My old Lab - Back in the Day ..
Over three decades of Information Technology experience, specializing in High Performance Networks, Security Architecture, E-Commerce Engineering, Data Center Design, Implementation and Support
Strat Cloud Manager ( => move away from Panorama
Prisma Access (Global Protect)
Commits
General Protection
Remote User /On-Prem Protection
netstat -rn | wc -l
34" MDF
11" Cut to accomidate 12" Speakers
All Joints are glued for sealed
Terminal Caps
Rectangular Slotted port 1 15/16" Tall, 12 1/8" Wide and 13" Deep (approx 1.5 Cubic Feet Volume)
Decrease the width lower the base frequency
Key Features
1.5 ft³ cabinet
Slotted port design
3/4" MDF construction
All joints glued and caulked
Black carpet covering
buffer flow
x site scripting
sql injection
Checklist to Build Cluster
1. Checkpoint Version R81.20
2. Checkpoint JumboHotFix JHF65 (or latest Checkpoint GA)
3. Hostname
4. DNS/NTP
5. Routes /Static/OSPF/Default Route/Route distribution
6. Add to Infoblox or your DNS server
7. Interface Speed/Duplex
8. Integration with Cisco tacacs or Authentication Server
9. RSA Seed files if integration is needed for VPN
10. Serial Connection to Term Server
11. Monitoring
a. Add to SolarWinds
b. Add to Indeni
12. Configure Firewall backup on Indeni
13. Add to Firewall Management Servers
14. Apply Checkpoint License
15. Verify
a. Logs on Logger
b. Policy is applied with software blades IPS/Identity Awareness
16. Configure Out-of-band LOM
Special Configurations
1. Fix CP provided for the talk path issue
/opt/CPsuite-R81.20/fw1/boot/modules/
Vi fwkern.conf
fwmultik_dispatcher_in_tap_mode=1
2. The core 0 CPU fix
/opt/CPsuite-R81.20/fw1/boot/modules/
Vi fwkern.conf
fwmultik_sync_processing_enabled=0
Ref: https://support.checkpoint.com/results/sk/sk165853
a.
set ospf
set router-id 100.14.25.12
set ospf area 5 on
set ospf interface eth1-01 area 5 on
set ospf interface eth1-01 cost 1
set ospf interface eth1-01 priority 0
set ospf interface eth1-01 authtype md5 key 1 secret already_scrambled_FFBm4JO9gDBWc=_00000000000000000000000000000000000000000000000000
set ospf interface eth1-04 area 5 on
set ospf interface eth1-04 priority 0
set ospf interface eth1-04 passive on
set ospf area backbone off
[Expert@myfw101:0]# ip route get 216.18.76.16
216.18.76.16 via 10.114.255.11 dev eth1-01 src 10.113.255.14
[Expert@myfw101:0]#
fw ctl zdebug + drop | grep 216.18.76.16
@;20508118;[vs_0];[tid_30];[fw4_30];fw_log_drop_ex: Packet proto=17 216.18.76.16:53 -> 10.113.255.14:39926 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "fw-cluster Security" rule 19;
DNS Not active on Standby Cluster Member
fwha_forw_packet_to_not_active=1
Heres the SK in case you need it:
https://support.checkpoint.com/results/sk/sk43807
enabled_blades
fw stat
cpinfo -y all
In addition, if you would please upload a cpinfo from your gateway, as well as uploading a HCP report, this will help us to look for known issues in your environment
cpinfo -s 6-0003824777
hcp -r all --include-wts yes
Standby
nslookup google.com
tcpdump -nni any host 216.18.76.16
Active
tcpdump -nni any host 216.18.76.16 and host 10.14.55.14
set dns mode default
set dns suffix bcbsma.com
set dns primary 216.118.176.16
set dns secondary 10.115.1.11
set dns tertiary 10.23.210.23
[Expert@myfw101:0]#
142.250.65.238
tcpdump -nni any host 216.118.176.16 and host 10.114.255.14 | grep -i 'google'
fw monitor -F "10.114.255.14,0,216.118.176.16,0,0"
fw monitor -F "10.114.255.14,0,216.118.176.16,0,0" | grep -i 'google'
[Expert@myfw101:0]## cat /var/opt/fw.boot/modules/fwkern.conf
enhanced_ssl_inspection=1
bypass_on_enhanced_ssl_inspection=1
fwmultik_input_queue_len=4096
[Expert@myfw101:0]##
hcp -r all
[Expert@myfw101:0]# tcpdump -nni Sync host 216.18.76.16 and host 10.14.255.14 | grep -i 'google'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on Sync, link-type EN10MB (Ethernet), capture size 262144 bytes
15:07:27.015688 IP 10.14.255.14.40175 > 216.18.76.16.53: 8827+ A? google.com. (28)
15:07:34.015911 IP 10.14.255.14.40175 > 216.18.76.16.53: 8827+ A? google.com. (28)
15:07:41.016201 IP 10.14.255.14.40175 > 216.18.76.16.53: 8827+ A? google.com. (28)
^C1648 packets captured
1685 packets received by filter
0 packets dropped by kernel
[Expert@myfw101:0]##
[Expert@myfw101:0]## fw ctl get int fwha_cluster_hide_active_only
fwha_cluster_hide_active_only = 1
[Expert@myfw101:0]#
[Expert@myfw101:0]# fw ctl get int fwha_cluster_hide_active_only
fwha_cluster_hide_active_only = 1
---- Unique IP's Table ----
Member Interface IP-Address MAC-Address
-------------------------------------------------------------------------
(Local)
0 3 192.168.110.1 00:1c:ff:46:44:92
0 19 10.114.255.113 00:1c:ff:a3:44:1c
0 22 216.21.183.19 00:1c:ff:a3:44:1f
0 26 172.116.183.2 00:1c:ff:a3:44:4d
0 27 216.21.183.252 00:1c:ff:a3:44:4d
1 3 192.168.110.2 00:1c:ff:46:44:b0
1 19 10.114.255.114 00:1c:ff:a3:44:a8
1 22 216.21.183.20 00:1c:ff:a3:44:ab
1 26 172.116.83.3 00:1c:ff:a3:44:51
1 27 216.21.83.253 00:1c:ff:a3:44:51
-------------------------------------------------------------------------
[Expert@myfw]#
This change was successfully implemented and validated.
