This topic describes how to add Check Point MDSM, SmartCenter / Gateway, or CMA devices, as well as fields and options shared by all of these device types.
Tip: Watch a training video on how AFA can collect data from a few Check Point devices. See Defining Check Point Devices on the AlgoSec portal.
In this topic:
Check Point network connections
The following diagrams shows an ASMS Central Manager or Remote Agent connecting to a Check Point MDSM, CMA, or Smart Center device, and a Check Point Gateway. Check Point versions R80 or higher have an additional connection via HTTP-REST.
Note: If your CLM/MLM log servers reside on separate hosts, you'll need to connect to these separately from ASMS.
ASMS requires minimal read-only CPMI and LEA OPSEC object permissions to connect to Check Point devices, and automatically initiates log collection via the defined LEA connection.
In the Check Point interface, define your permissions as follows:
CPMI
Select the following CPMI permissions:
Allow access via Management Portal and SmartConsole Applications
Permissions > Read Only All. To use ActiveChange, select Read/Write All.
LEA
On the LEA Permissions tab, under Permissions to Read Logs, select Show all log fields.
Note: Create a separate OPSEC Object and permissions profile for ASMS use only. Using the Administrator profile results in failures due to Check Point configurations.
Add a Check Point Multi-Domain Security Management device
Check Point Multi-Domain Security Management (MDSM) integrates multiple 'firewalled' networks within a single administrative framework. These devices consolidate multiple SmartCenter Servers, referred to as Customer Management Add-ons (CMAs), on a single host.
AFA analyzes the Filter Module security policy via a secure connection to the MDSM server.
Note: Multi-Domain Security Management, or MDSM, refers to both MDSM and Provider-1 devices.
Note: If you select to enable ActiveChange, the ActiveChange License Agreement appears. Select the I agree checkbox, and then click OK.
Click Next.
The fields on the Check Point - Multi-Domain Security Management (Provider-1) - Step 2/3 page differ, depending on whether you selected to connect to the device via SSH or OPSEC.
Do one of the following:
OPSEC
Recommended.
Enter the IP address of the CMA that manages the devices you wish to analyze.
SSH
Select the CMA that manages the devices you wish to analyze by clicking the relevant row.
Click Next.
The Check Point - Multi-Domain Security Management (Provider-1) - Step 3/3 page appears.
This page displays a table listing all the devices that are managed by the Check Point MDSM, including standalone devices and virtual systems.
If you selected Set user permissions, the Edit users dialog box appears.
In the list of users displayed, select one or more users to provide access to reports for this account. To select multiple users, press the CTRL button while selecting.
Check Point products are based on a distributed architecture, where a typical Check Point deployment is composed of a Filter Module or device and the SmartCenter Server.
A standalone deployment is the simplest deployment where the SmartCenter Server and the Filter Module are installed on the same machine.
A distributed deployment is a more complex deployment where the Filter Module and the SmartCenter Server are deployed on different machines.
AFA provides an analysis of the Filter Module's security policy via a secure connection to the SmartCenter server.
Note: If you select to enable ActiveChange, the ActiveChange License Agreement appears. Select the I agree checkbox, and then click OK.
Click Next.
The Check Point - Security Management (SmartCenter) - Step 2/2 page appears, displaying a table that lists all the devices that are managed by the Check Point SmartCenter/Gateway, including standalone devices and virtual systems.
If you selected Set user permissions, the Edit users dialog box appears.
In the list of users displayed, select one or more users to provide access to reports for this account. To select multiple users, press the CTRL button while selecting.
Note: If you select to enable ActiveChange, the ActiveChange License Agreement appears. Select the I agree checkbox, and then click OK.
Click Next.
The Check Point - Single CMA - Step 2/2 page appears, displaying a table that lists all the devices that are managed by the Check Point CMA, including standalone devices and virtual systems.
Select this option for devices versions R80 or higher.
For R80 devices, you must configure the Management API Settings of the device to accept API calls from the IP address of the AlgoSec server. For more information, see Enabling REST Calls to the Security Management Server (see Enable data collection via REST).
Connect via
Specify how AFA should connect to the device, by selecting one of the following:
SSH: Connect via SSH (Secure Shell protocol).
This option is not available when adding a single Check Point CMA.
