CP R76SP.50 SecuritySystem AdminGuide PDF
CP R76SP.50 SecuritySystem AdminGuide PDF
60000/40000 SECURITY
SYSTEMS
R76SP.50
Administration Guide
Classification: [Protected]
CHAPTE R 1
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on 60000/40000
Security Systems R76SP.50 Administration Guide.
Revision History
Date Description
30 June 2019 Updated:
• Packet Drop Monitoring (asg_drop_monitor) (on page 205).
01 June 2019 Updated:
• Using the Fast Accelerator (on page 304).
• Configuring Alerts for SGM and Chassis Events (on page 164).
Added:
• Configuring Severity for an Event Alert (on page 167).
19 February 2019 Updated:
• Multiple Security Groups (on page 350).
18 February 2019 Added:
• Multiple Security Groups (on page 350).
Updated:
• IPS Cluster Failover Management (on page 374).
Date Description
08 January 2019 Updated:
• CMM Slot IDs (on page 378).
• Using the Fast Accelerator (on page 304).
• Changing the Management Interface (on page 38).
• Backup and Restore (on page 86).
• Port Mirroring (SPAN Port) (on page 93).
Added:
• ISP Redundancy (on page 42).
26 August 2018 • Updated the section title from "Destination-Based Routing" to "Route
Cache Optimization (on page 66)".
• Updated the command for Layer4 CoreXL (on page 334).
• General formatting updates.
09 August 2018 Updated:
• Synchronizing SGM Time (on page 83) - removed the reference to the
asg_ntp_update_time command, because it is not relevant
anymore.
26 July 2018 Added:
• Backup configuration instructions (on page 86).
• Disabling Port Mirroring instructions for Security Gateway.
Improved information about the blade-range (on page 92) command.
28 June 2018 Updated:
• General updates.
Added:
• Unified MAC for Data Ports (on page 348).
17 June 2018 Updated:
• General updates.
• Services and changed example for Port Forwarding on Management
Servers (on page 371).
Added:
• Example for Active/Standby (on page 230).
29 April 2018 Added:
• Using an Alias IP (on page 17).
10 April 2018 Updated:
• Known Limitations for MAGG (on page 255).
• Vendor recommendation for Switch configuration (on page 254).
Date Description
14 March 2018 Updated:
• Known Limitations for MAGG (on page 255).
• Commands for asymmetric traffic.
Added:
• Commands for Destination Based Routing (on page 67).
• Known Limitation for fastaccel (on page 304).
• Configuring Port Speed (on page 48).
• SNMP Virtual System Mode (on page 226).
21 January 2018 Added:
• Requirement of a license for SSM440 (on page 48).
17 January 2018 Updated:
• Supported fanouts (on page 48).
12 November 2017 Updated:
• SGM information (on page 387).
25 October 2017 Added:
• Configuring Non-IP Bridge in VSX mode (on page 31).
Updated:
• Configuring IPv6 Static Routes - CLI (set ipv6 static-route) (on
page 21)
• Working with Jumbo Frames (on page 323)
• Unique MAC Identifier Utility Options (on page 36)
• Destination-Based Routing (on page 66)
• Setting Blade-Range (on page 92)
• Known Limitations of asg diag Verification Tests (on page 170)
• Working with Management Aggregation (on page 255)
02 August 2017 Updated:
• Adding/Removing SSMs (on page 384).
25 June 2017 Updated:
• Validating Chassis ID (on page 390)
• Serial Over LAN Forwarding (on page 82)