First Shell:
tcpdump -penni <external_interface> host <IP> and host <IP>
-s0 -w /var/log/TCPExternal.pcap
Second Shell:
tcpdump -penni <internal_interface> host <IP> and host <IP>
-s0 -w /var/log/TCPInternal.pcap
Third Shell:
fw monitor -F "0,0,<DST IP>,0,0" -F "<DST
IP>,0,0,0,0" -o
/var/log/<GW_name>_fw_monitor_bidirectional_traffic.pcap
Fourth Shell:
fw ctl zdebug + drop > traffic_drops.txt
Address: 192.168.0.1 11000000.10101000.00000000 .00000001
Netmask: 255.255.255.0 = 24 11111111.11111111.11111111 .00000000
Wildcard: 0.0.0.255 00000000.00000000.00000000 .11111111
=>
Network: 192.168.0.0/24 11000000.10101000.00000000 .00000000 (Class C)
Broadcast: 192.168.0.255 11000000.10101000.00000000 .11111111
HostMin: 192.168.0.1 11000000.10101000.00000000 .00000001
HostMax: 192.168.0.254 11000000.10101000.00000000 .11111110
Hosts/Net: 254 (Private Internet)
Given subnet show the last IP (broadcast) :
Be careful though what you feed as no proof-reading is done by the ipcalc :
[Expert@myfirewall]# cphaprob -l list
Built-in Devices:
Device Name: Interface Active Check
Current state: OK
Device Name: Recovery Delay
Current state: OK
Device Name: CoreXL Configuration
Current state: OK
Registered Devices:
Device Name: Fullsync
Registration number: 0
Timeout: none
Current state: OK
Time since last report: 1.31105e+06 sec
Device Name: Policy
Registration number: 1
Timeout: none
Current state: OK
Time since last report: 1.31105e+06 sec
Device Name: routed
Registration number: 2
Timeout: none
Current state: OK
Time since last report: 164.8 sec
Device Name: cxld
Registration number: 3
Timeout: 30 sec
Current state: OK
Time since last report: 102116 sec
Process Status: UP
Device Name: fwd
Registration number: 4
Timeout: 30 sec
Current state: OK
Time since last report: 102116 sec
Process Status: UP
Device Name: cphad
Registration number: 5
Timeout: 30 sec
Current state: OK
Time since last report: 4.1131e+06 sec
Process Status: UP
Device Name: VSX
Registration number: 6
Timeout: none
Current state: OK
Time since last report: 4.1131e+06 sec
Device Name: Init
Registration number: 7
Timeout: none
Current state: OK
Time since last report: 4.1131e+06 sec
Device Name: Local Probing
Registration number: 8
Timeout: none
Current state: OK
Time since last report: 185.2 sec
[Expert@myfirewall]#
FIXES
1. Set grub2 password
myfirewall01> set grub2-password
Enter new grub2 password:
Enter new grub2 password (again):
myfirewall01>
2. Update TRAC File
/var/opt/CPsuite-R81.20/fw/conf/trac_client_1.ttm
make a backup copy of file
)
:automatic_mep_topology (
:gateway (
:map (
:false (false)
:true (true)
:client_decide (false) [ change from Client_Decide to False]
)
:default (false) [ change from True to False]
)
)
3. Fix http2
Description:
Similar change was successfully implemented and tested on the lower region (TestVPN)
1. Disable HTTP2 Header Length on myfirewall01 and myfirewall02
To disable http2:
ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 IGNORE_ALPN_EXTENSION 1
cpstop;cpstart
To enable http2 again:
ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 IGNORE_ALPN_EXTENSION 0
cpstop;cpstart
No production impact, low risk.