CP R80 LoggingAndMonitoring AdminGuide
CP R80 LoggingAndMonitoring AdminGuide
R80
Administration Guide
Classification: [Protected]
© 2016 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Check Point R80
For more about this release, see the R80 home page
http://supportcontent.checkpoint.com/solutions?id=sk108623.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Logging and
Monitoring R80 Administration Guide.
Revision History
Date Description
31 March 2016 First release of this document
Contents
Important Information................................................................................................... 3
Terms ............................................................................................................................ 7
Welcome ....................................................................................................................... 9
Getting Started ............................................................................................................ 10
Logging and Monitoring Clients .............................................................................. 10
Understanding Logging ........................................................................................... 11
Deploying Logging ................................................................................................... 12
Deploying a Dedicated Log Server .................................................................................12
Configuring Logging ......................................................................................................12
Enabling Log Indexing ...................................................................................................13
Disabling Log Indexing ..................................................................................................13
Saving Logs on Security Gateways .................................................................................14
Configuring a Security Gateway to Save Logs Locally ....................................................14
Deploying SmartEvent............................................................................................. 15
SmartEvent Licensing....................................................................................................15
System Requirements ...................................................................................................15
Enabling SmartEvent on the Security Management Server ...........................................16
Deploying a Dedicated SmartEvent Server ....................................................................17
Configuring Dedicated Correlation Units .......................................................................20
Configuring SmartEvent to use a Non-Standard LEA Port .............................................21
Configuring SmartEvent to read External Logs .............................................................22
Administrator Permission Profiles ......................................................................... 23
Creating an Administrator .............................................................................................23
Permissions for Monitoring, Logging, Events, and Reports ...........................................24
Multi-Domain Security Management .............................................................................24
Locally Managing the Administrator ..............................................................................24
SmartEvent Reports-Only Permission Profile ...............................................................25
Importing Offline Log Files ..................................................................................... 26
Offline Work For Correlated Events...............................................................................26
Importing Log Files from SmartEvent Servers ..............................................................27
Views and Reports ....................................................................................................... 28
Deploying Views and Reports .................................................................................. 28
Catalog of Views and Reports.................................................................................. 29
Views ....................................................................................................................... 31
Customization................................................................................................................32
Export and Import..........................................................................................................33
Save As PDF ..................................................................................................................33
Reports.................................................................................................................... 34
Customization................................................................................................................35
Automatic Report Updates.............................................................................................37
Adding a Logo to Reports...............................................................................................37
Export and Import..........................................................................................................37
Generating a Report ......................................................................................................37
Generating a Predefined Report in the SmartEvent GUI Client ......................................38
Scheduling a Report ......................................................................................................38
Generating a Network Activity Report ...........................................................................39
Configuring Email Settings for Reports .........................................................................40
Widgets ................................................................................................................... 41
Adding and Customizing ................................................................................................41
Filters ............................................................................................................................43
Logging ....................................................................................................................... 44
Log Analysis ............................................................................................................ 44
Sample Log Analysis ............................................................................................... 44
Using the Log View .................................................................................................. 45
Working with Logs .................................................................................................. 46
Choosing Rules to Track ................................................................................................46
Viewing Rule Logs .........................................................................................................47
Searching the Logs ........................................................................................................47
Query Language Overview .............................................................................................50
Event Analysis ............................................................................................................. 54
Event Analysis with SmartEvent ............................................................................. 54
What is an Event? .................................................................................................... 54
How Are Logs Converted to Events? ..............................................................................54
Sample Application & URL Filtering Event Analysis ............................................... 55
The SmartEvent Solution ........................................................................................ 56
The Event Analysis Architecture ....................................................................................56
SmartEvent Correlation Unit .........................................................................................57
The SmartEvent GUI ......................................................................................................58
The SmartView Web Application ....................................................................................59
Working with SmartEvent ....................................................................................... 59
Opening the SmartEvent GUI Client ...............................................................................59
Working with Queries ....................................................................................................59
Investigating Events ......................................................................................................67
Configuring Event Definitions in the SmartEvent Policy Tab ..........................................68
System Administration ..................................................................................................89
SmartEvent High Availability Environment ....................................................................91
Monitoring Traffic and Connections ............................................................................ 92
SmartView Monitor Features .................................................................................. 92
SmartView Monitor scenarios........................................................................................93
To Start the Monitoring Views ................................................................................. 93
Immediate Actions .................................................................................................. 93
Deploying Monitoring .............................................................................................. 94
Monitoring and Handling Alerts .............................................................................. 94
Viewing Alerts ...............................................................................................................94
System Alert Monitoring Mechanism .............................................................................95
Monitoring Suspicious Activity Rules ...................................................................... 95
The Need for Suspicious Activity Rules ..........................................................................95
Creating a Suspicious Activity Rule................................................................................95
Creating a Suspicious Activity Rule from Results ..........................................................96
Managing Suspicious Activity Rules ...............................................................................97
How SmartView Monitor Works .............................................................................. 97
AMON ............................................................................................................................98
Defining Status Fetch Frequency ...................................................................................99
Configuring SmartView Monitor .............................................................................. 99
System Alerts and Thresholds.......................................................................................99
Working with SNMP Monitoring Thresholds ................................................................100
Customizing Results ....................................................................................................106
Setting Your Default View ............................................................................................110
Refreshing Views .........................................................................................................110
Monitoring Gateway Status ................................................................................... 110
Gateway Status ............................................................................................................110
Displaying Gateway Data .............................................................................................110
Starting and Stopping Cluster Members......................................................................115
Monitoring Tunnels ............................................................................................... 115
Tunnels Solution..........................................................................................................115
Tunnel View Updates ...................................................................................................116
Running Tunnel Views .................................................................................................116
Monitoring Traffic or System Counters ................................................................. 118
Traffic or System Counters Solution ............................................................................118
Select and Run a Traffic or System Counters View ......................................................120
Recording a Traffic or Counter View ............................................................................120
Monitoring Users .................................................................................................. 121
Users Solution .............................................................................................................121
Run a Users View .........................................................................................................121
Cooperative Enforcement ..................................................................................... 122
Cooperative Enforcement Solution ..............................................................................122
Running a Cooperative Enforcement View ...................................................................124
Log and Event Storage Maintenance ......................................................................... 126
Managing the Log and Event Database ................................................................. 126
Minimum Disk Space ............................................................................................. 126
Third-Party Log Formats .......................................................................................... 127
Importing Syslog Messages .................................................................................. 127
Generating a Syslog Parser and Importing syslog Messages ...................................... 127
Configuring SmartEvent to Read Imported Syslog Messages ...................................... 127
Importing Windows Events.................................................................................... 128
How Windows Event Service Works .............................................................................128
Administrator Support for WinEventToCPLog .............................................................128
Sending Windows Events to the Log Server .................................................................129
Working with SNMP .............................................................................................. 131
SNMP Best Practices Guide .........................................................................................131
Appendix: Manual Syslog Parsing ............................................................................. 132
Planning and Considerations ................................................................................ 132
The Parsing Procedure ......................................................................................... 133
Manual Syslog Parsing .......................................................................................... 133
The Free Text Parsing Language .......................................................................... 134
The Commands............................................................................................................134
Try ...............................................................................................................................135
Group_try ....................................................................................................................136
Switch ..........................................................................................................................137
Unconditional _try .......................................................................................................138
Include.........................................................................................................................139
add_field .....................................................................................................................139
Dictionary ....................................................................................................................143
Index.......................................................................................................................... 145
DLP
Terms
Data Loss Prevention. Detects and prevents
the unauthorized transmission of confidential
information.
Administrator
Event
A SmartConsole user with permissions to
A record of a security incident that is based
manage Check Point security products and
on one or more logs, and on a customizable
the network environment.
set of rules that are defined in the Event
Audit Log Policy.
Security Policy
A collection of rules that control network
traffic and enforce organization guidelines
for data protection and access to resources
with packet inspection.
SmartConsole
A Check Point GUI application used to
manage security policies, monitor products
and events, install updates, provision new
Welcome
Welcome
With R80, logging, event management, reporting, and monitoring are more tightly integrated than
ever before. Security data and trends easy to understand at a glance, with Widgets and chart
templates that optimize visual display. Logs are now tightly integrated with the policy rules. To
access logs associated with a specific rule, click that rule. Free-text search lets you enter specific
search terms to retrieve results from millions of logs in seconds.
One-click exploration makes it easy to move from high-level overview to specific event details
such as type of attack, timeline, application type and source. After you investigate an event, it is
easy to act on it. Depends on the severity of the event, you can ignore it, act on it later, block it
immediately, or toggle over to the rules associated with the event to refine your policy. Send
reports to your manager or auditors that show only the content that is related to each stakeholder.
In R80, SmartReporter and SmartEvent functionality is integrated into SmartConsole.
With rich and customizable views and reports, R80 introduces a new experience for log and event
monitoring.
The new views are available from two locations:
• SmartConsole > Logs & Monitor
• SmartView Web Application. Browse to: https://<Server IP>/smartview/ where Server IP is IP
address of the Security Management Server or SmartEvent server.
Getting Started
In This Section:
Logging and Monitoring Clients ...................................................................................10
Understanding Logging ................................................................................................11
Deploying Logging ........................................................................................................12
Deploying SmartEvent ..................................................................................................15
Administrator Permission Profiles ..............................................................................23
Importing Offline Log Files ..........................................................................................26
This section introduces the logging and monitoring clients, and explains how to install and
configure logging and monitoring products.
SmartView Web A SmartEvent Web application. It has the same real-time event
Application monitoring and analysis views as SmartConsole, with the convenience of
not having to install a client.
SmartEvent • For initial settings - configure the Correlation Unit, Log Servers,
Domains and Internal Network.
• To schedule Reports
• To configure the SmartEvent Correlation Unit
• For correlation policy (event definitions)
• For Automatic Reactions
SmartView Monitor • To monitor tunnels
• To monitor users
• For suspicious activity rules
• To monitor alerts - Thresholds configuration
For more about monitoring, see Monitoring Traffic and Connections (on
page 92).
Understanding Logging
Security Gateways generate logs, and the Security Management Server generates audit logs. The
Security Policy that is installed on each Security Gateway determines which rules generate logs.
Logs can be stored on a:
• Security Management Server that collects logs from the Security Gateways. This is the default.
• Log Server on a dedicated machine. This is recommended for organizations that generate a lot
of logs.
• Security Gateway. This is called local logging.
To find out how much storage is necessary for logging, see sk87263
http://supportcontent.checkpoint.com/solutions?id=sk87263.
In a Multi-Domain Security Management environment, the Security Gateways send logs to the
Domain Server or to dedicated Domain Log Servers. The Multi-Domain Server generates logs, and
they can be stored on the Multi-Domain Server or on a dedicated Multi-Domain Log Server. To
learn how to deploy logging in a Multi-Domain Security Management environment, see the R80
Multi-Domain Security Management Administration Guide
http://supportcontent.checkpoint.com/documentation_download?ID=46532.
To decrease the load on the Security Management Server, you can install a dedicated Log Server
and configure the gateways to send their logs to this Log Server. To see the logs from all the Log
Servers, connect to the Security Management Server with SmartConsole, and go to the Logs &
Monitor view Logs tab.
A Log Server handles log management activities:
• Automatically starts a new log file when the existing log file gets to the defined maximum size.
• Handles backup and restore for log files.
• Stores log files for export and import.
• Makes an index of the logs. Therefore, log queries work quickly.
Deploying Logging
In This Section
Deploying a Dedicated Log Server ...............................................................................12
Configuring Logging .....................................................................................................12
Enabling Log Indexing ..................................................................................................13
Disabling Log Indexing .................................................................................................13
Saving Logs on Security Gateways ..............................................................................14
Configuring a Security Gateway to Save Logs Locally ................................................14
On an open server:
1. Install R80 and run the First Time Configuration Wizard.
2. On the Installation Type page, select Security Management.
3. On the Products page, define the Security Management as Log Server / SmartEvent only.
On a Smart-1 appliance:
1. Run the First Time Configuration Wizard.
2. On the Installation Type page, select Security Management.
3. On the Products page, select Dedicated Server and SmartEvent.
Configuring Logging
You can configure logging from a Security Gateway to a Security Management Server or a Log
Server.
To configure logging:
1. Define one or more Log Servers (if you use them).
2. Enable logging on the Security Management Server and the Log Servers.
3. Configure the Security Gateways to send logs to the Domain Log Server or the Log Server.
4. Install the Policy.
6. On the General Properties > Management tab, select Logging & Status.
7. From the navigation tree, click Logs.
This shows the Security Gateways that forward logs to this machine.
8. Make sure that Enable Log Indexing is selected. It is enabled by default. If you clear this
option, it will take much more time to search the logs.
9. Click OK.
10. Click Publish.
11. Open Menu
12. Select Install Database.
13. The Install Database window opens.
14. Select the Log Server
To identify to the Log Server other network objects, that will send to and read logs from it,
install the database.
6. Click Publish.
7. From Menu, select Install Database.
When log indexing is disabled, you must connect with SmartConsole to each Log Server separately
to query its logs. When you connect to the management server you do not get a unified view of all
logs, as in Indexed mode. On each Log Server, the search is done in one log file at a time.
Deploying SmartEvent
SmartEvent Server is integrated with the Security Management Server architecture. It
communicates with Security Management Log Servers to read and analyze logs. You can enable
SmartEvent on the Security Management Server or deploy it as a dedicated server.
You can deploy R80 SmartEvent on a dedicated server and connect it to Security Management
Servers or Multi Domain servers of version R77.xx (or earlier). This lets you extend an R77.xx
environment with the new capabilities of R80 SmartEvent.
Only a Security Management Server can also work as a SmartEvent Server. In a Multi-domain
environment, you must install SmartEvent on a dedicated server.
Note - For R80, SmartReporter functionality (to generate reports on firewall and VPN activity) is
integrated into SmartConsole. To enable this functionality, activate the firewall session event on
the SmartEvent Policy tab. Select and enable Consolidated Sessions > Firewall Session. For
more, see Connecting SmartEvent Server to a Security Management Server ("Connecting the
SmartEvent Components to a Security Management Server" on page 18).
in This Section:
SmartEvent Licensing ..................................................................................................15
System Requirements ..................................................................................................15
Enabling SmartEvent on the Security Management Server .......................................16
Deploying a Dedicated SmartEvent Server .................................................................17
Configuring Dedicated Correlation Units ....................................................................20
Configuring SmartEvent to use a Non-Standard LEA Port ........................................21
Configuring SmartEvent to read External Logs ..........................................................22
SmartEvent Licensing
To deploy SmartEvent, you need a special license or contract. To get an evaluation license, contact
your sales representative. SmartEvent Server installed on an open server comes with a 45 day
trial period.
Check Point software is activated with a License Key. To generate a License Key, you need a
Certificate Key.
• To evaluate the product, register the Certificate Key that appears on the back of the software
media pack, in the Check Point UserCenter.
• For a permanent license, contact your reseller to get a Certificate Key.
System Requirements
To find the recommended Smart-1 appliance or open server for SmartEvent in your environment,
see the SmartEvent R80 Sizing Guide
http://supportcontent.checkpoint.com/solutions?id=sk109590.
To use SmartEvent, see the requirements in the R80 Release Notes
http://supportcontent.checkpoint.com/documentation_download?ID=46538.
.
8. In the SmartEvent Policy tab > Correlation Units, double-click the new Correlation Unit
object.
The window shows a list of all objects defined as Correlation units.
9. Select which Correlation Unit to enable and which Log Servers they read logs from.
10. Select:
• All Log Servers to read logs from
• The Log Server with the dedicated Correlation Unit
• The Log Server on SmartEvent R80
11. Click Save.
12. Install the Event Policy on the Correlation Unit: SmartEvent menu > Actions > Install Event
Policy
Creating an Administrator
To Create an Administrator
1. In SmartConsole, open Manage & Settings.
2. Click Administrators.
3. Click New Administrator.
The New Administrator window opens.
4. Enter a name for the administrator.
5. Select an Authentication method.
6. In the Permission Profiles area, select a permission profile, or click New and create a
permission profile.
7. In a new profile, in the Overview tab, configure Permissions. If you select Customized, you can
select these options for the features:
• Not selected - The administrator cannot see the feature.
Note - If you cannot clear a resource selection, the administrator access to it is mandatory,
and you cannot make it invisible
• Selected - The administrator can see the feature.
• Read - The administrator can see the feature but cannot change it.
• Write - The administrator can see and change the feature.
Some resources do not have the Read or Write option. You can only select (for full
permissions) or clear (for no permissions) these resources.
8. Optional: In the Expiration area, define an expiration date for the administrator account.
9. Optional: In the left of the window:
a) Click Additional.
b) Enter the personal information (email, phone number) for the administrator.
10. Click OK.
You can create rich and customizable views and reports for log and event monitoring, that inform
key stakeholders about security activities.
The views are available from two locations:
• SmartConsole > Logs & Monitor. Here you can also generate reports.
• SmartView Web Application. By browsing to: https://<Server IP>/smartview/
Where Server IP is IP address of the Security Management Server or SmartEvent server.
For a quick overview of Views and Reports in R80, see the online tutorial
https://sc1.checkpoint.com/documents/R80/CP_SmartEvent_R80_Views_and_Reports_Tutorial_w
eb/EN/html_frameset.htm.
Item Description
1 Open Log View - See and search through the logs from all Log Servers. You can also
search the logs from a Log Server that you choose.
Open Audit Logs View - See and search records of actions done by SmartConsole
administrators.
These views come from the Log Servers. Other views come from the SmartEvent Server.
2 Compliance View - Optimize your security settings and ensure compliance with
regulatory requirements.
3 Views - The list of predefined and customized views. A view is an interactive dashboard
made up of widgets. The view tells administrators and other stakeholders about security
and network events. Each widget is the output of a query. Widgets can show the
information as a graph, table, or some other format. To find out more about the events,
double-click a widget to drill down to a more specific view or raw log files.
4 Reports - The list of predefined and customized reports. A report has multiple views, and
applies to the time that the report is generated. It gives more details than a view. There
are several predefined reports, and you can create new reports. Reports can be
customized, filtered, generated and scheduled. You cannot drill down into a report. A
report is divided onto pages.
5 Favorites - Use this view to collect the views and reports you use the most.
Item Description
6 Switch to Table View or Thumbnails View - The Table view is the default for views and
reports. The Thumbnails view is the default for the Favorites and Recents.
7 External Apps
• SmartEvent Settings & Policy - The SmartEvent GUI client. Use it for initial setup and
to define the SmartEvent Correlation Unit policy. The views in SmartConsole are a
replacement for those in the SmartEvent GUI client.
• Open Tunnel and User Monitoring - The SmartView Monitor GUI Client. The
monitoring views in SmartConsole are a replacement for those in the SmartView
Monitor GUI client, except for Tunnel and User Monitoring.
• SmartView Web Application - A SmartEvent Web application that you can use to
analyze events that occur in your environment. Use it to see an overview of the
security information for your environment. It has the same real-time event monitoring
and analysis views as SmartConsole, with the convenience of not having to install a
client.
Views
Views tells administrators and other stakeholders about security and network events. A view is an
interactive dashboard made up of widgets. Each widget is the output of a query. A Widget can
show information in different formats, for example, a graph or a table.
SmartConsole comes with several predefined views. You can create new views that match your
needs, or you can customize an existing view.
In the Logs & Monitor view, clicking the (+) tab opens a catalog of all views and reports, predefined
and customized. Click a view to open it.
Item Description
1 Widget- The output of a query. A Widget can show information in different formats, for
example, a graph or a table.
2 Drill Down - To find out more about the events, double-click a widget to drill down to a
more specific view or raw log files.
6 Query search bar - Define custom queries using the GUI tools, or manually entering
query criteria. Shows the query definition for the most recent query.
Customization
Customize your views according to these options:
View Settings
1. Enter a title.
2. To show more results, this option allows a table to spread across multiple pages when saved
to PDF.
The No page limit option shows more results by spreading them across a number of pages.
Save As PDF
The Save as PDF option saves the current view as a PDF file, based on the defined filters and time
frame.
Reports
A report has multiple views, and applies to the time that the report is generated. It gives more
details than a view. There are several predefined reports, and you can create new reports. Reports
can be customized, filtered, generated and scheduled. You cannot drill down into a report
In the Logs & Monitor view, clicking the (+) tab opens a catalog of all views and reports, predefined
and customized. Click a report to open it.
Item Description
1 Preview bar - A report is divided onto pages, usually, one view on one page. Editing a
report is done per page, in the same way as you edit a view.
4 Query Search bar - Define custom queries using the GUI tools, or manually entering
query criteria. Shows the query definition for the most recent query.
Customization
Customize your reports according to these options:
Report Settings
Reports can be configured according to these options:
Customizing a Report
1. Select a report from the Catalog (new tab).
2. Click Options > Edit.
3. Select the page to edit.
You can also add or remove pages by clicking one of these:
Note -
• Use the timeframe to see how the report will look.
• The timeframe and search bar are not saved with the report definition. Define them as
needed when generating the report (Save as PDF).
See: Generating a Report (on page 37)
6. Click Schedule.
7. Configure the days and times that this custom report runs automatically.
Generating a Report
1. Open the Catalog (new tab) and select a report.
2. Define the required timeframe and filter in the search bar.
3. Click Options > Save As PDF.
Scheduling a Report
To schedule a report you need to define and edit it in the SmartEvent GUI client.
Note - Reports in the SmartEvent GUI client are different from reports in SmartConsole or the
SmartView Web Application. To customize a report before scheduling, edit the report in the
SmartEvent GUI client:
1. Open the Report tab
2. Select the report from the Report tree.
3. Click Edit.
To schedule a report:
1. Open SmartConsole > Logs & Monitor.
2. Click the (+) to open a Catalog (new tab).
3. Click the SmartEvent Settings & Policy link.
4. In the SmartEvent GUI client, select Schedule.
Widgets
In This Section:
Adding and Customizing ...............................................................................................41
Filters ............................................................................................................................43
To customize a widget:
Filters
The search bar is used to apply on-demand filters, but you can also save filters with the view /
report definition.
Logging
In This Section:
Log Analysis ..................................................................................................................44
Sample Log Analysis ....................................................................................................44
Using the Log View .......................................................................................................45
Working with Logs ........................................................................................................46
Log Analysis
SmartConsole lets you transform log data into security intelligence. Search results are fast and
immediately show the log records you need. The Security Gateways send logs to the Log Servers
on the Security Management Server or on a dedicated server. Logs show on the SmartConsole
Logs & Monitor Logs tab. You can:
• Quickly search through logs with simple Google-like searches.
• Select from many predefined search queries to find the applicable logs.
• Create your own queries using a powerful query language.
• Monitor logs from administrator activity and connections in real-time.
Item Description
1 Queries - Predefined and favorite search queries.
3 Query search bar - Define custom queries in this field. You can use the GUI tools or
manually enter query criteria. Shows the query definition for the most recent query.
4 Log statistics pane - Shows top results of the most recent query.
5 Results pane - Shows log entries for the most recent query.
Tracking Options
• Network Log - Generates a log with only basic Firewall information: Source, Destination,
Source Port, Destination Port, and Protocol.
• Log - Equivalent to the Network Log option, but also includes the application name (for
example, Dropbox), and application information (for example, the URL of the Website). This is
the default Tracking option.
• Full Log - Equivalent to the log option, but also records data for each URL request made.
• If suppression is selected, it generates a complete log from pre-R80 management
• If suppression is not selected
• None - Do not generate a log.
You can add these options to a Log, Full Log, or Network Log:
• Accounting - If selected, update the log every 10 minutes, to show how much data has passed
in the connection: Upload bytes, Download bytes, and browse time.
• Suppression - If there are multiple equivalent connections:
• If selected, one log is generated every three hours for all the connections. This is the
default.
• If not selected, there is a log for each Rule Base match (an extended log in pre-R80
management).
Alert:
If an Alert is selected, Log is selected automatically.
• None - Do not generate an alert.
• Alert - Generate a log and run a command, such as: Show a popup window, send an email
alert or an SNMP trap alert, or run a user-defined script as defined in the Menu > Global
Properties > Log and Alert > Alerts.
• SNMP - Send an SNMP alert to the SNMP GUI, or run the script defined in: Menu > Global
Properties > Log and Alert > Alerts.
• Mail - Send an email to the administrator, or run the mail alert script defined in: Menu >
Global Properties > Log and Alert > Alerts.
• User Defined Alert - Send one of three possible customized alerts. The alerts are defined by
the scripts specified in the Menu > Global Properties > Log and Alert > Alerts.
Running Queries
To create and run a query:
1. In the query search bar, click Enter Search Query (Ctrl+F).
2. Enter or select query criteria.
The query runs automatically. When you add more criteria, results are updated dynamically.
The query continues to update every five seconds while Auto-Refresh is enabled. If the number of
logs exceeds 100 in a five-second period, the logs are aggregated, and the summary view shows.
To see all logs that have been aggregated in a specific time interval, click View.
Criteria Values
Criteria values are written as one or more text strings. You can enter one text string, such as a
word, IP address, or URL, without delimiters. Phrases or text strings that contain more than one
word must be surrounded by quotation marks.
Phrase examples
• "John Doe"
• "Log Out"
• "VPN-1 Embedded Connector"
IP Addresses
IPv4 and IPv6 addresses used in log queries are counted as one word. Enter IPv4 address with
dotted decimal notation and IPv6 addresses with colons. You can also use the '*' wildcard
character with IP addresses.
Example:
• 192.0.2.1
• 2001:db8::f00:d
NOT Values
You can use NOT <field> values with field keywords (on page 52) in log queries to find logs for
which the value of the field is not the value in the query.
Syntax
NOT <field>:<value>
Example
NOT src:10.0.4.10
Wildcards
You can use the standard wildcard characters (* and ?) in queries to match variable characters or
strings in log records. The wildcard character cannot be the first character in a query criterion.
You can use more than the wildcard character.
Wildcard syntax
• The ? (question mark) matches one character.
• The * (asterisk) matches a character string.
Examples:
• Jo? shows Joe and Jon, but not Joseph.
• Jo* shows Jon, Joseph, and John Paul.
If your criteria value contains more than one word, you can use the wildcard in each word. For
example, 'Jo* N*' shows Joe North, John Natt, Joshua Named, and so on.
Examples:
• 192.168.2.* shows all records for 192.168.2.0 to 192.168.2.255 inclusive
• 192.168.* shows all records for 192.168.0.0 to 192.168.255.255 inclusive
Field Keywords
You can use predefined field names as keywords in filter criteria. The query result only shows log
records that match the criteria in the specified field. If you do not use field names, the query result
shows records that match the criteria in all fields.
This table shows the predefined field keywords. Some fields also support keyword aliases that you
can type as alternatives to the primary keyword.
source src Traffic source IP address, DNS name or Check Point network
object name
Examples:
• source:192.168.2.1
• action:(Reject OR Block)
You can use the OR Boolean operator in parentheses to include multiple criteria values.
Important - When you use fields with multiple values, you must:
• Write the Boolean operator, for example AND.
• Use parentheses.
Boolean Operators
You can use the Boolean operators AND, OR, and NOT to create filters with many different criteria.
You can put multiple Boolean expressions in parentheses.
If you enter more than one criteria without a Boolean operator, the AND operator is implied. When
you use multiple criteria without parentheses, the OR operator is applied before the AND operator.
Examples:
• blade:"application control" AND action:block
Shows log records from the Application & URL Filtering Software Blade where traffic was
blocked.
• 192.168.2.133 10.19.136.101
Shows log entries that match the two IP addresses. The AND operator is presumed.
• 192.168.2.133 OR 10.19.136.101
Shows log entries that match one of the IP addresses.
• (blade:Firewall OR blade:IPS OR blade:VPN) AND NOT action:drop
Shows all log entries from the Firewall, IPS or VPN blades that are not dropped. The criteria in
the parentheses are applied before the AND NOT criterion.
• source:(192.168.2.1 OR 192.168.2.2) AND destination:17.168.8.2
Shows log entries from the two source IP addresses if the destination IP address is
17.168.8.2. This example also shows how you can use Boolean operators with field criteria.
Event Analysis
In This Section:
Event Analysis with SmartEvent ..................................................................................54
What is an Event?..........................................................................................................54
Sample Application & URL Filtering Event Analysis ..................................................55
The SmartEvent Solution .............................................................................................56
Working with SmartEvent ............................................................................................59
What is an Event?
An event is a record of a security incident. It is based on one or more logs, and o rules that are
defined in the Event Policy.
An example of an event that is based on one log: A High Severity Anti-Bot event. One Anti-Bot log
with a Severity of High causes the event to be recorded.
An example of an event that is based on more than one log: A Certificate Sharing event. Two login
logs with the same certificate and a different user cause the event to be recorded.
3 SmartEvent Identifies events: Analyzes each log entry from a Log Server, and
Correlation Unit looks for patterns according to the installed Event Policy. The logs
contain data from Check Point products and certain third-party
devices. When a threat pattern is identified, the SmartEvent
Correlation Unit forwards the event to the SmartEvent Server.
4 SmartEvent Server Receives the items that are identified as events by the SmartEvent
Correlation Unit. The SmartEvent Server does further analysis to
determine the severity level of the event and what action to do. The
event is stored in the system database.
6 SmartEvent client Shows the received events. Uses the clients to manage events (for
example: to filter and close events), fine-tunes, and installs the
Event Policy. The clients are:
• SmartConsole
• SmartEvent GUI
• SmartView Web Application
The SmartEvent components can be installed on one computer (that is, a standalone deployment)
or multiple computers and sites (a distributed deployment). To handle higher volumes of logging
activity, we recommend a distributed deployment. You can install more than one SmartEvent
Correlation Unit. Each SmartEvent Correlation Unit can analyze logs from more than one Log
Server or Domain Log Server.
Overviews:
The Overview tab shows top events of all types. When you work with a protection type, you can go
directly to the data for that area.
Predefined Queries
SmartEvent provides a thorough set of predefined queries, which are appropriate for many
scenarios.
Queries are organized by combinations of event properties, for example:
• Threat Prevention, which includes queries of Threat Prevention events, including IPS events.
• Ticketing, such as ticket State.
• More > By IP, either the Source or Destination IP address.
• More > By Severity, such as Critical, High, and Medium.
Custom Queries
SmartEvent gives you the flexibility to define custom queries that show the most related events
and trends. After you define custom queries, you can organize them into folders. That way, they
are easy to find and use.
Use your queries to:
• Show an overview of events with specified characteristics in the Events tab.
• Generate reports to analyze specified events and trends in the Reports tab.
Customizing Query Filters
You can work with queries in the Events windows. To learn about procedures and to work with
report queries, see the Reports section.
Note - If you clear the Show option for a criterion that does not have a filter applied, that
criterion automatically moves to the Ignored list. This action is equivalent to the use of the
Remove button.
Item Description
1 Query Tree - Double-click a query to run the query. The results show in the event List.
2 Event Statistics pane - Shows the top events, destinations, sources and users of the
query results, either as a chart or in a tallied list.
Event List
The SmartEvent Event List in SmartConsole and in the SmartEvent GUI can show up to 100,000
events. The events shown are the result of a query that ran on the Event Database. To run a
different query, double-click a query in the Selector tree. The Event List show the events that
match the criteria of the query.
The Event List is where detected events can be filtered, sorted, grouped, sent for review, and
exported to a file. This helps to understand your network security status. Event details, such as
Start and End Time, Event Name and Severity, are shown in a grid. In the Status bar at the
bottom of the SmartConsole and SmartEvent client window, Number of records in view shows a
count of new events. Refresh retrieves the data from the database according the active query
filter.
The details of an event provide important specifics about the event: Type of event, origin, service,
and number of connections. To access event details, double-click the event or show the Event
Preview Pane.
Queries are built with default settings that can be changed directly in the Events tab to provide
more specified or more comprehensive results.
• The time frame Last... selection lets you select the period of time for which events are shown.
• The Event number selection sets the number of events that show from the query (default is
5,000 events). Up to 100,000 events can be shown and managed at one time.
• The Group By selection is useful to:
• Divide data by specified criteria.
• Immediately show the number of events for each grouping.
Filtering Events
After you run a query, you can right-click a column and define the filter parameters to filter the
event data. This temporarily includes the filter in the active query and runs the query again against
the database to return the matching values.
A green filter icon at the top of a column indicates that a filter is applied to that field. To save the
new set of filters as a custom query, select Save from the File menu. To discard the filters that
was not saved, run the query again.
Grouping Events
One of the most powerful ways to analyze event data: To group the data based on the specified
columns, and use the Group By button on the toolbar. Group the events by one or more columns.
The Event List shows the number of matching events in those groups, presented in descending
sequence.
To specify the default grouping that a query uses, mark fields as Grouped in the Events Query
Properties ("Customizing Query Filters" on page 60) window.
The top line of each group in the Event List shows a summary of the events that it contains. Hover
over a field in the top line to see details of what data that field contains in this group events.
You can filter in or out any value in the Event Statistics Pane to focus the query results on the data
that is most important to you. Filtering in the Event Statistics pane is also reflected in the Event
List, and clearing filters from the Event Statistics Pane clears all filters that have been applied to
the query.
• To remove events that have any specific field value, right-click on the value and select Filter
out.
• To include only events that have a specific field value, right-click on the value and select
Follow.
To remove the extra conditions you have applied, click on the Clear Filter icon.
Event Details
See the details of an event from the Preview Pane in the Events tab or by double-clicking on the
event in the Event List. The Event Details window has two tabs with different data:
• Summary tab - Shows a brief summary of the event in a user-friendly format.
• Details tab - Shows the full, technical details of the event.
These options are available from the Event Details window:
Details Tab
The Details tab includes:
• Details about the Software Blade and rule that caused the event.
• Ticketing information for the event - Use this to track activity related to the event.
• General Event Information - Includes the severity for the event and a unique ID.
• Traffic Information - Where the event originated, its destination, and the size of the data in
bytes.
• Event Detection - How and when the event was detected and by which Security Gateway.
• More - Additional information related to the connections involved in the event and the source.
Summary Tab
The Summary tab includes:
• The source of the activity. If Identity Awareness is enabled, this can be the user name.
• A brief description of the event.
• The action taken on the event.
• The time of the event.
• Other important data related to the event.
Browse Time
The Browse Time feature keeps track of the total time that users are connected to different sites
and applications. R76 and later Security Gateways calculate the cumulative connection time for
each session and periodically updates this value until the session is closed.
Investigating Events
After you arrange the events as you like in the Event List, you can investigate their details and
evaluate if they represent a threat.
• To edit an Event Ticket, open the event and click Edit Ticket.
Packet Capture
If a log has related packet captures, you can open a packet viewer to see the contents of the
captured packet. To examine this more, save the packet capture to a file.
To use the Packet Capture feature, you must activate blades.
To activate blades:
1. In a Security Management Server deployment, activate the Logging & Status Software Blade
on the Security Management Server.
2. In a Multi-Domain Security Management deployment:
a) Connect to SmartConsole for the Domain Server.
b) In the Gateways & Servers tab, double-click the Domain Server object.
c) In the General pane, select SmartEvent.
4. Optional: Select Actions > Packet Capture Configuration to define an application in which to
see packet capture information.
The options are:
• The SmartEvent Internal Viewer.
• A windows program related to this file type.
• To select a program, enter the program executable file name, and required arguments.
Policy Tab
Define the Event Policy in the Event Policy tab. Most configuration steps occur in the Policy tab.
You define system components, such as SmartEvent Correlation Unit, lists of blocked IP
addresses and other general settings.
The types of events that SmartEvent can detect are listed here, and sorted into a number of
categories. To change each event, change the default thresholds and set Automated Responses.
You can also disable events.
The Policy tab has these sections:
• Selector Tree - The navigation pane.
Revert Changes
You can undo changes to the Event Policy, if they were not saved.
To undo changes: click File > Revert Changes.
Event Threshold
The Event Threshold allows you to modify the limits that, when exceeded, indicates that an event
has occurred. The limits typically are the number of connections, logs, or failures, and the period
of time in which they occurred. It appears thus:
Detect the event when more than x connections/logs/failures (etc.) were detected over a period
of y seconds.
To decreasing the number of false alarms based on a particular event, increase the number of
connections, logs or failures and/or the period of time for them to occur.
Severity
An event severity affects in which queries (among those that filter for severity) this type of event
will appear.
To modify the severity of an event, select a severity level from the drop-down list.
Automatic Reactions
When detected, an event can activate an Automatic Reaction. The SmartEvent administrator can
create and configure one Automatic Reaction, or many, according to the needs of the system.
For example: A Mail Reaction can be defined to tell the administrator of events to which it is
applied. Multiple Automatic Mail Reactions can be created to tell a different responsible party for
each type of event.
defined in chkpnnt.mib, or in a file that refers it. If the OID field is left blank, the value is
determined from iso.org.dod.internet.private.enterprises.checkpoint.products.fw.fwEvent =
1.3.6.1.4.1.2620.1.1.11.
When the automatic reaction occurs, the SNMP Trap is sent as a 256 byte DisplayString
text. But, if the OID type is not text, the message is not sent.
4. Select Save.
Working Hours
Working Hours are used to detect unauthorized attempts to access protected systems and other
forbidden operations after-hours. To set the Regular Working Hours for an event, select a Time
Object that you have configured from the drop-down list.
Exceptions
Exceptions allow an event to be independently configured for the sources or destinations that
appear. For example, if the event Port Scan from Internal Network is set to detect an event when
30 port scans have occurred within 60 seconds, you can also define that two port scans detected
from host A in 10 seconds of each other is also an event.
To manually add an exception, under the heading Apply the following exceptions, click Add and
select the Source and/or Destination of the object to apply different criteria for this event.
Note - If you do not see the host object listed, you may need to create it in
SmartEvent (see "Adding Network and Host Objects" on page 89).
To match the Event Definition "A", a log from Endpoint Security must match the Action, Event
Type, Port, and Protocol values listed in the Endpoint Security column. A log from a Security
Gateway must match the values listed in its column.
SmartEvent divides this procedure into two steps. The SmartEvent Correlation Unit first checks if
the Product value in the log matches one of the permitted Product values of an Event Definition.
If Log 1 did not contain a permitted Product value, the SmartEvent Correlation Unit compares the
log against Event Definition "B", and so on. If the log fails to match against an Event Definition, it
is discarded.
The SmartEvent Correlation Unit checks if the log contains the Product-specific criteria to match
the Event Definition. For example: The product Endpoint Security generates logs that involve the
Firewall, Spyware, Malicious Code Protection, and others. The log contains this information in the
field Event Type. If an event is defined to match on Endpoint Security logs with the event type
Firewall, an Endpoint Security log with Event Type "Spyware" fails against the Event Definition
filter. Other criteria can be specified to the Product.
In our example, Log 1 matched Event Definition "A" with a permitted product value. The
SmartEvent Correlation Unit examines if the log contains the necessary criteria for an Endpoint
Security log to match.
If the criteria do not match, the SmartEvent Correlation Unit continues to compare the log criteria
to other event definitions.
Notes -
• The Event Candidate can track logs from multiple products
• The logs must be from the same source
• The Event Candidate tracks logs before all of the criteria were matched
Each Event Definition can have multiple event candidates, each of which keeps track of logs
grouped by equivalent properties. In the figure above the logs that create the event candidate have
a common source value. They were dropped, blocked or rejected by a Firewall. They are grouped
together because the Event Definition is designed to detect this type of activity, that originates
from one source.
When a log matches the event definition, but has properties different than those of the existing
event candidates, a new event candidate is created. This event candidate is added to what can be
thought of as the Event Candidate Pool.
Note - SmartEvent creates a new event candidate for a log with a different source.
To illustrate more, an event defined detects a high rate of blocked connections. SmartEvent tracks
the number of blocked connections for each Firewall, and the logs of the blocked traffic at each
Firewall forms an event candidate. When the threshold of blocked connection logs from a Firewall
is surpassed, that Firewall event candidate becomes an event. While this Event Definition creates
one event candidate for each Firewall monitored, other Event Definitions can create many more.
The Event Candidate Pool is a dynamic environment, with new logs added and older logs discarded
when they have exceeded an Event Definition time threshold.
New New Custom Launches the Event Definition Wizard, which allows you to select how to base the
event: on an existing Event Definition, or from scratch.
Event
Save As Save Event As Creates an Event Definition based on the properties of the
highlighted Event Definition. When you select Save As, the system
prompts you to save the selected Event Definition with a new name
for later editing. Save As can also be accessed from the Properties
window.
All User Defined Events are saved at Policy tab > Event Policy > User Defined Events. When an
Event Definition exists it can be modified through the Properties window, available by right-click
and from the Actions menu.
11. Edit or add product filters for each log necessary in the Event Definition filter:
a) Select the Log field from the available Log Field list.
b) Click Add to edit the filter.
c) Make sure that the filter matches on All Conditions or Any Conditions.
d) Double-click the Log field and select the values to use in the filter.
Click Next.
12. When you defined the filters for each product, select values for these options to define how to
process logs:
• Detect the event when at least __ logs occurred over a period of __ seconds contains the
event thresholds that define the event. You can modify the event thresholds by altering the
number of logs and/or the period of time that define the event.
• Each event definition may have multiple Event Candidates existing simultaneously allows
you to set whether SmartEvent creates distinct Event Candidates based on a field (or set of
fields) that you select below.
Select the field(s) by which distinct Event Candidates will be created allows you to set the
field (or set of fields) that are used to differentiate between Event Candidates.
• Use unique values of the __ field when counting logs directs SmartEvent to count unique
values of the specified field when determining whether the Event Threshold has been
surpassed. When this property is not selected, SmartEvent counts the total number of logs
received.
13. Click Finish.
For example: Multiple logs that report a virus detected on the same source with the
same virus name are combined into the same event.
Multiple logs — Required for events that identify an activity level, such as a High
Connection Rate.
When the event is triggered by multiple logs, set the behavior of Event Candidates:
Detect the event when at least... — Set the Event Threshold that, when exceeded,
indicates that an event has occurred.
Select the field(s) by which distinct event candidates will be created — An event is
generated by logs with the same values in the fields specified here. To define how logs
are grouped into Event Candidates, select the related fields here.
Use unique values of the ...— Only logs with unique values for the fields specified here
are counted in the event candidate. For example: A port scan event counts logs that
include unique ports scanned. Also, the logs do not increment the log count for logs
that contain ports already encountered in the event candidate.
Advanced — Define the keep=alive time for the event, and how often the SmartEvent
Correlation Unit updates the SmartEvent server with new logs for the created event.
• Event Format
When an event is generated, information about the event is presented in the Event Detail
pane.
This screen lets you specify if the information will be added to the detailed pane and from
which Log Field the information is taken.
You can clear it in the Display column. The Event Field will not be populated.
• GUI representation
All events can be configured. This screen lets you select the configuration parameters that
show.
The Threshold section shows the number of logs that must matched to create the
event. This is usually not shown for one log events and shown for multiple log events.
The Exclude section lets you specify the log fields that show when you add an event
exclusion.
The Exception section lets you specify the log fields that show when you add an event
exception.
3. Click OK to save your changes.
NIS Scans Port scan from NIS servers Any - Multiple NIS
Servers internal queries
network
HTTP Scans IP sweep from Proxy servers Any HTTP/ Proxy servers
Proxy internal HTTPS connections out
Servers - network to various sites
Out to the
Web
System Administration
To maintain your SmartEvent system, you can do these tasks from the General Settings section of
the Policy tab:
• Adding a SmartEvent Correlation Unit and Log Servers (see "Configuring Dedicated
Correlation Units" on page 20)
• Create offline jobs analyze historical log files ("Importing Offline Log Files" on page 26)
• Adding objects to the Internal Network (see "Defining the Internal Network" on page 90)
• Creating scripts to run as Automatic Reactions for certain events ("Creating an External Script
Automatic Reaction" on page 73)
• Creating objects for use in filters (see "Adding Network and Host Objects" on page 89)
Revert Changes
You can undo changes to the Event Policy, if they were not saved.
To undo changes: click File > Revert Changes.
How it works
Dbsync initially connects to the management server with which SIC is established. It retrieves all
the objects. After the initial synchronization it gets updates when an object is saved. Dbsync
registers all the High Availability management machines and periodically tests the connectivity
with the newest management server. If connectivity is lost, it attempts to connect to the other High
Availability management servers until it finds an active one and connects to it.
If two management servers are active concurrently, dbsync stays connected to one management
server. Dbsync does not get changes made on the other management server until a
synchronization operation is done.
SmartView Monitor gives you a complete picture of network and security performance. Use it to
respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow
patterns or security activities.
SmartView Monitor is a high-performance network and security analysis system. This system
helps you to establish work habits based on learned system resource patterns. Based on Check
Point Security Management Architecture, SmartView Monitor provides a single, central interface,
to monitor network activity and performance of Check Point Software Blades.
• System Counters
• VPN tunnel monitoring (SmartView Monitor only)
• Cooperative Enforcement, for Endpoint Security Servers
• Traffic
In SmartView Monitor you can create customized monitoring view.
Immediate Actions
If the status shows an issue, you can act on that network object.
For example:
• Disconnect client - Disconnect one or more of the connected SmartConsole clients.
• Start/Stop cluster member - You can see all Cluster Members of a Gateway Cluster in
SmartView Monitor. You can start or stop a selected Cluster Member.
• Suspicious Action Rules - You can block suspicious network activity while you investigate the
real risk or to quickly block an obvious intruder.
Logging and Monitoring Administration Guide R80 | 93
Monitoring Traffic and Connections
Deploying Monitoring
To monitor a Gateway in the Logs & Monitor view of SmartConsole, or in SmartView Monitor:
• You need a Security Management Server and one or more Security Gateways.
• Enable the Monitoring blade on the Security Management Server and Security Gateways.
No other deployment steps are necessary.
Viewing Alerts
Alert commands are set in SmartConsole > Global Properties > Log and Alert > Alerts page. The
Alerts in this window apply only to Security Gateways.
To see alerts:
1. Click the Alerts icon in the toolbar.
The Alerts window opens.
To block an activity:
1. In the SmartView Monitor toolbar, click the Suspicious Activity Rules button.
The Enforced Suspicious Activity Rules window opens.
2. Click Add.
The Block Suspicious Activity window opens.
3. In Source and in Destination, select IP or Network:
• To block all sources or destinations that match the other parameters, enter Any.
Logging and Monitoring Administration Guide R80 | 95
Monitoring Traffic and Connections
• To block one suspicious source or destination, enter an IP Address and Network Mask.
4. In Service:
• To block all connections that fit the other parameters, enter Any.
• To block one suspicious service or protocol, click the button and select a service from the
window that opens.
5. In Expiration, set your examining time limit.
6. Click Enforce.
You can create a Suspicious Activity rule based on TCP or UDP use.
6. Click Enforce.
For example:
Your corporate policy does not allow to share peer2peer file, and you see it in the Traffic > Top
P2P Users results.
1. Right-click the result bar and select Block Source.
The SAM rule is set up automatically with the user IP address and the
P2P_File_Sharing_Applications service.
2. Click Enforce.
3. For the next hour, while this traffic is dropped and logged, contact the user.
Gateway Status is similar in operation to the SNMP daemon that provides a mechanism to get data
about gateways in the system.
SIC is initialized between Security Gateways (1) (local and remote) and the Security Management
Server (2). The Security Management Server then gets status data from the Software Blades with
the AMON (Application Monitoring) protocol. SmartView Monitor (3) gets the data from the Security
Management Server.
AMON
The Security Management Server acts as an AMON client. It collects data about installed Software
Blades. Each Security Gateway, or any other OPSEC gateway which runs an AMON server, acts as
the AMON server itself. The gateway requests status updates from other components, such as the
Firewall kernel and network servers. Requests are fetched at a defined interval.
An alternate source for status collection can be any AMON client, such as an OPSEC partner,
which uses the AMON protocol.
The AMON protocol is SIC- based. It can collect data only after SIC is initialized.
2. Select thresholds.
3. In Action, select:
• none - No alert.
• log - Sends a log entry to the database.
• alert - Opens a pop-up window to your desktop.
• mail - Sends a mail alert to your Inbox.
• snmptrap - Sends an SNMP alert.
• useralert - Runs a script. Make sure a user-defined action is available. Go to
SmartConsole > Global Properties > Log and Alert > Alert Commands.
Note - SNMP monitoring thresholds are supported from R75.20, R71.30, and higher.
In each category there are many individual thresholds that you can set. For example, the hardware
category includes alerts for the state of the RAID disk, the state of the temperature sensor, the
state of the fan speed sensor, and others. For each individual threshold, you can configure:
• If it is enabled or disabled
• How frequently alerts are sent
• The severity of the alert
• The threshold point (if necessary)
• Where the alerts are sent to
You can also configure some settings globally, such as how often alerts are send and where they
are sent to.
Types of Alerts
• Active alerts are sent when a threshold point is passed or the status of a monitored component
is problematic.
• Clear alerts are sent when the problem is resolved and the component has returned to its
normal value. Clear alerts look like active alerts but the severity is set to 0.
Configuration Procedures
There is one primary command to configure the thresholds in the command line,
threshold_config. You must be in the Expert mode to run it. After you run
threshold_config, follow the on-screen instructions to make selections and configure the
global settings and each threshold.