23 April 2017 First release of this document.
Contents
Important Information................................................................................................... 3
Terms .......................................................................................................................... 12
Introduction ................................................................................................................. 16
Syntax Notation ....................................................................................................... 16
Licensing ................................................................................................................. 16
Managing the Network ................................................................................................ 17
Alias IP .................................................................................................................... 17
Adding and Removing an Alias IP in gClish ....................................................................18
Adding and Removing an Alias IP in SmartDashboard ...................................................19
Working with IPv6 ................................................................................................... 20
Enabling/Disabling IPv6 Support (ipv6-state) ................................................................20
Configuring IPv6 Static Routes - CLI (set ipv6 static-route) ...........................................21
Configuring the 6in4 Internet Transition Mechanism.............................................. 25
Working with Bridge Mode ...................................................................................... 27
Working with Chassis High Availability in Bridge Mode .................................................27
MAC tables ....................................................................................................................27
Special Advertisement Packets .....................................................................................28
Active/Active Bridge Mode .............................................................................................28
Working with Link State Propagation...................................................................... 33
Configuring a Unique MAC Identifier ....................................................................... 35
Unique MAC Identifier Utility Options ............................................................................36
Set Host Name With Unique MAC ..................................................................................36
Apply Unique MAC From Current Host Name ................................................................36
Revert to Unique MAC Factory Default ..........................................................................36
Manual Set Unique MAC ................................................................................................36
Configuring VLANs .................................................................................................. 37
Changing the Management Interface ...................................................................... 38
Working with ECMP ................................................................................................. 39
Enhanced Failover of ECMP Static Routes .....................................................................40
ISP Redundancy ...................................................................................................... 42
Working with the ARP Table (asg_arp) ................................................................... 44
Sample Output for Verbose Mode ..................................................................................45
Sample Output for Verifying MAC Addresses .................................................................45
Verifying ARP Entries ....................................................................................................45
Sample Output for Legacy Mode ....................................................................................46
Working with Proxy ARP for Manual NAT ............................................................... 47
Configuring Port Speed ........................................................................................... 48
Configuring SSM Port Speed .........................................................................................48
Management Port Speed Configuration .........................................................................51
Configuring Multicast Routing ................................................................................ 53
Multicast Restrictions....................................................................................................54
Multicast Acceleration ...................................................................................................54
Working with Routing Tables (asg_route)......................................................................55
Managing Scalable Platforms ..................................................................................... 69
Administration ........................................................................................................ 69
Working with Global Commands....................................................................................69
Check Point Global Commands ......................................................................................70
Global Commands Generated by CMM ...........................................................................74
General Global Commands ............................................................................................75
Serial Over LAN (sol) .....................................................................................................82
Synchronizing SGM Time......................................................................................... 83
Configuring SGMs (asg_blade_config) .................................................................... 84
Backup and Restore ................................................................................................ 86
Configuring SGM State (asg sgm_admin)................................................................ 87
Image Management................................................................................................. 89
Global Image Management ............................................................................................89
Image Management for Specified SGMs (g_snapshot) ...................................................91
Setting Blade-Range .....................................................................................................92
Port Mirroring (SPAN Port) ..................................................................................... 93
Configuring Port Mirroring on a Scalable Platform in Gateway Mode............................93
Configuring Port Mirroring on a Scalable Platform in VSX Mode ...................................95
Additional Port Mirroring Configuration Steps ..............................................................97
Security ................................................................................................................... 98
Resetting the Administrator Password ..........................................................................98
Generic Routing Encapsulation - GRE (asg_gre)............................................................98
Role Based Administration (RBA) ................................................................................101
RADIUS Authentication ................................................................................................102
Logging and Monitoring ............................................................................................ 109
CPView .................................................................................................................. 109
Overview of CPView .....................................................................................................109
Using CPView...............................................................................................................110
CPView User Interface .................................................................................................111
Network Monitoring .............................................................................................. 112
Monitoring Service Traffic (asg profile) .......................................................................112
Monitoring the Scalable Platform (asg_archive) .........................................................115
Working with Interface Status (asg if)..........................................................................117
Showing Bond Interfaces (asg_bond).................................................................... 121
Viewing a Global List of all Bonds (asg_bond) .............................................................121
Viewing a Specific Bond Interface (asg_bond -i) ..........................................................122
Bond Verification Test (asg_bond -v) ...........................................................................122
Setting the Minimum Number of Slaves in a Bond .......................................................122
Showing Traffic Information (asg_ifconfig) ..................................................................123
VPN Packet Tracking (bcstats) .............................................................................. 126
Monitoring VPN Tunnels ....................................................................................... 127
Showing SSM Traffic Statistics (asg_traffic_stats) ............................................... 128
Showing SGM Forwarding Statistics (asg_blade_stats) ........................................ 129
Traceroute (asg_tracert)....................................................................................... 130
Multi-blade Capture -tcpdump -mcap -view ......................................................... 130
Showing Multicast Traffic Information .................................................................. 132
Showing Multicast Routing (asg_mroute) ....................................................................132
