Advanced IPS
Advanced IPS
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties
Preface
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 3
Training Blades and Certification
1.
Take and pass
any 2 Training
Blades OR
+
AppControl Introduction to IPS
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 4
Certification Renewal Examples
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 5
Check Point Advanced IPS
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 6
Advanced IPS Course Chapters
1. IPS Management
2. IPS Monitoring
3. IPS Architecture
4. IPS Tuning
5. IPS Debugging
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 7
Lab Topology
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 8
Check Point 3D Security
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 9
Check Point 3D Security
Security is a process
– A network is never 100% secure
– IT security policy must be transparent
– Challenges to IT involve security, deployment, management,
and compliance
– Security products are tools to avoid risk
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 10
Check Point 3D Security
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 11
IPS Management
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 12
IPS Management
Learning Objectives
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 13
IPS Management
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 14
IPS Management
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 15
IPS Management
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 16
IPS Management
IPS Capabilities
– Simple management interface
– Reduced management
– Unified control
– Easy navigation
– Gbp throughput
– #1 security coverage for Microsoft and Adobe
– Resource throttling
– Complete integration with Check Point tools
10
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 17
IPS Management
IPS Example
– Malware can be downloaded by a user unknowingly
when browsing to a legitimate web site, also known as a
drive-by-download.
– The malware may exploit a browser vulnerability by
creating a special HTTP response and sending it to the
client.
– IPS can identify and block this type of attack even
though the firewall may be configured to allow the HTTP
traffic to pass
10
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 18
IPS Management
IPS in SmartDashboard
11
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 19
IPS Management
IPS in My Organization
11
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 20
IPS Management
IPS in My Organization
12
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 21
IPS Management
Security Status
13
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 22
IPS Management
Security Status
13
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 23
IPS Management
Security Status
13
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 24
IPS Management
Security Center
14
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 25
IPS Management
IPS Profiles
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 26
IPS Management
IPS Profiles
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 27
IPS Management
Protection Types
15
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 28
IPS Management
Creating Profiles
15
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 29
IPS Management
Creating Profiles
To create a profile:
1.In the IPS tab, select Profiles.
2.Click New and choose an
option:
3.Configure the General
Properties
4.Select IPS Policy
5.Click OK to create the profile
16
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 30
IPS Management
Predefined Profiles
17
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 31
IPS Management
17
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 32
IPS Management
IPS Mode
18
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 33
IPS Management
Severity
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 34
IPS Management
Severity (cont.)
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 35
IPS Management
Confidence Level
For every event that traverses the gateway, IPS calculates the
likelihood that the event is indeed an attack.
– Low: likely or known false positive
– High: likely to indicate an attack
19
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 36
IPS Management
Performance Impact
19
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 37
IPS Management
Performance Impact
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 38
IPS Management
Protocol Anomalies
20
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 39
IPS Management
Category
20
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 40
IPS Management
Updating Policy
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 41
IPS Management
Network Exceptions
20
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 42
IPS Management
Profile Workflow
20
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 43
IPS Management
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 44
IPS Management
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 45
IPS Management
21
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 46
IPS Management
Protection Browser
23
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 47
IPS Management
23
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 48
IPS Management
Filtering Protections
24
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 49
IPS Management
Sorting Protections
25
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 50
IPS Management
Sorting Protections
26
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 51
IPS Management
The exported information includes all protections, with all table fields
regardless of any applied sorting or filtering.
26
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 52
IPS Management
Protection Parameters
27
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 53
IPS Management
27
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 54
IPS Management
28
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 55
IPS Management
Protection Mode
28
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 56
IPS Management
IPS Updates
29
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 57
IPS Management
29
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 58
IPS Management
You can immediately update IPS with real-time information on attacks and all the
latest protections from the IPS website.
You can only manually update IPS if a proxy is defined in Internet Explorer settings.
