select a GUI Client, and from the right click menu, choose an action.
To create a new GUI Client, select New GUI Client.... from the Manage or right-click
the Provider-1 root and select New GUI Client. Step through the procedures, which
are the same as in the Add Customer Wizard. See “Assign Computers on which
Administrators use the MDG” on page 128.
132
Configuration
Deleting a Customer
To delete a customer, select it in the Customer Contents Tree and then choose Delete
from the Manage from the menu, or click the delete tool, or right-click the customer
and select Delete Customer from the right-click menu.
Configuring a CMA
To configure a CMA, select it in the Objects Tree (in either one of the General View
Modes), and select Manage > Configure, or double-click the CMA you wish to edit,
or right-click the CMA and select Configure Customer Management Add-on/Configure
Customer Log Module.
While the Name, Multi Domain Server and IP Address of the CMA cannot be changed,
its Licenses are available for configuration.
Deleting a CMA
Before deleting a CMA, make sure to stop it. Select it in the MDG Customer
Contents view and then choose the delete tool in the menu bar, or Manage > Delete,
or right-click the CMA and select Delete Customer Management Add-on/Delete
Customer Log Module (respectively) from the right-click menu.
134
Chapter 5
Global Policy Management
In This Chapter
135
Security Policies in Provider-1
136
Security Policies in Provider-1
The CMA, which is the equivalent of the Security Management server in the
Security Gateway model, allows administrators to create rules that apply to specific
Customer networks and their Security Gateways. For information about using
SmartDashboard to construct security policies, see the Security Management
Administration Guide.
Figure 5-2 How security policies are created
The administrator directly defines a Customer’s network and the security policy and
QoS policy via the CMA, using SmartDashboard. SmartDashboard is launched for a
particular CMA, and the administrator defines all the network objects, gateways,
hosts and nodes in the Customer’s network. The administrator also uses
SmartDashboard to create a set of rules (a rule base) which compose a security
policy. The CMA then downloads (or installs) the Security Policy to the Customer’s
Security Gateways.
The fundamental concept of the security policies’ rule base is “That which is not
explicitly permitted is prohibited.” The rule base specifies what communication will
be allowed to pass and what will be blocked, and specifies the source and
destination of the communication, what services can be used, at what times, and
whether to log the connection.
When creating rules for the system, an administrator must consider the needs of
the organization:
• What are the physical and logical components that make up the organization?
Each component of the organization needs to be accounted for. Every server,
every printer, every resource, etc.
• Who are the users and administrators and how should they be divided into
different groups?
• What are the access needs of these users?
138
Security Policies in Provider-1
Global rules can serve many uses. They can be used to rapidly implement defense
against new cyber attacks or viruses. They can be used to prevent logging for
specific types of traffic in order to reduce the amount of information in log files.
They can be used to set up rules for CMA communication management, such as
allowing additional GUI Clients to be implemented at Customer sites.
Only one set of objects is used for all the Global Policies. The Global Policies
database contains this set of objects, which can be used in any global rule in any
Global Policy. The administrator creates these objects using Global
SmartDashboard. Global Object icons are displayed with a purple G. For example, a
Global Check Point Node has the icon.
Global policies can be assigned to one or more Customers. Once Global Policies are
assigned to a Customer’s CMA, they become part of the CMA’s rule base. The entire
CMA’s rule base, including assigned global rules, can then be installed onto
selected Security Gateways.
140
Global SmartDashboard
Global SmartDashboard
In This Section
Global Services
Default services defined by Security Gateway are available for global use. Other
services need to be defined. To avoid collision, ensure that you name services with
unique names, that should not be the same as in the CMAs’ databases.
142
Global SmartDashboard
To understand how the dynamic global object is used, let us consider an example.
An administrator creates a global rule applying to a dynamic global object
representing a generic ftp server. But instead of specifying exactly which ftp servers
and their IP addresses will be affected by the rule, the servers are represented by a
dynamic global object (FTPserver_global).
In each CMA, the Customer administrator will define a host object with the same
name. During the assignment of the Global Policy, the references to the global
dynamic object in different rules will be replaced by the reference to the local host
object with the same name. The _global syntax triggers the reference replacement
mechanism.
Figure 5-7 Dynamic Global Object used to represent a host
Note - Global security rules can be installed on Security Gateways, Edge gateways,
SmartProvisioning Profiles, and Open Security Extension (OSE) devices.
7. Add all gateways on the CMA that you want to receive global security rules with
this target to the group.
8. Select File > Save.
9. From the MDG, re-assign the global policy to the relevant Provider-1
Customer(s).
144
Creating a Global Policy through Global SmartDashboard
Once she has created a Global Policy including this rule, she assigns/installs it for
specific Customers and their network gateways. Each Customer administrator must
create a group object with the same name as in the CMA database. This is done
through SmartDashboard. In this way, local administrators translate the dynamic
global object into sets of network object from the local database.
146
Global IPS
Global IPS
In This Section
IPS protections available in the Global SmartDashboard are identical to the default
settings and protections for a CMA. Any changes made to the Global Profiles apply
to all CMAs subscribed to the IPS service.
Note - You must have an Enterprise Software Subscription to update IPS protections.
Enterprise Software Subscriptions are available for purchase at the User Center at
https://usercenter.checkpoint.com.
IPS Profiles
An IPS Profile is a complete set of configured IPS protections that can be applied
to multiple gateways. On the CMA, multiple IPS Profiles can be assigned to suit
gateways that are exposed to different types of threats.
148
Global IPS
Note - Merge and Override IPS subscriptions are no longer supported in Provider-1.
150
Global IPS
Note - If you select Remove Global Policy, Global IPS will be removed from the CMA
regardless of the checkbox setting.
152
Assigning Global Policy
Global Policy, which includes the Global Security Policy and Global IPS, should be
assigned to Customers when it is first configured, and whenever you want to
implement a change. All Global Policy assign operations are performed from the
Global Policies - Security Policies and IPS view.
Note - To configure a Customer for IPS, see “Subscribing Customers to IPS Service” on
page 150.
154
Assigning Global Policy
In this window, each Customer is displayed under the Global Security Policy to
which it is assigned, or under the category No Global Policy. The time and date at
which the Global Policy was assigned to each Customer is reported, and a status
indicator shows whether that assignment is the most up-to-date version of the
Global Policy.
When a change is made in Global SmartDashboard, either to a Global Security
Policy or to the Global IPS, the change will be reflected in the Global Policy state
of each Customer assigned the relevant Policy. (A green check mark indicates that
the Policy is up-to-date, while a red exclamation mark indicates that since the
Policy was assigned, it has changed, and should be reassigned.)
156
Assigning Global Policy
158
Assigning Global Policy
CMA and installation on a remote gateway. The file includes time, operations
performed, Global Objects added, and problems. To access this file, see “Viewing
the Customer’s Global Policy History File” on page 163.
Configuration
Assigning or Installing a Global Policy
To assign, reassign, install or remove policies for Customers, you must be a
Superuser (either a Customer Superuser or a Provider-1 Superuser. All these actions
are performed in the MDG, using the Global Policies view.
You cannot assign a Global Policy to a Customer if a Read/Write SmartDashboard is
logged in to the Customer’s CMA. First, close SmartDashboard and then assign the
Global Policy. You can, however, assign a Global Policy to a Customer if there is a
Read Only SmartDashboard logged in to the CMA. The changes won't be displayed
in SmartDashboard until it is disconnected from and then reconnected to the CMA.
160
Configuration
162
Configuration
• Install Security Policy on cluster, only if it can be installed on all cluster members
— for each cluster, the installation succeeds only if the Policy is installed on
each and every cluster member. If the installation on any of the clusters
members fails, then the whole installation for this cluster fails and the previous
Policy remains installed. It is recommended that you enable this option.
164
Chapter 6
Working in the Customer’s
Network
In This Chapter
165
Overview
Overview
Management within the customer network is much the same for a Provider-1
customer as it is in the Security Gateway management model, but with a few key
differences. In the Security Gateway management model, policy management is
handled through the Security Management server. In the Provider-1 model, policy
management is handled by the Customer Management Add-on (CMA).
166
Overview
Once you have created a Customer’s CMA, you can start defining its policies, as
described in the Security Management Administration Guide. Gateways are
“defined” in the Provider-1 environment and managed via the Customer’s CMA.
VSX is described in the VSX Administration Guide.
Remember that routing must be set up to enable communication between
Customer’s gateways and the Customer’s CMA(s). Traffic must be allowed between
the Provider-1 management network gateway and Customer’s gateways. It should
also be enabled for SmartConsole Client applications and CMA connections. Access
rules must be set up as appropriate in Customer gateways’ rule bases.
If Logging is set up for the Customer network, or High Availability is enabled,
routing must support these functions. See Chapter 9, “Logging in Provider-1”, and
Chapter 8, “High Availability”, for further details.
Administrators
Administrators are assigned in a way that is slightly different to the way it is done
in the Security Gateway management model, as it is centralized through the
Provider-1 environment. Two types of administrators are assigned to manage
specific Customers’ networks: Customer Managers and None administrators.
For details about the different types of administrators and their levels of system
permissions, see Chapter 1, “Introduction”.
