CP R81.10 Multi-DomainSecurityManagement AdminGuide
CP R81.10 Multi-DomainSecurityManagement AdminGuide
MULTI-DOMAIN
SECURITY
MANAGEMENT
R81.10
Administration Guide
Check Point Copyright Notice
© 2021 - 2024 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No
part of this product or related documentation may be reproduced in any form or by any means
without prior written authorization of Check Point. While every precaution has been taken in
the preparation of this book, Check Point assumes no responsibility for errors or omissions.
This publication and features described herein are subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party
licenses.
Important Information
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-
date with the latest functional improvements, stability fixes, security
enhancements and protection against new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check
Point Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
09 April 2024 Updated "Configuring Implied Rules or Kernel Tables for Security
Gateways" on page 145
08 August 2023 Updated "Deploying a Domain Dedicated Log Server" on page 131
14 June 2022 In the HTML version, added glossary terms in the text
24 February Updated:
2022
n "Configuring Implied Rules or Kernel Tables for Security Gateways"
on page 145
l Corrected the paths for Security Gateways R81
1 November Updated:
2021
n "Cross-Domain Search" on page 55
24 September Updated:
2021
n "Failure Recovery" on page 117
n "Configuring Global VPN Communities" on page 101
Table of Contents
Introduction to Multi-Domain Management 18
About this Guide 18
Basic Multi-Domain Security Management Components 19
The Multi-Domain Server 19
Domain Management Servers 19
Domain Log Servers 20
SmartConsole 22
Multi-Domain View 22
Connecting to SmartConsole 24
Gateways & Servers View 25
Architecture and Processes 26
Check Point Registry 26
Server Processes 26
Multi-Domain Server Processes 26
Domain Management Server Processes 26
Automatic Start of Multi-Domain Server Processes 28
Environment Variables 29
Standard Check Point Environment Variables 29
Deploying Multi-Domain Security Management 31
Planning your Deployment 31
Multi-Site High Availability Deployment 31
Single Site Deployments 31
Platform & Performance Issues 33
Topology, IP Addresses and Routing 33
Using More than one Interface on a Multi-Domain Server 34
Changing the Leading Interface 34
Synchronizing Clocks 34
mdsstop_customer 506
mgmt_cli 507
migrate 508
migrate_server 512
migrate_global_policies 519
queryDB_util 520
rs_db_tool 521
sam_alert 523
stattest 527
threshold_config 530
$MDSVERUTIL 536
$MDSVERUTIL AllCMAs 547
$MDSVERUTIL AllVersions 548
$MDSVERUTIL CMAAddonDir 551
$MDSVERUTIL CMACompDir 552
$MDSVERUTIL CMAFgDir 553
$MDSVERUTIL CMAFw40Dir 554
$MDSVERUTIL CMAFw41Dir 555
$MDSVERUTIL CMAFwConfDir 556
$MDSVERUTIL CMAFwDir 557
$MDSVERUTIL CMAIp 558
$MDSVERUTIL CMAIp6 559
$MDSVERUTIL CMALogExporterDir 560
$MDSVERUTIL CMALogIndexerDir 561
$MDSVERUTIL CMANameByFwDir 562
$MDSVERUTIL CMANameByIp 563
$MDSVERUTIL CMARegistryDir 564
$MDSVERUTIL CMAReporterDir 565
$MDSVERUTIL CMASmartLogDir 566
$MDSVERUTIL CMASvnConfDir 567
Introduction to Multi-Domain
Management
Check Point Multi-Domain Security Management is a centralized management solution for
large-scale, distributed environments with many discrete network segments, each with
different security requirements. This solution lets administrators create Domains based on
geography, business units or security functions to strengthen security and simplify
management.
Each Domain has its own Security Policies, network objects and other configuration settings.
You use the Global Domain for common security Policies that apply to all or to specified
Domains. The Global Domain also includes network objects and other configuration settings
that are common to all or to specified Domains.
There can be more than one Domain Management Server for a Domain in a High Availability
deployment, each on a different Multi-Domain Server. One Domain Management Server is
Active, and the other, fully synchronized Domain Management Servers are Standby.
Item Description
2 Multi-Domain Log Server with Domain Log Servers for London and Tokyo
3 Tokyo Multi-Domain Server with an Active Domain Management Server for Tokyo
and a Standby Domain Management Server for London
4 Tokyo network
Item Description
5 London network
6 Internet
SmartConsole
SmartConsole is the unified application of Check Point R80.x Security Management. The
SmartConsole provides a consolidated solution for everything that is necessary for the security
of your organization:
n Security Policy Management
n Log Analysis
n System Health Monitoring
n Multi-Domain Security Management
SmartConsole makes it easy to manage your Multi-Domain Security Management
environment. Before you start to configure your cyber security environment and Policies, we
recommend that you know the SmartConsole application.
Multi-Domain View
Use the Multi-Domain view to manage Multi-Domain Servers, Domains, system objects,
configuration settings and other features. You must log into a Multi-Domain Server to see the
Multi-Domain view.
For a guided tour of Multi-Domain view, click the What's New button at the bottom left of
the window. Click the < and > icons to scroll between the different What's New screens.
Item Description
2 Navigation toolbar
3 Menu
4 View tree
5 Actions toolbar
7 Validation tab
8 Logged in administrator
Item Description
Connecting to SmartConsole
Use SmartConsole to connect to a Multi-Domain Server when you work with Multi-Domain
Security Management objects and settings. Use SmartConsole to connect to a Domain
Management Server when you work with Domain Security Policies, rules, objects and
configuration settings. You can also connect to Domains or specified Domain Management
Servers from within the Multi-Domain view.
1. Run SmartConsole.
2. Enter your user name and password.
3. Enter the Multi-Domain Server IP address, and then click Login.
4. In the Welcome screen, select MDS from the list, and then click Proceed.
SmartConsole opens in the Domains view.
Note - In a Management High Availability deployment, you can only make changes to
a Domain from the active Domain Management Server. The active Domain
Management Server shows with a black icon. If you connect to a standby Domain
Management Server (white icon), SmartConsole opens in the Read Only mode. See
"Working with High Availability" on page 105.
Server Processes
Multi-Domain Server Processes
Each Multi-Domain Server Level process has one instance on every Multi-Domain
Server/Multi-Domain Log Server machine, when it is running. These processes run on the
Multi-Domain Server.
Process Description
cpd Check Point daemon - A generic process for many Check Point services, such
as installing and fetching policy, online updates, and pushing SIC certificates.
fwm Legacy Check Point management server main process (R77.x and earlier)
For proper operation of the Multi-Domain Server, these processes must run together with CPM,
postgres, and solr. An exception to this rule is instances where cpca cannot run, such as
for Domain Log Servers. cpca must always run for Domain Management Servers.
Process Description
cpd Check Point daemon - A generic process for many Check Point services,
such as installing and fetching policy, online updates, and pushing SIC
certificates.
Process Description
fwm Legacy Check Point management server main process (R77.x and earlier)
For proper operation of the Domain Management Server, cpca, fwd and fwm must always
run, except for specified configurations where cpca cannot run. Other processes are required
only as necessary for applicable functionality.
For more information, see sk97638: Check Point Processes and Daemons.
Environment Variables
Different Multi-Domain Server processes require standard environment variables that:
n Point to the installation directories of different components
n Contain management IP addresses
n Hold data important for correct initialization and operation of the processes
Additionally, specific environment variables control certain parameters of different functions of
Multi-Domain Server.
Multi-Domain Server installation contains shell scripts for Bourne Shell and for C-Shell, which
define the necessary environment variables:
n The Bourne Shell version is:
/opt/CPshrd-R81.10/tmp/.CPprofile.sh
n The C-Shell version is:
/opt/CPshrd-R81.10/tmp/.CPprofile.csh
Calling these script files from other shell script files (using the "." command or the "source"
command) will define the environment necessary for the Multi-Domain Server processes to
run.
CPDIR Location of Check Point SVN Foundation files that point to different
directories in Multi-Domain Server and Domain Management Server
environments
Variable Description
Best Practice - For this type of deployment, use a backup solution that periodically
saves the system databases and settings to another device.
This example shows a single-site Multi-Domain Server deployment with three Domains at
remote locations. Each Domain has many Security Gateways to protect the internal networks
and resources. This example has only one Multi-Domain Server and does not use High
Availability.
Item Description
5 Multi-Domain Server
9 Internet
This illustration shows the configuration grid in the SmartConsole Multi Domain view for the
example deployment:
Note - The system automatically creates the Global Domain when you install Multi-
Domain Security Management.
Synchronizing Clocks
All Multi-Domain Server system clocks must synchronize to approximately one second. Before
you create a new Multi-Domain Server or Multi-Domain Log Server, you must synchronize its
clock with other system components.
Clock synchronization is important for these reasons:
n SIC trust can fail if devices are not synchronized correctly
n SmartEvent Correlation Unit uses time stamps, which must be accurate
n Make sure that cron jobs run at the correct time
n Certificate validation is based on the correct time
Item Description
Item Description
4 Security Gateways
5 Internet
See the R81.10 Security Management Administration Guide to learn how to create a Security
Policy.
Note - If the Multi-Domain Server is DOWN, the Domain Management Server cannot
authenticate administrators.
Managing Domains
A Domain Management Server is the functional equivalent of a Security Management Server
in a single-Domain environment.
You connect with SmartConsole directly to a Domain Management Server to manage the
Domain and its components:
n Security Gateways managed by this Domain
n Domain Security Policies, rules, and other Domain-level security settings
n Domain system objects, such as services, users, and VPN Communities.
n Domain Software Blades and their related configuration settings
This chapter contains:
n Instructions to create and manage Domains and Domain Management Servers.
n Instructions to create and configuring a Secondary Multi-Domain Server.
d. Click Trusted Clients and select one or more trusted clients from the list that can
connect to this Domain Management Server.
e. Optional: Click Additional Information and enter contact information for the person
responsible for this Domain Management Server.
5. Click OK to save the new Domain and Domain Management Server.
Notes:
n When you create a new Domain, you must always create at least one new
and packages.
n You cannot add additional information fields to the Domain object.
6. Select an identification criterion from the Type list and enter the applicable
information.
7. In the Domains Assignment section, add one or more Domains.
8. Optional: Select Multi-Domain Server Trusted Client to apply this assignment to
Multi-Domain Servers in addition to the specified Domains.
9. Click OK.
3. From the tree, click Permissions & Administrators > Trusted Clients.
4. Double-click the trusted client name.
5. In the Domains Assignment section, add one or more Domains.
6. Optional: Select Multi-Domain Server Trusted Client to apply this assignment to
Multi-Domain Servers in addition to the specified Domains.
7. Click OK.
5. Select an identification criterion from the Type list and enter or change the applicable
information.
6. In the Domains Assignment section, add or delete one or more Domains.
7. Optional: Select Multi-Domain Server Trusted Client to apply this assignment to
Multi-Domain Servers in addition to the specified Domains.
8. Click OK.
3. Right-click a Domain Management Server in the grid, and then select Delete.
Deleting a Domain
Note - This action automatically deletes the Active and Secondary Domain
Management Servers, Domain Log Servers, and the Domain object.
Note - In a Management High Availability deployment, you can only make changes
to a Domain from the active Domain Management Server. The active Domain
Management Server shows with a black icon. If you connect to a standby Domain
Management Server (white icon), SmartConsole opens in the Read Only mode.
This view shows all Security Gateways and Clusters managed by all Domain
Management Servers.
Example:
To work with a Security Gateway, double-click the Security Gateway object. A SmartConsole
instance for the applicable Domain Management Server opens and automatically shows the
Gateway window for the selected Security Gateway. In a Management High Availability
environment, SmartConsole opens for the Active Domain Management Server.
To work with a Domain, double-click its Domain Management Server object. A SmartConsole
instance for the applicable opens and automatically shows the Host window for the selected
Domain Management Server. In a Management High Availability environment, make sure that
you select the Active Domain Management Server, which opens in the Read/Write mode.
Standby Domain Management Servers open as Read-Only, and you cannot make any
changes to Domain objects.
Note - You cannot change the name of the Multi-Domain Server object.
Important:
n You can restore a Domain only on the same Multi-Domain Server, on which you
backed it up.
n You can restore a Domain, to which a Global Policy is assigned, only if during
the Domain backup you did not purge the assigned Global Domain Revision.
Backing Up a Domain
backup-domain
For API documentation, see the Check Point Management API Reference - search for
backup-domain.
Restoring a Domain
Before you can restore a Domain, you must delete the current Domain.
Before you delete the current Domain, make sure it is possible to restore it.
restore-domain
For API documentation, see the Check Point Management API Reference - search
for restore-domain.
Before you can restore a Domain, you must delete the current Domain.
You can perform this step in one of these ways:
n In SmartConsole connected to the MDS context
n With the API delete domain (see the Check Point Management API
Reference)
restore-domain
For API documentation, see the Check Point Management API Reference - search
for restore-domain.
4. Restore the Standby Domain Management Servers and Domain Log Servers
When you restore the Standby Domain Management Servers and Domain Log
Servers, they must have the same IP addresses that were used when you collected
the Domain backup.
For API documentation, see the Check Point Management API Reference - search
for set domain
For each Standby Domain Management Server, run this API:
You must again configure the Multi-Domain Server Administrators and GUI clients
and assign them to the Domains.
a. Configure the Multi-Domain Server Administrators and GUI clients:
i. Run the mdsconfig command
ii. Configure the Administrators
iii. Configure the GUI clients
Procedure:
1. On the source Multi-Domain Server, export the Domain Management Server
migrate-export-domain
For API documentation, see the Check Point Management API Reference -
search for migrate-export-domain.
b. Calculate the MD5 of the export file:
a. Transfer the export file from the source Multi-Domain Server to the target Multi-
Domain Server, to some directory.
migrate-import-domain
For API documentation, see the Check Point Management API Reference -
search for migrate-import-domain.
b. Make sure that all the required daemons (FWM, FWD, CPD, and CPCA) are in
the state "up" and show their PID (the "pnd" state is also acceptable):
mdsstat
You must again configure the Multi-Domain Server Administrators and GUI clients and
assign them to the Domains.
a. Configure the Multi-Domain Server Administrators and GUI clients:
a. Connect with SmartConsole to the Active Domain (to which this Domain
Management Server belongs).
b. Install the applicable policies on all managed Security Gateways and Clusters.
Database Revisions
You can revert to previous versions of the database on your domains. Revert to revision is
supported on the Global and Local Domains but not on the Multi-Domain Management Server
view. Note that the Global Domain supports revisions only if the corresponding revision was
not purged. For more information on how to use the database revision feature, see the R81.10
Security Management Administration Guide
Cross-Domain Search
Starting from R81, you can do these actions from the Multi-Domain view across all Domains,
without logging into each Domain:
n Search an object
n View unused objects
n See where an object is used
For information on how to do these actions in a specific domain, see the R81.10 Security
Management Administration Guide.
To do a cross-domain search:
1. In the Multi-Domain view, click the drop-down arrow in the main menu and select Open
Global Object Explorer.
You can select to see all search results or only results of unused objects.
1. In the Multi-Domain view, click the drop-down arrow in the main menu and select
Open Global Object Explorer.
The Global Object Explorer window opens.
1. In the Multi-Domain view, click the drop-down arrow in the main menu and select
Open Global Object Explorer.
The Global Object Explorer window opens.
2. Navigate to the applicable object.
3. Right-click the object and select Where Used.
A list appears with all the places where the object appears in all the Domains.
Notes:
n Cross-Domain Search is supported only on Domains defined on a Multi-Domain
Server, to which the user is connected with SmartConsole.
n Cross-Domain Search is supported only on Domains, for which the connected
user has Read or Read/Write permissions.
Global Management
This section describes how to connect to the Global Domain, create a Global Policy, create
Global Assignments, update IPS Protections and the Application & URL Filtering Database.
n Create, delete or change Global Access Control and Threat Prevention Policies.
n Create, delete or change rules in Global Policies.
n Create, delete or change global objects.
These activities are not supported in this release:
n Create a new Global Domain.
n Define Security Gateways as installation targets in global configuration rules. You must
use local Policies to do this.
Important - Before you delete a global object, make sure that no global or local policy
rules use this global object. This can cause errors when you reassign global
configurations.
You can also create a new global object with the Object Explorer.
3. Configure the required parameters.
4. Click OK to save the new object.
To change a user-defined global object, select it in the Object Explorer, and then change the
applicable settings.
To delete a user-defined object, select it in the Object Explorer and click Delete.
Important - After you complete the global object task, assign or reassign the global
configuration to the applicable Domains. This action automatically:
n Publishes the changes that were done on the Multi-Domain Server
n Updates the local Domain and its Rule Base
There is no NAT Rule Base in the Global Domain and you cannot define NAT settings there.
You must define NAT rules manually in Domain Policy Layers.
Policy Presets
SmartConsole lets you create Policy Presets for better policy installation planning. A Policy
Preset is a collection of Security Gateways or Policy Packages for policy installation purposes.
After you define a Preset, you can install policy on all the items which are included in the
Preset at the same time. You also have the option to define a policy installation schedule for a
specific Preset. In a large deployment Multi-Domain Server environment, Policy Presets help
you save time and manage the policy installation process more efficiently.
You can create 2 types of Policy Presets:
n By Gateways - Policies are installed on all Security Gateways in the Preset. The
applicable policy is installed on each Security Gateway in the Preset. A Preset can
include Security Gateways from different Domains, from the same Domain, Security
Gateways with different policies or identical policies.
n By Policy Packages - All Policy Packages included in the Preset are installed on the
Security Gateways that enforce it at the same time.
Note - A Preset by Policy Packages installs policy only on Security Gateways which
enforce the selected Policy Packages included in the Preset. It does not necessarily
install policy on all Security Gateways in a Domain.
You can use Presets for policy installation only after you installed policy on the installation
targets for the first time. Security Gateways with no policy installed on them are skipped during
the installation process.
1. In the Multi-Domain view, go to Multi-Domain > Install Policy Presets > New.
2. In Installation Targets, select one of these options:
n By Gateways - This Policy preset is installed on the Security Gateways that you
select.
n By Policy Packages - This Policy preset is installed on the Security Gateways
which enforce the selected Policy Packages.
3. In Scheduling:
You can schedule the policy installation to specific days and hours.
The hour of the policy installation is set to the time zone of:
n The SmartConsole client - for a one-time installation.
n The Multi-Domain Management Server - for a recurring installation.
In a one time installation, the installation time is according to the SmartConsole client.
In a recurring installation, the installation time is according to the Multi-Domain Server.
This affects how you set both the hour and the day on your local SmartConsole client.
Example 1:
Your SmartConsole client is in Israel, and your Multi-Domain Server is in New York.
n You want to schedule a recurring installation on Saturday 2 PM Israel time
(14:00):
In your SmartConsole client > New Install Policy Preset > Scheduling, select:
Install policy at 14:00
Note - The hour of the policy installation is set to the time zone of:
n The SmartConsole client - for a one-time installation.
n The Multi-Domain Management Server - for a recurring
installation.
You can see the next policy installation schedule in the Next Run column:
At any time, you can select a Preset and click Install Policy, regardless of the preset schedule.
The audit logs of your Preset activity show at the bottom of the Install Policy Presets page and
in the Logs & Monitor view.
Note - The policy preset is installed on the Multi-Domain Server with the active global
Domain. If a domain has no domain server on the Multi-Domain Server with the active
global Domain, then the policy preset is not installed on this Domain.
In this example, the Global policy will not be installed on Domain 2, because Domain 2 has
no server in Multi-Domain Server2.
In a one time installation, the installation time is according to the SmartConsole client. In a
recurring installation, the installation time is according to the Multi-Domain Server. This
affects how you set both the hour and the day on your local SmartConsole client.
Example 1:
Your SmartConsole client is in Israel, and your Multi-Domain Server is in New York.
n You want to schedule a recurring installation on Saturday 2 PM Israel time (14:00):
In your SmartConsole client > New Install Policy Preset> Scheduling, select:
Install policy at 14:00
Recurrence > Configure > Days in week > Saturday
n You want to schedule a recurring installation on Saturday 2 PM New York time
(14:00):
In your SmartConsole client > New Install Policy Preset > Scheduling, select: Install
policy at 21:00
Recurrence > Configure > Days in week > Saturday
Example 2:
Your SmartConsole client is in Israel, and your Multi-Domain Server is in New York.
n You want to schedule a recurring installation on Saturday 6 PM Israel time (18:00):
In your SmartConsole client > New Install Policy Preset > Scheduling, select:
Install policy at 18:00
Recurrence > Configure > Days in week > Saturday
n You want to schedule a recurring installation on Saturday 6 PM New York time
(18:00):
In your SmartConsole client > New Install Policy Preset > Scheduling, select: Install
policy at 01:00
Recurrence > Configure > Days in week > Sunday
Use Case - Mail Security Servers
You are the administrator for a corporation that has five branches, each branch in a
different city. You manage the Security Gateways from a Multi-Domain console. In the
Multi-Domain console, each branch is represented by a Domain. Each Domain has a
mail security server. When there is a mail-related update, you must update the policy on
all mail security servers (no update is required for the other Security Gateways in each
Domain). How can you make the policy installation process more efficient?