To obtain updates of all the latest protections from the IPS website:
1. Configure the settings for the proxy server in Internet Explorer.
In Microsoft Internet Explorer, open Tools > Internet Options > Connections tab > LAN
Settings. The LAN Settings window opens.
Select Use a proxy server for your LAN.
Configure the IP address and port number for the proxy server.
Click OK.
2. In the IPS tab, select Download Updates and click Update Now.
If you chose to automatically mark new protections for Follow Up,
you have the option to open the Follow Up page directly to see the new protections.
30
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 59
IPS Management
31
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 60
IPS Management
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 61
IPS Management
Offline Update
32
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 62
IPS Management
Network Exceptions
For most signature protections, exceptions are checked after the first tier of the
pattern matcher.
For most Application Control and Protocol Anomalies, protections exceptions are
checked first.
To apply the Network Exceptions to a pattern, add them to the new protection
converted from the relevant pattern.
Check Point components can use non-standard HTTP and SSL ports to
communicate. Implied exceptions exclude this traffic from IPS inspection.
33
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 63
IPS Management
Network Exceptions
33
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 64
IPS Management
Signature protections:
– Adding many exceptions does not have a performance impact –
most traffic does not make it through the first tier of the PM
– Adding exceptions to help when you are having a performance
issue does not help
34
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 65
IPS Management
34
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 66
IPS Management
35
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 67
IPS Management
Geo Protection
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 68
IPS Management
Geo Protection
36
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 69
IPS Management
36
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 70
IPS Management
37
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 71
IPS Management
Review Questions
39
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 72
IPS Management
Review Questions
39
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 73
IPS Management
Review Questions
39
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 74
IPS Management
Review Questions
39
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 75
IPS Management
Review Questions
39
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 76
IPS Management
Review Questions
39
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 77
IPS Management
Lab Practice
41
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 78
IPS Monitoring
93
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 79
IPS Monitoring
Learning Objectives
94
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 80
IPS Monitoring
IPS Event Analysis provides tools for translating IPS logs into a
complete picture of your security.
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 81
IPS Monitoring
95
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 82
IPS Monitoring
Easy Deployment
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 83
IPS Monitoring
96
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 85
IPS Monitoring
97
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 86
IPS Monitoring
The IPS Event Analysis client provide the tools necessary for
configuring definitions which will recognize security-related
issues in the network infrastructure.
97
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 87
IPS Monitoring
SmartEvent
98
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 88
IPS Monitoring
99
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 89
IPS Monitoring
99
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 90
IPS Monitoring
100
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 91
IPS Monitoring
100
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 92
IPS Monitoring
101
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 93
IPS Monitoring
101
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 94
IPS Monitoring
Review Questions
103
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 95
IPS Monitoring
Review Questions
103
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 96
IPS Monitoring
Review Questions
103
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 97
IPS Monitoring
Review Questions
103
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 98
IPS Monitoring
Lab Practice
105
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 99
IPS Architecture
121
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 100
IPS Architecture
Learning Objectives
122
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 101
IPS Architecture
Secure
Fast Performance
Accurate
Reliable
Updatable
Application Aware
Granular Control 123
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 102
IPS Architecture
Secure
– 0-day threat prevention
– Malicious code detection
– Anomalous behavior detection
– Anomalous protocol detection
– Command injection attack detection
– Phishing attack detection
123
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 103
IPS Architecture
Fast performance
– Fast no matter how enabled
– Fast no matter how security intensive
123
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 104
IPS Architecture
Accurate
– Distinguish false positives
123
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 105
IPS Architecture
Reliable
– Predictable solution
– Try in passive mode
– Tune for prevention
– Maintain connectivity
123
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 106
IPS Architecture
Updatable
– Evolving solution
– Identify changing genres of attacks
– Real-time threat protection updates
124
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 107
IPS Architecture
Application Aware
– Peer applications can transfer company confidential
data
– Enforce company policy on applications
124
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 108
IPS Architecture
Granular Control
– Setting network exceptions
– Forensic tool access
124
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 109
IPS Architecture
124
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 110
IPS Architecture
125
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 111
IPS Architecture
126
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 112
IPS Architecture
126
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 113
IPS Architecture
Unified Streaming
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 114
IPS Architecture
ASPII
127
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 115
IPS Architecture
ASPII
Example:
List of protections for this connection
1. Detect Bittorent
2. Detect Skype
3. Detect...
4. Block Malformed HTTP Connections
.