Showing PIM Information (asg_pim) ............................................................................133
Showing IGMP Information (asg_igmp) .......................................................................135
Monitoring Management Interfaces Link State ..................................................... 138
Hardware Monitoring and Control ........................................................................ 139
Showing Chassis and Component States (asg stat)......................................................139
Global Operating System Commands ..........................................................................154
Monitoring SGM Resources (asg resource)..................................................................158
Searching for a Connection (asg search) .....................................................................160
Configuring Alerts for SGM and Chassis Events (asg alert) ......................................... 164
Creating or Changing an Alert for SGM and Chassis Events ........................................ 165
Configuring Severity for an Event Alert .......................................................................167
Alert Modes .................................................................................................................169
Collecting System Diagnostics (smo verifiers).............................................................171
Monitoring Hardware Components (asg hw_monitor) .................................................187
Chassis Control (asg_chassis_ctrl) .............................................................................191
Monitoring CPU Utilization (asg_cores_util) ................................................................193
Security Monitoring .....................................................................................................194
System Monitoring ................................................................................................ 209
Showing System Serial Numbers ................................................................................209
Redirecting Alerts and Logs to External syslog server (asg_syslog) ........................... 210
Log Server Distribution (asg_log_servers) ..................................................................213
Configuring a Dedicated Logging Port .........................................................................214
Command Auditing (asg log audit) ...............................................................................216
Showing the Scalable Platform Version (ver) ..............................................................217
Viewing the Audit Log File (show smo log auditlog) .....................................................218
Working with the Firewall Database Configuration (asg config) .................................. 219
Showing Software and Firmware Versions (asg_version)............................................ 220
Showing System Messages ..........................................................................................222
Viewing a Log File (asg log) .........................................................................................223
Monitoring Virtual Systems (cpha_vsx_util monitor) ...................................................225
Working with SNMP .....................................................................................................226
Working with Active/Standby High Availability.......................................................... 230
How Active/Standby Works ................................................................................... 230
Synchronizing Clusters on a Wide Area Network.........................................................231
Configuring Active/Standby High Availability ........................................................ 232
Setting Chassis Weights (Chassis High Availability Factors)........................................ 232
Setting the Chassis ID ..................................................................................................233
Setting the Quality Grade Differential ..........................................................................234
Setting the Failover Freeze Interval ............................................................................235
Advanced Features ............................................................................................... 236
Working with Link Preemption ....................................................................................236
Chassis High Availability - Sync Lost Mechanism ........................................................236
Managing Connection Synchronization (asg_sync_manager) ...................................... 237
Working with SyncXL............................................................................................. 240
Setting Admin DOWN on First Join........................................................................ 241
Configuring a Unique IP Address For Each Chassis (UIPC) ................................... 242
VSX Active/Active Layer 2 Mode ............................................................................ 244
Working with Link Aggregation (Interface Bonds) .................................................... 245
Configuring Link Aggregation ............................................................................... 246
Creating a New Bond and Adding Slave Interfaces ......................................................248
Setting a Bonding Mode ...............................................................................................248
Setting the Polling interval ..........................................................................................249
Setting a Bond Interface On or Off ...............................................................................250
Removing Slave Interfaces.................................................................................... 251
Deleting a Bond ..................................................................................................... 252
Working with the ABXOR Bonds ............................................................................ 253
Configuring ABXOR ......................................................................................................254
Working with Management Aggregation ............................................................... 255
Converting MAGG in VSX Mode ....................................................................................256
Working with Sync Bonds ...................................................................................... 258
Sync Lost .....................................................................................................................259
Connecting Physical Cables .........................................................................................259
Working with VSX ...................................................................................................... 260
Provisioning VSX ................................................................................................... 260
Configuring 64-bit Virtual System Support ..................................................................260
Creating a new VSX Gateway .......................................................................................261
Reconfigure (vsx_util reconfigure) ..............................................................................264
Working with VSLS ................................................................................................ 265
Activating Chassis VSLS ..............................................................................................265
Selecting the Active Chassis for a Virtual System ........................................................265
Virtual System Failover ...............................................................................................266
SGM Failover ...............................................................................................................266
Configuring the VSLS Primary Chassis ........................................................................266
Monitoring VSLS ..........................................................................................................268
Monitoring and Logging in VSX.............................................................................. 275
VSX Functionality .........................................................................................................275
Monitoring Hardware Utilization for VSX (hw_utilization) ............................................ 275
Monitoring VSX Memory Resources (vsxmstat) ...........................................................276
Monitoring VSX Configuration (vsx stat) ................................................................ 280
VSX Legacy Bridge Mode ....................................................................................... 285
Working with LTE Features ....................................................................................... 286
Enabling LTE Support ........................................................................................... 287
VPN Sticky SA ........................................................................................................ 288
Troubleshooting .................................................................................................... 289
Collecting System Information (asg_info)....................................................................289
Verifiers.......................................................................................................................293
Resetting SIC (g_cpconfig sic init) ...............................................................................298
Debug files ..................................................................................................................301
Configuring SCTP NAT on SGMs............................................................................ 302
System Optimization ................................................................................................. 303
Firewall Connections Table Size for VSX Gateway ................................................ 303
Using the Fast Accelerator (sim fastaccel) ........................................................... 304