168
Installing and Configuring Security Gateways
Revision Control
You can configure a Customer to save a snapshot of its settings whenever policy is
assigned or installed to it. This allows a Customer administrator to roll Security
Management back to an earlier state, if necessary.
The property Create Database Version is located on the Assign Global Policy tab of
the Customer Configuration wizard. While the default setting is not enabled, it is
recommended to enable it if disk space is not an issue.
170
Working with CMAs and CLMs in the MDG
172
Chapter 7
VPN in Provider-1
In This Chapter
173
Overview
Overview
Branch offices need to connect with other branch offices. Partner sites also need to
establish local and remote communication. Once connectivity has been established,
the connections must remain secure, offering high levels of privacy, authentication,
and integrity.
Only legitimate traffic must be allowed to enter a customer’s internal network, and
possibly harmful traffic must be inspected for content. Within the customer’s
internal network, different levels of access must also exist so that sensitive data is
only available to the right people.
A Security Gateway at a network boundary acts as an gateway that inspects and
provides access control for all traffic passing through the gateway. Traffic that does
not pass through the gateway is not controlled.
Figure 7-1 A Security Gateway gateway inspects all traffic that crosses it
174
Overview
Encryption algorithm. A set of mathematical processes for rendering information into a format
which is incomprehensible. The mathematical transformations and conversions are controlled by a
special key. In VPN, various encryption algorithms such as 3DES and AES ensure that only
communicating peers are able to understand an encrypted message, using keys to decode the
incomprehensible format into the original message.
IKE can be thought of as the process that builds a tunnel, and IPSec packets as
“trucks” that carry the encrypted data along the tunnel, from the source gateway to
the destination gateway.
For example, a Customer has two hosts (host1 and host6), who are behind different
gateways, but need to communicate. Packets pass in the clear between host1 to
the local gateway. Using the packet’s source and destination addresses, the
gateway determines that a connection should be established with a remote gateway.
According to the rule base, the connection is permitted and should be encrypted.
If this is the first connection between the hosts, the gateway initiates an IKE
negotiation with the peer gateway protecting host6. During the negotiation, both
gateways authenticate each other, and agree on encryption methods and keys.
Note - Key Exchange is the process by which communicating parties negotiate the keys
and methods for exchanging data. In a VPN, this negotiation takes place using the IKE
protocol. Keys are used to transform a message into an incomprehensible format
(encryption), and to decode the encrypted message back into the original message.
After a successful IKE negotiation, a VPN tunnel is created. From now on, every
packet that passes between the gateways is encrypted according to the IPSec
protocol. IKE supplies authenticity (so that gateways are sure they are
communicating with each other) and creates the foundation for IPSec. Once the
tunnel is created, IPSec provides privacy (through encryption) and integrity (via
one-way hash functions).
Note -
Endpoint Security. Endpoint Security checks (via hash functions) ensure that the message has not
been intercepted and altered during transmission.
Trust. Public key infrastructure (PKI), certificates and certificate authorities are employed to establish
trust between gateways. Gateways “trust” that they are indeed communicating with each other, and not
with an intruder, based on these methods that establish identity.
Pre-shared Secret. Secret data which gateways agree to employ to ensure that they are
communicating with each other. In the absence of PKI, gateways employ a pre-shared secret to
establish each other’s identity, which is less secure than PKI.
Now host1 wants to speak to host8. After another IKE negotiation, host1
establishes a second VPN tunnel with the gateway protecting host8.
176
Overview
For each VPN tunnel, after it has been established, packets are dealt with in the
following way:
• A packet leaves the source host and reaches the gateway.
• The gateway encrypts the packet.
• The packet goes down the VPN tunnel to the second gateway. The packets are
actually standard IP packets passing through the Internet. However, because
the packets are encrypted, they can be considered as passing through a private
“virtual” tunnel.
• The second gateway decrypts the packet.
• The packet is delivered in the clear to the destination host. From the hosts
perspective, they are connecting directly.
178
VPN Connectivity in Provider-1
Figure 7-3 A VPN between gateways, and the Encryption (VPN) Domain of each gateway
The following shows how VPN might be implemented in a Traditional Encrypt rule:
VPN is established between two gateways managed by the same CMA, in the same
way that is done between Security Gateways managed by a standalone Security
Management server. Using SmartDashboard launched from the CMA, customer
gateways are configured to route VPN traffic. More information about Traditional
VPN is available in the VPN Administration Guide.
Simplified VPN
In Simplified VPN Mode, the security rule base deals only with access control. VPN
properties, on the other hand, are dealt with per VPN community. A VPN
community is defined in SmartDashboard, and is a group of gateways. (In
Traditional VPN, communication is defined for a pair of gateways.) The community
definition also specifies encryption methods for VPN.
Once a community is established, all communication between community members
is encrypted. Communication with outside gateways is not encrypted. To better
understand VPN Communities, a number of terms are defined here:
• VPN Community member refers to the gateway at each end of a VPN tunnel.
• VPN domain refers to the hosts behind the gateway. (In Traditional VPN, this
domain is called the Encryption domain.)
• VPN Site is a community member plus VPN domain. A typical VPN site would
be the branch office of a bank.
• VPN Community is the collection of VPN tunnels/links and their attributes.
180
VPN Connectivity in Provider-1
Simplified VPN Mode and communities are described in the VPN Administration
Guide. As with a standalone Security Management server, an administrator
establishes VPN between a single Customer’s gateways by defining it via the CMA’s
SmartDashboard.
A simplified VPN policy makes it easier for the administrator to configure VPN.
However, Traditional policies allow VPNs to be created with greater granularity than
Simplified policies, because it defines whether or not to encrypt can be defined per
rule (source, destination and service). Simplified policies require all the
connections between two gateways to be encrypted using the same methods, via a
unitary Community definition.
A Traditional VPN implementation can be converted to Simplified mode via a
wizard. Because of the granularity of Traditional VPN, after running the wizard,
some manual optimization of the rule base may be required.
Conversion Considerations
When a Traditional policy is converted to a Simplified policy, an Encrypt rule is
converted to community rule. In order to understand the conversion, it is important
to understand how an Encrypt rule works. These issues are described in the VPN
Administration Guide.
182
Global VPN Communities
For example, the BigBank enterprise has a London branch, whose Security Gateway
gateway is named “London_gw.” Its Customer is named BigBankUK. Martin, the
Provider-1 Superuser administrator, wants to change the default template to add UK
(country) at the end.
In MDG, via Manage > Provider-1 Properties, in the Global Names Format tab, Martin
specifies that the template should use the gateway and customer name and country
name, as follows: g<GATEWAY>_of_<CUSTOMER>. When Martin goes through the
process of enabling the gateway for global use, the template automatically names
the gateway gLondon_gw_of_BigBankUK.
Once a gateway is enabled for global VPN and given a unique name, it appears in
the Global Policy.
The templates for global names of gateways and global names of VPN Domain
objects can be defined in MDG, via Manage > Provider-1 Properties.
184
Global VPN Communities
Table 7-2
Source Destination VPN Service Action
Any Any Community_A HTTP Accept
If all conditions of the rule are met, the rule is matched and the connection
allowed. VPN is another level of security separate from the access control level.
186
Global VPN Communities
Considerations
After the global policy is assigned, when issuing the “install policy” command for a
CMA’s gateways, the gateways will receive the most updated CMA policy containing
the latest updates from the Global Policy. Changes may be made to a global policy,
after which the global policy is reassigned to one of more Customers. When a
Customer’s CMA then installs the updated policy to the Customer gateways, any
modifications to global and local objects/ rules are updated on the selected
gateways.
The assign and install procedure are two separate processes. The administrator can
re-assign a global policy without installing a local policy to Customer gateways.
During the re-assign operation, gateways that participate in Global VPN
Communities are provided the CA certificate for other Customers participating in
the community. Certificates are automatically installed in the certificate database
of the CMA assigned a global policy.
For each participating Customer, other than the CMA’s Customer, a global “CA
Server” object is created in the CMA’s database, representing the certificate
authority of the peer Customer. The existence of this object allows for
authentication by ‘Matching Criteria’ to work. If by chance the certificate of the peer
Customer has already been imported manually into the database, the ‘Matching
Criteria’ references the existing certificate.
188
Configuring Global VPN Communities
Different MDG views allow you to perform this step in slightly different ways.
You can assign the policy to one customer at a time, for greater load
management. Or you can assign the policy to all the customers at once, if load
management is not an issue.
7. You can now create security rules regarding VPN via SmartDashboard for a
customer’s CMA. Gateways which are external to a customer but are part of the
Global VPN Community, will appear as global externally managed gateway
objects in the CMA's SmartDashboard.
The customer's own participating gateways will appear as they usually do. It is
not necessary to define authentication for the external global gateway objects.
Matching criteria are automatically defined for the global gateway objects
referring to the other CMA’s Certificate Authority.
A Customer can be assigned a Global Policy which references a Global VPN
Community, in which, however, none of the Customer's gateways participate. If
this happens, the CMA database will have an empty community (without
community members).
190
Chapter 8
High Availability
In This Chapter
191
Overview
Overview
Provider-1/SiteManager-1 supports High Availability — a Check Point feature that
ensures uninterrupted service availability in case of a computer crash.