Create a Preset which includes the mail security server in each Domain. After you create
this Preset, each time it is necessary to update the Policy on the mail security servers,
you can select this preset for installation. This way, you do not need to search and filter
for each mail security server separately.
You can also schedule the policy installation for specific days and hours, for example, in
the evening hours, when there are fewer employees at work.
Services &
No. Name Source Destination VPN Action
Applications
In this example, the placeholder for local Domain rules is rule number 3. Global Domain rules 1
and 2 run before the local Domain rules. Global rule 4 and the cleanup rule run after the local
Domain rules.
Each local Domain Policy includes both Global Domain Policy rules and local Domain rules
that apply to its Security Gateways. Local Domain Policy rules show in a Domain Layer under
a parent rule.
Sample Domain Policy Layer with Global and Local Domain Rules
Services &
No. Name Source Destination VPN Action
Applications
In this example, the Security Gateways handle the global configuration rules (1 and 2) and
then the local Domain rules. If there is still no match in the local rules, the Security Gateways
handle the last two global rules, including the cleanup rule..
Although a local Domain can define implied rules, it is a best practice to put critical global rules
at the beginning of the Rule Base. Put the global cleanup rule at the end. This overrides the
implicit cleanup rule and gives you flexibility to define an effective sequence for local Domain
rules. .
In this example, the local Domain placeholder is rule number 3. Global Domain rules 1 and 2
run before the local Domain rules. Global Domain rule 4 is the default rule that runs after the
local Domain rules.
Each Domain Policy includes both global rules and local rules that apply to its Security
Gateways. Local Domain Policy rules show in a local Domain Layer under a parent rule.
Sample Domain Rule Base with global and local Domain Rules
This example shows Policy Layer with Global Domain rules together with the local Domain
rules.
Note - You cannot disable local Policy Layers in the Global Domain. This option
is not available.
n To delete the rules from a local Domain Layer, click the pencil icon in the Action column,
and select No domain rules in the local Domain. Publish the SmartConsole session.
n To use a different Domain Policy Layer, click the pencil icon in the Action column, and
select a different Domain Policy Layer from the list. Publish the SmartConsole session.
Upgrade Issues
When you upgrade an R77.X or earlier Multi-Domain Server, existing Policies are converted in
this manner:
n If a pre-R80.x Policy has a Global Access Control Policy with no defined rules
(placeholder only), its mode is automatically set to no global Policy after an upgrade to
R80.x. You can change the mode as necessary for both R80.x and pre-R80.x Policies.
n The Firewall Policy is converted into an R80.10 Network Policy Layer. Its implicit
cleanup rule is set to Drop.
n The Application & URL Filtering Policy is converted to the Application Policy Layer. The
implicit cleanup rule for it is set to Accept.
n If a Domain contains IPS rules, an IPS Layer is automatically created in the R80.x Threat
Prevention Policy for the applicable Domain.
You can create dynamic objects for most object types, including Security Gateways, hosts,
services, networks and groups. Use the standard global objects available in SmartConsole or
create your own global objects. All dynamic objects must have the _global suffix, which
identifies the objects as global.
There are two types of dynamic objects:
n Dynamic Global Network Objects - In each Domain, you define a host object with the
same name as the global dynamic object. During the assignment of the global policy, the
references to the global dynamic object in different rules are replaced by the reference to
the local host object with the same name. The _global syntax triggers the reference
replacement mechanism.
n Dynamic Objects - The dynamic object is assigned an IP at the Security Gateway level,
when you assign the global configuration to a Domain and install Policies on the Security
Gateways. There is no need to create a corresponding local object.
The use of dynamic objects makes it possible to create global rules with no specified network
objects. This lets you create rules that are templates.
Note - Global security rules can be installed on Security Gateways, and Open
Security Extension (OSE) devices.
After she created a Global Policy which includes this rule, she assigns and installs it to specific
Domains and their Security Gateways. Each Domain administrator must create a group object
with the same name as in the Domain Management Server database. This is done in
SmartConsole. This way, local administrators translate the dynamic global object into sets of
network object from the local database.
For details about how to use the SmartConsole, see the R81.10 Security Management
Administration Guide.
These are the differences between the Domain SmartConsole and the Global SmartConsole:
Rule Base Local, applying to the Domain Global, applying to multiple networks
network only. of all Domains assigned this Global
Policy.
Domain Security Rules and Global Global Rules and a place holder for
Rules (in Read Only mode) if the Domain rules.
Global Policy is assigned to the
Domain.
Saving a Adds the security policy to the list Adds the Global Policy to the Global
Security of Domain security policies. Policies database (and displays it in
Policy the Global Policies Tree of
SmartConsole).
Note - You cannot use the Global SmartConsole to create Security Gateway objects.
Instead, use a SmartConsole connected to a specific Domain Management Server to
create these objects.
Global Assignments
A global assignment is a Multi-Domain Security Management system object that assigns a
global configuration to one specified Domain. You create global assignments to assign
different combinations of Global Access Control Policies, Global Threat Prevention Policies,
and global object definitions to different Domains.
When you create a new global assignment, it automatically assigns the specified global
configuration to the specified Domain. It also publishes the assignment and updates local
Domain Policies.
Best Practice - When you create a new Domain, create a global assignment for that
Domain at the same time.
When you do one or more of these actions, you must publish the Global Domain session and
reassign the global configuration:
n Add, delete, or change rules in a global configuration
n Add, delete, or change user-defined objects in a global configuration
n Define the SmartEvent object in the global database
n Change the definition of a global assignment
The assign/reassign action does not automatically install Policies.
Best Practice - Install Policies after you assign or reassign a global assignment.
Configuring an Assignment
You can click Advanced to open the Advanced Assignment window to assign the
selected Policy:
n Only to the specified, local Domain Policies
n To all local Domain Policies, except for those explicitly specified
7. Optional: Enable Manage protection actions.
This option lets you change IPS protection actions for Security Gateways on the local
Domain.
8. Click Assign.
9. In the confirmation window, click Publish & Assign.
The system creates a task, which:
n Updates the local Domain and its Rule Base
n Publishes the changes
n Changes the assignment status to Up to Date
4. Click Assign.
5. In the confirmation window, click Publish & Assign.
Important - You can create a global assignment that does not include a Global
Access Control and Threat Prevention Policy. To do this, select the None value to
both Policy types. The global configuration assigns only the defined global objects
and settings to Domains.
Reassigning
When you make changes to the global configuration items, the assignment status changes to
Not up to date. The assignment status does not change if you make changes to the local
Domain Policies.
The Assignment Task Details window shows the task progress and details.
4. If the task fails and returns an error message, correct the error, and then try to
assign/reassign the global configuration again.
Some common errors include:
n Global objects with duplicate or illegal names
n Deleted global objects used in a rule
n Global rule validation errors
Best Practice - Immediately create a new global assignment so that Domain Security
Gateways continue to enforce global configuration rules.
Important - You must remove global objects from all local Domain rules before you
can delete a global assignment. If there is a rule that uses a global object when you
try to delete a global assignment, the delete operation fails.
Note - Security Gateways with IPS enabled only get the updates after you install Policy.
For troubleshooting or for performance tuning, you can revert to an earlier IPS protection
package.
Exceptions
This chapter explains exceptions and exception groups, how to create them, and the
difference between global exceptions and local exceptions.
Exceptions Rules
If necessary, you can add an exception directly to a rule. An exception sets a different Action
to an object in the Protected Scope from the Action specified Threat Prevention rule. In
general, exceptions are designed to give you the option to reduce the level of enforcement of a
specific protection and not to increase it.
For example
The Research and Development (R&D) network protections are included in a profile with
the Prevent action. You can define an exception which sets the specific R&D network to
Detect. For some Anti-Bot and IPS signatures only, you can define exceptions which are
stricter than the profile action.
You can add one or more exceptions to a rule. The exception is added as a shaded row below
the rule in the Rule Base. It is identified in the No column with the rule's number plus the letter
E and a digit that represents the exception number. For example, if you add two exceptions to
rule number 1, two lines will be added and show in the Rule Base as E-1.1 and E-1.2.
You can use exception groups to group exceptions that you want to use in more than one rule.
See the Exceptions Groups Pane.
You can expand or collapse the rule exceptions by clicking on the minus or plus sign next to
the rule number in the No. column.
To add an exception to a rule
Step Instructions
1 In the Policy pane, select the rule to which you want to add an exception.
3 Select the Above, Below, or Bottom option according to where you want to
place the exception.
Step Instructions
5 Install Policy.
Note - You cannot set an exception rule to an inactive protection or an inactive blade.
Protected Install
Name Protection/Site Action Track
Scope On
Step Instructions
Step Instructions
Blade Exceptions
You can configure an exception for an entire blade.
To configure a blade exception
Step Instructions
1 In the Policy, select the Layer rule to which you want to add an exception.
3 Select the Above, Below, or Bottom option according to where you want to
place the exception.
Step Instructions
1 Go to Security Policies > Threat Prevention > Custom Policy > IPS
Protections.
4 Click OK.
Step Instructions
An exception group is a container for one or more exceptions. You can attach an exception
group to all rules or only to some rules. With exception groups, you can manage your
exceptions more easily, because you can attach the same exception group to multiple rules,
instead of manually define exceptions for each rule.
The Exception Groups pane shows a list of exception groups that were created, the rules that
use them, and any comments related to the defined group.
The Exceptions Groups pane contains these options
Option Meaning
Global Exceptions
The system comes with a predefined group named Global Exceptions. Exceptions that you
define in the Global Exceptions group are automatically added to every rule in the Rule Base.
For other exception groups, you can decide to which rules to add them.
If there is a Global Exceptions group that contains two exceptions, all rules show the
exception rows in the Rule BaseNo column as E-1.1 and E-1.2. Note - that the numbering of
exception varies when you move the exceptions within a rule.
Step Instructions
3 In Apply On, configure how the exception group is used in the Threat Prevention
policy.
n Manually attach to a rule - This exception group applies only when you
add it to Threat Prevention rules.
n Automatically attached to each rule with profile - This exception group
applies to all Threat Prevention rules in the specified profile.
n Automatically attached to all rules - This exception group applies to all
Threat Prevention rules.
4 Click OK.
Step Instructions
2 In the Exceptions section, click the exception group to which you want to add
an exception.
Step Instructions
2 Right-click the rule and select Add Exception Group > <group name>.
An exception group is a container for one or more exceptions. You can attach an exception
group to all rules or only to some rules. With exception groups, you can manage your
exceptions more easily, because you can attach the same exception group to multiple rules,
instead of manually define exceptions for each rule.
The Exception Groups pane shows a list of exception groups that were created, the rules that
use them, and any comments related to the defined group.
The Exceptions Groups pane contains these options
Option Meaning
Global Exceptions
The system comes with a predefined group named Global Exceptions. Exceptions that you
define in the Global Exceptions group are automatically added to every rule in the Rule Base.
For other exception groups, you can decide to which rules to add them.
For example
If there is a Global Exceptions group that contains two exceptions, all rules show the
exception rows in the Rule BaseNo column as E-1.1 and E-1.2. Note - that the numbering of
exception varies when you move the exceptions within a rule.
Step Instructions
3 In Apply On, configure how the exception group is used in the Threat Prevention
policy.
n Manually attach to a rule - This exception group applies only when you
add it to Threat Prevention rules.
n Automatically attached to each rule with profile - This exception group
applies to all Threat Prevention rules in the specified profile.
n Automatically attached to all rules - This exception group applies to all
Threat Prevention rules.
4 Click OK.
Step Instructions
2 In the Exceptions section, click the exception group to which you want to add
an exception.
Step Instructions
2 Right-click the rule and select Add Exception Group > <group name>.
Configuring Administrators
To configure an administrator:
1. Connect to the Multi-Domain Server with SmartConsole, and go to Permissions &
Administrators > Administrators.
Note - You cannot add additional information fields to the Administrator object.
Administrator - General
Authentication
To set a default value for this parameter, go to Permissions & Administrators >
Advanced > Administrator Settings > Authentication Default Values. Select a
default authentication from the list.
n Certificate Information - Optional: Click Create to generate a new certificate.
l You can use a certificate with or without an authentication method.
l For an existing administrator definition, you can revoke an existing certificate
and create a new one.
Permissions
Accept the default permission profile or select a different one. You can also create a
new permission profile to assign. For an existing administrator, the currently selected
permission profile shows.
Click the View icon to see details of the currently assigned permission profile.
If the Edit icon shows, you have permissions to see and change the currently selected
permission profile. Click the Edit icon to change the settings.
Permission Profiles per Domain -Select one or more Domains, and then select a
Domain permission profile for each one.
+ - Click to select a Domain to add to the profile.
X - Click to remove the selected Domain from the profile.
Note - The Permission Profiles per Domain Section does not show for
Superusers, because Read/Write Domain permission profiles are assigned
automatically to all Domains.
n Expiration -Define when this administrator account expires.
l Never - The administrator account does not expire.
l Expire at - Select an expiration date for this administrator.
To set a default value for this parameter, go to Permissions & Administrators >
Advanced > Administrator Settings > Default Expiration Values.
Contact Options
n Email - Enter the administrator email address.
n Contact Details - Enter additional contact information.
n Phone - Enter the administrator telephone number.
Note - If you upgraded from an earlier release, the system copies these values into
the new release.
You can import the certificate file to the CryptoAPI (CAPI) certificate repository on the
Microsoft Windows SmartConsole computer. The administrator can use this stored certificate
to log in to SmartConsole using the CAPI Certificate option. The SmartConsole administrator
does not need to provide a password.
The certificate file is in the PKCS #12 format, and has a .p12 extension.
Note - Give the certificate file and the password to the SmartConsole administrators.
The administrator must provide this password when logging in to SmartConsole with
the Certificate File option.
Permission
Permissions
Profile
Global Manage Global Domains, global configurations, global rules, and global
Manager assignments. Global Managers can manage Domains, but not add or
delete domains or manage Multi-Domain Servers. Global managers can
manage administrators with equal or lower permissions.
Global Managers can create new global assignments and can assign
Global Policies to Domains that they have permissions to manage.
Domain-Level permissions are based on the assigned Domain permission
profile.
Permission
Permissions
Profile
Domain Manage Domain Policies, networks and objects based on their permission
Manager profile. Domain Managers can manage administrators with equal or lower
permissions.
Domain Managers can reassign Global Policies to Domains that they have
permissions to manage. They cannot create new global assignments.
Domain-Level permissions are based on the assigned Domain permission
profile.
Domain Manage Domain Policies, networks and objects based on their permission
Level Only profile. These administrators cannot manage the Multi-Domain Security
Management system or its configuration settings, or login to the Multi-
Domain Servers.
Domain-Level permissions are based on the assigned Domain permission
profile.
Permission
Permissions
Profile
Read/Write Read and write permissions for all Domain settings and data without
session management or DLP confidential data. The Read/Write option
lets the administrator see and configure an item.
Read Only Read only permissions for all Domain data. Read Only lets the
administrator see an item, but not change it.
The selected role affects the permissions that you can configure in the next parts: Multi
Domain Management, Global Management, and Domain Management. For example,
Superusers always have Domain Management permissions.
All options are enabled automatically for Superusers. Managers can select them.
n Manage Global Assignments - Create, update and delete global assignments.
n Default profile for all Global Domains - Change the default permission profile for all
global Domains.
n View global objects in Domains - Lets an administrator with no global objects
permissions view the global objects in the domain. This option is required for valid
domain management.
Domain Management
This profile defines the default Domain permissions that automatically apply when you
create a new administrator account. After you create the administrator account, you can
change its Domain profile as necessary.
Select a default profile from the list. This option is enabled automatically for Superusers,
and Managers can optionally select it.
Notes:
n You cannot prevent administrators from seeing some resources. You cannot
change their options.
n Some resources do not have Read or Write options. You can only select or
clear them.
A Global VPN Community connects the enterprise's Security Gateways through VPN and lets
the enterprise manage them under one network. You define the Global VPN Community in the
Global Domain. The Multi-Domain Server utilizes its knowledge about the different Domain
Management Server environments to create a VPN community which can manage them.
Item Description
1 VPN tunnel
Item Description
To learn more about VPN communities, see the R81.10 Site to Site VPN Administration Guide.
VPN Connectivity
When you establish a Global VPN Community, it replaces part of the configuration of
Externally Managed Security Gateways and automates the exchange of certificates for each
Domain Management Server.
These trusted entities create VPN trust in a Multi-Domain Security Management deployment:
n Certificates issued by a Domain Management Server Internal Certificate Authority (ICA).
n External third party Certificate Authority servers (using OPSEC connectivity).
n Pre-shared secrets.
The ICA of the Domain Management Server issues certificates used by Domain Security
Gateways to create SIC trust. Each Security Gateway supports certificates issued by the CAs
of the other Domains.
For more information on VPN with Externally Managed Gateways, see the R81.10 Site to Site
VPN Administration Guide.
4. Define a Security Policy - You can create a Global policy and assign it to the Local
Domains, or you can create the Security Policy rules only in the Local Domains.
5. Assign the Global configuration to the applicable Domains. After assignment, you must
also install the policy on the participating Security Gateways.
A global Security Gateway object and a VPN Domain object are created for the Security
Gateway in the Global Domain. Different Domains can coincidentally contain Security
Gateways with the same name. Because each global Security Gateway object must have its
own unique Global Name, the Global Names Template automatically assigns a unique name
for each global Security Gateway.
The default global name format is:
<Name of Security Gateway>_of_<Name of Domain>.
For example:
n Security Gateway name = MyGateway
n Domain name = MyDomain
n Global name = MyGateway_of_MyDomain
Note - When the local Domain that manages the gateway to be used globally has the
active server on a standby Multi-Domain Server, you cannot use the gateway
globally.
1. In the Global Domain, go to Security Policies > Access Control > Access Tools > VPN
Communities > New.
2. Add the global Security Gateway objects, defined in step 1, as participating Security
Gateways in the community.
To learn more about VPN communities, see the R81.10 Site to Site VPN Administration Guide.
To define a Global Security Policy, see "Global Management" on page 57. To learn more
about the Access Control Security Policy Rule Base, see the R81.10 Security Management
Administration Guide.
2. In the Multi-Domain Server SmartConsole > Multi-Domain view > Global Assignments,
assign the Global objects to the Local Domains (see "Global Assignments" on page 74)
3. Install policy on the Security Gateways.
Note - All Security Gateways which participate in the Global VPN Community must
use a Simplified VPN Policy.
For each Domain with Security Gateways in the Global VPN Community, a global CA Server
object is created in the Global Domain. During the assignment process, the Multi-Domain
Server automatically exports relevant Domain ICA information (such as the CA certificate) to
all the Domain Management Servers with Security Gateways that participate in the
community. This way, all the Security Gateways in the community can trust the others' ICAs.
After the assignment, the Global VPN Community object shows in each Domain with Security
Gateways in the community. If you assign a Global Policy to a Domain that has no Security
Gateways in the community, this Domain does not show the community object and the
community Security Gateway objects.
Note - This operation assigns the Policy to all selected Domains, and
then installs the Policy on all Domain Security Gateways, in one step.
It does not let you select specific Security Gateways on which to
install the Policy. The selected Policy is installed on all Security
Gateways in the selected Domains. Assigning the Policy to many
Domains and all their Security Gateways can take some time. Use
this option with caution.
In the standard configuration, there is only one Active Domain Management Server for each
Domain. All others are Standby Domain Management Servers. If the Active Domain
Management Server fails, you must manually change a Standby Domain Management Server
to Active.
Item Description
2 Multi-Domain Log Server with Domain Log Servers for London and Tokyo
3 Tokyo Multi-Domain Server with an Active Domain Management Server for Tokyo
and a Standby Domain Management Server for London
4 Tokyo network
5 London network
6 Internet
This illustration shows the configuration grid in the SmartConsole Multi Domain view for the
example deployment:
The system automatically creates the Global Domain when you install Multi-Domain Security
Management.
Important - Before you start this procedure, make sure to define the physical server
as the correct server type (Secondary Multi-Domain Server, or Multi-Domain Log
Server) during installation. An incorrect definition can cause deployment failure.
The new Multi-Domain Server automatically synchronizes with all existing Multi-Domain
Servers and Multi-Domain Log Servers. The synchronization operation can take some time to
complete, during which a notification indicator shows in the task information area.
Notes:
n To add a license for a Multi-Domain Server, go to the main Menu > Manage
licenses and packages.
n Private sessions are not synchronized between Multi-Domain Servers.You
cannot see a session that is open on one Multi-Domain Server on another Multi-
Domain Server or moved it to another Multi-Domain Server.
n You cannot manage the same object ((an object that is editable in the Multi-
Domain view, for example: an administrator, a domain, a permission profile, a
trusted client or a Multi-Domain Server) from multiple Multi-Domain
SmartConsoles. It can create synchronization failures between the Multi-
Domain servers. If there is a synchronization failure, make sure sessions on a
different Multi-Domain SmartConsoles do not lock the same object.