OPSEC (NGX R60 or higher): Connect via OPSEC. Recommended.
To specify a custom port, select Custom Port and enter the port number.
Note: For Windows environments, only OPSEC is supported.
Tip: Configure AFA to connect to the device using SSH with Public-Key authentication.
To do so, select the Use public key authentication in data collection check box in the General sub-tab of the Options tab in the Administration area. For details, see Define AFA preferences.
User Name / Password
Type the user name and password to access the device.
These fields only appear if you selected R80 or higher or you selected SSH in the Connect via area.
Choose this option to specify that the device is installed on a Check Point SecurePlatform operating system.
You must complete the Expert Password field.
This field only appears if you selected SSH in the Connect via area.
Expert Password
Type the expert password, which allows access to all the functions on the SmartCenter server required for this process.
This field only appears if you selected SSH in the Connect via area.
Solaris / RedHat Linux
Choose this option to specify that the device is installed on a Solaris or RedHat Linux operating system.
This field only appears if you selected SSH in the Connect via area.
User credentials above are for root user
Select this option to specify that the user name and password entered in the User Name and Password fields are the credentials for the Solaris root user.
If you clear this option, you must complete the Root Password field.
This field only appears if you selected SSH in the Connect via area.
Root Password
Type the root password for Solaris.
This field only appears if you selected SSH in the Connect via area.
High Availability
Select this option to configure High Availability for CMAs.
Important: AFA connects to the HA cluster using the active IP address, not the virtual IP address. You must configure access rules for each device in the cluster to allow this traffic.
This field only appears if you selected OPSEC in the Connect via area. It is not relevant for Check Point MDSM.
Secondary Security Management (SmartCenter)
Type the secondary CMA.
This field only appears if you selected OPSEC in the Connect via area. It is not relevant for Check Point MDSM.
If you choose SSH, you must enable AFA to analyze application control traffic logs. For more details, see Enable data collection via SSH. If you do not perform this step, then information related to application control traffic will not appear in the device report's Policy Optimization page.
This area only appears if you selected OPSEC in the Connect via area.
Check Point log server fields include the following:
Host (MLM)
Type the host name or IP address of the log server.
Username
Type the user name to use for SSH access to the log server.
Password
Type the password to use for SSH access to the log server.
Secure Platform
Choose this option to specify that the log server is installed on a Check Point SecurePlatform operating system.
You must complete the Expert Password field.
Expert Password
Type the expert password, which allows access to all the functions on the log server required for this process.
Solaris
Choose this option to specify that the log server is installed on a Solaris operating system.
User credentials above are for root user
Select this option to specify that the user name and password entered in the Username and Password fields are the credentials for the Solaris root user.
If you clear this option, you must complete the Root Password field.
Root Password
If you use a user other than "root" for accessing the Solaris OS, type the root password for Solaris.
Test Connectivity
Click this button to test connectivity to the defined log server.
A message informs you whether AFA connected to the log server successfully.
Check Point baseline configuration compliance fields include the following:
Host IP
Type the IP address of the device.
User Name
Type the user name to access the device.
Password
Type the password to access the device.
Platform
Select the device's platform.
This field only appears for Check Point devices.
Extra Password
Type the password to use for running OS commands on the device.
This field only appears for Check Point devices.
Baseline Profile
Select the baseline compliance profile to use.
The drop-down list includes all baseline compliance profiles in the system. For more information on baseline compliance profiles and instructions for adding new baseline compliance profiles, see Customizing Baseline Configuration Compliance Profiles (see Customize baseline configuration profiles).
To disable Baseline Compliance Report generation for this device, select None.
Test Connectivity
Click this button to test connectivity to the defined device.
A message informs you whether AFA connected to the device successfully.
AFA automatically identifies Check Point CloudGuard devices in one-armed mode, when the device has a single interface. If your device has multiple interfaces and one-armed mode is not identified automatically, configure this for your device manually.
Do the following:
On the AFA machine, access your device configuration meta file as follows:
/home/afa/.fa/firewalls/<device_name>/fwa.meta
where <device_name> is the name of the device listed. If you device is listed multiple times, enter the longer name.
On a new line, enter:
is_steering_device=yes
Run an analysis on the device to update the device data in AFA.