Provider-1/SiteManager-1 implements High Availability at three levels:
• The gateway level, such as through ClusterXL.
• The CMA level: multiple CMAs (one Active, and at least one Standby) are
supported, as is one Security Management backup server, per Customer.
• The MDS level, through MDS synchronization.
By using ClusterXL, Customer networks are protected in the event of a gateway
computer failure. Customers may choose to implement gateway clustering within
their network environments, using SmartDashboard to configure the system. CMAs
support cluster gateway management.
An administrator can implement fail-over gateway management for a Customer
network by creating multiple CMAs, configured to High Availability. These CMAs
regularly synchronize their databases, at a configurable interval or specified event
(such as saving or installing a policy). One CMA is Active, while the others are
Standby. Further High Availability can be achieved by installing a Security
Management backup server, which can take over if all CMAs fail.
Note - The current Provider-1 version supports more than two CMAs per Customer. In
versions NGX R65 and earlier, only two CMAs are supported per Customer; one Active and
one Standby.
The MDS Manager is the point of entry to the Provider-1 system. Any Manager can
serve as a point of entry: and if one fails for any reason, another can be used as an
access point for system management. Managers are configurable to regularly
synchronize their databases, so that if one fails, others contain updated data
regarding the system. It is possible to set up MDS Container mirror sites, so that
Containers are mirrored.
192
CMA High Availability
Note - MDSs may use different operating systems. All MDSs in the Provider-1 environment
must be running the same version of Provider-1.
Two or more CMAs can be created at the same time, or a secondary CMA may be
added at a later point. After a secondary CMA has been properly initialized and
synchronized, no functional differences exist between the CMAs. Each CMA must
be on a different Container. The same Container cannot contain two CMA’s
belonging to the same Customer.
It is possible to set up one Container with primary CMAs, and other Containers to
contain all of the secondary CMAs. This is called a “mirror system” and is
explained later in this chapter. This can be a useful solution for a service provider,
which concentrates all resources in a network operations center.
It is also possible to use a Security Management backup server that will allow a
Security Management server to have Management HA relations with a Provider-1
Customer.
It is not necessary to dedicate a Container to hold only secondary CMAs, a
Container can hold a mix of primary and secondary CMAs, as long as they are for
different Customers. Provider-1 provides this functional flexibility to support
different setup needs. An international corporate network may need to have a
mixture of management and backup capabilities that are quite different from those
of a large-scale local service provider.
For example, a corporate bank with numerous branches finds it useful to have
Active CMAs for local branches maintained on a Container in the area’s central
branch. The Standby (High Availability) CMAs are maintained on the MDS in
another area’s central branch.
By contrast, an MSP does not mix Active and Standby CMAs to support widespread
distribution needs. The MSP implements a single, remote, mirror site for disaster
recovery (see “MDS Mirror Site” on page 199).
To see how this works with two Containers, look at the example below. The Active
CMA for a bank’s Chicago network is housed on the Chicago MDS. The Active CMA
for the Atlanta network is housed on the Atlanta MDS. Each of the Standby CMAs,
however, are housed at the other location’s MDS.
Figure 8-1 CMA High Availability in an Enterprise network
To look at a more distributed example, let’s examine a medical supplies firm that
has many offices, which want partial failover capabilities. They have MDSs in three
branches: Kansas, Osaka, and Montenegro. Each MDS has a mix of Active and
Standby CMAs. Mission critical networks have CMAs with High Availability (CMA
1,3,6), while others do not (CMA 2,4,5,7,8).
194
CMA High Availability
Administrators make security policy changes through the Active CMA, not the
Standby. CMA updates are made through the CMA SmartDashboard. If policy
changes are made with the Active CMA, the Standby CMA is synchronized
automatically to reflect these changes (unless configured otherwise, i.e. manually
synchronized).
The terms “Active” and “Standby” are not the same as the terms “Primary CMA”
and “Secondary CMA,” which have to do with the chronological order of creation.
Either CMAs can be set up to be Active or Standby. Initially, the Primary CMA (the
first one created) is the Active one, but later on the administrator can manually
change this as needed.
196
CMA High Availability
GUI Clients and Administrators definitions are separate for the CMAs and for the
Security Management backup server.
GUI Clients and Administrators that were defined on the Provider-1 server are not
automatically used on the Security Management backup server and vice versa.
Figure 8-3 Security Management backup server
a. Select Manage > Network Objects > Check Point > New > Host
b. In the Check Point Host window, check Secondary Management Station under
Check Point Products. This automatically selects Log Server as well.
4. From the object created in step 3 establish secure communication with the
secondary Security Management backup server.
5. From SmartDashboard access the Policy menu, select Management High
Availability and press the Synchronize button.
To setup a Security Management backup server from an existing Security
Management server:
1. Migrate the existing Security Management server to the Provider-1 CMA using
the tools in “Upgrading Provider-1” of the R70 Upgrade Guide.
2. Perform a fresh Security Management server installation as a secondary
Security Management server on an existing or new machine.
3. Using cpconfig to select an activation key that will be used to establish secure
internal communication (SIC) between the CMA and Security Management.
4. Create a network object in the Provider-1 CMA that will represent the secondary
Security Management backup server.
a. Select Manage > Network Objects > Check Point > New > Host
b. In the Check Point Host window, check Secondary Management Station under
Check Point Products. This automatically selects Log Server as well.
5. From the object created in step 4 establish secure communication with the
secondary Security Management backup server.
6. From SmartDashboard access the Policy menu, select Management High
Availability and press the Synchronize button.
198
MDS High Availability
MDS Managers
MDS Managers are “mirrors” of each other. If there is more than one MDS Manager
in the system, each Manager will contain all the information regarding the
Provider-1 management system such as the network setup, administrator hierarchy,
selected customer and network information.
MDS Manager synchronization does not mirror CMA-specific data. For example,
internal domains and customer level policy rules are known only at the CMA level,
so they are not synced by MDS Managers.
Interconnected, mutually redundant MDS Managers form a robust management
system providing non-stop access, without the need to deploy dedicated hardware
or software redundancy. For MDSs, the Active/Standby status affects only the login
to the Global SmartDashboard (as opposed to the login to the MDG). MDG
management activities can be performed using any of the MDS Managers.
Figure 8-5 MDS Synchronization in an Enterprise network
In terms of using MDGs, all MDS Managers are simultaneously accessible and can
perform Read/Write operations at all times, except for creating/revoking MDS
certificates in the MDS Configuration window, which can only be done from the
Active MDS. MDS information is synchronized at configurable intervals.
200
MDS High Availability
MDS Database
This database holds data objects describing MDSs, Customers, CMAs, gateways,
licenses, administrators, GUI-clients, and information about assignment of Global
Policies to customers. This database is synchronized automatically between MDS
Managers. MDS Containers also contain parts of this database, which is
synchronized for proper operation.
The synchronization method of this database enables simultaneously opening MDGs
to different MDS Managers, and performing Read and Write operations at any time
from any MDG. Changes committed to the database of one MDS Manager are
distributed immediately to all other MDS Managers, and to the MDGs connected to
them as well.
If MDSs were disconnected from each other, it is recommended to make changes
only on one of them, to avoid data collision. Once the MDSs are reconnected, they
will synchronize with each other according to modification time.
202
MDS High Availability
204
MDS High Availability
Cross-MDS Synchronization
All of these synchronizations take place according to individual synchronization
settings or conditions, even though they may take place on the same machines.
Figure 8-9 MDS and CMA level synchronizations between two MDSs
Setting up Synchronization
206
MDS High Availability
The Sync Status displays synchronization statuses for MDSs and CMAs. Every
synchronization takes a certain amount of time to update the status. The default is
5 minutes. Statuses are as follows:
• Unknown — No information has been received about this CMA/MDS (see
footnote 1.) synchronization status.
• Never synced — This CMA/MDS has never been synchronized with the other
CMA/MDS to which the MDG is connected.
• Synchronized — This CMA/MDS (see footnote 1.) is synchronized with the other
CMA/MDS to which the MDG is connected.
• Lagging — The data of this CMA/MDS (see footnote 1.) is less updated than the
data of the other CMA/MDS to which the MDG is connected.
• Advanced —The data of this CMA/MDS (see footnote 1.) is more updated than
the data of the other CMA/MDS to which the MDG is connected.
• Collision — The data of this CMA/MDS (see footnote 1.) conflicts with the data
of the other CMA/MDS to which the MDG is connected.
Footnotes:
1. When dealing with MDS synchronization status, the status is relevant for the
Global Policies database. The ICA database is synchronized automatically
between MDSs when new certificates are created for
administrators/MDSs/MLMs, but when the database is modified as a result from
operations in Global SmartDashboard, it will be synchronized with the next
Global Policies database synchronization.
208
Configuration
Configuration
Adding another MDS
The following steps are described in greater detail in Chapter 3, “Provisioning
Provider-1”, in the section “Creating a Primary MDS Manager” on page 90.
1. Synchronize the system clock of the new MDS computer with all other MDSs
computers’ system clocks.