By default, the Primary Domain Management Server is Active. All other Domain Management
Servers for that Domain are Standbys. You can change a Standby Domain Management
Server to Active as necessary.
All Domain management operations, such as working with Security Policies, users, networks
and other objects, occur on the Active Domain Management Server. Standby Domain
Management Servers automatically synchronize with the Active Domain Management Server.
Security Gateways can get a Security Policy and a Certificate Revocation List (CRL) from
either the Active or Standby Domain Management Servers.
Notes:
n You cannot change settings for an existing Domain Management Server. You
must first delete the Domain Management Server and then create a new one.
n Creation of a Security Gateway object on the Domain Management Server that
is active on the Secondary Management Server fails. To resolve this issue, run
mdsstop; mdsstart on the secondary Multi-Domain Server.
To see the High Availability status of both servers, go to the main Menu and click High
Availability Status. In this window you can see which server is active and which is standby
and the synchronization status.
Synchronization
In a multi-domain environment, the Multi-Domain Servers work in active-active mode. All Multi-
Domain Servers are active and synchronize each other.
The Domains managed by the Multi-Domain Server work in active-standby mode, where the
Active Domain Server synchronizes all the standby Domain Servers.
The system automatically synchronizes periodically and when an administrator publishes
changes to the configuration.
On periodic synchronization:
1. The Active exports the delta data between the Active server and the Standby server to
compressed files.
2. The compressed files are transferred to the Standby server.
3. The Standby Server replays the delta data from the uncompressed files.
On manual synchronization:
1. The Active Server exports the public data to compressed files.
2. The compressed files are transferred to the Standby Server.
3. The Standby server overrides the existing data with the uncompressed files.
The data that is transferred during synchronization includes:
n Postgres database
n Solr
n ICA database
n Configuration files
n Domain licenses and contracts. Multi-Domain server licenses and contracts are not
transferred.
Initial Synchronization
Initial synchronization occurs automatically when you create a secondary Multi-Domain
Server, Multi-Domain Log Server, or Domain Management Server. The system generates a
task to copy all databases and system information from the connected server to the new
server.
Multi-Domain Server and Multi-Domain Log Server synchronization tasks show in the Task
Information area, in the Multi-Domain Server SmartConsole. Domain synchronization tasks
show in the Domain SmartConsole.
Periodic Synchronization
Multi-Domain Servers synchronize with all other peers and Multi-Domain Log Servers.
Periodic synchronization occurs automatically, and when an administrator publishes a
session. Private (non-published) sessions do not synchronize.
Periodic synchronizations are incremental. Only database changes synchronize with peers.
Active Domain Management Servers synchronize to the standby Domain Management
Servers.
Manual Synchronization
Manual synchronization is a full synchronization that overwrites all data on the peers. It
disconnects all connected clients and overrides active sessions and running tasks.
When changes made in a session are published on the Active server (made public), the
changes are synchronized to the Standby server. Unpublished, private sessions are not
synchronized.
Best Practice - Use this option with caution, and only in cases of synchronization
error. We recommend that you publish changes before initiating full sync.
For Domain Management Servers, you can only run a manual synchronization from the active
Domain Management Server to the standby peers.
Warning - Use manual synchronization with caution. This can overwrite all data on
the peer Multi-Domain Server if they do not synchronize correctly.
Failure Recovery
In many cases, you can recover a failed Primary Multi-Domain Server in a Management High
Availability deployment.
Action Plan:
1. Promote an existing Secondary Multi-Domain Server to become the Multi-Domain
Server Primary.
2. Promote each Secondary Domain Management Server to become the Primary Domain
Management Server.
3. Install and configure a new Secondary Multi-Domain Server.
Important - Use Domain Management Server promotion only to recover a failed Multi-
Domain Server. Do not use this procedure to change the Primary and Secondary
roles on working servers.
Procedure:
Notes:
n The procedure below assumes that the Primary Multi-Domain Server failed, and
the Secondary Multi-Domain Server keeps working.
n There are environments, where a Domain Management Server is primary on a
Secondary Multi-Domain Server.
If the primary Domain Management Server was on the failed Multi-Domain
Server, then promote the secondary Domain Management Server.
1. Promote the Global Domain Management Server on the Secondary Multi-Domain Server
Step Instruction
1 Make sure that all functional, Secondary Multi-Domain Servers and Multi-
Domain Log Servers are up and running.
Step Instruction
Step Instruction
2 In the top left panel, click Tables > Other > mdss.
3 In the top right panel, locate the object of the failed Primary Multi-Domain
Server > right-click this object > click Delete.
Important - The Database Tool (GuiDBEdit Tool) deletes this object
without asking to confirm.
4 In the top right panel, select the object of the Secondary Multi-Domain
Server you promoted.
12 In the right panel, from the top toolbar, right-click the object of the failed
Primary Multi-Domain Server > click Delete.
Follow these instructions for each Domain on the Secondary Multi-Domain Server.
Important:
n To use this procedure, there must be at least one Active Domain
Step Instruction
Step Instruction
6 Right-click the object of the Domain Management Server that failed >
click Where Used.
mdsstop
mdsstart
3. In SmartConsole, right-click the secondary Multi-Domain Server, and then select Delete
Multi-Domain Server.
4. Confirm the action and click OK.
5. Publish the SmartConsole session.
Note - This procedure deletes all standby and non-primary Domain Management
Servers on the Secondary Multi-Domain Server. You cannot delete the Primary or
Active Domain Management Server.
4. Enter y to confirm.
5. Enter and confirm the activation key.
One-click exploration makes it easy to move from high-level overview to specific event details
such as type of attack, timeline, application type and source. After you investigate an event, it
is easy to act on it. Depending on the severity of the event, you can choose to ignore it, act on it
later, or block it immediately. You can also easily toggle over to the rules associated with the
event to refine your Policy. Send reports to your manager or auditors that show only the
content that is relevant to each stakeholder.
In R80.x, SmartReporter and SmartEvent functionality is integrated into SmartConsole.
Using rich and customizable views and reports, R80 introduces a new experience for log and
event monitoring.
The new views are available from two locations:
n SmartConsole > Logs & Monitor
n SmartView Web Application. Browse to: https://<Server IP Address>/smartview/
Configuring Logging
Creating a Multi-Domain Log Server with Domain Log
Servers
This section shows you how to create a new Multi-Domain Log Server and its related Domain
Log Servers.
Important - Before you start this procedure, make sure that you define the physical
servers as the correct server type (Secondary Multi-Domain Server or Multi-Domain
Log Server) during installation. An incorrect definition can cause deployment failure.
6. Enter the IPv4 address or click Resolve IP to get the IP address from the DHCP Server.
7. Click Connect to establish SIC trust.
Enter the same Activation Key you entered during the First Time Configuration Wizard of
the Multi-Domain Log Server.
8. In the Platform section:
n In the OS field, select Gaia
n In the Version field, select the correct version
n In the Hardware field, select the applicable option
9. Click OK.
Note - To add a license for a Multi-Domain Log Server, go to the main Menu >
Manage licenses and packages.
7. Configure the Security Gateway in each Domain to the send its logs to the new Domain
Log Server on the Multi-Domain Log Server (see "Configuring Security Gateways to
Send Logs to a Log Servers" below).
The Domain Log Servers synchronize automatically.
The new Multi-Domain Log Server automatically synchronizes with all existing Multi-Domain
Servers. The synchronization operation can take many minutes to complete, during which a
notification indicator shows in the task information area.
Note - To add a license for a Domain Log Server, go to the main Menu > Manage
licenses and packages.
n Run the following script before cleanup - Enter a predefined script to run before
the cleanup starts.
n Send Alert when free disk space is below - Send an alert when available disk
space is less that the specified quantity. Select to enable (default). Clear to disable.
Enter the minimum disk space and unit of measure (Default = 3 GB).
5. In the Advanced view, configure these settings:
n Accept Syslog messages - Include syslog messages in the log files.
n Stop Logging - Stop all logging activity when the available disk space is less than
the specified quantity.
Enter the minimum disk space and unit of measure (Default = 100 MB).
n Create a new log file - Close and save the active log file when the active log file is
larger than the specified size. The log file has an extension that is a sequential
number. You can move these saved log files to external storage or export them to
an external database.
Enter the maximum log file size. (Default = 1 GB).
2. Each Domain keeps its Domain Log Servers on one or more Multi-Domain Log Servers.
If this Domain has more than one Domain Log Server, you must install each one on a
different Multi-Domain Log Server.
3. Each Domain Security Gateway works as the Log Server for its own logs. This is known
as local logging.
For additional information, see "Deploying a Domain Dedicated Log Server" on page 131.
Note - Connecting with SmartConsole to the Domain Dedicated Log Server to see
Security Policies is not supported.
See the R81.10 Installation and Upgrade Guide > Chapter "Installing a Multi-Domain
Server".
2. Install a regular dedicated R81.10 Log Server.
See the R81.10 Installation and Upgrade Guide > Chapter "Installing a Dedicated Log
Server or SmartEvent Server".
3. Connect with SmartConsole to the specific Domain.
See the R81.10 Multi-Domain Security Management Administration Guide.
4. Add a regular Log Server object for the dedicated R81.10 Log Server you installed in
Step 2.
Requirement post upgrade to R81.10:
For any environment, which uses SmartEvent Server or a Domain Dedicated Log Server, this
is a required step to complete post upgrade to R81.10 from any source version:
After you upgrade the SmartEvent Server or Domain Dedicated Log Server, run this command
in the Expert mode on each Multi-Domain Security Management Server:
Important - Stop after the CPUSE Verifier shows the upgrade / installation is
allowed.
n For Multi-Domain Servers:
See the chapter "Upgrade of Multi-Domain Servers and Multi-Domain Log
Servers" > select the applicable section to upgrade "from R80.10 and
lower" > select the applicable section to upgrade "with CPUSE".
n For Log Servers:
See the chapter "Upgrade of Security Management Servers and Log
Servers" > section "Upgrading a Dedicated Log Server from R80.10 and
lower" > select the applicable section to upgrade "with CPUSE".
n For SmartEvent Servers:
See the chapter "Upgrade of Security Management Servers and Log
Servers" > section "Upgrading a Dedicated SmartEvent Server from
R80.10 and lower" > select the applicable section to upgrade "with
CPUSE".
b. Fix all the errors, except the one specified for Log Servers on a Domain
Management Server:
cp -v $CPDIR/tmp/.CPprofile.sh{,_BKP}
cat >> $CPDIR/tmp/.CPprofile.sh << EOF
> export PUV_ERRORS_AS_WARNINGS=1
> EOF
e. Follow the instructions in the R80.40 Installation and Upgrade Guide to upgrade
all the servers "with CPUSE".
2. Upgrade all Multi-Domain Servers to R81.10.
See the R81.10 Installation and Upgrade Guide > chapter "Upgrade of Multi-Domain
Servers and Multi-Domain Log Servers" > select the applicable section to upgrade
"from R80.20 and higher" > select the applicable section to upgrade "with CPUSE".
3. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
$MDS_FWDIR/scripts/configureCrlDp.sh
reboot
6. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
7. Reboot all the Domain Dedicated Log Servers and the SmartEvent Servers:
reboot
Advanced Upgrade
c. In your active shell window, run this command in the Expert mode:
export PUV_ERRORS_AS_WARNINGS=1
d. Follow the instructions in the R80.40 Installation and Upgrade Guide to upgrade
all the servers "with Advanced Upgrade".
2. Upgrade all Multi-Domain Servers to R81.10.
See the R81.10 Installation and Upgrade Guide > chapter "Upgrade of Multi-Domain
Servers and Multi-Domain Log Servers" > select the applicable section to upgrade
"from R80.10 and lower" > select the applicable section to upgrade "with Advanced
Upgrade".
3. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
$MDS_FWDIR/scripts/configureCrlDp.sh
reboot
6. On each Multi-Domain Security Management Server, run this script in the Expert
mode:
7. Reboot all the Domain Dedicated Log Servers and SmartEvent Servers:
reboot
Item Description
3 Query search bar - Define custom queries in this field. You can use the GUI tools
or manually enter query criteria. Shows the query definition for the most recent
query.
4 Log statistics pane (Tab hidden) - Top results of the most recent log query.
5 Log Servers - All Multi-Domain Log Servers, Domain Log Servers, and other Log
Server objects in the Multi-Domain Security Management deployment. Select one
or more Log Servers from this list to include in a query.
6 Results pane - All log entries for the most recent query.
n HTML
n JPG
n CSV file (compatible with Microsoft Excel)
n Plain text file
n OS Password
OS Password is stored on the operating system of the computer on which the Security
Gateway (for users) or Security Management Server (for administrators) is installed.
You can also use passwords that are stored in a Windows domain. No additional
software is required.
n RADIUS
n SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or
password. Token authenticators generate one-time passwords that are synchronized
to an RSA Authentication Manager and may come in the form of hardware or software.
Hardware tokens are key-ring or credit card-sized devices, while software tokens
reside on the PC or device from which the user wants to authenticate. All tokens
generate a random, one-time use access code that changes approximately every
minute. When a user attempts to authenticate to a protected resource, the one-time
use code must be validated by the Authentication Manager.
Using SecurID, the Security Gateway forwards authentication requests by remote
users to the Authentication Manager. For administrators, it is the Security
Management Server that forwards the requests. The Authentication Manager
manages the database of RSA users and their assigned hard or soft tokens. The
Security Gateway or the Security Management Server act as an Authentication
Manager agent and direct all access requests to the RSA Authentication Manager for
authentication. For additional information on agent configuration, refer to RSA
Authentication Manager documentation.
There are no specific parameters required for the SecurID authentication method.
n TACACS
If you create an administrator through mdsconfig, the Check Point configuration tool, Check
Point password is automatically configured
Note - If you do not do this, the administrator will not be able to log in to
SmartConsole.
In the Certificate Information section, click Create, and follow the instructions in
"Creating a Certificate for Logging in to SmartConsole" on page 93.
5. Select a Permissions profile for this administrator, or create a new one.
6. Set the account Expiration date:
n For a permanent administrator - select Never
n For a temporary administrator - select an Expire At date from the calendar
The default expiration date shows, as defined in the Default Expiration Settings. After the
expiration date, the account is no longer authorized to access network resources and
applications.
7. Optional: Configure Additional Info - Contact Details, Email and Phone Number of the
administrator.
8. Click OK.
API
You can configure and control the Management Server through API Requests you send to the
API Server that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions
with third party systems, such as virtualization servers, ticketing systems, and change
management systems.
To learn more about the management APIs, to see code samples, and to take advantage of
user forums, see:
n The API Documentation:
l Online - Check Point Management API Reference
l Local - https://<Server IP Address>/api_docs
By default, access to the local API Documentation is disabled. Follow the
instructions in sk174606.
API Tools
You can use these tools to work with the API Server on the Management Server:
n Standalone management tool, included with Gaia operating system:
mgmt_cli
n Standalone management tool, included with SmartConsole:
mgmt_cli.exe
You can copy this tool from the SmartConsole installation folder to other computers that
run Windows operating system.
n Web Services APIs that allow communication and data exchange between the clients
and the Management Server over the HTTP protocol.
These APIs also let other Check Point processes communicate with the Management
Server over the HTTPS protocol.
https://<IP Address of Management Server>/web_api/<command>
Select Automatic start to automatically start the API server when you start or reboot
the Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to
the API Server. This option only lets you use the mgmt_cli utility on the
Management Server to send API requests. You cannot use SmartConsole or
Web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests
from all IP addresses that are defined as Trusted Clients in SmartConsole. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
n All IP addresses - You can send API requests from all IP addresses. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
Configuration files
File Name Controls Location
Configuration Procedure
1. Connect to the command line on the Multi-Domain Server.
2. Log in to the Expert mode.
3. Go to the context of the applicable Domain Management Server:
Example:
cp -v $FWDIR/conf/user.def.FW1{,_BKP}
Example:
vi $FWDIR/conf/user.def.FW1
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $FWDIR/conf/user.def.FW1
R81 $FWDIR/conf/user.def.FW1
R80.40 $FWDIR/conf/user.def.R8040CMP
R80.30 $FWDIR/conf/user.def.R8040CMP
R80.20 $FWDIR/conf/user.def.R8040CMP
R80.10 $FWDIR/conf/user.def.R8040CMP
R77.30 $FWDIR/conf/user.def.R77CMP
Important - If the required file does not exist, create a copy of the
$FWDIR/conf/user.def.FW1 file, rename it, and edit it.
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-
R81.10/fw1/lib/table.def
R81 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-
R81.10/fw1/lib/table.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/table.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/table.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/table.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/table.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-R81.10/lib/table.def
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/crypt.def
R81 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/crypt.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/crypt.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/crypt.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/crypt.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/crypt.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-R81.10/lib/crypt.def
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/vpn_
table.def
R81 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/vpn_
table.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/vpn_
table.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/vpn_
table.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/vpn_
table.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/vpn_
table.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-R81.10/lib/vpn_table.def
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-
R81.10/fw1/lib/communities.def
R81 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-
R81.10/fw1/lib/communities.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-
R81.10/lib/communities.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-
R81.10/lib/communities.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-
R81.10/lib/communities.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-
R81.10/lib/communities.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-
R81.10/lib/communities.def
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/base.def
R81 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/base.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/base.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/base.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/base.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/base.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-R81.10/lib/base.def
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/dhcp.def
R81 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/dhcp.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/dhcp.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/dhcp.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/dhcp.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/dhcp.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-R81.10/lib/dhcp.def
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/gtp.def
R81 $MDSDIR/customers/<Name_of_
Domain>/CPsuite-R81.10/fw1/lib/gtp.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/gtp.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/gtp.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/gtp.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/gtp.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-R81.10/lib/gtp.def
Important - You must edit the file in the context of the applicable Domain
Management Server. To go to the required context, use the command "mdsenv <IP
Address or Name of Domain Management Server>".
R81.10 $MDSDIR/customers/<Name_of_Domain>/CPsuite-
R81.10/fw1/lib/implied_rules.def
R81 $MDSDIR/customers/<Name_of_Domain>/CPsuite-
R81.10/fw1/lib/implied_rules.def
R80.40 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/implied_
rules.def
R80.30 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/implied_
rules.def
R80.20 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/implied_
rules.def
R80.10 $MDSDIR/customers/<Name_of_
Domain>/CPR8040CMP-R81.10/lib/implied_
rules.def
R77.30 $MDSDIR/customers/<Name_of_
Domain>/CPR77CMP-R81.10/lib/implied_
rules.def
Syntax Legend
Whenever possible, this guide lists commands, parameters and options in the alphabetical
order.
This guide uses this convention in the Command Line Interface (CLI) syntax:
Character Description
Square brackets or Enclose an optional command or parameter, which user can also
brackets enter.
[]
cma_migrate
Description
On the applicable target Domain Management Server, imports the management database that
was exported from an R7x Domain Management Server.
Note - This command updates the database schema before it imports. First, the
command runs pre-upgrade verification. If no errors are found, migration continues. If
there are errors, you must fix them on the source R7x Domain Management Server
according to instructions in the error messages. Then do this procedure again.
For the complete procedure, see the R81.10 Installation and Upgrade Guide.
Syntax
Example
contract_util
Description
Works with the Check Point Service Contracts.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify
Parameters
Parameter Description
cpmacro Overwrites the current cp.macro file with the specified cp.macro file.
<options>
download Downloads all associated Check Point Service Contracts from the User
<options> Center, or from a local file.
mgmt Delivers the Service Contract information from the Management Server to
the managed Security Gateways.
print Shows all the installed licenses and whether the Service Contract covers
<options> these license, which entitles them for upgrade or not.
update Updates Check Point Service Contracts from your User Center account.
<options>
Parameter Description
contract_util check
Description
Checks whether the Security Gateway is eligible for an upgrade.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
hfa Checks whether the Security Gateway is eligible for an upgrade to a higher
Hotfix Accumulator.
maj_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Major version.
min_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Minor version.
contract_util cpmacro
Description
Overwrites the current cp.macro file with the specified cp.macro file, if the specified is
newer than the current file.
For more information about the cp.macro file, see sk96217: What is a cp.macro file?
Syntax
Message Description
contract_util download
Description
Downloads all associated Check Point Service Contracts from User Center, or from a local file.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service
Contract File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}]
<Username> <Password> [<Proxy Server> [<Proxy Username>:<Proxy
Password>]]
Parameters
Parameter Description
<Proxy Server> [<Proxy Specifies that the connection to the User Center goes
Username>:<Proxy through the proxy server.
Password>]
n <Proxy Server> - IP address of resolvable
hostname of the proxy server
n <Proxy Username> - Username for the proxy
server.
n <Proxy Password> - Password for the proxy
server.
Note - If you do not specify the proxy server explicitly, the
command uses the proxy server configured in the
management database.
<Service Contract Path to and the name of the Service Contract file.
File> First, you must download the Service Contract file from
your User Center account.
contract_util mgmt
Description
Delivers the Service Contract information from the Management Server to the managed
Security Gateways.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util mgmt
contract_util print
Description
Shows all the installed licenses and whether the Service Contract covers these license, which
entitles them for upgrade or not.
This command can show which licenses are not recognized by the Service Contract file.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
Parameters
Parameter Description
contract_util summary
Description
Shows post-installation summary and whether this Check Point computer is eligible for
upgrades.
Syntax
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
contract_util update
Description
Updates the Check Point Service Contracts from your User Center account.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]
Parameters
Parameter Description
-proxy <Proxy Specifies that the connection to the User Center goes through
Server>:<Proxy the proxy server:
Port>
n <Proxy Server> - IP address of resolvable hostname
of the proxy server.
n <Proxy Port> - The applicable port on the proxy
server.
Note - If you do not specify the proxy explicitly, the
command uses the proxy configured in the management
database.
-ca_path <Path to Specifies the path to the Certificate Authority Bundle file (ca-
ca-bundle.crt File> bundle.crt).
Note - If you do not specify the path explicitly, the
command uses the default path.
contract_util verify
Description
Checks whether the Security Gateway is eligible for an upgrade.
This command is the same as the command, but it also interprets the return values and shows
a meaningful message.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util verify
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
Parameters
Parameter Description
auto Shows and configures the automatic start of Check Point products during
<options> boot.
See "cp_conf auto" on page 184.
client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 187.
Parameter Description
cp_conf admin
Description
Configures Check Point system administrators for the Security Management Server.
Notes:
n Multi-Domain Server does not support this command.
n Only one administrator can be defined in the menu.
To define additional administrators, use SmartConsole.
n This command corresponds to the option Administrator in the
menu.
Syntax
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get
Parameters
Parameter Description
add -gaia [{a | w | r}] Adds the Gaia administrator user admin:
n a - Assigns all permissions - read settings, write
settings, and manage administrators
n w - Assigns permissions to read and write settings
only (cannot manage administrators)
n r - Assigns permissions to only read settings
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Parameters
Parameter Description
cp_conf ca
Description
This command changes the settings of the Internal Certificate Authority (ICA).
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_conf ca
-h
fqdn <FQDN Name>
init
Parameters
Parameter Description
fqdn <FQDN Configures the Fully Qualified Domain Name (FQDN) for the Internal
Name> Certificate Authority (ICA).
The "<FQDN Name>" is the text string in this format:
hostname.domainname
Notes:
n The existing certificates for configured objects are not
revoked.
n The existing ICA certificate is not changed.
n The Management Server uses the specified "<FQDN Name>"
to configure the Certificate Revocation List Distribution Point
(CRL DP) property in all certificates that the ICA generates.
Refer to this command: "cpca_client get_crldp" on page 223
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cp_conf client
Description
Configures the GUI clients that are allowed to connect with SmartConsoles to the Security
Management Server.
Notes:
n Multi-Domain Server does not support this command.
n This command corresponds to the option GUI Clients in the
menu.
Syntax
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get
Parameters
Parameter Description
createlist <GUI Client 1> Deletes the current allowed GUI clients and creates
<GUI Client 2> ... a new list of allowed GUI clients.
del <GUI Client 1> <GUI Deletes the specified the GUI clients.
Client 2> ...
Examples
Example 1 - Configure one IPv4 address
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
cp_conf finger
Description
Shows the Internal Certificate Authority's Fingerprint.
This fingerprint is a text string derived from the ICA certificate on the Security Management
Server, Multi-Domain Server, or Domain Management Server.
This fingerprint verifies the identity of the Security Management Server, Multi-Domain Server,
or Domain Management Server when you connect to it with SmartConsole.
Syntax
cp_conf finger
-h
get
Parameters
Parameter Description
Example
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to Adds a license from the specified Check Point
License File> license file.
You get this license file in the Check Point User
Center.
This is the same command as the "cplic db_add" on
page 256.
cp_log_export
Description
Exports Check Point logs over syslog.
For more information, see sk122323 and R81.10 Logging and Monitoring Administration
Guide.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_log_export
cp_log_export <command-name> help
Parameters
Parameter Description
<command-name> help Shows the built help for the specified internal command.
Internal Commands
Name Description
reexport Resets the current log position and exports all logs again based on the
configuration.
cp_log_export reexport name <Name> --apply-now
cp_log_export reexport name <Name> start-position
<Position of Last Exported Log> --apply-now
cp_log_export reexport name <Name> start-position
<Position of Gap Start> end-position <Position of
Gap End> --apply-now
Name Description
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
ca-cert Specifies the full Optio Optio N/A N/A N/A N/A
<Path> path to the CA nal nal
certificate file
*.pem.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
client-cert Specifies the full Optio Optio N/A N/A N/A N/A
<Path> path to the client nal nal
certificate *.p12.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
end-position Specifies the end N/A N/A N/A N/A N/A Optio
<Position> position, up to which nal
to export the logs.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
n Accept
n Block
n Bypass
n Detect
n Drop
n HTTPS
Bypass
n HTTPS
Inspect
n Prevent
n Reject
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
2. In the top
query field,
enter blade:
and a letter.
Examples of values:
n Anti-Bot
n Firewall
n HTTPS
Inspection
n Identity
Awareness
n IPS
Valid Software
Blade families:
n Access
n TP
n Endpoint
n Mobile
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
format Specifies the format, Optio Optio N/A N/A N/A N/A
{generic | in which the logs are nal nal
cef | json | exported.
leef | Default: syslog
logrhythm |
rsa | splunk
| syslog}
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
name Specifies the unique Man Man Man Opti Opti Man
"<Name>" name of the Log dator dator dator onal. onal. dator
Exporter y y y By By y
configuration. defa defa
ult, ult,
appli appli
es to es to
all. all.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Notes:
n Allowed
characters
are: Latin
letters, digits
("0-9"),
minus ("-"),
underscore
("_"), and
period (".").
n Must start
with a letter.
n The minimum
length is two
characters.
n The "add"
command
creates a new
target
directory with
the specified
unique name
in the
$EXPORTERD
IR/target
s/ directory.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
protocol Specifies the Layer Man Optio N/A N/A N/A N/A
{tcp | udp} 4 Transport protocol dator nal
to use (TCP or y
UDP).
There is no default
value.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
read-mode Specifies the mode, Optio Optio N/A N/A N/A N/A
{raw | semi- in which to read the nal nal
unified} log files.
n raw -
Specifies to
export log
records
without any
unification.
n semi-
unified -
Specifies to
export log
records with
step-by-step
unification.
That is, for
each log
record, export
a record that
unifies this
record with all
previously-
encountered
records with
the same ID.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Default: semi-
unified
Default: raw
start- Specifies the start N/A N/A N/A N/A N/A Optio
position position, from which nal
<Position> to export the logs.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
cpca_client
Description
Execute operations on the Internal Certificate Authority (ICA).
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_ca_services <options>
set_cert_validity <options>
set_mgmt_tool <options>
set_sign_hash <options>
Parameters
Parameter Description
Parameter Description
get_crldp <options> Shows how to access a CRL file from a CRL Distribution
Point.
See "cpca_client get_crldp" on page 223.
get_pubkey <options> Saves the encoding of the public key of the ICA's certificate
to a file.
See "cpca_client get_pubkey" on page 225.
init_certs <options> Imports a list of DNs for users and creates a file with
registration keys for each user.
See "cpca_client init_certs" on page 226.
set_sign_hash Sets the hash algorithm that the CA uses to sign the file hash.
<options> See "cpca_client set_sign_hash" on page 245.
cpca_client create_cert
Description
Issues a SIC certificate for the Security Management Server or Domain Management Server.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.
-f <Full Path Specifies the PKCS12 file, which stores the certificate and keys.
to PKCS12 file>
Example
cpca_client double_sign
Description
Creates a second signature for a certificate.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management
number> Server or Domain Management Server, which is used to connect to
the Certificate Authority.
The default TCP port number is 18209.
-o <Full Path Optional. Saves the certificate into the specified file.
to Output
File>
Example
[Expert@MGMT:0]#
cpca_client get_crldp
Description
Shows the Fully Qualified Domain Name (FQDN) configured for the Internal Certificate
Authority (ICA) with the ""cp_conf ca" on page 185" command.
The Management Server uses this FQDN:
1. To configure the Certificate Revocation List Distribution Point (CRL DP) property in all
certificates that the ICA generates.
2. To create the URL for accessing the CRL.
Example: http://MyMGMT.checkpoint.com:18264/ICA_CRL1.crl
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <ICA Optional.
port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18264.
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cpca_client get_pubkey
Description
Saves the encoding of the public key of the ICA's certificate to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
<Full Path Saves the encoding of the public key of the ICA's certificate to the
to Output specified file.
File>
Example
cpca_client init_certs
Description
Imports a list of Distinguished Names (DN) for users and creates a file with registration keys for
each user.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
cpca_client lscert
Description
Shows all certificates issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-stat {Pending | Valid | Optional. Filters the search results to those with
Revoked | Expired | certificate status that matches the specified status.
Renewed} This command does not support multiple values.
-kind {SIC | IKE | User | Optional. Filters the search results to those with
LDAP} certificate kind that matches the specified kind.
This command does not support multiple values.
-ser <Certificate Serial Optional. Filters the search results to those with
Number> certificate serial number that matches the specified
serial number.
This command does not support multiple values.
Example
Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023
Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023
cpca_client revoke_cert
Description
Revokes a certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
Note - You can use the parameter '-n' only, or together with the
parameter "-s".
cpca_client revoke_non_exist_cert
Description
Revokes a non-existent certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Paramet
Description
er
-i Specifies the file that contains the list of the certificate to revoke.
<Full You must create this file in the same format as the "cpca_client lscert" on
Path page 227 command prints its output.
to
Input Example
File> Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri
Apr 7 19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri
Apr 7 19:40:13 2023
Note - This command saves the error messages in the <Name of Input
File>.failures file.
cpca_client search
Description
Searches for certificates in the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Parameter Description
-kind {SIC | IKE | User | LDAP} Optional. Specifies the certificate kind
to search.
You can enter multiple values in this
format:
-kind <Kind1> <Kind2> <Kind3>
The default is to search for all kinds.
Example 1
[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP -stat Pending
Valid Renewed
Example 2
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#
Example 3
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#
cpca_client set_ca_services
Description
This command enables and disables the Certificate Authority Services Portal on the
Management Server on the TCP port 18268.
From this portal, you can download the applicable Internal Certificate Authority certificates.
For trust purposes, you can install this certificate on the applicable Security Gateways,
externally managed Site to Site VPN peer gateways, Remote Access VPN clients, clients that
use Clientless VPN, and so on.
Note - In R81.10, the TCP port 18264 on the Management Server is available only for
the retrieval of the CRL (Certificate Revocation List).
Syntax
Parameters
Parameter Description
cpca_client set_ca_services on
cpca_client set_ca_services on
cpca_client set_cert_validity
Description
This command configures the default certificate validity period for new certificates.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n The new certificate validity period applies only to certificate you create after this
change.
Syntax
Parameters
Parameter Description
Example
cpca_client set_mgmt_tool
Description
Controls the ICA Management Tool.
This tool is disabled by default.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management
number> Server or Domain Management Server, which is used to connect to
the Certificate Authority.
The default TCP port number is 18265.
Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
-u <User DN> Optional. Specifies the DN of the user that is permitted to use the
ICA Management Tool.
Must specify the full DN as appears in SmartConsole:
Procedure
Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
Parameter Description
-c <Custom Optional. Specifies the DN for the custom user that is permitted to
User DN> use the ICA Management Tool.
Must specify the full DN as appears in SmartConsole.
Procedure
Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
3. In the command line on the Management Server, start the ICA Management Tool.
cpca_client set_mgmt_tool on
5. Import the administrator's / user's certificate into the Windows Certificate Store:.
a. Right-click the *.p12 file you saved when you created the required administrator /
user, and click Install PFX.
The Certificate Import Wizard opens.
c. Click Next.
d. Enter the same certificate password you used when you created the required
administrator / user certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store > click Browse > select
Personal > click OK.
i. Click Next.
j. Click Finish.
8. Select the appropriate certificate for authenticating to the ICA Management Tool.
9. Click OK.
10. In the Security Alert dialog box, click Yes.
cpca_client set_sign_hash
Description
Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
{sha1 | sha256 | sha384 | The hash algorithms that the CA uses to sign the
sha512} file hash.
The default algorithm is SHA-256.
Example
cpca_create
Description
Creates new Check Point Internal Certificate Authority database.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on
your Check Point server.
For more information, see sk92739.
cplic
Description
The cplic command manages Check Point licenses.
You can run this command in Gaia Clish or in the Expert mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
For more about managing licenses, see the R81.10 Security Management Administration
Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Syntax for Remote Licensing on managed Security Gateways and Cluster Members
cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>
cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>
Parameters
Parameter Description
check Confirms that the license includes the feature on the local Security
<options> Gateway or Management Server.
See "cplic check" on page 252.
contract Manages (deletes and installs) the Check Point Service Contract on
<options> the local Check Point computer.
See "cplic contract" on page 254.
Parameter Description
del <Object Detaches a Central license from a remote managed Security Gateway
Name> or Cluster Member.
<options> See "cplic del <object name>" on page 262.
print Prints details of the installed Check Point licenses on the local Check
<options> Point computer.
See "cplic print" on page 265.
put <Object Attaches one or more Central or Local licenses to a remote managed
Name> Security Gateways and Cluster Members.
<options> See "cplic put <object name>" on page 270.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management
Server. See sk66245.
Syntax
Parameters
Parameter Description
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member / Scalable Platform Security Group, you must update the license
repository on the applicable Management Server - either with the "cplic get" on
page 263 command, or in SmartUpdate.
Syntax
cplic contract -h
cplic [-d] contract
del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>
Parameters
Parameter Description
cplic db_add
Description
Adds licenses to the license repository on the Management Server.
When you add Local licenses to the license repository, Management Server automatically
attaches them to the managed Security Gateway / Cluster Member with the matching IP
address.
When you add Central licenses, you must manually attach them.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Parameter Description
< The SKU of the license summarizes the features included in the
SKU/Features> license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command "cplic db_add -
l 192.0.2.11.lic" produces output similar to:
cplic db_print
Description
Shows the details of Check Point licenses stored in the license repository on the Management
Server.
Syntax
Parameters
Parameter Description
Example
cplic db_rm
Description
Removes a license from the license repository on the Management Server.
After you remove the license from the repository, it can no longer use it.
Warning - You can run this command ONLY after you detach the license with the
"cplic del" on page 261 command.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other
licenses.
This command can delete a license on both local computer, and on remote managed
computers.
Syntax
Parameters
Parameter Description
Description
Detaches a Central license from a remote managed Security Gateway or Cluster Member.
When you run this command, it automatically updates the license repository.
The Central license remains in the license repository as an unattached license.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object as
defined in SmartConsole.
-ip <Dynamic IP Deletes the license on the DAIP Security Gateway with the
Address> specified IP address.
Note - If this parameter is used, then object name must be a
DAIP Security Gateway.
cplic get
Description
Retrieves all licenses from managed Security Gateways and Cluster Members into the license
repository on the Management Server.
This command helps synchronize the license repository with the managed Security Gateways
and Cluster Members.
When you run this command, it updates the license repository with all local changes.
Syntax
Parameters
Parameter Description
-all Retrieves licenses from all Security Gateways and Cluster Members in the
managed network.
<IP The IP address of the Security Gateway / Cluster Member, from which
Address> licenses are to be retrieved.
<Host The name of the Security Gateway / Cluster Member object as defined in
Name> SmartConsole, from which licenses are to be retrieved.
Example
If the Security Gateway with the object name MyGW contains four Local licenses, and the
license repository contains two other Local licenses, the command "cplic get MyGW"
produces output similar to this:
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
{-c | -check- Verifies the license. Checks if the IP of the license matches the Check
only} Point computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP
select} address of the Check Point computer.
Parameter Description
{-P | -Pre- Use this option after you have upgraded and before you reboot the
boot} Check Point computer.
Use of this option will prevent certain error messages.
< The SKU of the license summarizes the features included in the
SKU/Features> license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the
license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
Description
Attaches one or more Central or Local licenses to a remote managed Security Gateways and
Cluster Members.
When you run this command, it automatically updates the license repository.
Note
n You get the license details in the Check Point User
Center.
n You can attach more than one license.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object, as
defined in SmartConsole.
-ip <Dynamic Installs the license on the Security Gateway with the specified IP
IP Address> address.
This parameter is used to install a license on a Security Gateway with
dynamically assigned IP address (DAIP).
Note - If you use this parameter, then the object name must be
that of a DAIP Security Gateway.
<SKU/Features> The SKU of the license summarizes the features included in the
license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the
license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in the specified license file.
Note - You get this license file in the Check Point User Center.
Syntax
Parameters
Parameter Description
-l <Input Upgrades the licenses in the license repository and Check Point Security
File> Gateways / Cluster Members to match the licenses in the specified file.
Example
This example explains the procedure to upgrade the licenses in the license repository.
There are two Software Blade licenses in the input file:
n One license does not match any license on a remote managed Security Gateway.
n The other license matches an NGX-version license on a managed Security Gateway that
has to be upgraded.
Workflow in this example:
1. Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the
Security Gateways with the previous product versions.
2. Import all licenses into the license repository.
You can also do this after you upgrade the products on the remote Security Gateways.
3. Run this command:
Example:
Example:
5. In the Check Point User Center, view the licenses for the products that were upgraded
from version NGX to a Software Blades license.
You can also create new upgraded licenses.
6. Download a file containing the upgraded licenses.
Only download licenses for the products that were upgraded from version NGX to
Software Blades.
7. If you did not import the version NGX licenses into the repository, import the version NGX
licenses now.
n The licenses in the downloaded license file and in the license repository are
compared.
n If the certificate keys and features match, the old licenses in the repository and in
the remote Security Gateways are updated with the new licenses.
n A report of the results of the license upgrade is printed.
For more about managing licenses, see the R81.10 Security Management Administration
Guide.
cppkg
Description
Manages the SmartUpdate software packages repository on the Security Management
Server.
Important - Installing software packages with the SmartUpdate is not supported for
Security Gateways running on Gaia OS.
Syntax
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run mdsenv).
Parameters
Parameter Description
getroot Shows the path to the root directory of the repository (the value of
the environment variable $SUROOT).
See "cppkg getroot" on page 282.
cppkg add
Description
Adds a SmartUpdate software package to the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n This command does not overwrite existing packages. To overwrite an existing
package, you must first delete the existing package.
n You get the SmartUpdate software packages from the Check Point Support
Center.
Syntax
Parameters
Parameter Description
<Full Path to Specifies the full local path on the computer to the SmartUpdate
Package> software package.
Example - Adding R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances
ppkg delete
Description
Deletes SmartUpdate software packages from the SmartUpdate software packages
repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
Parameters
Parameter Description
del | When you do not specify optional parameters, the command runs in the
delete interactive mode. The command shows the menu with applicable options.
Notes:
n To see the values for the optional parameters, run the "cppkg print" on page 283
command.
n You must specify all optional parameters, or no parameters.
Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20
(e) Exit
You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y
[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#
cppkg get
Description
Updates the list of the SmartUpdate software packages in the SmartUpdate software
packages repository based on the real content of the repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg get
Example
cppkg getroot
Description
Shows the path to the root directory of the SmartUpdate software packages repository (the
value of the environment variable $SUROOT)
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg getroot
Example
cppkg print
Description
Prints the list of SmartUpdate software packages in the SmartUpdate software packages
repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg print
cppkg setroot
Description
Configures the path to the root directory of the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n The default path is: /var/log/cpupgrade/suroot
n When changing repository root directory:
l This command copies the software packages from the old repository to
Syntax
Example
cpprod_util
Description
This utility works with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point
computer.
n Enables and disables Check Point products and features on this Check Point computer.
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified
product or feature:
n One of these integers: 0, 1, 4
n A string
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.
n If you run the "cpprod_util" command without parameters, it prints:
l The list of all available products and features (for example,
"FwIsFirewallMgmt", "FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the "cpprod_util" command, it is necessary to redirect the
stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade is
enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade is
enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
cpmiquerybin
Description
The cpmiquerybin utility connects to a specified database, runs a user-defined query and
shows the query results.
The results can be a collection of Security Gateway sets or a tab-delimited list of specified
fields from each retrieved object.
The default database of the query tool is based on the shell environment settings.
To connect to a Domain Management Server database, run "mdsenv" on page 491 and define
the necessary environment variables.
Use the Domain Management Server name or IP address as the first parameter.