.
.
37. Block Malformed jpeg
128
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 116
IPS Architecture
Protocol Parsers
128
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 117
IPS Architecture
Protocol Parsers
128
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 118
IPS Architecture
129
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 119
IPS Architecture
129
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 120
IPS Architecture
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 121
IPS Architecture
Pattern Matcher
131
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 122
IPS Architecture
131
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 123
IPS Architecture
132
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 124
IPS Architecture
INSPECTv2
INSPECT:
– Provides scalable open approach to generic traffic analysis
132
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 125
IPS Architecture
133-134
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 126
IPS Architecture
Review Questions
137
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 127
IPS Architecture
Review Questions
137
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 128
IPS Architecture
Review Questions
137
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 129
IPS Architecture
Review Questions
137
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 130
IPS Architecture
Lab Practice
137
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 131
IPS Tuning
175
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 132
IPS Tuning
Learning Objectives
176
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 133
IPS Tuning
177
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 134
IPS Tuning
177
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 135
IPS Tuning
177
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 136
IPS Tuning
178
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 137
IPS Tuning
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 138
IPS Tuning
179
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 139
IPS Tuning
180
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 140
IPS Tuning
Tuning Protections
IPS profiles allow you to apply all of the protections as a group to specific
gateways.
Because newer versions includes some features that are not supported
by older gateways (or have a different effect there), it is recommended to
apply different profiles for current gateways and for older gateways.
180-181
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 141
IPS Tuning
IPS Policy settings allow you to control the entire body of protections with
few basic decisions.
This level of security may be necessary for highly sensitive data and
resources; however it can create system resource and log management
challenges when applied to data and resources that do not require high
security.
181
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 142
IPS Tuning
181
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 143
IPS Tuning
181
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 144
IPS Tuning
Broad protection definitions are required to detect certain attacks that are
elusive.
181
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 145
IPS Tuning
182
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 146
IPS Tuning
182
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 147
IPS Tuning
Configure Servers
Protections for some hosts, such as DNS Servers, Web Servers and Mail
Servers require additional configuration.
Making sure these hosts are properly configured for IPS allows for more
accurate alerting, and performance improvement.
182
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 148
IPS Tuning
DNS Servers
182
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 149
IPS Tuning
Web Servers
183
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 150
IPS Tuning
Mail Servers
184
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 151
IPS Tuning
Servers to Check
184
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 152
IPS Tuning
Engine Settings
185
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 153
IPS Tuning
Example – MS-RPC
185
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 154
IPS Tuning
Example – MS-RPC
186
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 155
IPS Tuning
Review Questions
187
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 156
IPS Tuning
Review Questions
187
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 157
IPS Tuning
Review Questions
187
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 158
IPS Tuning
Review Questions
187
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 159
IPS Tuning
Lab Practice
189
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 160
IPS Debugging
219
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 161
IPS Debugging
Learning Objectives
220
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 162
IPS Debugging
221
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 163
IPS Debugging
SmartView Tracker
221
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 164
IPS Debugging
SmartView Tracker
SmartView Tracker
The gateways on which this Policy is installed collect data as specified in the
Policy, and forward the logs to the Security Management server (and/or to Log
Servers, depending on their settings).
The logs are organized in files according to the order in which they arrived to the
Security Management server.
All new logs are saved to the fw.log file, except for audit (management-related)
logs, which are saved to the fw.adtlog file.