When you run threshold_config, you get these options:
• Show policy name - Shows you the name configured for the threshold policy.
• Set policy name - Lets you set a name for the threshold policy.
• Save policy- Lets you save the policy.
• Save policy to file - Lets you export the policy to a file.
• Load policy from file - Lets you import a threshold policy from a file.
• Configure global alert settings - Lets you configure global settings for how frequently alerts
are sent and how many alerts are sent.
• Configure alert destinations - Lets you configure a location or locations where the SNMP
alerts are sent.
• View thresholds overview - Shows a list of all thresholds that you can set including: the
category of the threshold, if it is active or disabled, the threshold point (if relevant), and a short
description of what it monitors.
• Configure thresholds - Opens the list of threshold categories to let you select thresholds to
configure.
Configure Global Alert Settings
If you select Configure global alert settings, you can configure global settings for how frequently
alerts are sent and how many alerts are sent. You can configure these settings for each threshold.
If a threshold does not have its own alert settings, it uses the global settings by default.
You can configure these options:
• Enter Alert Repetitions - How many alerts are sent when an active alert is triggered. If you
enter 0, alerts are sent until the problem is fixed.
• Enter Alert Repetitions Delay - How long the system waits between it sends active alerts.
• Enter Clear Alert Repetitions - How many clear alerts are sent after a threshold returns to a
regular value.
• Enter Clear Alert Repetitions Delay - How long the system waits between it sends clear
alerts.
• Configure Alert Destinations - See all of the configured alert destinations. By default, active
alerts and clear alerts are sent to the destinations. You can change this for each destination.
When you select the destination you see these options:
• Remove from destinations - If you select this, alerts for this threshold are not sent to the
selected destination.
• Add a destination - If you configured a destination in the global alert destinations but did
not apply it to all thresholds, you can add it to the threshold.
• Disable clear alerts - Cleared alerts for this threshold are not sent to the selected
destination. Active alerts are sent.
State - The status of the object: active or clearing (passed the threshold but returns to
usual value).
Severity - The severity of that threshold, as you configured for it in the CLI.
Activation time - When was the alert first sent.
• Alert Destinations - A list of the destinations that alerts are sent to.
Name - The name of the location.
Type - The type of location. For example, a Domain Log Server or NMS.
State - If logs are sent from the gateway or Security Management Server to the
destination machine.
Alert Count - How many alerts were sent to the destination from when the policy
started.
• Errors - Shows thresholds that cannot be monitored. For example, the Security Gateway
cannot monitor RAID sensors on a machine that does not have RAID sensors. Therefore it
shows an error for the RAID Sensor Threshold.
Threshold Name - The name of the threshold with an error.
Error - A description of the error.
Time of Error - When the error first occurred.
Customizing Results
You can create Custom Views, to change the fields that show in the results.
• Tunnels
• Virtual Links
• Packet Size Distribution
4. Select the Target gateway.
• If you often need results for on gateway, select it in Specific Gateway.
• If you have a small number of gateways, you can create a custom view for each one.
• If not, select Prompt for Gateway before run.
5. Open the next tabs.
The tabs that show depend on the Query Type you selected.
• If you select History, the next tab is Traffic History, where you select the Time Frame and
type of report.
• If you select Real Time, the next tabs let you set services or objects to monitor, gateways or
specified IP addresses to monitor, update interval, result type, and chart settings.
6. Click Save.
7. Right-click the new Custom view and select Rename.
8. Enter a name for the view.
Refreshing Views
Results are automatically refreshed every 60 seconds.
To refresh the view earlier, right-click the view name in the Tree and select Run.
To refresh data about an object in the current view, right-click the object in the results and select
Refresh.
Attention At least one Software Blade has a minor issue, but the gateway works.
Waiting SmartView Monitor waits for the Security Management Server to send
data from Security Gateways.
System Data
• Unified Package - The version number.
• SO Information - The name, the version name/number, the build number, the service pack,
and any additional information about the Operating System in use.
• CPU - The specific CPU parameters (for example, Idle, User, Kernel, and Total) for each CPU.
Note - In the Gateways Results view the Average CPU indicates the average total CPU usage
of all existing CPOS.
• Memory - The total amount of virtual memory, what percentage of this total is used. The total
amount of real memory, what percentage of this total is used, and the amount of real memory
available for use.
• Disk - Shows all the disk partitions and their specific details (for example, capacity, used, and
free).
Note - In the Gateways Results view the percentage/total of free space in the hard disk on
which the Firewall is installed. For example, if there are two hard drives C and D and the
Firewall is on C, the Disk Free percentage represents the free space in C and not D.
Firewall
• Policy information - The name of the Security Policy installed on the gateway, and the date and
time that this policy was installed.
• Packets - The number of packets accepted, dropped and logged by the gateway.
• UFP Cache performance - The hit ratio percentage and the total number of hits handled by the
cache, the number of connections inspected by the UFP Server.
• Hash Kernel Memory (the memory status) and System Kernel Memory (the OS memory) - The
total amount of memory allocated and used. The total amount of memory blocks used. The
number of memory allocations, and those allocation operations which failed. The number of
times that the memory allocation freed up, or failed to free up. The NAT Cache, including the
total amount of hits and misses.
• Failed - The current failure rate of Phase I IKE Negotiations can be used to troubleshoot (for
instance, denial of service) or for a heavy load of VPN remote access connections. High
Watermark includes the highest rate of failed Phase I IKE negotiations since the Policy was
installed. Accumulative is the total number of failed Phase I IKE negotiations since the Policy
was installed.
• Concurrent - The current number of concurrent IKE negotiations. This is useful to track the
behavior of VPN connection initiation, especially in large deployments of remote access VPN
scenarios. High Watermark includes the maximum number of concurrent IKE negotiations
since the Policy was installed.
• Encrypted and Decrypted throughput - The current rate of encrypted or decrypted traffic
(measured in Mbps). Encrypted or decrypted throughput is useful (in conjunction with
encrypted or decrypted packet rate) to track VPN usage and VPN performance of the gateway.
High Watermark includes the maximum rate of encrypted or decrypted traffic (measured in
Mbps) since the gateway was restarted. Accumulative includes the total encrypted or
decrypted traffic since the gateway was restarted (measured in Mbps).
• Encrypted and Decrypted packets - The current rate of encrypted or decrypted packets
(measured in packets per second). Encrypted or decrypted packet rate is useful (in conjunction
with encrypted/decrypted throughput) to track VPN usage and VPN performance of the
gateway. High Watermark includes the maximum rate of encrypted or decrypted packets since
the gateway was restarted, and Accumulative, the total number of encrypted packets since the
gateway was restarted.
• Encryption and Decryption errors - The current rate at which errors are encountered by the
gateway (measured in errors per second). This is useful to troubleshoot VPN connectivity
issues. High Watermark includes the maximum rate at which errors are encountered by the
gateway (measured in errors per second) since the gateway was restarted, and the total
number of errors encountered by the gateway since the gateway was restarted.
• Hardware - The name of the VPN Accelerator Vendor, and the status of the Accelerator.
General errors such as the current rate at which VPN Accelerator general errors are
encountered by the gateway (measured in errors per second). The High Watermark includes
the maximum rate at which VPN Accelerator general errors are encountered by the gateway
(measured in errors per second) since the gateway was restarted. The total number of VPN
Accelerator general errors encountered by the gateway since it was restarted.
• IP Compression - Compressed/Decompressed packets statistics and errors.
QoS
• Policy information - The name of the QoS Policy and the date and time that it was installed.
• Number of interfaces - The number of interfaces on the Check Point QoS gateway. Information
about the interfaces applies to both inbound and outbound traffic. This includes the maximum
and average amount of bytes that pass per second, and the total number of conversations,
where conversations are active connections and connections that are anticipated as a result of
prior inspection. Examples are data connections in FTP, and the "second half" of UDP
connections.
• Packet and Byte information - The number of packets and bytes in Check Point QoS queues.
ClusterXL
• gateway working mode - The gateway working mode as a cluster member, active or not, and
its place in the priority sequence. Working modes are: ClusterXL, Load Sharing, Sync only.
Running modes: active, standby, ready and down.
• Interfaces - Interfaces recognized by the gateway. The interface data includes the IP Address
and status of the specified interface, if the connection that passes through the interface is
verified, trusted or shared.
• Problem Notes - Descriptions of the problem notification device such as its status, priority and
when the status was last verified.
OPSEC
• The version name or number, and build number of the Check Point OPSEC SDK and OPSEC
product. The of time it takes (in seconds) since the OPSEC gateway is up and running.
• The OPSEC vendor can add fields to their OPSEC Application gateway details.
SmartConsole Server
The number of licensed users that are currently connected.
Monitoring Tunnels
Tunnels Solution
VPN Tunnels are secure links between Security Gateways. These Tunnels ensure secure
connections between gateways of an organization and remote access clients.
When Tunnels are created and put to use, you can keep track of their normal function, so that
possible malfunctions and connectivity problems can be accessed and solved as soon as possible.
To ensure this security level, SmartView Monitor constantly monitor and analyze the status of an
organization's Tunnels to recognize malfunctions and connectivity problems. With the use of
Tunnel views, you can generate fully detailed reports that include information about the Tunnels
that fulfill the specific Tunnel views conditions. With this information you can monitor Tunnel
status, the Community with which a Tunnel is associated, the gateways to which the Tunnel is
connected, and so on. These are the Tunnel types:
• A Regular tunnel refers to the ability to send encrypted data between two peers. The Regular
tunnel is considered up if both peers have Phase 1 and Phase 2 keys.
• Permanent tunnels are constantly kept active. As a result, it is easier to recognize
malfunctions and connectivity problems. With Permanent tunnels administrators can monitor
the two sides of a VPN tunnel and identify problems without delay.
Permanent tunnels are constantly monitored. Therefore, each VPN tunnel in the community
can be set as a Permanent tunnel. A log, alert or user defined action can be issued when the
VPN tunnel is down.
Permanent tunnels can only be established between Check Point gateways. The configuration
of Permanent tunnels takes place on the community level and:
• Can be specified for an entire community. This option sets every VPN tunnel in the
community as permanent.
• Can be specified for a specific gateway. Use this option to configure specific gateways to
have Permanent tunnels.
• Can be specified for a single VPN tunnel. This feature allows to configure specific tunnels
between specific gateways as permanent.
This table shows the possible Tunnel states and their significance to a Permanent or Regular
Tunnel.
Gateway not Responding The gateway is not responding. The gateway is not responding.
Traffic
Traffic Monitoring provides in-depth details on network traffic and activity. As a network
administrator you can generate traffic information to:
• Analyze network traffic patterns
Network traffic patterns help administrators determine which services demand the most
network resources.
• Audit and estimate costs of network use
Monitoring traffic can provide information on how the use of network resources is divided
among corporate users and departments. Reports that summarize customer use of services,
bandwidth and time can provide a basis to estimate costs for each user or department.
• Identify the departments and users that generate the most traffic and the times of peak
activity.
• Detect and monitor suspicious activity. Network administrators can produce graphs and charts
that document blocked traffic, alerts, rejected connections, or failed authentication attempts to
identify possible intrusion attempts.
A Traffic view can be created to monitor the Traffic types listed in the following table.
IPs/Network Shows the current status view about active IPs/Network Objects through the
Objects selected gateway.
Security Rules Shows the current status view about the most frequently used Firewall rules.
The Name column in the legend states the rule number as previously configured
in SmartConsole.
Connections Shows the current status view about current connections initiated through the
selected gateway.
Tunnels Shows the current status view about the Tunnels associated with the selected
gateway and their usage.
Virtual Link Shows the current traffic status view between two gateways (for example,
Bandwidth, Bandwidth Loss, and Round Trip Time).
Packet Size Shows the current status view about packets according to the size of the
Distribution packets.
QoS Shows the current traffic level for each QoS rule.
System Counters
Monitoring System Counters provides in-depth details about Check Point Software Blade usage
and activities. As a network administrator you can generate system status information about:
• Resource usage for the variety of components associated with the gateway. For example, the
average use of real physical memory, the average percent of CPU time used by user
applications, free disk space, and so on.
• Gateway performance statistics for a variety of Firewall components. For example, the average
number of concurrent CVP sessions handled by the HTTP security server, the number of
concurrent IKE negotiations, the number of new sessions handled by the SMTP security
server, and so on.
• Detect and monitor suspicious activity. Network administrators can produce graphs and charts
that document the number of alerts, rejected connections, or failed authentication attempts to
identify possible intrusion attempts.
Monitoring Users
Users Solution
The User Monitor is an administrative feature. This feature lets you to keep track of Endpoint
Security VPN users currently logged on to the specific Security Management Servers. The User
Monitor provides you with a comprehensive set of filters which makes the view definition process
user-friendly and highly efficient. It lets you to easily navigate through the obtained results.
With data on current open sessions, overlapping sessions, route traffic, connection time, and
more, the User Monitor gives detailed information about connectivity experience of remote users.
This SmartView Monitor feature lets you view real-time statistics about open remote access
sessions.
If specific data are irrelevant for a given User, the column shows N/A for the User.
Cooperative Enforcement
Cooperative Enforcement Solution
Cooperative Enforcement works with Check Point Endpoint Security Management Servers. This
feature utilizes the Endpoint Security Management Server compliance function to make sure
connections that come from different hosts across the internal network.
Endpoint Security Management Server is a centrally managed, multi-layered endpoint security
solution that employs policy based security enforcement for internal and remote PCs. The
Endpoint Security Management Server mitigates the risk of hackers, worms, spyware, and other
security threats.
Features such as policy templates, and application privilege controls enable administrators to
easily develop, manage, and enforce Cooperative Enforcement.
With Cooperative Enforcement, a host that initiates a connection through a gateway is tested for
compliance. This increases the integrity of the network because it prevents hosts with malicious
software components to access the network.
This feature acts as a middle-man between hosts managed by an Endpoint Security Management
Server and the Endpoint Security Management Server itself. It relies on the Endpoint Security
Management Server compliance feature. This feature defines if a host is secure and can block
connections that do not meet the defined prerequisites of software components.
A typical Cooperative Enforcement workflow:
1. A host opens a connection to the network through a Firewall gateway. The first packet from
the client to the server is allowed. The Cooperative Enforcement feature starts to perform on
the first server's reply to the client.
2. The Firewall checks for host compliance in its tables and queries the Endpoint Security
Management Server, if required.
3. A connection from a compliant host is allowed when a reply is received. But if the client is
non-compliant, the connection is closed, unless this Firewall feature is in Monitor-only mode.
Logging and Monitoring Administration Guide R80 | 122
Monitoring Traffic and Connections
For more about the Endpoint Security client and Cooperative Enforcement, see the R77 Security
Gateway Technical Administration Guide
http://supportcontent.checkpoint.com/documentation_download?ID=24836.
Enforcement Mode
In this mode, a non-compliant host connection is blocked by the Firewall Cooperative Enforcement
feature. If it is an HTTP connection, the host gets a notification page that indicates that it is not
compliant. The user can do the applicable actions to become compliant. For example, to become
compliant the user can upgrade the version of the Endpoint Security client.
This figure illustrates Endpoint Security client (A) access from the internal network (B) to the
Internet (C) in association with the Gateway (D) and Endpoint Security Management Server (E).
Unauthorized
Authorized
Process:
1. An Endpoint Security client (A) in the internal network (B) opens a connection to the Internet
(C). The Internet is opened through a Security Gateway (D).
2. The Security Gateway checks for the client's compliance in its tables and queries the Endpoint
Security server (E) if necessary.
3. When a reply is received, a connection from a compliant host to the Internet is allowed. But if
the client is non-compliant, the connection is closed, unless Cooperative Enforcement is in
Monitor-only mode.
To change the minimum available disk space for Logs and indexes:
1. In SmartConsole, edit the Security Management Server or Log Server or SmartEvent network
object.
2. Open Logs > Storage.
3. Select When disk space is below <number> Mbytes, start deleting old log files.
4. Change the disk space value.
Note - In a Multi-Domain Security Management environment, the disk space for logs and
indexes is controlled by the Multi-Domain Server, and applies to all Domain Servers. Configure
the disk space on the Multi-Domain Server object.
You can import these third-party log formats to a Check Point Log Server:
• Syslog messages.
• Windows Events.
• SNMP Traps.
The Log Server converts the third-party log messages to a Check Point log. The log is then
available for further analysis by SmartEvent.
To configure the SmartEvent Server to read logs from this Log Server:
1. Configure SmartEvent to read logs from the Log Server (see "Configuring Dedicated
Correlation Units" on page 20).
2. In SmartEvent or in the SmartConsole event views, make a query to filter by the Product Name
field. This field uniquely identifies the events that are created from the syslog messages.
Note - Make sure that Access Control rules allow ELA traffic between the Windows computer and
the Log Server.
b) Enter the name of the corresponding OPSEC Application object that you created in
SmartConsole for the Windows events.
c) Enter the Activation Key of the OPSEC object.
5. Restart the Check Point Windows Event Service.
Establishing Trust
Establish trust between the Security Management Server and the windows host.
To establish trust:
1. Edit the OPSEC Application that you created in SmartConsole for the Windows events.
2. Select Communication.
3. Make sure that the trust status is Trust Established.
4. Click Publish to save the database.
In This Appendix
Planning and Considerations .....................................................................................132
The Parsing Procedure ..............................................................................................133
Manual Syslog Parsing ...............................................................................................133
The Free Text Parsing Language ...............................................................................134
Firewall, router and other devices that send connection source IP address, destination IP address, source port,
based logs destination port, protocol, accept/reject indication
IDS / IPS, application Firewall and other devices that attack name/ID
send attack logs
: (
:command (
:cmd_name (include)
:file_name ("snortPolicy.C")
)
)
4. Optional: If required:
a) Create a new dictionary file called <device product name>_dict.ini (see "Dictionary" on
page 143).
b) Put it in the directory $FWDIR/conf/syslog/UserDefined on the Log Server.
A dictionary translates values with the same meaning from logs from different devices into
a common value. This common value is used in the Event Definitions.
c) Edit the file $FWDIR/conf/syslog/UserDefined/UserDefinedSyslogDictionaries.C on the
Log Server.
d) Add a line to include the dictionary file. For example:
Logging and Monitoring Administration Guide R80 | 133
Appendix: Manual Syslog Parsing
:filename ("snort_dict.ini")
5. To examine the parsing, send syslog samples to a Check Point Log Server.
Troubleshooting:
If SmartConsole does not show the logs as expected, there can be problems with the parsing files:
• If there is a syntax error in the parsing files, an error message shows. To read a specified error
message, set the TDERROR_ALL_FTPARSER value to 5 before you run the procedure fwd -n.
• If the syslogs show in SmartConsole with 'Product syslog', the log was not parsed properly,
but as a general syslog.
• If the Product field contains another product (not the one you have just added) this means
there is a problem with the other product parsing file. Report this to the Check Point
SmartEvent team.
• If the product reports correctly in the log, look for all the fields you extracted. Some of them
are in the Information section. Some fields can be seen only when you select More Columns.
The Commands
Each command consists of these parts:
• cmd_name - the name of the command.
• command arguments - arguments that define the behavior of the command.
• on_success (optional) - the next command executed if the current command execution
succeeds.
• on_fail (optional) - the next command executed if the current command execution fails.
Sample
:command (
:cmd_name (try)
:try_arguments
.
.
:on_success (
:command()
)
:on_fail (
:command()
)
)
Try
The try command matches a regular expression against the input string.
Argument Description
parse_from start_position - run the regular expression from the start of
the input string.
last_position - run the regular expression from the last
position of the previous successful command.
add_field One or more fields to add to the result (only if the regular
expression is successful).
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)")
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (1)
)
)
Group_try
The command group_try executes one or more commands in one of these modes:
• try_all tries all commands in the group, and ignores the return code of the commands.
• try_all_successively tries all the commands in the group, and ignores the return code of
the commands.