Reserved Connections .......................................................................................... 307
Policy Acceleration - SecureXL Keep Connections ............................................... 310
VPN Performance Enhancements ......................................................................... 311
SPI Distribution ...........................................................................................................311
SPI Affinity (asg_spi_affinity) .......................................................................................311
VPN Templates (cphwd_offload_vpn_templates) ........................................................312
Using Third Party VPN Peers with Many External Interfaces ....................................... 313
SCTP Acceleration .......................................................................................................314
Configuring DNS Session Rate.....................................................................................315
Accelerated Drop Enhancement ..................................................................................318
Configuring Hyper-Threading ......................................................................................320
Configuring CoreXL (g_cpconfig) .................................................................................320
Working with Jumbo Frames .......................................................................................323
TCP MSS Adjustment ...................................................................................................326
Working with Session Control (asg_session_control) .................................................327
Acceleration Not Disabled Because of Traceroute Rule (asg_tmpl_special_svcs)331
Improving Inbound HTTPS Performance .............................................................. 332
Supported SSL Ciphers................................................................................................332
Layer 4 CoreXL Overview ...................................................................................... 333
Configuring Layer4 CoreXL (g_cpconfig) .....................................................................334
VSX Affinity Commands (fw ctl affinity-s -d) ................................................................335
Setting Affinities ..........................................................................................................335
Setting Affinities for all Virtual Systems (fw ctl affinity-s -d -fwkall) ........................... 337
Monitoring Process Affinity (fw ctl affinity -l -x) ..........................................................338
System Under Load ............................................................................................... 339
60000/40000 Security Platforms ............................................................................... 340
Single Management Object and Policies ............................................................... 340
Installing and Uninstalling Policies .............................................................................341
Working with Policies (asg policy) ...............................................................................341
SGM Policy Management ....................................................................................... 344
Synchronizing Policy and Configuration between SGMs ..............................................344
Understanding the Configuration File List ...................................................................344
MAC Addresses and Bit Conventions ...........................................................................346
MAC Address Resolver (asg_mac_resolver) ...............................................................348
Unified MAC for Data Ports ..........................................................................................348
Security Group ...................................................................................................... 349
Multiple Security Groups....................................................................................... 350
Description ..................................................................................................................350
Enabling Multiple Security Groups ..............................................................................351
Security Group ID ........................................................................................................351
Adding SGMs to a Security Group ................................................................................352
Removing SGMs from a Security Group .......................................................................352
Creating Another Security Group .................................................................................352
Working with a Shared VLAN Trunk Interface .............................................................353
Global Configuration....................................................................................................355
Viewing the Configuration............................................................................................355
Deleting a Security Group ............................................................................................356
Disabling Multiple Security Groups .............................................................................357
Working with the Distribution Mode ...................................................................... 358
Automatic Distribution Configuration (Auto-Topology) ................................................358
Manual Distribution Configuration (Manual-General) ..................................................360
Setting and Showing the Distribution Configuration ....................................................360
Configuring the Interface Distribution Mode (set distribution interface) ..................... 361
Configuring Distribution Matrix Maximal Size (set distribution matrix-max-size) ....... 362
Showing Distribution Status (show distribution status) ...............................................363
Running a Verification Test (show distribution verification) ......................................... 364
Configuring the Layer 4 Distribution Mode and Masks (set distribution l4-mode) ....... 365
NAT and the Correction Layer on a Scalable Platform ......................................... 367
NAT and the Correction Layer on a VSX Gateway .................................................. 368
Working with the GARP Chunk Mechanism ........................................................... 369
Port Forwarding on Management Servers ............................................................ 371
Threat Emulation .................................................................................................. 372
IPS Bypass Under Load ......................................................................................... 373
IPS Cluster Failover Management ........................................................................ 374
Optimizing IPS (asg_ips_enhance) ........................................................................ 375
Advanced Hardware Configuration ........................................................................... 376
Chassis Management Module (CMM) CLI .............................................................. 376
CMM Commands..........................................................................................................377
Security Switch Module (SSM) .....................................................................................380
Security Gateway Modules .................................................................................... 387
Identifying SGMs in the Chassis (asg_detection) .........................................................387
Software Blades Update Verification (asg_swb_update_verifier) ................................ 388
Replacing Hardware Components............................................................................. 390
Replacing the CMM ............................................................................................... 390
Adding or Replacing an SGM ................................................................................. 393
Using Snapshot to Add a New or Replacement SGM ....................................................393
Installing a New SGM Using a CD/DVD.........................................................................397
Mounting and Dismounting a USB Disk........................................................................398
Cluster
Terms
1. Two or more Security Gateways that work
together in a redundant configuration - High
Availability or Load Sharing.
Active/Standby Mode 2. In a virtualized environment - a set of
See High Availability Mode. VMware ESX/i hosts used for High Availability
or Load Sharing.
Administrator
Cluster Member
A SmartDashboard or SmartDomain
Manager user with permissions to manage A Security Gateway that is part of a cluster.
Check Point security products and the
ClusterXL
network environment.
Cluster of Check Point Security Gateways
Affinity that work together in a redundant
The assignment of a specified CoreXL configuration.
Firewall instance, VSX Virtual System, These Check Point Security Gateways are
interface, user space process, or IRQ to one installed on Gaia OS, SecurePlatform OS,
or more specified CPU cores. X-Series XOS, IPSO OS, or Windows OS:
VLAN Trunk
A connection between two switches that
contains multiple VLANs.
VPN
Virtual Private Network. A secure, encrypted
connection between networks and remote
clients on a public infrastructure, to give
authenticated remote users and sites
secured access to an organization's network
and resources.
VSX
Virtual System Extension. Check Point virtual
networking solution, hosted on a computer
or cluster with virtual abstractions of Check
Point Security Gateways and other network
devices. These Virtual Devices provide the
same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual
networks, including all Virtual Devices that
provide the functionality of physical network
devices. It holds at least one Virtual System,
which is called VS0.
Warp Link
An interface between a Virtual System and a
Virtual Switch or Virtual Router that is
created automatically in a VSX topology.