Notes:
n You can see complete documentation of the cpmiquerybin utility, with the full
query syntax, examples, and a list of common attributes in sk65181.
n The MISSING_ATTR string shows when you use an attribute name that does
not exist in the objects in query result.
Syntax
Parameters
Parameter Description
Return Values
n 0 - Query returns data successfully
n 1 - Query does not return data or there is a query syntax error
cprid
Description
Manages the Check Point Remote Installation Daemon (cprid).
This daemon is used for remote upgrade and installation of Check Point products on the
managed Security Gateways.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run these commands in the context of the
MDS (run mdsenv).
Commands
Syntax Description
run_cprid_ Stops and then starts the Check Point Remote Installation Daemon
restart (cprid).
cpstat
Description
Shows the status and statistics information for Check Point applications.
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>]
[-o <Polling Interval> [-c <Count>] [-e <Period>]] <Application
Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
-h <Host> Optional.
When you run this command on a Management Server, this parameter
specifies the managed Security Gateway / ClusterXL object.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object
name.
The default is localhost.
Note - On a Multi-Domain Server, you must run this command in
the context of the applicable Domain Management Server:mdsenv
<IP Address or Name of Domain Management Server>.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s <SICname> Optional.
Secure Internal Communication (SIC) name of the Application
Monitoring (AMON) server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor
in the <Application Flag>. To see all flavors, run the cpstat
command without any parameters.
-o <Polling Optional.
Interval> Specifies the polling interval (in seconds) - how frequently the
command collects and shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this
is the default value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the
loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the
"-e <Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results
before it stops.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling
Interval> and then stops.
Example:
cpstat os -f perf -o 2 -c 2
Parameter Description
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the
statistics.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
You can use this parameter together with the "-c <Count>"
parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
<Application Mandatory.
Flag> See the table below with flavors for the application flags.
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway / ClusterXL, and some flags are supported only
by a Management Server.
Feature or
Flag Flavors
Software Blade
Feature or
Flag Flavors
Software Blade
Anti-Virus ci default
Feature or
Flag Flavors
Software Blade
QoS fg all
Feature or
Flag Flavors
Software Blade
Provisioning PA default
Agent
Examples
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cprinstall
Description
Performs installation of Check Point product packages and associated operations on remote
managed Security Gateways.
Important - Installing software packages with this command is not supported for
Security Gateways that run on Gaia OS.
Notes:
n This command requires a license for SmartUpdate.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On the remote Security Gateways these are required:
l SIC Trust must be established between the Security Management Server
Syntax
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>
Parameters
Parameter Description
get n Gets details of the products and the operating system installed on
<options> the managed Security Gateway.
n Updates the management database on the Security Management
Server.
See "cprinstall get" on page 309.
show Displays all snapshot (backup) files on the managed Security Gateway
<options> that runs on SecurePlatform OS.
See "cprinstall show" on page 314.
transfer Transfers a software package from the repository to the managed Security
<options> Gateway without installing the package.
See "cprinstall transfer" on page 316.
Parameter Description
cprinstall boot
Description
Reboots the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall boot MyGW
cprinstall cprestart
Description
Runs the cprestart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT:0]# cprinstall cprestart MyGW
cprinstall cpstart
Description
Runs the cpstart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall cpstart MyGW
cprinstall cpstop
Description
Runs the cpstop command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
-proc Kills the Check Point daemons and Security Servers, while it maintains the
active Security Policy running in the Check Point kernel.
Rules with generic Allow, Drop or Reject action based on services, continue
to work.
-nopolicy Kills the Check Point daemons and Security Servers and unloads the
Security Policy from the Check Point kernel.
Example
[Expert@MGMT]# cprinstall cpstop -proc MyGW
cprinstall delete
Description
Deletes a snapshot (backup) file on the managed Security Gateway that runs on
SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017
cprinstall get
Description
n Gets details of the products and the operating system installed on the managed Security
Gateway.
n Updates the management database on the Security Management Server.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example:
cprinstall install
Description
Installs Check Point products on the managed Security Gateway.
Important - Installing software packages with this command is not supported for
Security Gateways that run Gaia OS.
Notes:
n Before transferring the software package, this command runs the "cprinstall
verify" on page 320 command.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 283
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is
canceled in certain scenarios.
Example
cprinstall revert
Description
Restores the managed Security Gateway that runs on SecurePlatform OS from a snapshot
saved on that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
cprinstall show
Description
Displays all snapshot (backup) files on the managed Security Gateway that runs on
SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
cprinstall snapshot
Description
Creates a snapshot on the managed Security Gateway that runs on SecurePlatform OS and
saves it on that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
cprinstall transfer
Description
Transfers a software package from the repository to the managed Security Gateway without
installing the package.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 283
command.
Syntax
Parameters
Parameter Description
cprinstall uninstall
Description
Uninstalls Check Point products on the managed Security Gateway.
Important - Uninstalling software packages with this command is not supported for
Security Gateways running on Gaia OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n Before uninstalling product packages, this command runs the "cprinstall verify"
on page 320 command.
n After uninstalling a product package, you must run the "cprinstall get" on
page 309 command.
n To see the values for the package attributes, run the "cppkg print" on page 283
command.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get
cprinstall verify
Description
Confirms these operations were successful:
n If a specific product can be installed on the managed Security Gateway.
n That the operating system and currently installed products the managed Security
Gateway are appropriate for the software package.
n That there is enough disk space to install the product the managed Security Gateway.
n That there is a CPRID connection with the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 283
command.
Syntax
Parameters
Parameter Description
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU,
Memory, Disk space) and information for different Software Blades (only on a Security
Gateway / ClusterXL / Scalable Platform Security Group).
The CPView continuously updates the data in easy to access views.
On a Security Gateway / ClusterXL / Scalable Platform Security Group, you can use this
statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and
mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the
capture>
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes
such as Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products
and Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log
file.
The cpwd_admin utility shows the status of the monitored processes, and configures the
Check Point WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates
abnormally.
In the output of the cpwd_admin list command, the MON column shows
N for passively monitored processes.
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
Parameter Description
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes
monitor only passively.
See "cpwd_admin stop_monitor" on page 346.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the "cpstop" and "cpstart" commands (which restart
all Check Point processes).
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
reset_ n Range: > 0 Configures the time (in seconds) the WatchDog
startups n Default: waits after the process starts and before the
3600 WatchDog resets the process's startup_counter
to 0.
To see the process's startup counter, in the output of
the cpwd_admin list command, refer to the
#START column.
stop_timeout n Range: > 0 Configures the time (in seconds) the WatchDog
n Default: 60 waits for a process stop command to complete.
Configuration Accepted
Description
Parameter Values
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored
processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 337 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"mdsstart_customer" on page 499 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 337 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 337 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"mdsstart_customer" on page 499 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 337 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
cpwd_admin exist
Example
cpwd_admin flist
Description
Saves the status of all WatchDog monitored processes to a file.
Parameters
Parameter Description
Output
Column Description
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 327).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 324):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 337 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"mdsstop_customer" on page 506 and "mdsstart_customer" on page 499 commands.
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
Output
Column Description
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 327).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 324):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
Example - Default output on a Management Server
[Expert@HostName:0]# cpwd_admin list
APP PID STAT #START START_TIME MON COMMAND
CPVIEWD 19738 E 1 [17:50:44] 31/5/2019 N cpviewd
HISTORYD 0 T 0 [17:54:44] 31/5/2019 N cpview_historyd
CPD 19730 E 1 [17:54:45] 31/5/2019 Y cpd
SOLR 19935 E 1 [17:50:55] 31/5/2019 N java_solr /opt/CPrt-
R81.10/conf/jetty.xml
RFL 19951 E 1 [17:50:55] 31/5/2019 N LogCore
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2019 N SmartView
INDEXER 20032 E 1 [17:50:55] 31/5/2019 N /opt/CPrt-R81.10/log_indexer/log_
indexer
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2019 N /opt/CPSmartLog-
R81.10/smartlog_server
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2019 N cp3dlogd
EPM 20251 E 1 [17:50:56] 31/5/2019 N startEngine
DASERVICE 20404 E 1 [17:50:59] 31/5/2019 N DAService_script
[Expert@HostName:0]#
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 324.
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name Name, under which the cpwd_admin list command shows the
<Application monitored process in the leftmost column APP.
Name> Examples:
n FWM
n FWD
n CPD
n CPM
-path "<Full The full path (with or without Check Point environment variables)
Path to to the executable including the executable name.
Executable>" Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R81.10/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd"
n For CPM: "/opt/CPsuite-
R81.10/fw1/scripts/cpm.sh"
n For SICTUNNEL: "/opt/CPshrd-R81.10/bin/cptnl"
Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the
<Env_ shell.
Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes
actively.
See the explanation for the "cpwd_admin" on page 324 command.
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows
Name> the monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-path "<Full Path The full path (with or without Check Point environment
to Executable>" variables) to the executable including the executable name.
Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R81.10/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
Parameter Description
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 324 command.
cpwd_admin stop_monitor
Example
dbedit
Description
Edits the management database - the $FWDIR/conf/objects_5_0.C file - on the Security
Management Server or Domain Management Server. See skI3301.
Important - Do NOT run this command, unless explicitly instructed by Check Point
Support or R&D to do so. Otherwise, you can corrupt settings in the management
database.
Syntax
dbedit -help
dbedit [-globallock] [{-local | -s <Management_Server>}] [{-u
<Username> | -c <Certificate>}] [-p <Password>] [-f <File_Name>
[ignore_script_failure] [-continue_updating]] [-r "<Open_Reason_
Text>"] [-d <Database_Name>] [-listen] [-readonly] [-session]
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Parameters
Parameter Description
-globallock When you work with the dbedit utility, it partially locks the management
database. If a user configures objects in SmartConsole at the same
time, it causes problems in the management database.
This option does not let SmartConsole, or a dbedit user to make
changes in the management database.
When you specify this option, the dbedit commands run on a copy of
the management database. After you make the changes with the
dbedit commands and run the savedb command, the dbedit utility
saves and commits your changes to the actual management database.
Parameter Description
-u Specifies the username, with which the dbedit utility connects to the
<Username> Security Management Server.
Mandatory parameter when you specify the "-s <Management_
Server>" parameter.
-c Specifies the user's certificate file, with which the dbedit utility connects
< to the Security Management Server.
Certificate> Mandatory parameter when you specify the "-s <Management_
Server>" parameter.
-p Specifies the user's password, with which the dbedit utility connects to
<Password> the Security Management Server.
Mandatory parameter when you specify the "-s <Management_
Server>" and "-u <Username>" parameters.
-f <File_ Specifies the file that contains the applicable dbedit internal commands
Name> (see the section "dbedit Internal Commands" below):
n create <object_type> <object_name>
n modify <table_name> <object_name> <field_name>
<value>
n update <table_name> <object_name>
n delete <table_name> <object_name>
n print <table_name> <object_name>
n quit
ignore_ Continues to execute the dbedit internal commands in the file and
script_ ignores errors.
failure You can use it when you specify the "-f <File_Name>" parameter.
-continue_ Continues to update the modified objects, even if the operation fails for
updating some of the objects (ignores the errors and runs the update_all
command at the end of the script).
You can use it when you specify the "-f <File_Name>" parameter.
-r "<Open_ Specifies the reason for opening the database in read-write mode
Reason_ (default mode).
Text>"
Parameter Description
-d Specifies the name of the database, to which the dbedit utility should
<Database_ connect (for example, mdsdb).
Name>
-listen The dbedit utility "listens" for changes (use this mode for advanced
troubleshooting with the assistance of Check Point Support).
The dbedit utility prints its internal messages when a change occurs in
the management database.
Note - To see the available tables, class names (object types), attributes and values,
connect to Management Server with Database Tool (GuiDBEdit Tool) (see sk13009).
-h Description:
Prints the general help.
Syntax:
dbedit> -h
-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q
dbedit> quit [-update_all | -noupdate]
Examples:
n Exit the utility and commit the remaining modified objects
(interactive mode):
dbedit> quit
n Exit the utility and update all the remaining modified objects:
dbedit> quit -update_all
n Exit the utility and discard all modifications:
dbedit> quit -no_update
update Description:
Saves the specified object in the specified table (for example,
"network_objects", "services", "users").
Syntax:
dbedit> update <table_name> <object_name>
Example:
Save the object My_Service in the table services:
dbedit> update services My_Service
update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all
_print_set Description:
Prints the specified object from the specified table (for example,
"network_objects", "services", "users") as it appears in the
$FWDIR/conf/objects_5_0.C file (sets of attributes).
Syntax:
dbedit> _print_set <table_name> <object_name>
Example:
Print the object My_Obj from the table network_objects:
dbedit> print network_objects My_Obj
print Description:
Prints the list of attributes of the specified object from the specified
table (for example, "network_objects", "properties",
"services", "users").
Syntax:
dbedit> print <table_name> <object_name>
Examples:
n Print the object My_Obj from the table network_objects (in
"Network Objects"):
dbedit> print network_objects my_obj
n Print the object firewall_properties from the table properties (in
"Global Properties"):
dbedit> print properties firewall_properties
printxml Description:
Prints in XML format the list of attributes of the specified object from the
specified table (for example, "network_objects", "properties",
"services", "users").
You can export the settings from a Management Server to an XML file
that you can use later with external automation systems.
Syntax:
dbedit> printxml <table_name> [<object_name>]
Examples:
n Print the object My_Obj from the table network_objects:
dbedit> printxml network_objects my_obj
n Print the object firewall_properties from the table properties (in
"Global Properties"):
dbedit> printxml properties firewall_
properties
printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as
"chkpf_uid ({...})").
Syntax:
dbedit> printbyuid {object_id}
Example:
Print the attributes of the object with the specified UID:
dbedit> printbyuid {D3833F1D-0A58-AA42-865F-
39BFE3C126F1}
query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value -
query is separated by a comma after "query <table_name>"
(spaces are not allowed between the <attribute> and '<value>').
Syntax:
dbedit> query <table_name> [ ,
<attribute>='<value>' ]
Examples:
n Print all objects in the table users:
dbedit> query users
n Print all objects in the table network_objects that are defined as
Management Servers:
dbedit> query network_objects,
management='true'
n Print all objects in the table services with the name ssh:
command_sdbedit> query services, name='ssh'
n Print all objects in the table services with the port 22:
dbedit> query services, port='22'
n Print all objects with the IP address 10.10.10.10:
dbedit> query network_objects,
ipaddr='10.10.10.10'
whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant
information about each such place.
Syntax:
dbedit> whereused <table_name> <object_name>
Example:
Check where the object My_Obj is used:
dbedit> whereused network_objects My_Obj
create Description:
Creates an object of specified type (with its default values) in the
database.
Restrictions apply to the object's name:
n Object names can have a maximum of 100 characters.
n Objects names can contain only ASCII letters, numbers, and
dashes.
n Reserved words will be blocked by the Management Server (refer
to sk40179).
Syntax:
dbedit> create <object_type> <object_name>
Example:
Create the service object My_Service of the type tcp_service (with its
default values):
dbedit> create tcp_service my_service
delete Description:
Deletes an object from the specified table.
Syntax:
dbedit> delete <table_name> <object_name>
Example:
Delete the service object My_Service from the table services:
dbedit> delete services my_service
modify Description:
Modifies the value of specified attribute in the specified object in the
specified table (for example, "network_objects", "services",
"users") in the management database.
Syntax:
dbedit> modify <table_name> <object_name> <field_
name> <value>
Examples:
n Modify the color to red in the object My_Service in the table
services:
dbedit> modify services My_Service color red
n Add a comment to the object MyObj:
dbedit> modify network_objects MyObj comments
"Created by fwadmin with dbedit"
n Set the value of the global property ike_use_largest_possible_
subnets in the table properties to false:
dbedit> modify properties firewall_properties
ike_use_largest_possible_subnets false
n Create a new interface on the Security Gateway My_FW and
modify its attributes - set the IP address / Mask and enable Anti-
Spoofing on interface with "Element Index"=3 (check the
attributes of the object My_FW in Database Tool (GuiDBEdit
Tool) (see sk13009)):
lock Description:
Locks the specified object (by administrator) in the specified table (for
example, "network_objects", "services", "users") from being
modified by other users.
For example, if you connect from a remote computer to this
Management Server with admin1 and lock an object, you are be able to
connect with admin2, but are not able to modify the locked object, until
admin1 releases the lock.
Syntax:
dbedit> lock <table_name> <object_name>
Example:
Lock the object My_Service_Obj in the table services in the database:
dbedit> lock services My_Service_Obj
addelement Description:
Adds a specified multiple field / container (with specified value) to a
specified object in specified table.
Syntax:
dbedit> addelement <table_name> <object_name>
<field_name> <value>
Examples:
n Add the element BranchObjectClass with the value Organization
to a multiple field Read in the object My_Obj in the table ldap:
dbedit> addelement ldap My_Obj
Read:BranchObjectClass Organization
n Add the service MyService to the group of services
MyServicesGroup in the table services:
dbedit> addelement services MyServicesGroup
'' services:MyService
n Add the network MyNetwork to the group of networks
MyNetworksGroup in the table network_objects:
dbedit> addelement network_objects
MyNetworksGroup '' network_objects:MyNetwork
rmelement Description:
Removes a specified multiple field / container (with specified value)
from a specified object in specified table.
Syntax:
dbedit> rmelement <table_name> <object_name>
<field_name> <value>
Examples:
n Remove the service MyService from the group of services
MyServicesGroup from the table services:
dbedit> rmelement services MyServicesGroup ''
services:MyService
n Remove the network MyNetwork from the group of networks
MyNetworksGroup from the table network_objects:
dbedit> rmelement network_objects
MyNetworksGroup '' network_objects:MyNetwork
n Remove the element BranchObjectClass with the value
Organization from the multiple field Read in the object My_Obj in
the table ldap:
dbedit> rmelement ldap my_obj
Read:BranchObjectClass Organization
rename Description:
Renames the specified object in specified table.
Syntax:
dbedit> rename <table_name> <object_name> <new_
object_name>
Example:
Rename the network object london to chicago in the table network_
objects:
dbedit> rename network_objects london chicago
rmbyindex Description:
Removes an element from a container by element's index.
Syntax:
dbedit> rmbyindex <table_name> <object_name>
<field_name> <index_number>
Example:
Remove the element backup_log_servers from the container log_
servers by element index 1 in the table network_objects:
dbedit> rmbyindex network_objects g log_
servers:backup_log_servers 1
add_owned_ Description:
remove_name Adds an owned object (and removes its name) to a specified owned
object field (or container).
Syntax:
dbedit> add_owned_remove_name <table_name>
<object_name> <field_name> <value>
Example:
Add the owned object My_Gateway (and remove its name) to the
owned object field (or container) my_external_products:
dbedit> add_owned_remove_name network_objects My_
Gateway additional_products owned:my_external_
products
is_delete_ Description:
allowed Checks if the specified object can be deleted from the specified table
(object cannot be deleted if it is used by other objects).
Syntax:
dbedit> is_delete_allowed <table_name> <object_
name>
Example:
dbedit> is_delete_allowed network_objects MyObj
Check if the object MyObj can be deleted from the table network_
objects:
set_pass Description:
Sets specified password for specified user.
Notes:
n The password must contain at least 4 characters and no more
than 50 characters.
n This command cannot change the administrator's password.
Syntax:
dbedit> set_pass <Username> <Password>
Example:
Set the password 1234 for the user abcd:
dbedit> set_pass abcd 1234
savedb Description:
Saves the database. You can run this command only when the
database is locked globally (when you start the dbedit utility with the
"dbedit -globallock" command).
Syntax:
dbedit> savedb
savesession Description:
Saves the session. You can run this command only when you start the
dbedit utility in session mode (with the "dbedit -session"
command).
Syntax:
dbedit> savesession
fw
Description
n Performs various operations on Security or Audit log files.
n Kills the specified Check Point processes.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
Syntax
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
Parameters
Parameter Description
Parameter Description
logswitch Switches the current active Check Point log file - Security
<options> ($FWDIR/log/fw.log) or Audit ($FWDIR/log/fw.adtlog).
See "fw logswitch" on page 376.
repairlog Rebuilds pointer files for Check Point log files - Security
<options> ($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog).
See "fw repairlog" on page 386.
sam_policy Manages the Suspicious Activity Policy editor that works with these type
<options> of rules:
or n Suspicious Activity Monitoring (SAM) rules.
samp
<options>
n Rate Limiting rules.
See "fw sam_policy" on page 395.
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log Notes:
File N>
n If you do not specify the log file name explicitly, the command
transfers all Security log files ($FWDIR/log/*.log*) and all Audit
log files ($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for
example, 2017-0?-*.log).
If you enter a wildcard, you must enclose it in double quotes or single
quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name
or main IP address of the Check Point Computer as configured in
SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the
specified Check Point computer. Meaning, it deletes the specified log files on the
specified Check Point computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local
Check Point computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer.
The new log file name is the concatenation of the Check Point computer's name (as
configured in SmartConsole), two underscore (_) characters, and the original log file
name (for example: MyGW__2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R81.10/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R81.10/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R81.10/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R81.10/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their
states.
Syntax
Parameters
Parameter Description
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Example
fw kill fwd
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Parameter Description
-b "<Start Shows only entries that were logged between the specified start and
Timestamp>" end times.
"<End
Timestamp>"
n The <Start Timestamp> and <End Timestamp> may be a
date, a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End
Timestamp> in single or double quotes (-b 'XX' 'YY", or -b
"XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-
e" parameters.
n See the date and time format below.
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>" Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-h <Origin> Shows only logs that were generated by the Security Gateway with
the specified IP address or object name (as configured in
SmartConsole).
l mail
l snmp_trap
l spoof
l user_alert
l user_auth
n all - Show entries that match all alert types (this is the default).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries,
and then specify the time for each log entry.
Parameter Description
-n Does not perform DNS resolution of the IP addresses in the log file
(this is the default behavior).
This significantly speeds up the log processing.
-o Shows detailed log chains - shows all the log segments in the log
entry.
-p Does not perform resolution of the port numbers in the log file (this is
the default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>" Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current
date.
n Enclose the <Start Timestamp> in single or double quotes
(-s '...', or -s "...").
n You cannot use the "-s" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-t This parameter:
1. Does not show the saved entries that match the specified
conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the
"nature" of the log - for example, control, audit, accounting,
complementary, and so on).
-x <Start Shows only entries from the specified log entry number and below,
Entry Number> counting from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from
Number> the beginning of the log file.
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_name: Host
Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity: 2;
status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292; Action:
drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Parameter Description
+ Specifies to copy the active log from the remote computer to the local
computer.
Notes:
n If you specify the name of the switched log file, you must write it
immediately after this + (plus) parameter.
n The command copies the active log from the remote computer and
saves it in the $FWDIR/log/ directory on the local computer.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command copies the log file from the remote computer, it
compresses the file.
Parameter Description
- Specifies to transfer the active log from the remote computer to the local
computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/
directory on the local computer and then deletes the switched log file
on the remote computer.
n If you specify the name of the switched log file, you must write it
immediately after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 362
command.
Compression
When this command transfers the log files from the remote computer, it compresses the file
with the gzip command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation
of LZ77 method. The compression ratio varies with the content of the log file and is difficult to
predict. Binary data are not compressed. Text data, such as user names and URLs, are
compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying the
switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R81.10/fw1/log/fw.log
/opt/CPsuite-R81.10/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R81.10/fw1/log/fw.log
/opt/CPsuite-R81.10/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]
... [-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime |
etime}] [<Target>]
Parameters
Parameter Description
-f <Name Specifies the name of the log file to show. Need to specify name only.
of Log Notes:
File>
n If the log file name is not specified explicitly, the command shows all
Security log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-
0?-*). If you enter a wildcard, you must enclose it in double quotes or
single quotes.
n You can specify multiple log files in one command. You must use the
"-f" parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2>
... -f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log
file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
Parameter Description
-s {name | Specifies the sort order of the log files using one of the following sort
size | options:
stime |
etime}
n name - The file name
n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or
Domain Management Server, then <Target> is the applicable
object's name or main IP address of the Check Point Computer as
configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended
information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse
order
Example 6 - Showing only log files specified by the patterns, from a managed Security
Gateway with main IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw logswitch" on
page 376 command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw logswitch"
on page 376 command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Warning: The size of the files you have chosen to merge
is greater than 2GB. The merge will produce two or more
files.
The names of merged files are:
l <Name of Merged Log File>.log
l <Name of Merged Log File>_1.log
l <Name of Merged Log File>_2.log
l ... ...
Syntax
Parameters
Parameter Description
-t <Time Conversion Specifies a full path and name of a file that instructs this
File> command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
<IP Address of Log Server #1> <Signed
Date Time #1 in Seconds>
<IP Address of Log Server #2> <Signed
Date Time #2 in Seconds>
... ...
Notes
n You must specify the absolute path and the file
name.
n The name of the time conversion file cannot
exceed 230 characters.
Parameter Description
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) are databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this
command can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block
connections to and from IP addresses without the need to change or reinstall the Security
Policy. For more information, see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" on page 395 and "sam_alert" on page 523 commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - The SAM Policy rules consume some CPU resources on
Security Gateway. Set an expiration for rules that gives you time to
investigate, but does not affect performance. Keep only the required SAM
Policy rules. If you confirm that an activity is risky, edit the Security Policy,
educate users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches
100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security
Gateway in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-t <Timeout>] [-l <Log
Type>] [-C] [-e <key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q}
<Criteria>
Parameters
Parameter Description
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of
Server> the Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected
Name of that the SAM server has this SIC name, otherwise the connection fails.
SAM Notes:
Server>
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC
API Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command
to show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam
command with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
Parameter Description
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout> The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+ Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
Parameter Description
-J Inhibits new connections with the specified parameters, and closes all
existing connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> Matches the specific Source IP address,
<Port> <Protocol> Destination IP address, Service (port number) and
Protocol.
subsrvs <Src IP> <Src Matches the specific Source IP address, source
Netmask> <Dest IP> <Port> netmask, destination netmask, Service (port
<Protocol> number) and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination
<Dest Netmask> <Port> IP, destination netmask, Service (port number) and
<Protocol> Protocol.
Parameter Description
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that works with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 387
n "sam_alert" on page 523
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 413.
fw sam_policy add
Description
The "fw sam_policy add" and "fw6 sam_policy add" commands:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b} Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against
the policy rules.
Note - Rules with action set to Bypass cannot have a log or limit
specification. Bypassed packets and connections do not count
towards overall number of packets and connection for limit
enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that
matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout> Specifies the time period (in seconds), during which the rule will be
enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate
Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be
enforced on all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the
rule should be enforced only on this Security Gateway or Cluster
object (the object name must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be
enforced on all Security Gateways that are members of this Group
object (the object name must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\
\\"
-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"
Parameter Description
-o "<Rule Optional.
Originator Specifies the name of the originator for this rule.
>" Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"Created\ by\ John\ Doe"
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from
the SAM policy database immediately, add "flush true" in
the fw samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general),
when a rule's limit is violated, the Security Gateway also drops
all packets that match the rule.
The Security Gateway computes new connection rates on a
per-second basis.
At the start of the 1-second timer, the Security Gateway allows
all packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too
many new connections, then the Security Gateway blocks all
remaining packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are
reset, and the process starts over - the Security Gateway
allows packets to pass again up to the point, where the rule’s
limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM)
rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format -
x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port
Number Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
source IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that
are assigned to this organization, based on
the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses
that are assigned to this organization, based
on the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the
specified type
Argument Description
Argument Description
Argument Description
Examples
Example 1 - Rate Limiting rule with a range
fw sam_policy add -a d -l r -t 3600 quota service any source range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this
rule, including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second
(new-conn-rate 5) for any traffic (service any) from the source IP addresses in
the range 172.16.7.11 - 172.16.7.13 (source range:172.16.7.11-
172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the
fwaccel dos config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the
Suspicious Activity Monitoring (SAM) policy database immediately, because this rule
includes the "flush true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this
rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all packets except (service-negated true) the packets with
IP protocol number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-
51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the
country with specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP
protocol number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the Autonomous System number 64500
(asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120
(cidr:[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
n This rule applies to packets sent to TCP port 80 (service 6/80).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP
addresses that are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to
655/65536=~1% (concurrent-conns-ratio 655) for any traffic (service any)
except (service-negated true) the connections from the source IP addresses
that are assigned to the country with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that
match this rule, and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
fw sam_policy batch
Description
The "fw sam_policy batch" and "fw6 sam_policy batch" commands:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
1. Start the batch mode
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service
any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The "fw sam_policy del" and "fw6 sam_policy del" commands:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle brackets
('<...>') are mandatory.
n See "fw sam_policy get" on
page 416.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1
originator=John\ Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The "fw samp del" and "fw6 samp del" commands only remove a rule from the
persistent database. The Security Gateway continues to enforce the deleted rule until
the next time you compiled and load a policy. To force the rule deletion immediately,
you must enter a flush-only rule right after the "fw samp del" and "fw6 samp del"
command. This flush-only rule immediately deletes the rule you specified in the
previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The "fw sam_policy get" and "fw6 sam_policy get" commands:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t
<Type> [+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.
Examples
Example 1 - Output in the default format
[Expert@HostName:0]# fw samp get
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fwm
Description
Performs various management operations and shows various management information.
Notes:
n For debug instructions, see the description of the fwm process in sk97638.
n On a Multi-Domain Server, you must run these commands in the context of the
applicable Domain Management Server.
Syntax
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
Parameters
Parameter Description
Parameter Description
dbload Downloads the user database and network objects information to the
<options> specified targets
See "fwm dbload" on page 425.
fetchfile Fetches a specified OPSEC configuration file from the specified source
<options> computer.
See "fwm fetchfile" on page 427.
getpcap Fetches the IPS packet capture data from the specified Security
<options> Gateway.
See "fwm getpcap" on page 431.
unload Unloads the policy from the specified managed Security Gateways.
<options> See "fwm unload" on page 452.
Parameter Description
ver <options> Shows the Check Point version of the Management Server.
See "fwm ver" on page 456.
fwm dbload
Description
Copies the user database and network objects information to specified managed servers with
one or more Management Software Blades enabled.
fwm exportcert
Description
Export a SIC certificate of the specified managed object to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file
<Output File> [-withroot] [-pem]
Parameters
Parameter Description
<Name of Specifies the name of the managed object, whose certificate you wish
Object> to export.
<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish
to export.
fwm fetchfile
Description
Fetches a specified OPSEC configuration file from the specified source computer.
This command supports only the fwopsec.conf or fwopsec.v4x files.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Source> Specifies the managed remote source computer, from which to fetch
the file.
Note - The local and the remote source computers must have
established SIC trust.
Example
fwm fingerprint
Description
Shows the Check Point fingerprint.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
fwm getpcap
Description
Fetches the IPS packet capture data from the specified Security Gateway.
This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory.
This command does not work with other Software Blades, such as Anti-Bot and Anti-Virus that
store packet captures in the $FWDIR/log/blob/ directory on the Security Gateway.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <Local Specifies the local path to save the specified packet capture file.
Path> If you do not specify the local directory explicitly, the command saves the
packet capture file in the current working directory.
Example
fwm ikecrypt
Description
Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must
then be stored in the LDAP database.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Key> Specifies the IKE Key as defined in the LDAP Account Unit properties
window on the Encryption tab.
<Password> Specifies the password for the Endpoint VPN Client user.
Example
fwm load
Description
Loads a policy on a managed Security Gateway.
fwm logexport
Description
Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog)
to an ASCII file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>]
[-i <Input File>] [-o <Output File>] [{-f | -e}] [-x <Start Entry
Number>] [-y <End Entry Number>] [-z] [-n] [-p] [-a] [-u
<Unification Scheme File>] [-m {initial | semi | raw}]
Parameters
Parameter Description
Parameter Description
-f After reaching the end of the currently opened log file, specifies to
continue to monitor the log file indefinitely and export the new entries as
well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-e After reaching the end of the currently opened log file, continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-x <Start Starts exporting the log entries from the specified log entry number and
Entry below, counting from the beginning of the log file.
Number>
-y <End Starts exporting the log entries until the specified log entry number,
Entry counting from the beginning of the log file.
Number>
Parameter Description
-p Specifies to not to perform resolution of the port numbers in the log file
(this is the default behavior).
This significantly speeds up the log processing.
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
Step Instructions
3 To include or exclude the log fields from the output, add these lines in the
configuration file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_
FIELDS>,field100
excluded_fields = field10,field11
Where:
n You can specify only the included_fields parameter, only the
excluded_fields parameter, or both.
n The num field must always appear first. You cannot manipulate this field.
n The <REST_OF_FIELDS> is an optional reserved token that refers to a list of
fields.
l If you specify the "-f" parameter, then the <REST_OF_FIELDS> is
fwm mds
Description
n Shows the Check Point version of the Multi-Domain Server.
n Rebuilds status tree for Global VPN Communities.
Syntax
Parameters
Parameter Description
Example
fwm printcert
Description
Shows a SIC certificate's details.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Item Description
-obj <Name of Object> Specifies the name of the managed object, for which to
show the SIC certificate information.
Examples
Example 1 - Showing the SIC certificate of a Management Server
[Expert@MGMT:0]# fwm printcert -ca internal_ca
Subject: O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Apr 8 13:41:00 2018 Local Time
Not Valid After: Fri Jan 1 05:14:07 2038 Local Time
Serial No.: 1
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint:
is CA
MD5 Fingerprint:
7B:F9:7B:4C:BD:40:B9:1C:AB:2C:AE:CF:66:2E:E7:06
SHA-1 Fingerprints:
1. A6:43:3A:2B:1A:04:7F:A6:36:A6:2C:78:BF:22:D9:BC:F7:7E:4D:73
2. KEYS HEM GERM PIT ABUT ROVE RAW PA IQ FAWN NUT SLAM
[Expert@MGMT:0]#
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
Example 4 - Showing the SIC certificate of a managed Cluster object in verbose mode
[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed. Returning -2
defaultCert:
fwm sic_reset
Description
Resets SIC on the Management Server.
For detailed procedure, see sk65764: How to reset SIC.
Warning:
n Before you run this command, take a Gaia Snapshot and a full backup of the
Management Server.
This command resets SIC between the Management Server and all its
managed objects.
n This operation breaks trust in all Internal CA certificates and SIC trust
across the managed environment.
Therefore, we do not recommend it at all, except for real disaster recovery.
Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
fwm snmp_trap
Description
Sends an SNMPv1 Trap to the specified host.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On a Multi-Domain Server, the SNMP Trap packet is sent from the IP address of
the Leading Interface.
Syntax
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s
<Specific Trap Number>] [-p <Source Port>] [-c <SNMP Community>]
<Target> ["<Message>"]
Parameters
Parameter Description
-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.
-p <Source Port> Specifies the source port, from which to send the SNMP Trap
packets.
<Target> Specifies the managed target host, to which to send the SNMP
Trap packets.
Enter an IP address of a resolvable hostname.
Example - Sending an SNMP Trap from a Management Server and capturing the traffic on
the Security Gateway
fwm unload
Description
Unloads the policy from the specified managed Security Gateways or Cluster Members.
Warning:
1. The fwm unload command prevents all traffic from passing through the
Security Gateway (Cluster Member), because it disables the IP Forwarding in
the Linux kernel on the specified Security Gateway (Cluster Member).
2. The fwm unload command removes all policies from the specified Security
Gateway (Cluster Member).
This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection
enabled.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n If it is necessary to remove the current policy, but keep the Security Gateway
(Cluster Member) protected, then run the "comp_init_policy" command on
the Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of
these commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch"
l "cpstart"
Syntax
Parameters
Parameter Description
<GW1> <GW2> Specifies the managed Security Gateways by their main IP address or
... <GWN> Object Name as configured in SmartConsole.
Example
[Expert@MGMT:0]#
fwm ver
Description
Shows the Check Point version of the Security Management Server.
Syntax
Parameters
Parameter Description
-f <Output Specifies the name of the output file, in which to save this information.
File>
Example
fwm verify
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 507 command to verify a policy on a managed Security Gateway.
Description
Verifies the specified policy package without installing it.
Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
inet_alert
Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under
attack. This command forwards log messages generated by the alert daemon on your Check
Point Security Gateway to an external Management Station. This external Management
Station is usually located at the ISP site. The ISP can then analyze the alert and react
accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The
Management Station receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must
be performed between the external Management Station running the ELA Proxy at the ISP site
and the Check Point Security Gateway generating the alert.
Procedure
Step Instructions
3 Click on the [+] near the Log and Alert and click Alerts.
5 Select the next option Run UserDefined script under the above.
6 Enter the applicable inet_alert syntax (see the Syntax section below).
7 Click OK.
Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f
<Token> <Value>] [-m <Alert Type>]
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Parameters
Parameter Description
-s <IP The IPv4 address of the ELA Proxy (usually located at the ISP site).
Address>
-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.
Parameter Description
Exist Status
Example
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert
ldapcmd
Description
This is an LDAP utility that controls these features:
Feature Description
Cache LDAP cache operations, such as emptying the cache, as well as providing
debug information.
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR
Level> debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
objects
l TemplateExtGrpCacheObject - Clears cache for
objects
l TemplateExtGrpCacheObject - Traces cache for
ldapcompare
Description
This is an LDAP utility that performs compare queries and prints a message whether the result
returned a match or not.
This utility opens a connection to an LDAP directory server, binds, and performs the
comparison specified on the command line or from a specified file.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR
Level> debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Compare options
Option Description
-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version
is 3.
Common options
Option Description
Option Description
l "chainingRequired"
l "referralsPreferred"
l "referralsRequired"
n [!]manageDSAit
RFC 3296
n [!]noop
n ppolicy
n [!]postread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]preread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]relax
n abandon
SIGINT sends the abandon signal; if critical,
does not wait for SIGINT. Not really controls.
n cancel
SIGINT sends the cancel signal; if critical, does
not wait for SIGINT. Not really controls.
n ignore
SIGINT ignores the response; if critical, does not
wait for SIGINT. Not really controls.
Option Description
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password (for
simple authentication).
ldapmemberconvert
Description
This is an LDAP utility that ports from the "Member" attribute values in LDAP group entries to
the "MemberOf" attribute values in LDAP member (User or Template) entries.
This utility converts the LDAP server data to work in either the "MemberOf" mode, or "Both"
mode. The utility searches through all specified group or template entries that hold one or
more "Member" attribute values and modifies each value. The utility searches through all
specified group/template entries and fetches their "Member" attribute values.
Each value is the DN of a member entry. The entry identified by this DN is added to the
"MemberOf" attribute value of the group/template DN at hand. In addition, the utility delete
those "Member" attribute values from the group/template, unless you run the command in the
"Both" mode.
When your run the command, it creates a log file ldapmemberconvert.log in the current
working directory. The command logs all modifications done and errors encountered in that log
file.
Important - Back up the LDAP server database before you run this conversion utility.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
-m <Member Specifies the LDAP attribute name when fetching and (possibly)
Attribute Name> deleting a group Member attribute value.
-f <File> Specifies the file that contains a list of Group DNs separated by a
new line:
<Group DN 1>
<Group DN 2>
...
<Group DN N>
Length of each line is limited to 256 characters.
Parameter Description
-L <LDAP Server Specifies the Server side time limit for LDAP operations, in
Timeout> seconds.
Default is "never".
-S <Size> Specifies the Server side size limit for LDAP operations, in
number of entries.
Default is "none".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".
Notes
There are two "GroupMembership" modes. You must keep these modes consistent:
n template-to-groups
n user-to-groups
For example, if you apply conversion on LDAP users to include the "MemberOf" attributes for
their groups, then this conversion has to be applied on LDAP defined templates for their
groups.
Troubleshooting
Symptom:
A command fails with an error message stating the connection stopped unexpectedly when
you run it with the parameter -M <Number of Updates>.
Root Cause:
The LDAP server could not handle that many LDAP requests simultaneously and closed the
connection.
Solution:
Run the command again with a lower value for the "-M" parameter. The default value should
be adequate, but can also cause a connection failure in extreme situations. Continue to reduce
the value until the command runs normally. Each time you run the command with the same set
of groups, the command continues from where it left off.
Examples
Example 1
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...
...
cn=member1
objectclass=fw1Person
...
and:
...
cn=member2
objectclass=fw1Person
...
Run:
[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer -d cn=admin -w secret -m uniquemember -o memberof -c
fw1Person
...
cn=cpGroup
...
...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
and:
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
If you run the same command with the "-B" parameter, it produces the same result, but the
group entry is not modified.
Example 2
If there is another member attribute value for the same group entry:
uniquemember="cn=template1,ou=people, ou=cp,c=us"
cn=member1
objectclass=fw1Template
Then after running the same command, the template entry stays intact, because of the
parameter "-c fw1Person", but the object class of "template1" is "fw1Template".
ldapmodify
Description
This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF
format.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server
Port>] [-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b]
[-c] [-F] [-k] [-n] [-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f
<Input File> .ldif | < <Entry>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Parameter Description
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".
ldapsearch
Description
This is an LDAP utility that queries an LDAP directory and returns the results.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>]
[-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b
<Base DN>] [-F <Separator>] [-l <LDAP Server Timeout>] [-s
<Scope>] [-S <Sort Attribute>] [-t] [-T <LDAP Client Timeout>] [-
u] [-z <Number of Search Entries>] [-Z] <Filter> [<Attributes>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified
TDERROR debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Parameter Description
-b <Base DN> Specifies the Base Distinguished Name (DN) for search.
-l <LDAP Server Specifies the Server side time limit for LDAP operations, in
Timeout> seconds.
Default is "never".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is never.
Parameter Description
Example
[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass
mcd
Description
This command changes current working directory to the specified directory in the $FWDIR
directory in the context of a Domain Management Server.
Syntax
Example
[Expert@MDS:0]# mdsstat
+-----------------------------------------------------------------------------------------------
------+
| Processes status checking
|
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| Type | Name | IP address | FWM | FWD | CPD | CPCA
|
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| MDS | - | 192.168.3.51 | up 15312 | up 15310 | up 10227 | up
15475 |
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| CMA | MyDomain_Server | 192.168.3.240 | up 17225 | up 17208 | up 17101 | up
18402 |
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| Total Domain Management Servers checked: 1 1 up 0 down
|
| Tip: Run mdsstat -h for legend
|
+-----------------------------------------------------------------------------------------------
------+
[Expert@MDS:0]#
[Expert@MDS:0]#
[Expert@MDS:0]# mdsenv MyDomain_Server
[Expert@MDS:0]#
[Expert@MDS:0]# mcd
changing to /opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1/
[Expert@MDS:0]#
[Expert@MDS:0]# pwd
/opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1
[Expert@MDS:0]#
[Expert@MDS:0]# ls -1
av
bin
conf
cpm-server
database
doc
hash
lib
libsw
log
scripts
state
tmp
[Expert@MDS:0]#
[Expert@MDS:0]# mcd av
changing to /opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1/av
[Expert@MDS:0]#
[Expert@MDS:0]# mcd bin
changing to /opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1/bin
[Expert@MDS:0]#
[Expert@MDS:0]# mcd conf
changing to /opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1/conf
[Expert@MDS:0]#
[Expert@MDS:0]# mcd log
changing to /opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1/log
[Expert@MDS:0]#
[Expert@MDS:0]# mcd scripts
changing to /opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1/scripts
[Expert@MDS:0]#
mds_backup
Description
The mds_backup command backs up binaries and data from a Multi-Domain Server to a user
specified working directory.
You then copy the backup files from the working directory to external storage.
This command requires Multi-Domain Superuser privileges.
The mds_backup command runs the gtar and dump commands to back up all databases.
The collected information is stored in one *.tar file. The file name is a combination of the
backup date and time and is saved in the current working directory. For example:
13Sep2015-141437.mdsbk.tar
Notes:
n Do not create or delete Domains or Domain Management Servers until the
backup operation completes.
n It is important not to run the mds_backup command from directories that are
not backed up.
For example, when you back up a Multi-Domain Server, do not run the mds_
backup command from the /opt/CPmds-<Current_Release>/ directory,
because it is a circular reference (backup of directory, in which it is necessary to
write files).
Run the mds_backup command from a location outside the product directory
tree to be backed up. This becomes the working directory.
n The mds_backup command does not collect the active Security log file
(*.log) and Audit log file (*.adtlog).
This is necessary to prevent inconsistencies during the read-write operations.
Best Practice - Perform a log switch before you start the backup
procedure.
n You can back up the Multi-Domain Server configuration without the log files.
This backup is typically significantly smaller than a full backup with logs.
To back up without log files, add this line to the file $MDSDIR/conf/mds_
exclude.dat configuration file:
log/*
n After the backup completes, copy the backup *.tar file, together with the mds_
restore, and gtar binary files, to your external backup location.
Syntax
mds_backup -h
mds_backup [-b] [-d <Target Directory>] [-ds] [-l] [-s] [-v] [-x]
Parameters
Parameter Description
-v "Dry run" - Shows all files to be backed up, but does not perform the
backup operation.
mds_restore
Description
Use the mds_restore command to restore a Multi-Domain Server / Multi-Domain Log Server
that was backed up with the "mds_backup" on page 481 command.
Important - You must restore on the server that runs same software version, from
which you collected this backup.
Example: If you collected a backup on a server with version "XX" and Jumbo Hotfix
Accumulator Take "YY", then you must restore on a server with version "XX" and
Jumbo Hotfix Accumulator Take "YY".
Best Practice - If the Multi-Domain Security Management environment has multiple
Multi-Domain Servers, restore all Multi-Domain Servers at the same time.
Backing up and restoring in Management High Availability environment:
n To back up and restore a consistent environment, make sure to collect and
restore the backups and snapshots from all servers in the High Availability
environment at the same time.
n Make sure other administrators do not make changes in SmartConsole until the
backup operation is completed.
For more information:
n About Gaia Backup and Gaia Snapshot, see the R81.10 Gaia Administration
Guide.
n About Virtual Machine Snapshots, see the vendor documentation.
./mds_restore <backup_file>
5. If you restore on a Multi-Domain Server with a new IP address, configure the new
IP address.
mdscmd
Description
In versions lower than R80, this utility executed various commands on the Multi-Domain
Server.
Starting from R80, this command is obsolete.
You must use other commands. If there is no alternative command, then perform the
applicable action in SmartConsole.
mdsconfig
Description
This command starts the Multi-Domain Server Configuration Program. This tool configures
specific settings for the installed Check Point products.
Note - This command updates the database schema before it imports. First, the
command runs pre-upgrade verification. If no errors are found, migration continues. If
there are errors, you must fix them on the source R7x Domain Management Server
according to instructions in the error messages. Then do this procedure again.
For the complete procedure, see the R81.10 Installation and Upgrade Guide.
Syntax
mdsconfig
Menu Options
Leading VIP Interfaces The Leading VIP Interfaces are real interfaces connected
to an external network.
These interfaces are used when you configure virtual IP
addresses for Domain Management Servers.
GUI Clients Configures the GUI clients that can use SmartConsole to
connect to this server.
Start Multi-Domain Server Configures a password to control the start of the Multi-
Password Domain Server.
IPv6 Support for Multi- Enables or disables the IPv6 Support on the Multi-Domain
Domain Server Server.
Important - Multi-Domain Server does not support
IPv6 at all (Known Limitation PMTR-14989).
IPv6 Support for Existing Enables or disables the IPv6 Support on the Domain
Domain Management Management Servers.
Servers Important - Multi-Domain Server does not support
IPv6 at all (Known Limitation PMTR-14989).
[Expert@MyMDS:0]# mdsconfig
Configuration Options:
----------------------
(1) Leading VIP Interfaces
(2) Licenses
(3) Random Pool
(4) Groups
(5) Certificate's Fingerprint
(6) Administrators
(7) GUI clients
(8) Automatic Start of Multi-Domain Server
(9) P1Shell
(10) Start Multi-Domain Server Password
(11) IPv6 Support for Multi-Domain Server
(12) IPv6 Support for Existing Domain Management Servers
(13) Exit
mdsenv
Description
Use the mdsenv command to set shell environment variables to run commands on a specified
Domain Management Server.
When run without an argument, the command sets the shell for Multi-Domain Server level
commands ("mdsstat" on page 500, "mdsstop" on page 502, and so on).
Syntax
Parameters
Parameter Description
Example
[Expert@MyMDS:0]# mdsstat
+-----------------------------------------------------------------
------------------------------------+
| Processes status checking
|
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| Type | Name | IP address | FWM | FWD
| CPD | CPCA |
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| MDS | - | 192.168.3.51 | up 10086 | up
11422 | up 5427 | up 11440 |
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| CMA | MyDomain_Server | 192.168.3.240 | up 10891 | up
8199 | up 7670 | up 9536 |
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| Total Domain Management Servers checked: 1 1 up 0 down
|
| Tip: Run mdsstat -h for legend
|
+-----------------------------------------------------------------
------------------------------------+
[Expert@MyMDS:0]#
[Expert@MyMDS:0]# mdsenv MyDomain_Server
[Expert@MyMDS:0]#
[Expert@MyMDS:0]# echo $FWDIR
/opt/CPmds-R81.10/customers/MyDomain_Server/CPsuite-R81.10/fw1
[Expert@MyMDS:0]#
mdsquerydb
Description
The mdsquerydb is an advanced database query tool that administrators can use to run shell
scripts to get information from the Multi-Domain Security Management databases.
Use this command to get information from the Multi-Domain Server, Domain Management
Server, and Global databases.
Syntax
Parameters
Parameter Description
-f <output_ Send the query results to the specified file name. If this parameter is not
file_name> specified, the data is sent to the standard output.
Example 2 - Send a list of Domains in the Multi-Domain Server database to the standard
output
[Expert@MDS:0]# mdsenv
[Expert@MDS:0]# mdsquerydb Domains
Example 3 - Send a list of network objects in the global database to the /tmp/gateways.txt
file
[Expert@MDS:0]# mdsenv
[Expert@MDS:0]# mdsquerydb NetworkObjects -f /tmp/gateways.txt
Example 4 - Get a list of gateway objects in the Domain Management Server "DServer1"
mdsstart
Description
Starts the Multi-Domain Server and all Domain Management Servers.
To start a specific Domain Management Server, see the "mdsstart_customer" on page 499
command.
Syntax
Parameters
Parameter Description
-m Optional: Starts only the Multi-Domain Server and not the Domain
Management Servers.
You can decrease the amount of time it takes to start the Multi-Domain Server when there are
many Domain Management Servers.
To do this, set the value of the environment variable NUM_EXEC_SIMUL to the number of
Domain Management Servers that start at the same time.
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Step Instructions
4 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Parameter Description
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
Important - After this line, you must press Enter to add a new line.
Example:
export NUM_EXEC_SIMUL=5
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is not
set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must be empty.
mdsstart_customer
Description
Starts the specified Domain Management Server, if it was stopped with the "mdsstop_
customer" on page 506 command.
To start the entire Multi-Domain Server, see the "mdsstart" on page 495 command.
Syntax
mdsstat
Description
This command shows the status of specific processes on the Multi-Domain Server and
Domain Management Servers.
Syntax
Parameters
Parameter Description
Status Description
Example
[Expert@MDS:0]# mdsstat
+--------------------------------------------------------------------------------------+
| Processes status checking |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Type| Name | IP address | FWM | FWD | CPD | CPCA |
+-----+----------------+-----------------+------------+----------+----------+----------+
| MDS | - | 192.168.3.101 | up 17284 | up 17266 | up 17251 | up 17753 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| CMA |DOM211_Server | 192.168.3.211 | up 32227 | up 32212 | up 25725 | up 32482 |
| CMA |DOM212_Server | 192.168.3.212 | up 4248 | up 4184 | up 4094 | up 4441 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Total Domain Management Servers checked: 2 2 up 0 down |
| Tip: Run mdsstat -h for legend |
+--------------------------------------------------------------------------------------+
[Expert@MDS:0]#
mdsstop
Description
Stops the Multi-Domain Server and all Domain Management Servers.
To stop a specific Domain Management Server, see the "mdsstop_customer" on page 506
command.
Syntax
Parameters
Parameter Description
-m Optional: Stops only the Multi-Domain Server and not the Domain
Management Servers.
You can decrease the amount of time it takes to stop the Multi-Domain Server when there are
many Domain Management Servers.
To do this, set the value of the environment variable NUM_EXEC_SIMUL to the number of
Domain Management Servers that stop at the same time.
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Step Instructions
4 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Parameter Description
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
Important - After this line, you must press Enter to add a new line.
Example:
export NUM_EXEC_SIMUL=5
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is not
set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must be empty.
mdsstop_customer
Description
Stops the specified Domain Management Server.
To stop the entire Multi-Domain Server, see the "mdsstop" on page 502 command.
Syntax
mgmt_cli
Description
The mgmt_cli tool works directly with the management database on your Management
Server.
cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional
Switches>
cd /d "%ProgramFiles
(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional
Switches>
Notes
n For a complete list of the mgmt_cli options, enter the mgmt_cli (mgmt_cli.exe)
command and press Enter.
n For more information, see the Check Point Management API Reference.
migrate
Important - This command is used to migrate the management database from R80.10
and lower versions.
For more information, see the R81.10 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/bin/upgrade_tools/
directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate utility from the
migration tools package created specifically for that higher software version.
See the Installation and Upgrade Guide for that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R81.10/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R81.10/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R81.10/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# ./migrate -h
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File> &
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File>.tgz &
Parameters
Parameter Description
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Important:
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long
time to complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and
Log Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long
time to complete (depends on the number of logs and
indexes).
-n Runs silently (non-interactive mode) and uses the default options for
each setting.
Important:
n If you export a management database in this mode and the
specified name of the exported file matches the name of an
existing file, the command overwrites the existing file
without prompting.
n If you import a management database in this mode, the
"migrate import" command runs the "cpstop"
command automatically.
--exclude- n During the export operation, does not back up the PostgreSQL
uepm- database from the Endpoint Security Management Server.
postgres-db n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
--include- n During the export operation, backs up the MSI files from the
uepm-msi- Endpoint Security Management Server.
files n During the import operation, restores the MSI files on the
Endpoint Security Management Server.
Parameter Description
<Name of n During the export operation, specifies the name of the output
Exported file.
File> The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported
file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R81.10/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_server
Important - This command is used to migrate the management database from
R80.20.M1, R80.20, R80.20.M2, R80.30, and higher versions.
For more information, see:
n sk135172 - Upgrade Tools
n The R81.10 Installation and Upgrade Guide
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/scripts/ directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate_server utility
from the migration tools package created specifically for that higher software
version. See the Installation and Upgrade Guide for that higher software
version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R81.10/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R81.10/migrate-2021.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R81.10/log/migrate-2021 - 2024.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server -h
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server verify -v R81.10 [-skip_
upgrade_tools_check]
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export -v R81.10 [-skip_
upgrade_tools_check] [-l | -x] [--include-uepm-msi-files] [--
exclude-uepm-postgres-db] [--ignore_warnings] /<Full
Path>/<Name of Exported File>
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server import -v R81.10 [-skip_
upgrade_tools_check] [-l | -x] [/var/log/mdss.json] [--
include-uepm-msi-files] [--exclude-uepm-postgres-db] /<Full
Path>/<Name of Exported File>.tgz
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server migrate_import_domain -v
R81.10 [-skip_upgrade_tools_check] [-l | -x]
[/var/log/mdss.json] [--include-uepm-msi-files] [--exclude-
uepm-postgres-db] /<Full Path>/<Name of Exported File>.tgz
Parameters
Parameter Description
Parameter Description
Parameter Description
-skip_ Does not try to connect to Check Point Cloud to check for a more recent
upgrade_ version of the Upgrade Tools.
tools_check Best Practice - Use this parameter on the Management Server that
is not connected to the Internet.
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Important:
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n Before you use this parameter, it is necessary to make sure all
log indexes are closed and saved.
Run this command in the Expert mode and wait for the output
to show "Solr stopped":
$RTDIR/scripts/stopSolr.sh
n This parameter only supports Management Servers and Log
Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs and indexes).
Parameter Description
/var/log/md Important:
ss.json
n In the Upgrade Tools for R81.10 build higher than 996000356,
the syntax is (this filename is mandatory):
Previously:
-change_ /var/log/mdss.json
ips_file You must create the file /var/log/mdss.json and not use the
/<Full parameter "-change_ips_file".
Path n In the Upgrade Tools for R81.10 build 996000356 and lower,
>/<
the syntax was:
Name>.json
-change_ips_file /<Full Path>/<Name of JSON
File>.json
Specifies the absolute path to the special JSON configuration file with
new IPv4 addresses.
This file is mandatory during an upgrade of a Multi-Domain Security
Management environment.
Even if only one of the servers migrates to a new IP address, all the other
servers must get this configuration file for the import process.
Syntax:
[{"name":"<Name of Server 1 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address
of Server 1>"},
{"name":"<Name of Server 2 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address
of Server 2>"}]
Example:
[{"name":"MyPrimaryMultiDomainServer","newIpAddress
4":"172.30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAddres
s4":"172.30.40.52"}]
--include- n During the export operation, backs up the MSI files from the
uepm-msi- Endpoint Security Management Server.
files n During the import operation, restores the MSI files on the Endpoint
Security Management Server.
--exclude- n During the export operation, does not back up the PostgreSQL
uepm- database from the Endpoint Security Management Server.
postgres-db n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
Parameter Description
--exclude- n During the export operation, does not back up the licenses from the
licenses Management Server.
n During the import operation, does not restore the license on the
Management Server.
/<Full Specifies the absolute path to the exported database file. This path must
Path>/<Name exist.
of Exported
File>
n During the export operation, specifies the name of the output file.
The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R81.10/migrate-2021 - 2024.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_global_policies
Description
This utility transfers (and upgrades, if necessary) the global configuration database from one
Multi-Domain Server to another Multi-Domain Server.
Notes:
n You can only use this command when the target Multi-Domain Server does not
have global configurations defined.
n This utility replaces all existing global configurations. Each existing global
configuration is saved with a *.pre_migrate extension.
n If you migrate only the global configurations (without the Domain Management
Servers) to a new Multi-Domain Server, disable all Security Gateways that are
enabled for global use.
Important - You cannot export an R80.X global configuration database and then use
this utility on an R80.X Multi-Domain Server.
Syntax
migrate_global_policies <Path>
Parameters
Parameter Description
<Path> The fully qualified path to the directory where the global policies files,
originally exported from the source Multi-Domain Server
($MDSDIR/conf/), are located.
Example
[email protected]_MDS:0]# migrate_global_policies /var/log/exported_global_db.22Jul2019-124547.tgz
queryDB_util
Description
Searches in the management database for objects or policy rules.
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 507 command to search in the management database for objects or policy rules
according to search parameters.
rs_db_tool
Description
Manages Dynamically Assigned IP address (DAIP) gateways in a DAIP database.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
n To add an entry to the DAIP database:
Note - You must run this command from the Expert mode.
Parameters
Parameter Description
-TTL <Time-To- Specifies the relative time interval (in seconds), during which the
Live> entry is valid.
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the
information received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User
Defined Alerts mechanism.
Important:
n You must run this command on the Management Server.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam" on page 387 and "fw sam_policy" on page 395 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with
pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The
default is forever.
Parameter Description
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-n <Name>] [-c "<Comment">] [-o
<Originator>] [-l {r | a}] -a {d | r| n | b | q | i} [-C] {-ip
|-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to
use with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the
action. The default is forever.
Parameter Description
-l {r | a} Specifies the log type for connections that match the specified
criteria:
n r - Regular
n a - Alert
Default is None.
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug
purposes - to make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Notes:
n These Regular OIDs are specified in the SNMP MIB files.
n For Check Point MIB files, see sk90470.
Notes:
n These Statistical OIDs take some time to "initialize".
n For example, to calculate an average, it is necessary to collect enough samples.
n Check Point statistical OIDs are registered in the $CPDIR/conf/statistical_
oid.conf file.
Parameters
Parameter Description
Parameter Description
threshold_config
Description
You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts.
You can use these thresholds to monitor many system components automatically without
requesting information from each object or device.
You configure these SNMP Monitoring Thresholds only on the Security Management Server,
Multi-Domain Server, or Domain Management Server.
During policy installation, the managed a Security Gateway and Clusters receive and apply
these thresholds as part of their policy.
For more information, see sk90860: How to configure SNMP on Gaia OS.
Procedure
Step Instructions
Step Instructions
(1) Show policy Shows the name of the current configured threshold policy.
name
(2) Set policy Configures the name for the threshold policy.
name If you do not specify it explicitly, then the default name is "Default
Profile".
(3) Save policy Saves the changes in the current threshold policy.
(8) View Shows a list of all available thresholds and their current settings.
thresholds These include:
overview
n Name
n Category (see the next option "(9)")
n State (disabled or enabled)
n Threshold (threshold point, if applicable)
n Description
Thresholds Categories
Category Sub-Categories
Category Sub-Categories
Notes:
n If you run the threshold_config command locally on a Security Gateway or
Cluster Members to configure the SNMP Monitoring Thresholds, then each
policy installation erases these local SNMP threshold settings and reverts them
to the global SNMP threshold settings configured on the Management Server
that manages this Security Gateway or Cluster.
n On a Security Gateway and Cluster Members, you can save the local Threshold
Engine Configuration settings to a file and load it locally later.
n The Threshold Engine Configuration is stored in the
$FWDIR/conf/thresholds.conf file.
n In a Multi-Domain Security Management environment:
l You can configure the SNMP thresholds in the context of Multi-Domain
Server are for that Domain Management Server and its managed Security
Gateway and Clusters.
l If an SNMP threshold applies both to the Multi-Domain Server and a
$MDSVERUTIL
Description
This utility returns information about the Multi-Domain Server and Domain Management
Servers.
This utility is intended for internal use by Check Point scripts on the Multi-Domain Server.
You can use this utility to get some information about the Multi-Domain Server and Domain
Management Servers (for example, the names of all Domain Management Servers).
Syntax
$MDSVERUTIL help
$MDSVERUTIL
AllCMAs <options>
AllVersions
CMAAddonDir <options>
CMACompDir <options>
CMAFgDir <options>
CMAFw40Dir <options>
CMAFw41Dir <options>
CMAFwConfDir <options>
CMAFwDir <options>
CMAIp <options>
CMAIp6 <options>
CMALogExporterDir <options>
CMALogIndexerDir <options>
CMANameByFwDir <options>
CMANameByIp <options>
CMARegistryDir <options>
CMAReporterDir <options>
CMASmartLogDir <options>
CMASvnConfDir <options>
CMASvnDir <options>
ConfDirVersion <options>
CpdbUpParam <options>
CPprofileDir <options>
CPVer <options>
CustomersBaseDir <options>
DiskSpaceFactor <options>
InstallationLogDir <options>
IsIPv6Enabled
IsLegalVersion <options>
IsOsSupportsIPv6
LatestVersion
MDSAddonDir <options>
MDSCompDir <options>
MDSDir <options>
MDSFgDir <options>
MDSFwbcDir <options>
MDSFwDir <options>
MDSIp <options>
MDSIp6 <options>
MDSLogExporterDir <options>
MDSLogIndexerDir <options>
MDSPkgName <options>
MDSRegistryDir <options>
MDSReporterDir <options>
MDSSmartLogDir <options>
MDSSvnDir <options>
MDSVarCompDir <options>
MDSVarDir <options>
MDSVarFwbcDir <options>
MDSVarFwDir <options>
MDSVarSvnDir <options>
MSP <options>
OfficialName <options>
OptionPack <options>
ProductName <options>
RegistryCurrentVer <options>
ShortOfficialName <options>
SmartCenterPuvUpgradeParam <options>
SP <options>
SVNPkgName <options>
SvrDirectory <options>
SvrParam <options>
Parameters
Parameter Description
CMACompDir <options> Returns the full path for the specified Backward
Compatibility Package in the context of the
specified Domain Management Server.
See "$MDSVERUTIL CMACompDir" on page 552.
Parameter Description
CMAFgDir <options> Returns the full path for the $FGDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMAFgDir" on page 553.
CMAFw40Dir <options> Returns the full path for the $FWDIR directory for
FireWall-1 4.0 in the context of the specified
Domain Management Server.
See "$MDSVERUTIL CMAFw40Dir" on page 554.
CMAFw41Dir <options> Returns the full path for the $FWDIR directory for
Edge devices (that are based on FireWall-1 4.1) in
the context of the specified Domain Management
Server.
Note - R81.10 does not support UTM-1 Edge
and Safe@Office devices. The information
about this command is provided only to
describe the existing syntax option until it is
removed completely.
See "$MDSVERUTIL CMAFw41Dir" on page 555.
CMAFwDir <options> Returns the full path for the $FWDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMAFwDir" on page 557.
Parameter Description
CMAReporterDir <options> Returns the full path for the $RTDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMAReporterDir" on
page 565.
CMASvnDir <options> Returns the full path for the $CPDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMASvnDir" on page 568.
Parameter Description
CPprofileDir <options> Returns the path to the directory that contains the
.CPprofile.sh and the .CPprofile.csh
shell scripts.
See "$MDSVERUTIL CPprofileDir" on page 571.
Parameter Description
MDSCompDir <options> Returns the full path for the specified Backward
Compatibility Package in the MDS context.
See "$MDSVERUTIL MDSCompDir" on page 581.
MDSDir <options> Returns the full path in the /opt/ directory to the
$MDSDIR directory.
See "$MDSVERUTIL MDSDir" on page 582.
MDSFgDir <options> Returns the full path for the $FGDIR directory in
the MDS context.
See "$MDSVERUTIL MDSFgDir" on page 583.
MDSFwbcDir <options> Returns the full path in the /opt/ directory (in the
MDS context) for the Backward Compatibility
directory for Edge devices.
See "$MDSVERUTIL MDSFwbcDir" on page 584.
MDSFwDir <options> Returns the full path in the /opt/ directory for the
$FWDIR directory in the MDS context.
See "$MDSVERUTIL MDSFwDir" on page 585.
Parameter Description
MDSReporterDir <options> Returns the full path for the $RTDIR directory in
the MDS context.
See "$MDSVERUTIL MDSReporterDir" on
page 592.
MDSSvnDir <options> Returns the full path in the /opt/ directory for the
$CPDIR directory in the MDS context.
See "$MDSVERUTIL MDSSvnDir" on page 594.
Parameter Description
Parameter Description
$MDSVERUTIL AllCMAs
Description
Returns the list of names of the configured Domain Management Servers.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL AllVersions
Description
Returns the internal representation of versions, this Multi-Domain Server recognizes.
You can you these internal version strings in other commands.
In addition, see these commands:
n "$MDSVERUTIL IsLegalVersion" on page 577
n "$MDSVERUTIL OfficialName" on page 601
Syntax
$MDSVERUTIL AllVersions
Mapping
VID_94 R80.40
VID_93 R80.30
VID_92 R80.20
VID_91 R80
VID_90 R77.X
VID_89 R76
VID_88 R75.40VS
VID_87 R75.40
VID_86 R75.30
VID_85 R75.20
VID_84 R75
VID_83 R71.X
VID_80 R70.X
VID_541_A NG AI R55W
VID_541 NG AI R55
VID_54_VSX_R2 VSX NG AI R2
VID_54 NG AI R54
VID_53_VSX VSX NG AI
VID_53 NG FP3
VID_52 NG FP2
VID_51 NG FP1
VID_41 4.1
Example
$MDSVERUTIL CMAAddonDir
Description
Returns the path to the Management Addon directory in the context of the specified Domain
Management Server. Applies only to NG AI R55W version.
In addition, see the "$MDSVERUTIL MDSAddonDir" on page 580 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMACompDir
Description
Returns the full path for the specified Backward Compatibility Package in the context of the
specified Domain Management Server.
In addition, see these commands:
n "$MDSVERUTIL MDSCompDir" on page 581
n "$MDSVERUTIL MDSVarCompDir" on page 595
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAFgDir
Description
Returns the full path for the $FGDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSFgDir" on page 583 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFw40Dir
Description
Returns the full path for the $FWDIR directory for FireWall-1 4.0 in the context of the specified
Domain Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFw41Dir
Note - R81.10 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax
option until it is removed completely.
Description
Returns the full path for the $FWDIR directory for UTM-1 Edge devices (that are based on
FireWall-1 4.1) in the context of the specified Domain Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFwConfDir
Description
Returns the full path for the $FWDIR/conf/ directory in the context of the specified Domain
Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFwDir
Description
Returns the full path for the $FWDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSFwDir" on page 585 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAIp
Description
Returns the IPv4 address of the Domain Management Server specified by its name.
In addition, see the "$MDSVERUTIL MDSIp" on page 586 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAIp6
Description
Returns the IPv6 address of the Domain Management Server specified by its name.
In addition, see the "$MDSVERUTIL MDSIp6" on page 587 command.
Note - Multi-Domain Server does not support IPv6 at all (Known Limitation PMTR-
14989).
Syntax
Parameters
Parameter Description
$MDSVERUTIL CMALogExporterDir
Description
Returns the full path for the $EXPORTERDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSLogExporterDir" on page 588 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMALogIndexerDir
Description
Returns the full path for the $INDEXERDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSLogIndexerDir" on page 589 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMANameByFwDir
Description
Returns the name of the Domain Management Server based on the context of the current
$FWDIR directory.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMANameByIp
Description
Returns the name of the Domain Management Server based on the specified IPv4 address.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMARegistryDir
Description
Returns the full path for the $CPDIR/registry/ directory in the context of the specified
Domain Management Server.
In addition, see the "$MDSVERUTIL MDSRegistryDir" on page 591 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAReporterDir
Description
Returns the full path for the $RTDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSReporterDir" on page 592 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASmartLogDir
Description
Returns the full path for the $SMARTLOGDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSSmartLogDir" on page 593 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASvnConfDir
Description
Returns the full path for the $CPDIR/conf/ directory in the context of the specified Domain
Management Server.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASvnDir
Description
Returns the full path for the $CPDIR directory in the context of the specified Domain
Management Server.
In addition, see these commands:
n "$MDSVERUTIL MDSSvnDir" on page 594
n "$MDSVERUTIL MDSVarSvnDir" on page 599
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL ConfDirVersion
Description
Returns the internal Version ID based on the context of the current $FWDIR/conf/ directory.
For information about the internal Version ID, see the "$MDSVERUTIL AllVersions" on
page 548 command.
Syntax
Example
$MDSVERUTIL CpdbUpParam
Description
Returns internal version numbers from the internal database.
In addition, see these commands:
n "$MDSVERUTIL MSP" on page 600
n "$MDSVERUTIL SP" on page 607
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
$MDSVERUTIL CPprofileDir
Description
Returns the path to the directory that contains the .CPprofile.sh and the
.CPprofile.csh shell scripts.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CPVer
Description
Returns internal Check Point version number.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CustomersBaseDir
Description
Returns the full path for the $MDSDIR/customers/ directory.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL DiskSpaceFactor
Description
Returns the disk-space factor. The mds_setup command uses this value during an upgrade.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL InstallationLogDir
Description
Returns the full path for directory with all installation logs (/opt/CPInstLog/).
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL IsIPv6Enabled
$MDSVERUTIL IsLegalVersion
Description
Returns 0, if the specified internal Version ID is legal.
Returns 1, if the specified internal Version ID is illegal.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL IsOsSupportsIPv6
Description
Returns true, if the OS supports IPv6.
Returns false, if the OS does not support IPv6.
Note - Multi-Domain Server does not support IPv6 at all (Known Limitation PMTR-
14989).
Syntax
$MDSVERUTIL IsOsSupportsIPv6
$MDSVERUTIL LatestVersion
Description
Returns the internal Version ID of the latest installed version.
Syntax
$MDSVERUTIL LatestVersion
Example
$MDSVERUTIL MDSAddonDir
Description
Returns the path to the Management Addon directory in the MDS context.
In addition, see the "$MDSVERUTIL CMAAddonDir" on page 551 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSCompDir
Description
Returns the full path for the specified Backward Compatibility Package in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMACompDir" on page 552
n "$MDSVERUTIL MDSVarCompDir" on page 595
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSDir
Description
Returns the full path in the /opt/ directory to the $MDSDIR directory.
In addition, see the "$MDSVERUTIL MDSVarDir" on page 596 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFgDir
Description
Returns the full path for the $FGDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMAFgDir" on page 553 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFwbcDir
Note - R81.10 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax
option until it is removed completely.
Description
Returns the full path in the /opt/ directory (in the MDS context) for the Backward
Compatibility directory for UTM-1 Edge devices.
This Backward Compatibility directory contains the applicable files to install policy on UTM-1
Edge devices.
In addition, see the "$MDSVERUTIL MDSVarFwbcDir" on page 597 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFwDir
Description
Returns the full path in the /opt/ directory for the $FWDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL MDSVarFwDir" on page 598
n "$MDSVERUTIL CMAFwDir" on page 557
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSIp
Description
Returns the IPv4 address of Multi-Domain Server.
In addition, see the "$MDSVERUTIL CMAIp" on page 558 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSIp6
Description
Returns the IPv6 address of Multi-Domain Server.
In addition, see the "$MDSVERUTIL CMAIp6" on page 559 command.
Note - Multi-Domain Server does not support IPv6 at all (Known Limitation PMTR-
14989).
Syntax
Parameters
Parameter Description
$MDSVERUTIL MDSLogExporterDir
Description
Returns the full path for the $EXPORTERDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMALogExporterDir" on page 560 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSLogIndexerDir
Description
Returns the full path for the $INDEXERDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMALogIndexerDir" on page 561 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSPkgName
Description
Returns the name of the MDS software package.
In addition, see the "$MDSVERUTIL SVNPkgName" on page 608 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSRegistryDir
Description
Returns the full path for the $CPDIR/registry/ directory in the MDS context.
In addition, see the "$MDSVERUTIL CMARegistryDir" on page 564 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSReporterDir
Description
Returns the full path for the $RTDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMAReporterDir" on page 565 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSSmartLogDir
Description
Returns the full path for the $SMARTLOGDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMASmartLogDir" on page 566 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSSvnDir
Description
Returns the full path in the /opt/ directory for the $CPDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMASvnDir" on page 568
n "$MDSVERUTIL MDSVarSvnDir" on page 599
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarCompDir
Description
Returns the full path in the /var/opt/ directory for the specified Backward Compatibility
Package in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMACompDir" on page 552
n "$MDSVERUTIL MDSCompDir" on page 581
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSVarDir
Description
Returns the full path in the /var/opt/ directory to the $MDSDIR directory.
In addition, see the "$MDSVERUTIL MDSDir" on page 582 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarFwbcDir
Note - R81.10 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax
option until it is removed completely.
Description
Returns the full path in the /var/opt/ directory (in the MDS context) for the Backward
Compatibility directory for UTM-1 Edge devices.
This Backward Compatibility directory contains the applicable files to install policy on UTM-1
Edge devices.
In addition, see the "$MDSVERUTIL MDSFwbcDir" on page 584 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarFwDir
Description
Returns the full path in the /var/opt/ directory for the $FWDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL MDSFwDir" on page 585 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarSvnDir
Description
Returns the full path in the /var/opt/ directory for the $CPDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMASvnDir" on page 568
n "$MDSVERUTIL MDSSvnDir" on page 594
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MSP
Description
Returns the Minor Service Pack version.
In addition, see these commands:
n "$MDSVERUTIL SP" on page 607
n "$MDSVERUTIL CpdbUpParam" on page 570
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL OfficialName
Description
Returns the official version name.
In addition, see the "$MDSVERUTIL ShortOfficialName" on page 605 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
$MDSVERUTIL OptionPack
Description
Returns the internal Option Pack version.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL ProductName
Description
Returns the official name of the Multi-Domain Server product.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL RegistryCurrentVer
Description
Returns the current internal version of Check Point Registry.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL ShortOfficialName
Description
Returns the short (without spaces) official version name.
In addition, see the "$MDSVERUTIL OfficialName" on page 601 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL SmartCenterPuvUpgradeParam
Description
Returns the version to the Pre-Upgrade Verifier (PUV) in order for it to upgrade to that version.
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
[Expert@MDS:0]# $MDSVERUTIL SmartCenterPuvUpgradeParam -v VID_65
NGX_R65
[Expert@MDS:0]#
$MDSVERUTIL SP
Description
Returns the Service Pack version.
In addition, see these commands:
n "$MDSVERUTIL MSP" on page 600
n "$MDSVERUTIL CpdbUpParam" on page 570
Syntax
Parameters
Parameter Description
Example 1
[Expert@MDS:0]# $MDSVERUTIL SP
4
[Expert@MDS:0]#
Example 2
$MDSVERUTIL SVNPkgName
Description
Returns the name of the Secure Virtual Network (SVN) package. Applies to versions NGX R60
and above.
In addition, see the "$MDSVERUTIL MDSPkgName" on page 590 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL SvrDirectory
Description
Returns the full path for the SmartReporter directory.
Syntax
Parameters
Parameter Description
$MDSVERUTIL SvrParam
Description
Returns the SmartReporter version.
Syntax
Parameters
Parameter Description
Example:
4. Connect with SmartConsole to the new Domain Management Server to configure the
applicable settings.
Glossary
A
Anti-Bot
Check Point Software Blade on a Security Gateway that blocks botnet behavior and
communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.
Anti-Spam
Check Point Software Blade on a Security Gateway that provides comprehensive
protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS,
ASPAM.
Anti-Virus
Check Point Software Blade on a Security Gateway that uses real-time virus signatures
and anomaly-based protections from ThreatCloud to detect and block malware at the
Security Gateway before users are affected. Acronym: AV.
Application Control
Check Point Software Blade on a Security Gateway that allows granular control over
specific web-enabled applications by using deep packet inspection. Acronym: APPI.
Audit Log
Log that contains administrator actions on a Management Server (login and logout,
creation or modification of an object, installation of a policy, and so on).
Bridge Mode
Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
Security Gateway that is part of a cluster.
Compliance
Check Point Software Blade on a Management Server to view and apply the Security
Best Practices to the managed Security Gateways. This Software Blade includes a
library of Check Point-defined Security Best Practices to use as a baseline for good
Security Gateway and Policy configuration.
Content Awareness
Check Point Software Blade on a Security Gateway that provides data visibility and
enforcement. Acronym: CTNT.
CoreXL
Performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to stick
to a particular FWK daemon is done at the first packet of connection on a very high level,
before anything else. Depending on the SecureXL settings, and in most of the cases, the
SecureXL can be offloading decryption calculations. However, in some other cases,
such as with Route-Based VPN, it is done by FWK daemon.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can
automatically update Check Point products for the Gaia OS, and the Gaia OS itself.
DAIP Gateway
Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway, on which the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
Classification of data in a Check Point Security Policy for the Content Awareness
Software Blade.
Distributed Deployment
Configuration in which the Check Point Security Gateway and the Security Management
Server products are installed on different computers.
Dynamic Object
Special object type, whose IP address is not known in advance. The Security Gateway
resolves the IP address of this object in real time.
Expert Mode
The name of the elevated command line shell that gives full system root permissions in
the Check Point Gaia operating system.
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restricted shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for the Check Point Gaia operating system.
Global Domain
Domain on a Multi-Domain Security Management Server, on which the Multi-Domain
Server administrator creates and manages objects, security policies and settings that
apply to the entire Multi-Domain Security Management environment.
Global Objects
On a Multi-Domain Security Management Server, all objects defined in the Global
Domain. You can use this objects in a Global Policy or Local Policies on Domains.
Global Policy
On a Multi-Domain Security Management Server, a policy defined in the Global Domain.
You can assigns this Global Policy to Domains.
Hotfix
Software package installed on top of the current software version to fix a wrong or
undesired behavior, and to add a new behavior.
HTTPS Inspection
Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets
Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection.
Acronyms: HTTPSI, HTTPSi.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and
audits data based on network location, the identity of the user, and the identity of the
computer. Acronym: IDA.
Identity Logging
Check Point Software Blade on a Management Server to view Identity Logs from the
managed Security Gateways with enabled Identity Awareness Software Blade.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets
and data for numerous types of risks (Intrusion Prevention System).
IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and
Remote Access VPN access.
Kerberos
An authentication server for Microsoft Windows Active Directory Federation Services
(ADFS).
Log Server
Dedicated Check Point server that runs Check Point software to store and process logs.
Management Interface
(1) Interface on a Gaia Security Gateway or Cluster member, through which
Management Server connects to the Security Gateway or Cluster member. (2) Interface
on Gaia computer, through which users connect to Gaia Portal or CLI.
Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security
Management Server.
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN
access for managed and unmanaged clients. Acronym: MAB.
Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security
Management Servers called Domain Management Servers. Synonym: Multi-Domain
Security Management Server. Acronym: MDS.
Network Object
Logical object that represents different parts of corporate topology - computers, IP
addresses, traffic protocols, and so on. Administrators use these objects in Security
Policies.
Open Server
Physical computer manufactured and distributed by a company, other than Check Point.
Provisioning
Check Point Software Blade on a Management Server that manages large-scale
deployments of Check Point Security Gateways using configuration profiles. Synonyms:
SmartProvisioning, SmartLSM, Large-Scale Management, LSM.
QoS
Check Point Software Blade on a Security Gateway that provides policy-based traffic
bandwidth management to prioritize business-critical traffic and guarantee bandwidth
and control latency.
Rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause
specified actions to be taken for a communication session.
Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase.
SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that
passes through a Security Gateway.
Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and
enforce Security Policies for connected network resources.
Security Policy
Collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over SSL,
for secure communication. This authentication is based on the certificates issued by the
ICA on a Check Point Management Server.
SmartConsole
Check Point GUI application used to manage a Check Point environment - configure
Security Policies, configure devices, monitor products and events, install updates, and
so on.
SmartDashboard
Legacy Check Point GUI client used to create and manage the security settings in
versions R77.30 and lower. In versions R80.X and higher is still used to configure
specific legacy settings.
SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is
"Provisioning") that manages large-scale deployments of Check Point Security
Gateways using configuration profiles. Synonyms: Large-Scale Management,
SmartLSM, LSM.
SmartUpdate
Legacy Check Point GUI client used to manage licenses and contracts in a Check Point
environment.
Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade
inspects specific characteristics of the traffic (2) On a Management Server, each
Software Blade enables different management capabilities.
Standalone
Configuration in which the Security Gateway and the Security Management Server
products are installed and configured on the same server.
Threat Emulation
Check Point Software Blade on a Security Gateway that monitors the behavior of files in
a sandbox to determine whether or not they are malicious. Acronym: TE.
Threat Extraction
Check Point Software Blade on a Security Gateway that removes malicious content from
files. Acronym: TEX.
Updatable Object
Network object that represents an external service, such as Microsoft 365, AWS, Geo
locations, and more.
URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over
which web sites can be accessed by a given group of users, computers or networks.
Acronym: URLF.
User Directory
Check Point Software Blade on a Management Server that integrates LDAP and other
external user management servers with Check Point products and security solutions.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer
or cluster with virtual abstractions of Check Point Security Gateways and other network
devices. These Virtual Devices provide the same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide
the functionality of physical network devices. It holds at least one Virtual System, which
is called VS0.
Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides
real-time phishing prevention based on URLs. Acronym: ZPH.