The Security Management server makes these logs available for inspection via
SmartView Tracker.
The Security Management server also performs the operations specified in the
Policy for events matching certain rules (e.g., issuing an alert, sending
email, running a user-defined script etc.). 222
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 166
IPS Debugging
SmartView Tracker
222
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 167
IPS Debugging
222
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 168
IPS Debugging
Log Suppression
224
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 170
IPS Debugging
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 171
IPS Debugging
IPS Column
The Protection Type column is relevant to IPS protection incidents. You can filter
for any of these types:
– Application Control
– Engine Settings
– Geo Protection
– Protocol Anomaly
– Signature
– Server Type
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 172
IPS Debugging
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 173
IPS Debugging
Packet Capture
227
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 174
IPS Debugging
Packet Capture
227
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 175
IPS Debugging
Packet Capture
1. Open the protection for which you want to track the packet data.
2. Make sure the protection is activated (either Detect or Prevent).
3. Double-click on the profile for which you want packet capture data.
4. In the Action area, select any tracking action other than None and then select
Capture Packets. 227-228
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 176
IPS Debugging
Packet Capture
1. SmartView Tracker opens. Wait until the log window for the specific protection opens.
2. If searching for automatically captured packets, make sure the Packet Capture column is
showing
4. Right-click the item in the protection's SmartView Tracker log and select View packet
capture. 228
(cont.)
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 177
IPS Debugging
Packet Capture
You may also use a third-party packet capture application by selecting Choose program and
specifying the application in the Program Name field.
(cont.)
228
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 178
IPS Debugging
Packet Capture
229
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 179
IPS Debugging
Kernel Debugging
229
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 180
IPS Debugging
230
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 181
IPS Debugging
2. Install Policy
3. Set debug
fw ctl zdebug + drop
231
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 182
IPS Debugging
Now, every dropped packet will generate a more elaborate drop message, for example:
231
*Add cifs if you suspect an issue with SMB traffic (port 445).
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 183
IPS Debugging
Each IPS protection has a Performance Impact grade. When the gateway is under heavy
load, or under specific traffic blends, this impact might be substantial.
232
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 184
IPS Debugging
Possible actions
– Deactivate protections with critical or high performance impact.
– If this is due to automatic activation settings, reconfigure these.
– Consider activating the “Bypass SmartDefense under load
option.
– Consider activating the “Protect Internal Hosts Only” feature.
This requires a correct configuration of the gateway’s
interfaces.
233
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 185
IPS Debugging
233
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 186
IPS Debugging
233
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 187
IPS Debugging
The “&” will run the “fw ctl adebug” command in the background, to stop it
you need to being the process to the foreground by executing the “fg”
command, and then terminate the program by clicking “Ctrl+C”.
234
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 188
IPS Debugging
On the SmartCenter:
– Copy the file collected on the module to the Management under $FWDIR/
scripts/
– Change folder to $FWDIR/scripts/
– Run the command: ./sdstat_analyse.csh <file_name>
– The output file will be <file_name>.csv
– Copy the file to a host, and open it.
234
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 189
IPS Debugging
235
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 190
IPS Debugging
236
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 191
IPS Debugging
Logging Issues
If you suspect that packets are being dropped with no log, it is possible to
debug the logging mechanism:
236
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 192
IPS Debugging
237
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 193
IPS Debugging
Usage:
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 194
IPS Debugging
This may be problematic on heavy loads, as the debug buffer might be full.
Packet capture is often just as helpful. 237
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 195
IPS Debugging
238
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 196
IPS Debugging
Review Questions
239
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 197
IPS Debugging
Review Questions
239
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 198
IPS Debugging
Review Questions
239
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 199
IPS Debugging
Review Questions
239
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 200
IPS Debugging
Review Questions
239
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 201
IPS Debugging
Review Questions
239
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 202
IPS Debugging
Lab Practice
241
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 203
Advanced IPS
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2012 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties