Rsa Netwitness Platform: Check Point Security Suite, Ips-1
Rsa Netwitness Platform: Check Point Security Suite, Ips-1
Note: For version R77.30 & R80.10 and going forward, the only collection method we support is syslog
collected via log exporter tool. This is by recommendation from Checkpoint.
Supported Platforms:
Check Point Appliances, SecuredBy Check Point partner appliances, Check Point SecurePlatform
running on Open Servers, and Check Point software running on supported Operating Systems (such
as Windows, Red Hat and Solaris)
l Log Exporter (R77.30 and R80.10)
Event Source Class.Subclass: Security.Firewall
To configure the Check Point Security Suite to work with RSA NetWitness Platform,
perform the following tasks:
I. Introduction to the Check Point Security Suite
II. Verify the Functionality of the Existing Check Point Security System
III. Configure Check Point to Accept Connections
l To use Check Point Lea API collection, choose either of the following procedures,
based on your version:
l Configure version R80
l Configure version R76 or 77.x
l To use Log Exporter, Configure the Log Exporter tool to send CEF format syslog to
RSA NetWitness Platform
IV. Configure RSA NetWitness Platform
l Configure NetWitness Platform for Check Point Collection
l Or, if using Log Exporter, Configure RSA NetWitness Platform for Syslog
l For version R71 and newer, you cannot use the no authentication nor the auth_
OPSEC method to connect to the console. You need to use SSLCA as the
authentication method.
RSA recommends that customers use SSLCA as the authentication method whenever
possible. If not, you may see errors in the c heckpoint servername_opsec_output.log file
such as connection reset by peer or unable to connect.
l By default, Check Point logs are sent from the Check Point event sources to the
management server. A
lternatively, logs can be sent to a centralized log module (CLM).
In this document, the term "log server" refers to either the management server or a
CLM, whichever you are using.
Warning: Do not proceed until the Check Point log server is receiving events. If the
log server does not display logs, R
SA NetWitness Platform will not receive any
events.
2. To ensure that RSA NetWitness Platform communicates with the Check Point
management server, confirm that:
l Event sources have been configured for all communication between Check Point and
RSA NetWitness Platform.
l Proper routing is available.
Warning: The following ports must be open on any firewall between
RSA NetWitness Platform and the Check Point Management Station.
Port Use
FW_lea (18184) Required for non- authenticated or authenticated
connections.
FW_ica_Pull ( Required for sending the certificate file to the
18210) appliance.
To ensure that the LEA server component sends LEA events for Check Point
versions earlier than R60:
1. To verify that the dictionary log file has no more than 1000 rows, follow these steps:
a. Open the %FWDIR%\log\fw.logtrack file with a text editor to calculate the
number of rows in t his file.
b. If there are more than 1000 rows in the file, back up the fw.logtrack file, and
type:
fw logswitch
Note: The LEA server component on the log server fails to send LEA events if
the dictionary log file has more than 1000 rows.
2. Verify that the number of network objects does not exceed the 64 K OPSEC buffer.
Warning: If the number of network objects exceeds the 64 K OPSEC buffer, go to
the Check Point web site, and download the fix associated with ID sk23634.
l On a Linux or Unix system, type cd $FWDIR
Note: To configure version R80, you need to have RSA NetWitness Platform version
10.6.2.1 or later to configure Check Point version R80.
d. Enter a name for the Host, and enter the IP address of the RSA NetWitness Log
Collector.
e. Click OK.
2. Follow these steps to add an OPSEC application to represent RSA NetWitness
Platform:
c. In the OPSEC Application Properties window, complete the fields as follows.
Field Action
Name Type SA_OPSEC.
Note: This value is used to obtain the SSL certificate for SSLCA
authentication.
Host Select the Check Point network object that you defined in step 1.
d. Click Communication.
e. Enter a password to act as the activation key. Enter the activation key again.
f. Click Initialize.
g. Click Close.
3. Follow these steps to add an access rule that permits RSA NetWitness Platform to
collect events:
b. Complete the fields as follows to add the access rule.
Enter the host name of Enter the host name of
the Check Point log the RSA NetWitness
server. Platform Log Collector.
Warning: If you encounter an interpretation problem or a conflict among rules,
move this rule to the top of the list.
d. Enter the appropriate values to represent the RSA NetWitness Platform Log
Collector service.
e. Click OK.