2. Run the MDS installation script to install the MDS. When you are asked if this
is an MDS Manager or Container MDS, select the type of MDS you want to add.
3. If you set up an MDS Manager, when you are asked if this is the Primary MDS,
answer No.
4. During the configuration phase add an MDS license, and the Activation Key
(password). This Activation Key if for passing the SIC certificate to the new MDS
from the primary MDS.
5. In the MDG connected to the first MDS, define a new MDS. Assign it the IP
address of the Leading Interface you selected for it in the configuration phase.
Send the new MDS a certificate by the Initialize Communication option. Use the
same Activation Key you entered in the configuration of the new MDS.
6. You will be prompted to perform an “Initial synchronization” for this MDS.
Select to do so. Your new MDS Manager is now ready. You can connect directly
to it with the MDG client.
210
Configuration
212
Configuration
214
Failure Recovery in High Availability Deployments
The correct procedure for failure recovery depends on whether one of the
remaining, functioning MDSs is a manager or not. You may have a remaining,
functioning MDS manager in cases where there was more than one manager MDS
or the failed MDS was not the manager. If the failed MDS was the only manager,
the entire deployment needs to be migrated to a different MDS.
In This Section
4. On each remaining MDS and on each remaining MLM, run the following two
lines:
mdsenv
cp $MDSDIR/conf/mdsdb/customers.C
$MDSDIR/conf/mdsdb/customers.C.prepromote
5. In the General - MDS Contents view of the MDG, delete the failed MDS.
If the failed MDS was the primary MDS, the MDG will by default not allow you
to delete the MDS. In this case, first run the following commandon a remaining
manager MDS:
enable_mds_deletion <name>
where <name> is the name of the failed primary MDS. Then delete the failed
MDS in the MDG.
Note - Deleting the MDS causes all of its CMAs, many network objects, and Global Policy
assignments to disappear from the MDG as well. Objects that are still relevant will be
automatically restored after the next step.
6. On each remaining MDS and on each remaining MLM, run the following lines:
mdsstop
mv $MDSDIR/conf/mdsdb/cp-deleted.C
$MDSDIR/conf/mdsdb/cp-deleted.C.prepromote
cp $MDSDIR/conf/mdsdb/customers.C
$MDSDIR/conf/mdsdb/customers.C.afterpromote
cp $MDSDIR/conf/mdsdb/customers.C.prepromote
$MDSDIR/conf/mdsdb/customers.C
mdsstart
Relevant network objects and Global Policy assignments are automatically
restored in the MDG.
216
Failure Recovery in High Availability Deployments
2. Promote the Customer’s active CMA from secondary to primary by setting its
host MDS’s environment to that CMA (with mdsenv <cma_name>), and then
running the following:
promote_util
3. In SmartDashboard for the promoted CMA, locate (with Where Used) and
remove all uses of the failed CMA, and the failed CMA itself. Save the policy.
4. Synchronize the Customer’s CMAs manually, if necessary, and re-assign Global
Policies and install policies on all gateways.
5. If the promoted CMA is using an HA CMA license, replace it with a regular CMA
license.
4. Migrate the Provider-1 environment from the old deployment to the new one
according to the instructions for a Gradual Upgrade in the Provider-1 Upgrade
Practices section of the Upgrading Provider-1 chapter in the Upgrade Guide.
For the migration process, as the source CMA for each Customer, use the
primary CMA (the original primary CMA, if remaining, or the one promoted in
step ).
As part of the migration process, in SmartDashboard for the new CMA, make
sure to locate (with Where Used) and to remove all uses of the old deployment’s
CMAs (except the primary CMA used for migration), and these CMA objects
themselves. Save the policy.
The Gradual Upgrade process includes migrating Global Policies. Afterwards,
remember to re-assign Global Policies and install policies on all gateways.
5. Mirror new secondary CMAs according to your needs.
218
Chapter 9
Logging in Provider-1
In This Chapter
219
Logging Customer Activity
220
Logging Customer Activity
Figure 9-1 Log server collects gateway activity logs & stores them in the Customer’s
network
A Customer Log Module (CLM) can be deployed in to function as a Log server for a
specific Customer. The CLM is housed on an MDS Container. It is possible to set
up a CLM on any MDS Container in the system, as long as the MDS does not have
another CMA or CLM of the same Customer on it. Once a CLM is created for a
Customer, the Customer’s gateways send records to the CLM, which stores logs on
the MDS on which the CLM is housed.
By default, a Log server and/or a CLM receive logs from gateways of a specific
Customer. However, you can configure a Log server/CLM to receive logs from
multiple customers. For more information, refer to Check Point's SecureKnowledge
database.
A special MDS Container that hosts only CLMs, and is actually dedicated to
housing logs for multiple Customers, is called a Multi-Customer Log Module
(MLM). If you expect heavy logging, it is advisable and more cost effective in terms
of licensing to dedicate a separate server to deal solely with logs.
222
Logging Customer Activity
Table 9-1 highlights the similarities and differences between CMAs, CLMs and Log
servers:
Note - Provider-1 supports Eventia Reporter Reports. An Eventia Reporter server is installed
on a separate machine and then configured in the Provider-1 environment.
Exporting Logs
There are several ways and formats in which a log file can be exported:
In This Section
224
Exporting Logs
You can export Check Point and OPSEC logs to Oracle commercial relational
databases. To do this, you must configure the MDS to support log exports (see
“Configuring an MDS to Enable Log Export” on page 230). Logs can automatically
be exported once a day at a scheduled time.
Logs exports can only be done on log files that are not currently open and Active.
The automatic log export will not take place in the following cases:
• The MDS, CMA or CLM is down at the scheduled log export time.
• The latest log file has not been closed and all previous logs were already
exported.
Log Files
For each CLM, an Active log file, the fw.log file, is created. Logged data is stored
to this file for a scheduled period or until it reaches a certain size limit, after which
the fw.log file is saved with a new extension, say fw.log.109, and a new file is
opened (this process is also known as log “switching”). Once a log file is closed, it
is possible to export the file, automatically or manually.
Export Profiles
Automatic log exports are performed according to a Log Export Profile. This profile
defines log export parameters, such as the schedule and the log fields to be
exported. Each CMA and CLM can be assigned a Log Export Profile. The same log
profile can be applied to a number of CMAs and CLMs that share the same logging
needs.
Logs exports are performed on log files that are not currently open. The file must
be inActive and not yet exported.
Log Forwarding
It is possible to use SmartView Tracker to forward a log file from one MLM to
another computer. For more information, see the SmartView Tracker documentation
in the Security Management Administration Guide.
226
Logging Configuration
Logging Configuration
The following section outlines the configuration issues that are involved with
logging in Provider-1.
In This Section
Setting Up Logging
1. To create an MLM, follow the same procedure that is done for creating a
Container. See Chapter 3, “Provisioning Provider-1”.
2. Using the MDG, create one or more CLMs per customer. Each must be on a
different MDS.
Remember to enable communication between the Provider-1 network and the
customer's gateways. Add appropriate rules permitting the CLMs to
communicate from the Provider-1 network with the customer's gateways, and
install the policy on the relevant gateways.
3. Setup each relevant gateway to the send its logs to the new CLM.
4. Synchronize the new CLM database with the CMA’s database using the
"install-database" operation. This must be done so that logs are properly
processed. See “Synchronizing the CLM Database with the CMA Database” on
page 230”
5. Configure the MDS for the log exporting procedure. See “Configuring an MDS to
Enable Log Export” on page 230
6. If you want to enable automatic log exporting, create a Log Export Profile and
assign it to the customer’s CLMs and CMAs. See “Configuring Log Export
Profiles” on page 230, and “Choosing Log Export Fields” on page 231.
If you experience any difficulty, consult the Troubleshooting section. See “Log
Export Troubleshooting” on page 232
Add a CLM
CLMs can be added through the MDG. Note the following:
• A Customer must have at least one CMA before a CLM can be added to it.
• Each CLM created for the same customer must be deployed on a different
MDS.
• A Customer's CLM and CMA cannot be installed on the same MDS.
To add the new CLM:
1. In the MDG Customer View, select a customer, then select Add Customer Log
Module from the Manage menu, or right-click the Customer and select Add
Customer Log Module.
2. You are required to enter values for the displayed fields.
• Enter a name for the CLM.
• Select the Container MDS on which this CLM will be maintained.
3. Assign a virtual IP address to the CLM. Configuration details for creating Virtual
IPs and installing licensing are similar to those of the CMA, see “Planning the
Provider-1 Environment” on page 59.
4. Next, fill in the license information, if required.
228
Logging Configuration
Deleting a CLM
Before deleting a CLM, make sure to stop it. Select it in the MDG Customer
Contents view and then choose the delete tool in the menu bar, or Manage > Delete,
or right-click the CLM and select Delete Customer Management Add-on/Delete
Customer Log Module (respectively) from the right-click menu.
230
Logging Configuration
If you modify this list (for example, changing a field’s length), once the data is
exported, the list details will become incompatible with the target table and
future Log Exports will fail. To avoid this, rename the current table.
Next time you perform a Log Export, the process will create a new table using
the original table’s name.