CHAPTE R 2
Introduction
In This Section:
Syntax Notation .............................................................................................................16
Licensing .......................................................................................................................16
Introducing the Check Point Scalable Platform, the world's fastest Threat Prevention platforms.
The carrier-class next generation Threat Prevention and Firewall solutions, provide the security
you need today and into the future.
Already supporting fast networking connectivity such as 40 GbE and 100 GbE, the 64000 and 44000
can be integrated with new and advanced solutions, both on premises or in the cloud.
These scalable platforms enable you to continue to grow your business, so when traffic volume or
security requirements increase, you can easily scale up the system capacity.
Welcome to the future of Cyber Security!
Syntax Notation
This table shows the syntax characters.
Licensing
For information on how to monitor and administer licenses, see the License section of the R76
Gaia Administration Guide http://downloads.checkpoint.com/dc/download.htm?ID=22928.
Run all licensing commands in Global Clish.
Alias IP
If you have traffic going to different IP addresses, you can use Alias IP to direct that traffic to one
single interface. Use the commands below to add and delete any of those IP addresses. This
enables any packet you generate from different routers, or from different IP addresses, to be
directed to the same interface. The maximum number of IP addresses that you can add to one
interface is 256.
You can add secondary IP addresses (aliases) to physical interfaces, VLANs, and Bonds.
Alias IP is also referred to as Secondary IP.
Example:
gclish -c "add interface eth1-01 alias 172.16.16.14/24"
gclish -c "add interface eth1-01 alias 172.16.16.15/24"
gclish -c "add interface eth1-01 alias 172.16.16.16/24"
1_01:
Aliases
eth1-01:1 172.16.16.14/24
eth1-01:2 172.16.16.15/24
eth1-01:3 172.16.16.16/24
To remove an alias:
> delete interface <interface> alias <interface>:<alias_id>
Example:
gclish -c "delete interface eth1-01 alias eth1-01:2" // removing alias
172.16.16.15/24
Note - The Alias IDs do not change for the rest of the Aliases.
On-screen commands:
[Global] MyChassis-ch01-01 > set ipv6-state on
1_01:
In order to fully enable IPv6, you also need to reboot.
The changces will be applied after reboot. This step is mandatory.
1_02:
In order to fully enable IPv6, you also need to reboot.
The changes will be applied after reboot. This step is mandatory.
1_03:
In order to fully enable IPv6, you also need to reboot.
The changes will be applied after reboot. This step is mandatory.
Syntax
> set ipv6-state {on | off}
> show ipv6-state
Parameters
Parameter Description
on Enables IPv6 support
off Disables IPv6 support
Syntax
> set ipv6 static-route <source_ip> nexthop gateway <gw_ip> [priority <p_val>] {on
| off} [interface <gw_if> [priority <p_val>]] on
> set ipv6 static-route <source_ip> nexthop [<gw_ip>] {blackhole | reject | off}
Parameters
Parameter Description
gateway Defines the next hop path.
Parameter Description
priority Assigns a path priority when there are many different paths. The available
path with the lowest priority value is selected. The gateway with the lowest
priority value is selected.
interface Identifies the next hop gateway by the interface that connects to it. Use this
option only if the next hop gateway has an unnumbered interface.
<p_val> Priority value for a route or interface. Valid values are integers between 1 and
8. Default = 1
Note - There are no add or show commands for the static route feature.
Troubleshooting:
Symptoms:
• You cannot configure the VPN Software Blade.
• This message shows: VPN blade demands gateway's IP address corresponding to
the interface's IP addresses
Cause:
IPv6 is active, but the main IPv6 address is not configured.
Solution:
Configure the main IPv6 address in General Properties.
Example output:
Codes: C - Connected, S - Static, B - BGP, Rg - RIPng, A - Aggregate,
O - OSPFv3 IntraArea (IA - InterArea, E - External),
K - Kernel Remnant, H - Hidden, P - Suppressed
Parameters
Parameter Description
<dest_ip> Destination IPv6 address.
<gw_ip> Next hop gateway IPv6 address.
<gw_if> Next hope gateway interface name.
Examples:
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 on
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 interface eth3
on
Parameters
Parameter Description
<dest_ip> Destination IP address.
<gw_ip> Next hop gateway IP address.
<p_val> Integer between 1 and 8, default is 1.
Run this command for each path and assign a priority value to each. Two or more paths can have
the same priority. This creates a backup path with the same priority.
Example:
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 priority 3 on
Parameters
Parameter Description
<dest_ip> Destination IP address
<mess_option> Message option - Drop packet sends one of these message:
• Reject - Drops packets and sends an error message to the traffic source.
• Blackhole - Drops packets but does not send an error message.
Examples:
> set ipv6 static-route 3100:192::0/64 nexthop reject
> set ipv6 static-route 3100:192::0/64 nexthop blackhole
Example:
> set ipv6 static-route 3100:192::0/64 off
Parameters
Parameter Description
<dest_ip> Destination IP address
<gw_ip> Next hop gateway IP address or interface name.