2. Follow these steps to add an OPSEC application to represent RSA NetWitness
Platform:
a. From the Check Point SmartDashboard menu, click M
anage > Servers and
OPSEC Applications.
c. In the OPSEC Application Properties window, complete the fields as follows.
Field Action
Name Type SA_OPSEC.
Note: This value is used to obtain the SSL certificate for SSLCA
authentication.
Host Select the Check Point network object that you defined in step 1.
d. Click Communication.
e. Enter a password to act as the activation key. Enter the activation key again.
f. Click Initialize.
g. Click Close.
3. Follow these steps to add an access rule that permits RSA NetWitness Platform to
collect events:
b. Complete the fields as follows to add the access rule.
Enter the host Enter the host
name of the name of the
Check Point RSA
log server. NetWitness
Platform Log
Collector.
Warning: If you encounter an interpretation problem or a conflict among rules,
move this rule to the top of the list.
l Transform: Changes the logs according to the configuration
l Load: Sends the logs to the configured target server
If you are on a Multi Domain environment, run the following command to specify the
domain name or IP:
cp_log_export add name <unique name of the log export session> domain-
server <MDS/MLM domain name or IP> target-server <Decoder IP> target-port
<the port on which the target is listening> protocol <protocol to use>
format CEF
Examples
SmartCenter/Log Server
cp_log_export add name test-session-1 target-server 10.10.10.10 target-port
514 protocol tcp format cef
MDS/MLM
cp_log_export add name test-session domain-server 20.20.20.20 target-server
10.10.10.10 target-port 514 protocol tcp format cef
2. In the Services grid, select a Log Collector, and from the Actions menu, choose
View > Config > Event Sources.
4. In the Event Categories panel toolbar, click +.
The Available Event Source Types dialog is displayed.
5. Select checkpoint from the list, and click OK.
Examples 10
Event Source Log Configuration Guide
The newly added event source type is displayed in the Event Categories panel.
Note: The entity name and password must match the values you entered when you
created the OPSEC application on the Check Point server.
8. Click + i n the Sources panel toolbar, and enter the parameter values in the Add Source
dialog box, then Click OK.
Parameter Description
Name* Enter the name of the OPSEC Application that you created when
configuring Check Point earlier.
Address* IP Address of the Check Point server.
Server Enter the name of the Check Point server.
Name*
Certificate Select a certificate from the drop-down list.
Name
Client Enter the Client Distinguished Name from the Check Point server.
Distinguished This is the string that was displayed when you created the
OPSEC application in the Check Point server earlier.
Client Entity Enter the OPSEC Application name you entered on the Check Point
Name server.
Parameter Description
Enabled Select the check box to enable the event source configuration to start
collection. The check box is selected by default.
This is an example of the Check Point Add/Edit Source dialog box:
Parameters are defined in the next section.
Basic Parameters
Parameter Description
Name* Name of the event source.
Parameter Description
Address* IP Address of the Check Point server.
Server Name of the Check Point server.
Name*
Certificate Certificate name for secure connections to use when the transport
mode is https. If set, the certificate must exist in the certificate trust
Name
store that you created using the Settings tab.
Select a certificate from the drop-down list. The file naming
convention for Check Point event source certificates is checkpoint_
name-of-event-source.
Client Distin- Enter the Client Distinguished Name from the Check Point server.
guished
Client Entity Enter the Client Entity Name from the Check Point server.
Name
Server Distin- Enter the Server Distinguished Name from the Check Point server.
guished
Enabled Select the check box to enable the event source configuration to start
collection. The check box is selected by default.
Pull Cer- Select the checkbox to pull a certificate for first time. Pulling a
certificate makes it available from the trust store.
tificate
Certificate IP Address of the server on which the certificate resides. Defaults to
the event source address.
Server
Address
Password Only active when you select the Pull Certificate checkbox for first
time. Password required to pull the certificate. The password is the
activation key created when adding an OPSEC application to Check
Point on the Check Point server.
13 Basic Parameters
Event Source Log Configuration Guide
l Max Duration Poll = 120 (2 minutes)
l Max Events Poll = 5000 (5000 events per polling interval)
l Max Idle Time Poll = 0
For very active Check Point event sources, it is a good practice to set up a connection
that stays open until you stop collection (persistent connection). This ensures that Check
Point collection maintains the pace of the events generated by these active event sources.
The persistent connection avoids restart and connection delays and prevents Check Point
collection from lagging behind event generation.