5. In the Assign tab, specify which CMAs and CLMs are assigned this profile.
6. To find the profile assigned to a specific CMA or CLM, click Find in the Log
Export Profiles window. The window will either display the Log Export Profile's
name, or indicate that no profile has been assigned.
232
Logging Configuration
234
Chapter 10
Monitoring in Provider-1
In This Chapter
235
Overview
Overview
Provider-1’s MDG is designed to support daily monitoring and maintenance
activities. It has a variety of MDG views that can be used by administrators to
confirm that the system is running smoothly and that management activities are
being successfully performed.
By default, management activities receive system confirmation within five minutes.
Once confirmation has been received, Administrators can use status indicators to
determine if management activities were performed successfully. The following
status checks can be executed:
If status check reveal that management activities were not successful, you can use
the MDG views such as the Critical Notification window to yield further information
for troubleshooting purposes.
It is also possible to use the SmartView Console clients (such as SmartView Monitor
and SmartView Tracker) for monitoring, tracking and troubleshooting purposes.
236
Monitoring Components in the Provider-1 System
The Customer Contents mode is divided into 2 sections or panes. The far right pane
gives a statistical breakdown, or summary of the components in the system
depending on what you have selected in the left pane.
For example, if you select the Provider-1 root, a summary of Provider-1 root
Customer-related statistics is displayed: the number of Customers, CMAs, gateways,
Administrators and GUI Clients in the system. Another example, if you select a
Customer in the left pane, Customer Properties are displayed, including:
user-defined free field information (e.g. Contact Person), entered in the Properties
tab of the Customer Configuration window.
The left pane provides a view of all the Customers in the system, their CMAs and
gateways. Information displayed in this pane includes:
• The MDS which contains the CMA and CLM.
• The IP addresses of all the components in the system
• Whether the component is Active or Standby (for High Availability).
• Whether the component has been enabled for global use, in this case the global
name is displayed.
Filtering
To focus on a specific group of objects that share a certain common denominator
(such as their IP address range, Customer name or the MDS they are installed on),
filter any of the List pane's columns by right-clicking the column heading and
selecting Column Filter... from the displayed menu. Additionally:
• To view existing filters, select View > Filter Details.
• To clear all filters, select View > Clear All.
238
Checking the Status of Components in the System
The Network Objects mode shows general and status information for all components
in the system. This information is displayed in the upper part of the window, or the
List pane.
In the Network Objects mode List Pane you can right-click or double-click on a
component and execute a command. For example, you can start, stop, configure or
update a selected component. Additionally you can launch any of the SmartView
Console clients and take advantage of their facilities. For example, if a Customer’s
gateway is behaving sluggishly, launch SmartView Monitor and/or SmartView
Tracker from the said gateway to check what activities are taking place at the
gateway so as to determine the root of the sluggishness.
240
Checking the Status of Components in the System
Table 10-5
For each object, the name, status and time of status update is displayed.
242
Monitoring Issues for Different Components and Features
In This Section
MDS
MDSs are managed via their own special view, MDG’s General View - MDS Contents
mode, for administrator convenience. Since MDSs are so vital to smooth Provider-1
operations, only the Provider-1 Superuser administrator has the ability to view and
manage the MDS Contents mode. This mode allows the Provider-1 Superuser
administrator to perform MDS management activities and check all MDS statuses
at a glance.
However, non Provider-1 Superuser administrators can view the status of MDSs in
the MDG’s General View - Network Objects mode. This view displays all system
components and how they are functioning.
For a granular view of MDS activity, the Provider-1 Superuser administrator can
launch SmartView Tracker in Audit mode. In SmartView Tracker you can see:
• the management activity logs generated by the administrator
• the time the log was generated
• the GUI Client source
• the administrator performing the actions, and changes to network objects.
The Provider-1 Superuser administrator can also start, stop, add or delete an MDS.
244
Monitoring Issues for Different Components and Features
Global Policies
Customer network systems operate according to the behavior specified in their
Security and Global Policy rules. To see how Global Policies have been applied to
Customers in the Provider-1 system, use the Global Policies View - Security Policies
mode. This mode displays:
• the Global Policies in the system,
• the Customers and CMAs that are assigned to these policies,
• the time when the assignment took place,
• the last time that the global policy was modified,
• the status of the assignment operation (whether or not it was successful).
Figure 10-4 Global Policies View - Security Policies mode
Customer Policies
Checking a CMA’s Policy
A CMA’s policy may or may not contain global rules, depending on whether a global
policy was assigned to the Customer. Use the Global Policies View - Security Policies
mode to check:
• if a Customer’s CMA has been assigned a global policy,
• which Global Policy was assigned,
• the time of the assignment,
• the time that the Global Policy was last changed,
• whether the assignment operation was successful.
You can also use the MDG’s General View - Network Objects mode to see which
Customer policy is assigned to a CMA.
Gateway Policies
Checking a Gateway’s Current Policy
To see which policy is installed on a specific gateway, you can use the General View
- Network Objects mode. For each gateway the following information is displayed:
• the Policy Name,
• the Gateway Local Installation Time,
• the local date and time when the policy was installed.
If there are problems with the gateway, they will be displayed in the Critical
Notifications Pane, which focuses on components that need attention.
246
Monitoring Issues for Different Components and Features
High Availability
Provider-1 implements High Availability on the following levels:
• The gateway level.
• The CMA level - multiple CMAs are supported, as well as an optional Security
Management Backup server.
• The MDS level.
CMA and MDS High Availability are managed through the MDG’s High Availability
View. The administrator can do all management activities relating to MDS High
Availability through this view, and examine the status of these actions.
In the High Availability - MDS Contents mode, the following information is displayed:
• MDSs Active/Standby (login) status,
• The Sync Status. This status displays synchronization statuses for MDSs and
CMAs. Every synchronization takes a certain amount of time to update the
status. The default is 5 minutes. Statuses are as follows:
• Unknown, no information has been received about this CMA synchronization
status.
• Never synced, this CMA has never been synchronized with the other CMA.
• Synchronized, this CMA is synchronized with the other CMA.
• Lagging, the data of this CMA is less updated than the data of the other
CMA.
• Advanced, the data of this CMA is more updated than the data of the other
CMA.
• Collision, the data of this CMA conflicts with the data of the other CMA.
After the Global VPN Communities are defined in the Global SmartDashboard, the
Global Policies View - VPN Communities mode displays the configuration update
status for each community, and the Customers and gateways that participate in the
community.
248
Monitoring Issues for Different Components and Features
Administrators
To view all the administrators that have been created in the system, and the
Customers for which they are responsible for, use the Administrators View -
Customers per Administrator mode.
Figure 10-6 Administrators View - Customers per Administrator
Connected Administrators
To see which administrators are Active in the system at any time, use the Connected
Administrators View. This view allows you determine if any questionable activity has
taken place. This view also allows the Provider-1 Superuser to use mouse’s
right-click and regular menus to delete an administrator’s connection.
Figure 10-7 Connected Administrators View
GUI Clients
To see which GUI Clients have been assigned for use, and to which MDSs or
Customer environments they are connected, use the GUI Clients View. In this view
information is displayed by default in a Customer per GUI Client hierarchy, in other
words where you can see the GUI Clients and the Customers assigned to each. You
can manage these entities by right-clicking on the GUI Client and selecting to
assign Customers to it. This view can be toggled so that the hierarchy is reversed,
in other words where you can see GUI Clients per Customer. Similarly, by
right-clicking on a Customer you can select to assign GUI Clients to it.
250
Monitoring Issues for Different Components and Features
Log Tracking
The Provider-1 system uses either CMAs or CLMs to gather information about
Customer gateways' activities. CMAs and CLMs can gather detailed log information
from Security Gateways, UTM-1 Edge appliances, and many OPSEC-certified
security applications. This information can then be accessed using the
SmartConsole Clients.
252
Using SmartConsole to Monitor Provider-1 Components
254
Using SmartConsole to Monitor Provider-1 Components
can be monitored, and alerts can be generated. Traffic can be monitored between
two Check Point Security Gateways or two QoS gateways for real time analysis of
bandwidth and latency.
Using Thresholds
SmartView Monitor can be used to configure predefined actions that are triggered
when certain changes in status occur. For instance, a rule can be defined to send
an email to a certain address if the load on a gateway’s CPU surpasses a threshold
that you set.
By default the engine responsible for triggering the events is disabled for Provider-1
CMAs, but it can be enabled per CMA by running the following commands from the
root shell of the MDS machine:
1. Change to the CMA’s environment with the command mdsenv <CMA Name>
2. cpstat_monitor &
After running this command, thresholds are monitored until the CMA is stopped.
To permanently enable this functionality for a specific CMA, you must modify the
value of the registry key that sets whether the cpstat_monitor process auto-starts
whenever the CMA is started. You can do so by running the following command
from the CMA’s environment:
cpprod_util CPPROD_SetValue PROVIDER-1 RunCpstatMonitor 1 1 1
Note - To revert to the registry’s original setting, enter the following on the MDS in the
CMA’s environment:
256
Chapter 11
Architecture and Processes
In This Chapter
257
Packages in MDS Installation
On Linux and SecurePlatform, package names contain the suffix “-00”. For
example, the full name of CPsuite-70 package for these platforms is
CPsuite-R70-00.
All of these packages have pre-defined dependencies between them. Under no
circumstances should these packages be manually removed.
258
MDS File System
260
MDS File System
Processes
In This Section
Environment Variables
Different Multi-Domain server processes require standard environment variables to
be defined. The variables have the following functionality, they:
• Point to the installation directories of different components.
• Contain management IP addresses.
• Hold data important for correct initialization and operation of the processes.
Additionally, specific environment variables control certain parameters of different
functions of Multi-Domain server.
MDS installation contains shell scripts for C-Shell and for Bourne Shell, that define
the necessary environment variables:
• The C-Shell version is /opt/CPshrd-R70/tmp/.CPprofile.csh
• The Bourne Shell version is /opt/CPshrd-R70/tmp/.CPprofile.sh
Sourcing these files (or in other words, using “source” command in C-Shell or “.”
command in Bourne Shell) will define the environment necessary for the MDS
processes to run.
262
Processes
For proper operation of the Multi-Domain server all four processes must be running,
unless dealing with configurations where cpca shouldn’t be running.
264
Processes
For proper operation of the CMA, at least cpd, cpca, fwd and fwm must be running,
unless dealing with configurations where cpca shouldn’t be running. Other
processes are required only for CMAs using specific functionality for which these
processes are responsible.
In This Section
MDS Database
This database contains two kinds of objects:
• MDS-level management objects – such as like administrators, customers, MDSs
and CMAs. These objects are defined either using the Multi-Domain GUI or the
MDS Command Line utilities.
266
MDS Configuration Databases
CMA Database
This database contains:
• Definitions of objects and policies created and edited by SmartDashboard,
when connecting to the CMA.
• Global Objects (in read-only mode) copied by the Assign Global Policy operation.
• SmartLSM Security Gateways definitions made by SmartProvisioning.
Different CMAs residing on the same MDS have different separate databases.
By default this task attempts to reconnect the MDS to no more than five CMAs per
iteration. So, a system with 50 CMAs requires 10 iteration (of 90 seconds each, by
default), so connecting to all the CMAs could take up to 15 minutes.
268
Connectivity Between Different Processes
To change the maximum number of CMAs to which the MDS can connect per cycle,
set the MSP_RETRY_INIT_INTERVAL variable to the desired value.
Note - Raising this value makes the MDS connect to all CMAs faster during startup, but
may overload if it is set too low.
Status Collection
Status collection begins when an MDG connects to a Manager. The MDS sends all
CMAs a request to start collecting statuses. The MDS contacts the CMAs one by
one, spacing these requests by one second, thus preventing the MDS load from
peaking when multiple statuses arrive. You can change this default spacing and set
the required spacing in milliseconds, with the environment variable
MSP_SPACING_REG_CMAS_FOR_STATUSES.
270
Issues Relating to Different Platforms
In This Section
Table 11-8
Action Use Script/Command Comment
Migrate the migrate_global_policies Run this script without any
Global Policies script parameters in order to see its
Database usage. The files required before
executing this script are
specified in the script's usage.
The specified files should be
copied manually to the
destination MDS.
Export a CMA, export_database script This script exports the
Security comprehensive database files
Management, into one .tgz file on the source
or Global machine that can be imported
Policy to a different MDS machine
database from
one machine
to another.
Migrate migrate_assist script This script retrieves all of the
complete CMA required files for the migration
databases from of the CMA, including its
one MDS configuration database and log
machine to files. The script works remotely,
another. file by file.
Migrate the Use any one of:
CMA into the • Import Customer
destination Management Add-on
environment. command from the MDG
• cma_migrate script
• mdscmd migratecma
utility
272
Chapter 12
Commands and Utilities
In This Chapter
273
Cross-CMA Search
Cross-CMA Search
In This Section
Overview
The Cross-CMA Search feature enables searching across multiple CMA databases
for defined network objects (including groups, dynamic objects and Global objects)
and for rules (including Global and implied rules) that contain or affect a specified
object.
Cross-CMA Search is a powerful tool for analyzing the functioning of network
components in the context of a Provider-1 environment. The search function is
similar to SmartDashboard’s Where Used.
Performing a Search
You can access Cross-CMA search from the General - Customer Contents or from the
General - Network Objects view of the MDG.
To open the Cross-CMA search window, select Cross-CMA Search from the Manage
menu, or click the Cross-CMA Search icon.
Select a query and the Customer or Customers to search in. The following queries
are available:
• Specified Object query:
• Find network objects by exact name - finds objects defined in the CMA
database, where the object’s name exactly matches the query entry.
• Find network objects by partial name - finds objects defined in the CMA
database, where the object’s name contains the query entry.
• Find network objects by IP address - finds objects defined in the CMA
database, where the object’s IP address matches the query entry.
Results for object queries include object and Customer information.
274
Cross-CMA Search
• Find Policy rules that use a global object - the query entry is a global object
name. The query finds rules in the CMA policies, where the global object is part
of the rule definition. This includes cases where the global object is not explicit
in the rule definition, but is included in some object (such as a group or
cluster) that appears in the rule.
Results include Customer, policy and rule information, and the specific rule
column where the global object appears. The first Results column, Object Name,
indicates the relevant object as defined in the rule. This object may be one that
includes, but is not identical to, the query entry.
• Find Policy rules that use a global object explicitly - this query is the same as
the previous query, except that the results are limited to rules where the global
object is explicit. Rules where the global object is merely included in some
object (such as a group or cluster) that appears in the rule are excluded.
Results include Customer, policy and rule information, and the specific rule
column where the global object appears. Two additional Results columns are:
Last in Cell? - indicates whether the object is the sole object in its rule column,
so that removing it would cause the cell content to become Any.
Is Removable? - indicates whether an object is not a non-deletable object.
• Find network objects that use a global object explicitly- the query entry is the
name of a global object. The query finds network objects (such as groups or
clusters), defined in the CMA database, that contain the global object explicitly.
Results include object and Customer information.
The Object Name Results column indicates the relevant object as defined in the
rule. This object may be one that includes, but is not identical to, the query
entry.
Is Removable? - indicates whether an object is not a non-deletable object.
Parameter Description
-n Specifies that <entry> is the full object name. Available for all values of
<query type>.
276
Cross-CMA Search
Example
To search CMAs for all Customers for objects containing ‘my_gw’ in their names:
mdscmd runcrosscmaquery -all query_network_obj -n my_gw
P1Shell
In This Section
Overview
P1Shell is a command line shell that allows administrators to run Provider-1 CLI
commands on the MDS, in both MDS and CMA environments, without root
permissions. P1Shell authorizes users who are recognized by the MDS as Provider-1
Superusers or Customer Superusers. Lower level Provider-1 administrators must use
the MDG (unless they have root permissions).
P1Shell can be defined as the default login shell for Provider-1 users, or it can be
manually started in the CLI.
Because Provider-1 authentication is provided by the MDS, MDS processes must be
running for an administrator to be authorized for P1Shell. However, starting MDS
processes should not be available to non-Provider-1 administrators, so a password
is required for mdsstart. The Start-MDS password can be set in mdsconfig, and
should be given to Provider-1 administrators.
P1Shell maintains a connection with the MDS. P1Shell may be disconnected from
the MDS by an MDG user (from the Connected Administrators view of the MDG),
but as soon as P1Shell processes a command, P1Shell will reconnect to the MDS.
The P1Shell user will be notified neither of the disconnecting nor of reconnecting.
The MDG Connected Administrators view will display the reconnected P1Shell user
only when the view is refreshed.
Note - P1Shell settings and commands are defined in configuration files that should not be
changed. Any change to P1Shell configuration files will block P1Shell. If that happens,
restore the files to their original versions to enable access to P1Shell.
278
P1Shell
Starting P1Shell
To work in P1Shell, it must first be enabled. To enable P1Shell, run:
mdsconfig
and select P1Shell.
To start P1Shell, if it is not your default login shell, run:
p1shell
If the MDS is not running, you will be prompted for the Start-MDS password to
authorize starting the MDS. Then, you will be prompted to enter your Provider-1
user name and password to authorize you for P1Shell.
Note - The mds_backup command is an exception to this rule. The output of the backup is
created at the path: /var/opt/mds_backups/<timestamp>, where <timestamp> is the
time that the backup started.
Upon starting, P1Shell defines both input and output directories as the user’s
home directory. They can be changed for the work session, only within the home
directory. Change the directories with the following commands:
set_inputdir <path>
set_outputdir <path>
where <path> is an existing directory, defined relative to the user’s home directory.
To view existing input and output directories, enter:
display_io_dirs
Filenames appearing in commands cannot be paths (/ will be considered an illegal
character) and must be located in the defined input or output directory.
Note - For security reasons, the output directory cannot be soft linked.
P1Shell Commands
P1Shell enables both general Provider-1 commands and its own “Native P1Shell
Commands”.
To view a list of available Provider-1 commands, enter help or ? . When the
logged-in user is a Customer Superuser, commands that are available only to
Provider-1 Superusers, not to Customer Superusers, will not appear in the list.