Example:
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 off
Parameters
Parameter Description
<physical_if> From where the physical interface traffic leaves the system.
Example: eth1-01
<6in4_id> A numerical identifier for the 6in4 virtual interface.
<ttl> Time-to-live - The number of router hops before packets are discarded
Example:
> add interface eth1-01 6in4 999 remote 50.50.50.10
1_01:
Success
The virtual sit_6in4_ interface is created for eth1-01 on all SGMs even though you specified a
single physical interface, eth1-01 in the command line.
To see the virtual interfaces for each SGM, run: show interface eth1-01 6in4s
Parameters
Parameter Description
<ipv6_address> IPv6 address
Example:
> set interface sit_6in4_999 ipv6-address 30:30:30::1 mask-length 64
1_01:
Success
Example:
> delete interface eth1-01 6in4 999
1_01:
success
Limitations:
• Bridge Mode is only supported with two interfaces.
• BPDU forwarding is not supported with VLAN tagging (on page 31).
• The Scalable Platform does not generate BPDU (STP) frames.
• The Scalable Platform forwards BPDUs between bridge slave interfaces.
• Bridge group must use an IP address on the same subnet as clients or routers that connect to
the Scalable Platform. This lets UserCheck work properly.
• Bridge setup supports only the manual-general distribution mode.
MAC tables
The OS table is not synchronized across SGMs. The firewall table is synchronized across SGMs.
To show the OS MAC table:
In Expert Mode, run:
# brctl showmacs <bridge_name>
To show the Firewall MAC table:
In Clish, run:
> fw tab –t fdb_shadow
BPDU
Description
The BDPU maximum age timer controls the maximum length of time that passes before a bridge
port saves its configuration BPDU information. The default time is set to 20 seconds, the time it
takes to reach failover. It can be configured between 6-40 seconds.
For example, on Cisco switches use spanning-tree vlan on each VLAN to configure the BDPU
maximum age timer.
Syntax
> spanning-tree vlan <vlan_id> max-age <age>
Parameters
Parameter Description
<vlan_id> VLAN ID
<age> BDPU maximum age in seconds
Allowed values: 6-40
Syntax
> add bridging group <group_id> interface <if_name>
> delete bridging group <group_id> interface <if_name>
> show bridging group <group_id>
Parameters
Parameter Description
<group_id> Integer that identifies the bridging group.
<if_name> Interface name as configured on the system.
Example
> add bridging group 2 interface eth1-03
> show bridging group 2
Bridge Configuration
Bridge Interfaces
eth1-03
Item Description
1 LSP Port Group (full syntax)
2 Interface Group
<if> Physical Interface
Example 1:
eth1-01+eth2-01,eth3-01+eth4-01
In this example, the LSP Port Group has two interface groups with two interfaces:
• Interface Group 1 contains eth1-01 and eth2-01
• Interface Group 2 contains eth3-01 and eth4-01
Example 2:
eth1-02+eth1-03+eth1-04+eth1-05,eth3-02+eth4-02,eth3-03+eth4-03
In this example, the LSP port Group has three interface groups.
One group with four interfaces and two other groups with two interfaces each.
Note - You must reboot the system to apply the new Unique MAC Identifier.
This creates a new host name with a Unique MAC Identifier of 22. The setup number replaces the
Unique MAC Identifier default value of 254.
After reboot, all data interface MAC addresses have the new Unique MAC Identifier value 16.
Example:
eth1-01 00:1C:7F:XY:ZW:16
Note - The last octet for eth1-01 (shown in bold) is 16 hex (22 decimal).
Configuring VLANs
Description
Use these commands to configure VLANs. These commands do not work in a VSX environment.
Syntax
> add interface <if_name> vlan <vlan_id>
> set interface <if_name>.<vlan_id> ip-address <ip_addr> mask-length <mask-len>
> delete interface <if_name> vlan <vlan_id>
Parameters
Parameter Description
<if_name> Name of the physical interface
<vlan_id> VLAN ID number
<ip_addr> VLAN IPv4 or IPv6 address
<mask-len> Network mask length
Parameters
Parameter Description
<new_mng_if> Name of the new management interface
For example: eth1-Mgmt3
<old_mng_if> Name of the existing management interface to be changed or
deleted. For example: eth1-Mgmt2.