Each command tries to execute from the last position of the earlier successful command.
• try_until_success tries all the commands until one succeeds.
• try_until_fail tries all the commands until one fails.
The command group_try is commonly used when it parses a "free-text" piece of a log, which
contains a number of fields we want to extract. For example:
%PIX-6-605004: Login denied from 194.29.40.24/4813 to
outside:192.168.35.15/ssh for user 'root'
When you look at see this section of the log, you can use this structure:
:command (
:cmd_name (group_try)
:mode (try_all_successively)
:(
# A "try" command for the source.
:command ()
)
:(
# A "try" command for the destination.
:command ()
)
:(
# A "try" command for the user.
:command ()
)
.
.
.
)
In this example, the first try command in the group_try block (for the source) is executed.
If the source, destination and user are not in a specified sequence in the syslog, use the try_all
mode instead of try_all_successively.
:command (
:cmd_name (group_try)
:mode (try_until_success)
:(
:command (
.
.
.
:regexp ("(\(|)(login|su)(\)|).* session (opened|closed) for
user ([a-z,A-Z,0-9]*)")
)
)
:(
:command (
.
.
.
:regexp ("(\(|)su(\)|).* authentication failure;
logname=([a-zA-Z0-9]*).*
user=([a-zA-Z0-9]*)")
)
)
.
.
.
)
Note - When you add a new device, the first try command in the parsing file must use the try
until success parameter:
:cmd_name (group_try)
:mode (try_until_success)
: (
….
)
Switch
This command enables to compare the result of a specified field against a list of predefined
constant values.
case One or more case attributes followed by the value with which to compare.
default Execute only if no relevant case is available. The default value is optional.
:command (
:cmd_name (switch)
:field_name (msgID)
:(
:case (302005)
:command ()
)
:(
:case (302001)
:case (302002)
:command ()
)
:default (
:command()
)
)
Unconditional _try
This command is an "empty" command that allows to add fields to the result without any
conditions.
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (product)
:field_type (string)
:field_value ("Antivirus")
)
)
:command (
:cmd_name (switch)
:field_name (msgID)
(
:case (106017)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("LAND Attack")
)
)
)
:(
:case (106020)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("Teardrop Attack")
)
)
)
.
.
.
)
Include
This command enables the inclusion of a new parsing file.
file_name The full path plus the file name of the file to be included.
:command (
:cmd_name (include)
:file_name ("c:\freeTextParser\device\antivirusPolicy.C")
)
add_field
Each add_field has some parameters:
• Type - The type of the add_field command. This parameter has these possible values:
• Index - Part of the regular expression will be extracted as the field. The field_index
value denotes which part will be extracted (see field_index bullet).
• Const - Add a constant field whose value does not depend on information extracted from
the regular expression. See field_value bullet.
Field_name - the name of the new field. There are some fields, which have corresponding
columns in SmartConsole Logs & Monitor > Logs. This table shows the names to give these fields
to show in their Logs & Monitor > Logs column (and not in the Information field, where other
added fields appear):
Dst Destination
proto Protocol
Action Action
ifname Interface
User User
When you name the above fields accordingly, they are placed in their correct column in Logs &
Monitor > Logs. This enables them to participate in all filtering done on these columns. These
fields automatically take part in existing event definitions with these field names.
Field_type - the type of the field in the log. This table shows the possible field types.
uint
string
ipaddr For IP addresses used with the Src and Dst fields.
timestmp Includes the date and time of the syslog. Supports the format 'Oct 10 2004
15:05:00'.
string_id For a more efficient usage of strings. Used when there is a finite number of
possible values for this field.
action Supports these actions: drop, reject, accept, encrypt, decrypt, vpnroute, keyinst,
authorize, deauthorize, authcrypt, and default.
ifdir 0 - inbound
1 - outbound
The field type of the field names in this table must be as mentioned:
Dst ipaddr
proto protocol
s_port port
service port
Action action
ifname ifname
• field_index or field_value - The parameter used depends on the value of the "type"
field. If it is index, field_index shows. If it is const, field_value shows.
field_index denotes which part of the regular expression is extracted, according to the
grouping of the patterns. To make this grouping, write a certain expression in brackets. In this
expression, the number in field_index denotes the bracket number whose pattern is taken
into account.
The pattern for the User, [a-zA-Z0-9]+, is located in the first pair of brackets. Therefore, the
field_index is one. The pattern for the Source address,
[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+, is located in the second pair of brackets. Therefore, the
index is two. The pattern for the port is in the third pair of brackets.
In each parsed regular expression the maximum number of brackets must be up to nine. To
extract more than nine elements from the regular expression, break the expression into two
pieces. The first regular expression contains the first nine brackets. The remaining of the regular
expression is in the on_success command.
Logging and Monitoring Administration Guide R80 | 141
Appendix: Manual Syslog Parsing
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("access-list (.*) (permitted|denied|est-allowed)
([a-zA-Z0-9_\([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) -> ")
:add_field (
:type (index)
:field_name (listID)
:field_type (string)
:field_index (1)
)
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
)
:add_field (
:type (index)
:field_name (proto)
:field_type (protocol)
:field_index (3)
)
:add_field (
:type (index)
:field_name (ifname)
:field_type (ifname)
:field_index (4)
)
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (5)
)
:on_success (
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp
("([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) hit-cnt ([0-9]+) ")
:add_field (
:type (index)
:field_name (destination_interface)
:field_type (string)
:field_index (1)
)
)
)
)
Dict_name is the name of the dictionary to use to convert the value. If the value is not found in
the dictionary, the value is the result. See Dictionary (on page 143).
Dictionary
The free text parser enables us to use dictionaries to convert values from the log. These
conversions are used to translate values from logs from different devices, with the same meaning,
into a common value, which is used in the event definitions.
Each dictionary file is defined as an .ini file. In the ini file the section name is the dictionary
name and the values are the dictionary values (each dictionary can include one or more sections).
[dictionary_name]
Name1 = val1
Name2 = val2
cisco_action] [3com_action]
permitted = accept Permit = accept
denied = reject Deny = reject
Dictionary Sample
The reference to a dictionary in the parsing file is shown in this table:
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("list (.*) (permitted|denied) (icmp)
([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+) -> ([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+).*
packet")
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
:dict_name (cisco_action)
)
)
Page 146
OPSEC • 112 Sending an Event • 64
Sending Windows Events to the Log Server •
P 128
Packet Capture • 67 Services that Generate Events • 82
Pause or Stop the Results of a Recorded View Setting Your Default View • 109
that is Playing • 120 Severity • 70
Permissions for Monitoring, Logging, Events, Showing Query Results • 48
and Reports • 24 SmartConsole • 8
Planning and Considerations • 131 SmartConsole Server • 112
Play the Results of a Recorded Traffic or SmartEvent Correlation Unit • 57
Counter View • 119 SmartEvent Correlation Unit and the
Policy • 8 SmartEvent Server • 113
Policy Tab • 68 SmartEvent Correlation Unit High Availability •
Predefined Queries • 60 91
Predefined Report • 8 SmartEvent High Availability Environment • 91
SmartEvent Licensing • 15
Q SmartEvent Reports-Only Permission Profile •
QoS • 111 25
Query Language Overview • 50 SmartEvent Server • 8
SmartView Monitor Features • 92
R SmartView Monitor scenarios • 93
SNMP Best Practices Guide • 130
Recording a Traffic or Counter View • 119
Software Blade • 8
Refreshing Views • 109
Sorting and Searching Events • 63
Remote Access VPN • 8
Starting and Stopping Cluster Members • 114
Report • 8
Summary Tab • 66
Reports • 34
Switch • 136
Revert Changes • 69, 89
System Administration • 89
Run a Down Tunnel View • 116
System Alert Monitoring Mechanism • 95
Run a Permanent Tunnel View • 116
System Alerts and Thresholds • 99
Run a Tunnels on Community View • 116
System Counter • 8
Run a User View for a Specified Gateway • 121
System Counters • 118
Run a User View for a Specified User • 120
System Data • 109
Run a User View for all Users or Mobile Access
System Requirements • 15
Users • 121
Run a Users View • 120 T
Run Tunnels on Gateway View • 116
Running a Cooperative Enforcement View • 123 The Commands • 133
Running Queries • 47 The Event Analysis Architecture • 56
Running Tunnel Views • 115 The Free Text Parsing Language • 133
The Need for Suspicious Activity Rules • 95
S The Parsing Procedure • 132
The SmartEvent GUI • 58
Sample Application & URL Filtering Event
The SmartEvent Solution • 56
Analysis • 55
The SmartView Web Application • 59
Sample Log Analysis • 44
Third-Party Log Formats • 126
Save As PDF • 33
To Start the Monitoring Views • 93
Save Event Policy • 69, 89
Tracking Event Resolution using Tickets • 67
Saving Logs on Security Gateways • 14
Tracking Options • 46
Scheduling a Report • 38
Traffic • 8, 117
Searching the Logs • 47
Traffic Legend Output • 118
Security Cluster • 8
Traffic or System Counters Solution • 117
Security Gateway • 8
Try • 134
Security Management Server • 8
Tunnel View Updates • 115
Security Policy • 8
Tunnels Solution • 114
Select and Run a Traffic or System Counters
Types of Alerts • 100
View • 119
Selecting Criteria from Grid Columns • 49 U
Selecting Query Fields • 49
Unconditional _try • 137
Page 147
Understanding Logging • 11
Users Solution • 120
Using Custom Commands • 68
Using the Log View • 45
Using Wildcards with IP Addresses • 51
V
View Settings • 32
Viewing Alerts • 94
Viewing Rule Logs • 47
Views • 31
Views and Reports • 28
Virtual Private Networks • 110
VPN • 8
VPN Tunnel • 8
W
Welcome • 9
What is an Event? • 54
When a Candidate Becomes an Event • 79
Widgets • 41
Wildcards • 51
Working Hours • 75
Working with Logs • 46
Working with Queries • 59
Working with SmartEvent • 59
Working with SNMP • 130
Working with SNMP Monitoring Thresholds •
100
Page 148