In This Section
cplic All
280
P1Shell
cpstat All
cpstat_monitor All
cpvinfo All
cpwd_admin list
dbedit All
mds_user_expdate All
mdsenv All
mdsquerydb All
mdsstart_customer All
mdsstat All
mdsstop_customer All
promote_util All
sam_alert All
Command Description
help [<command>] Displays the command’s help text, or (without arguments) lists
available commands.
Idle [<minutes>] Sets idle time before automatic logout to <minutes>, or (without
arguments) displays current idle time (default is 10 minutes).
exit Exits P1Shell.
? [<command>] Same as help.
set_outputdir <path> Sets the output directory to be <path>, where <path> is relative to
the user’s home directory.
set_inputdir <path> Sets the input directory to be <path>, where <path> is relative to
the user’s home directory.
display_io_dirs Displays the input and output directories.
282
P1Shell
Command Description
copy_logfiles Copies the process’s debug log files according to the environment
-<process_name> [<-l>] context (CMA/MDS) to the output directory. <process_name> is one
of: fwm, fwd, cpd, cpca. If -l is used, only the most recent log file
is copied.
run <batch_file> Runs a batch of MDS commands in sequence. The batch file must
be in the defined input directory.
scroll [on | off] Sets output scrolling on or off, or displays current scroll setting.
Scrolling is similar to the 'more' command.
Audit Logging
P1Shell logs audits in two different ways.
P1Shell saves all audits to a text file:
$MDS_SYSTEM/p1shell/log/p1shell_cmd_audit.log
In addition, P1Shell sends audits to the MDS to be logged. These audits can be
viewed in SmartView Tracker. If the MDS is not running at the time as the audited
event, and the MDS later starts during the same P1Shell session, the audit is then
sent to the MDS. If the MDS is down from the time of the event until the end of
the P1Shell session, the MDS does not receive the audit.
284
Command Line Reference
cma_migrate
Description This command imports an existing Security Management server or CMA
into a Provider-1/SiteManager-1 MDS so that it will become one of its
CMAs. If the imported Security Management or CMA is of a version
earlier than the MDS to which it is being imported, then the Upgrade
process is performed as part of the import.
It is recommended to run cma_migrate to import CMA or Security
Management database files created using the export_database tool.
Bear in mind that the source and target platforms may be different. The
platform of the source management to be imported can be Solaris,
Linux, Windows, SecurePlatform or IPSO.
Usage cma_migrate <source management directory path> <target CMA
FWDIR directory>
Further Info. For further information and procedures for using the cma_migrate
command, refer to the High End Installation and Upgrade Guide at
http://supportcontent.checkpoint.com/documentation_download?ID=875
2.
In This Section
286
Command Line Reference
288
Command Line Reference
290
Command Line Reference
************************************************
Customer: b52-1
Network Objects: 8
Gateways With Firewall Installed: 2
Objects Database Size: 337296
Rules Database Size: 11369
************************************************
292
Command Line Reference
CPperfPack
Description This utility is used to package the performance monitor repository
into single compressed file in order to send it to Check Point
technical personnel.
Usage CPperfPack [store=<your store>] [target=<your target>]
cpmiquerybin
Description cpmiquerybin utility is the binary core of the Database Query Tool.
(For the Database Query Tool, see “mdsquerydb” on page 315.)
This command-line CPMI client connects to the specified database,
executes a query and displays results as either a collection of FW-1 Sets
or tab-delimitered list of requested fields from each retrieved object. The
target database of the query tool depends on the environment settings of
the shell being used by the user.
Whenever the user desires to access one of MDS databases, he/she
should execute the mdsenv command, in order to define the environment
variables necessary for database connection. In order to connect to a
294
Command Line Reference
Note - A MISSING_ATTR string is displayed when the user specifies an attribute name that
does not exist in one of the objects in query result. The MISSING_ATTR string indicates
that that attribute is missing.
Exit Code
0 when query succeeds, 1 if query fails, or query syntax is bad.
Usage cpmiquerybin <query_result_type> <database> <table> <query>
[-a <attributes_list>]
dbedit
Description This utility can be used in Provider-1 configuration and is further
described in the Security Management Administration Guide. It is used
in conjunction with the mdsenv command. Particular commands for
accessing the MDS and CMA environment are included here.
Usage dbedit –mds
dbedit –s <MDS_IP> –d mdsdb -u <P1_Admin> -p <password>
dbedit –s <CMA_IP> -u <CMA_Admin> -p <password>
Example To edit the database that resides on the MDS Global database, use the
following commands:
mdsenv
dbedit –mds
296
Command Line Reference
To edit the database that resides on the MDS MDSDB database, use the
following commands:
mdsenv
dbedit –mds –d mdsdb
To edit the CMA database, use the following command:
mdsenv CMA_Flower
dbedit 10.10.10.10 -mds
where 10.10.10.10 is the CMA IP.
To use dbedit on a remote MDS/CMA the computer that you are running
the dbedit on must be defined as an authorized GUI Client of the
MDS/CMA. The user must be a Provider-1 administrator and provide a
user name and password:
dbedit –s 10.10.10.10 -u CANDACE -p ****
where 10.10.10.10 is the MDS or CMA IP, and **** is a password.
To edit the remote MDS MDSDB database:
dbedit –s 10.10.9.1 –d mdsdb -u ROGER -p ****
where 10.10.9.1 is the MDS IP, ROGER is an administrator and **** is
a password.
To edit the remote CMA database:
dbedit –s 10.10.19.1 -u SAMANTHA -p ****
where 10.10.19.1 is the CMA IP, SAMANTHA is an administrator and
**** is a password.
export_database
Description The export_database utility allows you to export an entire database into
one .tgz file that can be imported into a different MDS machine. The
following files can be exported:
• An entire CMA database
• An entire Security Management database
• An MDS Global Policy database
The export_database utility exports the database as one comprehensive
file on the source machine, as opposed to migrate_assist which exports
the database as multiple files to a remote location.
The export_database tool is supported on Linux 3.0, Secure Platform
and Solaris 2. If you are running other platforms, use migrate_assist to
export all files, including the Global Policy.
• Exporting a CMA:
./export_database.sh <path for the output file> –c <name of
CMA>
• Exporting a Security Management:
./export_database.sh <path for the output file>
• Exporting an MDS global database:
./export_database.sh <path for the output file> –g
Syntax Argument Description
Example To export the database of a CMA, CMA1, including its log database to a
file path, /var/tmp, use the following command:
./export_database.sh /var/tmp –c CMA1 -l
298
Command Line Reference
mds_backup
Description This utility stores binaries and data from your MDS installation. Runs the
gtar command on the root directories of data and binaries. Any extra
information located under these directories is backed up except from
files that are specified in mds_exclude.dat file. The collected
information is wrapped in a single zipped tar file. The name of the
created backup file is constructed by the date and time of the backup,
followed by the extension .mdsbk.tgz. For example:
13Sep2002-141437.mdsbk.tgz.
Usage mds_backup [-g -b {-d <target dir name>} -v -h]
Argument Description
Comments When using the -g or -b options, make sure that no GUI clients or
Eventia Reporter servers are connected. Otherwise, the backup may
contain inconsistencies due to database changes made during the
backup process.
It is important not to run mds_backup from one of the directories that will
be backed up. For example, when backing up an MDS, do not run
mds_backup from /opt/CPmds-R70 since it is a circular reference (zipping
the directory you need to write into).
Active log files are not backed up, in order to avoid read-during-write
inconsistencies. It is recommended to perform a log switch prior to the
backup procedure.
Further Info. The MDS configuration can be backed up without backing up the log
files. Such a backup will usually be significantly smaller in size than a
full backup with logs. To backup without log files, add the following line
to the file $MDSDIR/conf/mds_exclude.dat:
log/*
mds_restore
Description Restores a MDS that was previously backed up with mds_backup. For
correct operation, mds_restore should be restored onto a clean MDS
installation.
Usage mds_restore <backup file>
Note - The mds_restore command must use the script that was created in the directory into
which the backup file was created.
300
Command Line Reference
mds_user_expdate
Description This command is used to modify the expiration date of the users defined
in the CMAs.
Usage mds_user_expdate
Further Info. After entering the command mds_user_expdate, you are required to
choose between two modes:
• Run on all CMAs located on the MDS where the command is
executed.
• Run on a specific CMA.
After selecting the run method, specify the expiration date in the
following format: <dd-mmm-yyyy>, e.g., 24-Feb-2003.
Comments Make sure to disconnect any GUI client before running this utility so
that the changes made by the command will not be overwritten by the
client. This utility can work only on Active CMAs. After running this
utility, you will need to manually synchronize your CMAs.
mdscmd
Description This command is used to execute different commands on the MDS
system. It connects to an MDS Manager as a CPMI client and causes it
to execute one of the specified commands described below. Connection
parameters [-m MDS server -u user -p password] are required in order
to log into a remote MDS manager. If these arguments are omitted,
mdscmd connects to the local machine. As the command is a CPMI client,
it has an audit log.
Usage mdscmd <sub command and sub command parameters> [-m MDS server
-u user -p password]
mdscmd help
In This Section
mdscmd addcustomer
Description This command is used to create a Customer, locally or remotely. If
run remotely, add login details. A first CMA can be created at the
same time using this command.