<ip> Interface IPv4 address
<length> Interface net mask
Syntax
> set static-route <network> nexthop gateway address <gw_ip> on
Parameters
Parameter Description
<network> IP address of the destination network
Example:
> set static-route 50.50.50.0/24 nexthop gateway address 20.20.20.101 on
> set static-route 50.50.50.0/24 nexthop gateway address 20.20.20.102 on
> set static-route 50.50.50.0/24 nexthop gateway address 20.20.20.103 on
Notes:
• To get to addresses on the 50.50.50.0/24 network, packets must first be forwarded to one of
these gateways:
• 20.20.20.101
• 20.20.20.102
• 20.20.20.103
• To confirm that static routes to the next-hop gateways are being enforced:
Run:
> show route static
Example output that shows that the static route to 50.50.50.0/24 is through three next-hop
gateways:
1_01:
Codes: C - Connected, S - Static, R - RIP, B - BGP,O - OSPF IntraArea (IA -
InterArea, E - External, N - NSSA)A - Aggregate, K - Kernel Remnant, H - Hidden,
P - Suppressed
Note - You can configure enhanced ECMP failover after you configure an ECMP static route.
Parameters
Parameter Description
<network> IP address of the destination network.
<subnet_len> Subnet length of the destination network.
Parameters
Parameter Description
count <val> Number of packets to be sent before next hop is declared dead.
Example 2 - Enable failover ECMP on all static routes configured for destination 5.5.5.0/24
> set static-route 5.5.5.0/24 ping on
When 10.33.85.2 is reached, tcpdump shows that it replies to the ping requests, and it is re-added
to the routing table:
[Expert@MyChassis-ch02-01]# tcpdump -nepi eth1-01 host 10.33.85.2
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1-01, link-type EN10MB (Ethernet), capture size 96 bytes
14:38:08.388224 00:1c:7f:a1:01:55 > 00:50:56:a7:7f:f5, ethertype IPv4 (0x0800), length 62: 10.33.85.1
>10.33.85.2: ICMP echo request, id 53007, seq 43981, length 28
14:38:08.388462 00:50:fc:58:80:0a > 00:1c:7f:0f:00:fe, ethertype IPv4 (0x0800), length 62: 10.33.85.2
>10.33.85.1: ICMP echo reply, id 53007, seq 43981, length 28
14:38:18.387762 00:1c:7f:a1:01:55 > 00:50:56:a7:7f:f5, ethertype IPv4 (0x0800), length 62: 10.33.85.1
>10.33.85.2: ICMP echo request, id 53007, seq 43981, length 28
14:38:18.387980 00:50:fc:58:80:0a > 00:1c:7f:0f:00:fe, ethertype IPv4 (0x0800), length 62: 10.33.85.2
>10.33.85.1: ICMP echo reply, id 53007, seq 43981, length 28
14:38:28.388161 00:1c:7f:a1:01:55 > 00:50:56:a7:7f:f5, ethertype IPv4 (0x0800), length 62: 10.33.85.1
>10.33.85.2: ICMP echo request, id 53007, seq 43981, length 28
14:38:28.388382 00:50:fc:58:80:0a > 00:1c:7f:0f:00:fe, ethertype IPv4 (0x0800), length 62: 10.33.85.2
>10.33.85.1: ICMP echo reply, id 53007, seq 43981, length 28
Validation:
1. In gClish, run:
> show route
Make sure that only ECMP static routes with reachable next hops show.
2. Run:
tcpdump
Note - Make sure the ping is on. Every few seconds there must be a ping request on the interface
with the static route.
ISP Redundancy
Background
ISP Redundancy feature ensures reliable outbound Internet connectivity for a Scalable Platform. It
enables connection through redundant ISP Links.
Prerequisites
• To support ISP Redundancy in R76SP.50, you must install R76SP.50 Jumbo Hotfix Accumulator
Take 105 and above on your Scalable Platform. See sk117633
http://supportcontent.checkpoint.com/solutions?id=sk117633.
Note - These Takes of the R76SP.50 Jumbo Hotfix Accumulator support from two to ten ISP
Links.
• To configure from three to ten ISP Links, you must:
• Manage your R76SP.50 Scalable Platform with the R80.10 Management Server, and
• Install the required hotfix on this R80.10 Management Server from sk140512
http://supportcontent.checkpoint.com/solutions?id=sk140512
Parameters
Parameter Description
full Verifies each SGM. Default is only for MISP masters.
routing Verifies default route installed in the routing table.
Known Limitations
See sk140512 http://supportcontent.checkpoint.com/solutions?id=sk140512.
Syntax
# asg_arp -h
# asg_arp [-b <SGM_IDs>] [-v] [--verify] [-i <if>] [-m <mac>] [<hostname>]
# asg_arp --legacy
Parameters
Parameter Description
-h Shows the command syntax and help information
-v Verbose mode that shows detailed SGM cache information
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-i <if> Shows the ARP cache for the specified interface
-m <mac> Shows the ARP cache for the specified MAC address
<hostname> Shows the ARP cache for the specified host name
--verify Runs MAC address verification on both Chassis and shows the results
--legacy Shows the ARP cache for each SGM in the legacy format
You can show the magic attribute within type ethX-YZ interfaces with the ifconfig command:
# ifconfig eth1-01
eth1-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:16
inet6 addr: fe80::21c:7fff:fe81:116/64 Scope:Link
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:154820 errors:0 dropped:0 overruns:0 frame:0
TX packets:23134 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0 RX bytes:15965660 (15.2 MiB)
TX bytes:2003398 (1.9 MiB)
Verification:
To make sure that all the entries in the local.arp file are applied correctly on the system, run:
# asg_local_arp_verifier
To compare the entries manually, run:
# g_fw ctl arp
Syntax
> set interface <ifn> link-speed <speed>
For more information, see the R76SP.50 Scalable Platforms Gaia Administration Guide
https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/html_frameset.htm -
Chapter Network Management - Section Network Interfaces.