To establish a persistent connection for a Check Point event source, set the following
parameters to the following values:
l Polling Interval = -1
l Max Duration Poll = 0
l Max Events Poll = 0
l Max Idle Time Poll = 0
Parameter Description
Event Filter Enter a regular expression to filter events.
Note: See the topic "Configure Event Filters for Log Collector" in the
Log Collection Guide for details on how to create more detailed rules
for event filtering.
Port Port on the Check Point server that Log Collector connects to. Default
value is 18184.
Collect Log Type of logs that you want to collect: Valid values are:
Type l Audit - collects audit events.
Parameter Description
l Security - collects security events.
If you want to collect both audit and security events, you must create a
duplicate event source. For example, first you would create an event
source with Audit selected pulling a certificate into the trust store for
this event source. Next you would create another event source with the
same values except that you would select Security for the Collect Log
Type and you would select the same certificate in Certificate Name
that you pulled when you set up the first set of parameters for this event
source and you would make sure that Pull Certificate was not selected.
Collect Logs When you set up a Check Point event source, Security Analytics
collects events from the current log file. Valid values are:
From
l Now - Start collecting logs now (at this point in time in the current
log file).
l Start of Log - Collect logs from the beginning of the current log file.
If you choose "Beginning of Time" for this parameter value, you may
collect a very large amount of data depending on how long the current
log file has been collecting events. Note that this option is effective
only for the first collection session.
Polling Inter- Interval (amount of time in seconds) between each poll. The default
value is 180.
val
For example, if you specify 180, the collector schedules a polling of the
event source every 180 seconds. If the previous polling cycle is still
underway, it will wait for it to finish that cycle. If you have a large
number of event sources that you are polling, it may take longer than
180 seconds for the polling to start because the threads are busy.
Max Dur- The maximum duration of polling cycle (how long the cycle lasts) in
ation Poll seconds.
Max Events The maximum number of events per polling cycle (how many events col-
Poll lected per polling cycle).
Max Idle Maximum idle time, in seconds, of a polling cycle. 0 indicates no
Time Poll limit.> 300 is the default value.
Parameter Description
Forwarder Enables or disables the Check Point server as a forwarder. By default it
is disabled.
Log Type Logs from the event source in Name Value format. By default it is
disabled.
(Name
Value Pair)
Enables and disables debug logging for the event source.
Valid values are:
l Off = (default) disabled
l On = enabled
l Verbose = enabled in verbose mode ‐ adds thread information and
source context information to the messages.
This parameter is designed to debug and monitor isolated event source
collection issues. The debug logging is verbose, so limit the number of
event sources to minimize performance impact.
If you change this value, the change takes effect immediately (no
restart required).
l Configure Syslog Collection
2. In the Services grid, select a Log Decoder, and from the Actions menu, choose View
> Config.
3. In the Service Parsers Configuration panel, search for your event source, and ensure
that the Config Value field for your event source is selected.
Note: The required parser is cef.
Note: You only need to configure Syslog collection the first time that you set up an event
source that uses Syslog to send its output to NetWitness.
You should configure either the Log Decoder or the Remote Log Collector for Syslog. You
do not need to configure both.
2. In the Services grid, select a Log Decoder, and from the Actions menu, choose View
> System.
3. Depending on the icon you see, do one of the following:
l If you see , click the icon to start capturing Syslog.
l If you see , you do not need to do anything; this Log Decoder is
already capturing Syslog.
2. In the Services grid, select a Remote Log Collector, and from the Actions menu,
choose View > Config > Event Sources.
3. Select Syslog/Config from the drop-down menu.
The Event Categories panel displays the Syslog event sources that are configured, if
any.
4. In the Event Categories panel toolbar, click +.
The Available Event Source Types dialog is displayed.
5. Select either syslog-tcp or syslog-udp. You can set up either or both, depending on
the needs of your organization.
7. Enter 514 for the port, and select Enabled. Optionally, configure any of the
Advanced parameters as necessary.
Click OK to accept your changes and close the dialog box.
Once you configure one or both syslog types, the Log Decoder or Remote Log Collector
collects those types of messages from all available event sources. So, you can continue
to add Syslog event sources to your system without needing to do any further
configuration in NetWitness.
Copyright © 2019 Dell Inc. or its subsidiaries. All Rights Reserved.
Trademarks
For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-
trademarks.htm#rsa .