Usage mdscmd addcustomer <customerName> [-n cma_name] [-i IP] [-t
target_mds] [-m mds -u user -p password]
302
Command Line Reference
mdscmd addcma
Description A customer must already be created in order to use this command.
Usage mdscmd addcma <customerName> <-i IP> [-n cma_name] [-t
target_mds] [-m mds -u user -p password]
304
Command Line Reference
Argument Description
Example Add a new CMA to the Customer BestCustomer using the Virtual IP address
4.4.4.4:
mdscmd addcma BestCustomer -i 4.4.4.4
Add a new CMA to the Customer BestCustomer named
BestCustomerCma using the Virtual IP address 4.4.4.4:
mdscmd addcma BestCustomer -i 4.4.4.4 -n BestCustomerCma
Add a new CMA to the Customer BestCustomer on host AnotherMds
using the Virtual IP address 4.4.4.4:
mdscmd addcma BestCustomer -i 4.4.4.4 -t AnotherMds
mdscmd addclm
Description Use the addclm sub-command to add a CLM to an existing Customer.
addclm adds either the first or any subsequent CLM of the Customer.
To add a CLM to a Customer, it must already have at least one CMA.
Usage mdscmd addclm <customerName> [-i IP] [-t target_mds] [-m mds
-u user -p password]
mdscmd deletecustomer
Description Use this command to delete an existing Customer. When deleting a
Customer, you also delete the Customer’s CMAs.
Usage mdscmd deletecustomer <customerName> -m mds -u user name -p
password
306
Command Line Reference
mdscmd deletecma
Description Use this command to delete an existing CMA.
Usage mdscmd deletecma <customerName> <-n cma_name | -i IP > [-m
mds -u user -p password]
Argument Description
mdscmd deleteclm
Description Use this command to delete an existing CLM.
Usage mdscmd deleteclm <customerName> <-i IP > [-m mds -u user -p
password]
308
Command Line Reference
mdscmd enableglobaluse
Description Use this command to connect a customer gateway to a Global VPN
Community. Executing this command with a customer’s name and a
gateway name, creates a global gateway object and a VPN Domain
object for the specific customer gateway in the Global database.
[-g global name] is used to determine the global gateway object
name. If [-g global name] is omitted, the global name will be
gGW1_of_CUST1 for the gateway GW1 and customer CUST1.
The VPN domain object will receive the same name as the global
gateway object with a ‘_Domain’ extension.
Usage mdscmd enableglobaluse <customerName> <gatewayName> [-g
globalName] [-m mds -u user -p password]
mdscmd disableglobaluse
Description Use this command to remove a customer global gateway object and
VPN Domain object from the global database.
Usage mdscmd disableglobaluse <customerName> <gatewayName> [-m
mds -u user -p password]
310
Command Line Reference
mdscmd startcma
Description Use this command to start an existing CMA.
Usage mdscmd startcma <customerName> <-n cma_name | -i IP > -m mds
-u user name -p password
Argument Description
mdscmd stopcma
Description Use this command to stop a running CMA.
Usage mdscmd stopcma <customerName> <-n cma_name | -i IP > -m mds
-u user name -p password
312
Command Line Reference
Argument Description
mdscmd migratecma
Description Use this command to migrate/import an existing source database
(from a Security Management server or CMA) into another CMA.
You can use mdscmd migratecma to import files created using the
export_database tool.
Usage mdscmd migratecma <customerName> <-l cma_path> <-n cma_name>
Example Migrate a source database from an NGX (R60) version CMA, named
MyFirstCMA, into the CMA BestCustomerCMA, defined for the Customer
BestCustomer:
mdscmd migratecma BestCustomer -l/opt/CPmds-R60/customers/
MyFirstCMA/CPfw1-R60 -n BestCustomerCMA
See also “cma_migrate” on page 285.
mdscmd mirrorcma
Description Use this command to mirror the CMA configuration from one MDS to
another MDS. This command is used to create CMA High Availability.
This command parses all Customers and checks which Customers
have a single CMA defined. If a Customer has a CMA on the source
MDS, a secondary CMA is created on the target MDS.
Usage mdscmd mirrorcma -s source_mds -t target_mds [-m mds -u user
-p password]
314
Command Line Reference
Example Mirror the configuration from the MDS FirstMDS to the MDS
SecondMDS:
mdscmd mirrorcma -s FirstMDS -t SecondMDS
mdsenv
Description This command prepares the shell environment variables for running MDS
level command lines or specific CMA command lines. Without an
argument, the command sets the shell for MDS level commands
(mdsstart, mdsstop, etc.).
Usage mdsenv [cma name]
mdsquerydb
Description The mdsquerydb command runs the Database Query Tool. The purpose of
the Database Query Tool is to allow advanced users to create UNIX shell
scripts which can easily access information stored inside the CheckPoint
Security Management server databases. These include the Global
Database (which are usually accessed from the Global SmartDashboard),
MDS Database (usually accessed from the MDG) and the CMA databases
Comments The purpose of the Database Query Tool is to provide advanced users of
Provider-1 with means of querying different Security Management server
databases from UNIX shell scripts. Some Database queries are
pre-defined in the configuration file. The configuration file
(queries.conf) can be found in $MDSDIR/conf. The file should not be
edited by the end-users in any case.
316
Command Line Reference
mdsstart
Description This command starts the MDS server and all CMAs. You can reduce the
time it takes to start and stop the MDS if you have many CMAs. To do
so, set the variable NUM_EXEC_SIMUL to the number of CMAs to be
launched or stopped simultaneously. When this variable is not defined,
the system attempts to start or stop up to 10 CMAs simultaneously.
Usage mdsstart [-m|-s]
mdsstat
Description This command utility gives detailed information on the status of the
processes of the MDS and CMAs, the up/down status per process.
Usage mdsstat [-h] [-m] [<cma name>]
mdsstop
Description This command stops the MDS server and all the CMAs. You can reduce
the time it takes to start and stop the MDS if you have many CMAs. To
do so, set the variable NUM_EXEC_SIMUL to the number of CMAs to be
launched or stopped simultaneously. When this variable is not defined,
the system attempts to start or stop up to 10 CMAs simultaneously.
Usage mdsstop [-m]
merge_plugin_tables
Description The merge_plugin_tables utility is included in the export_database
utility. It searches for all CMA or Security Management plug-ins and
merges the plug-in tables with the CMA or Security Management tables.
In linux 3.0 and Solaris 2.x and higher, the merge_plugin_tables tool
runs automatically when you run the export_database tool and its
output becomes part of the CMA database .tgz file.
If you have a Security Management running on FreeBSD, IPSO 6.x, or
Windows, you can and should use merge_plugin_tables to consolidate
your plug-in information before exporting files using migrate_assist.
Before using the merge_plugin_tables utility, you must:
1.Copy the export tool .tgz file for your operating system to the source
CMA or Security Management machine. The export tool files can be
found on your installation CD or on the Check Point support website,
http://support.checkpoint.com.
2.Unntar the export tool .tgz file to some path in the source machine.
A directory called export_tools is extracted.
3.Run the merge_plugin_tables command from the export_tools
directory.
Usage merge_plugin_tables <-p conf_dir> [-s] [-h]
318
Command Line Reference
Example To merge the plug-in tables of a CMA, CMA1, run the following
commands:
mdsenv cma1
merge_plugin_tables -p "$FWDIR"
migrate_assist
Description This utility is a helper utility for cma_migrate. It copies all relevant files
from the original source database (from a Security Management server or
CMA) to the MDS machine. It uses FTP to transfer the original source
database directories to current disk storage. This file copy is NOT
encrypted. Once finished with migrate_assist, you can run cma_migrate,
whose input directory is the output directory of migrate_assist.
It is recommended to use the export_database tool instead of
migrate_assist if your source machine is running on a running linux
3.0 or Solaris 2.x and higher operating system.
Usage $ migrate_assist
migrate_assist <source machine name/ip> <source FWDIR folder>
<user name> <password> <target folder> <source CPDIR folder>
Further Info. You can run the cma_migrate utility (or use the Import Customer
Management Add-on command in the MDG) after using this utility. The
source folder for these actions should be the destination folder of
migrate_assist.
When migrating from an NG source Security Management server or CMA,
the Name and IP address of the Primary Security Management
server/CMA object become the Name and IP address of the new CMA,
and are adjusted accordingly by cma_migrate. An ftp server must be
running on the source machine.
Before running migrate_assist, use the merge_plugin_tables tool if
you have plug-ins installed.
migrate_global_policies
Description This utility transfers (and upgrades, if necessary) the global policies
database from one MDS to the global policies database of another MDS.
migrate_global_policies replaces all existing Global Policies and
Global Objects. Each of the existing Global Policies is saved with a
*.pre_migrate extension.
If you only migrate the global policies (without the CMAs) to a new MDS,
you should disable any gateways that are enabled for global use.
You can migrate global policies from the following Provider-1 versions:
• R60, R60A, R61, R62, R65, R70
You can use migrate_global_policies to import files created using the
export_database tool.
Usage migrate_global_policies <path>
Example migrate_global_policies
/tmp/exported_global_db.22Jul2007-124547.tgz
320