Parameters
Parameter Description
<ifn> Interface name with the ethX-YZ format
Example: eth1-01
<speed> Interface speed:
• auto - Automatically selected based on the hardware
detected
• 1G - 1 Gbit/second
• 10G - 10 Gbit/second
Example
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > set interface eth1-01 link-speed 1G
1_01:
success
Syntax
> set ssm id <ssm_id> qsfp-ports-mode <qsfp_mode>
Parameters
Parameter Description
<ssm_id> SSM identification number.
<qsfp_mode> Specifies the QSFP ports mode.
For SSM160:
• 4x10G
Ports 9-16 work in 10G mode
• 40G
Ports 9,13 work in 40G mode
For SSM440:
• 2x100G_4x40G
Ports 9,13,17,21 work in 40G mode
Ports 25,33 work in 100G mode
• 6x40G
Ports 9,13,17,21,25,33 work in 40G mode
• 32x10G
Ports 9-40 work in 10G mode
• 2x100G_16x10G
Ports 9-24 work in 10G mode
Ports 25,33 work in 100G mode
Example
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > set ssm id 2 qsfp-ports-mode 2x100G_16x10G
You are about to perform SSM QSFP ports mode configuration on SSM: 2 on blades: all
Syntax
> show smo verifiers print name Port_Speed
Example
> show smo verifiers print name Port_Speed
==============================
Port Speed:
==============================
+--------------------------------------------------------------------+
|Port speed verifier |
+---------------+-------------+-------------+-------------+----------+
|Interface |DB |Chassis1 |Chassis2 |Result |
+---------------+-------------+-------------+-------------+----------+
|eth1-01 |10G |10G |10G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-02 |10G |10G |10G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-03 |10G |10G |10G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-04 |10G |10G |10G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-05 |10G |10G |10G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-06 |10G |10G |10G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-07 |10G |10G |10G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-09 |40G |40G |40G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-10 |auto |auto |auto |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-11 |auto |auto |auto |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-12 |auto |auto |auto |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-13 |40G |40G |40G |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-14 |auto |auto |auto |OK |
+---------------+-------------+-------------+-------------+----------+
|eth1-15 |auto |auto |auto |OK |
+---------------+-------------+-------------+-------------+----------+
-------------------------------------------------------------------------------
| Tests Status |
-------------------------------------------------------------------------------
| ID | Title | Result | Reason |
-------------------------------------------------------------------------------
| Networking |
-------------------------------------------------------------------------------
| 39 | Port Speed | Passed | |
-------------------------------------------------------------------------------
| Tests Summary |
-------------------------------------------------------------------------------
| Passed: 1/1 test |
| Setting MOTD... |
| Output file: /var/log/verifier_sum.39.2017-03-26_18-21-32.txt |
Parameters
Parameter Description
<port> In SSM160 use:
1/5/3 for ethX-Mgmt3
1/5/4 for ethX-Mgmt4
In SSM440 use:
1/6/1 for ethX-Mgmt3
1/6/2 for ethX-Mgmt4
<speed> Speed in Mbps
Valid values:
10000 (only on SSM440)
1000
100
Example
> T-HUB4# config
Entering configuration mode terminal
---T-HUB4(config)# port 1/5/4
T-HUB4(config-port-1/5/4)# speed 100
T-HUB4(config-port-1/5/4)# commit
Commit complete.
T-HUB4(config-port-1/5/4)# end
============================================================================
Ethernet Interface
============================================================================
Interface : 1/5/4
Description :
Admin State : up Port State : up
Config Duplex : auto Operational Duplex : full
Config Speed : 100 Operational Speed(Mbps) : 100
-------------------------------------------------------------------------------
Flow Control : disabled
Dual Port : No Active Link : RJ45
-------------------------------------------------------------------------------
Default VLAN : 1 MTU[Bytes] : 1544
MAC Learning :
LAG ID : N/A
============================================================================
T-HUB4#
To change the PIM Multicast Routing Mode between dense and sparse:
1. For each applicable interface, run:
> set pim interface <if_name> off
2. For Dense Mode, run:
> set pim mode dense
For Spare Mode. run:
> set pim mode sparse
3. For each applicable interface, run:
> set pim interface <if_name> on
Important - You must use this procedure to change the mode. Failure to do so can cause
unexpected behavior.
Validation:
Run:
> show pim interfaces
Example:
> set pim interface eth1-01 on
1_01:
success
> set pim interface eth1-02 on
1_01:
success
> set pim interface eth2-01 on
1_01:
success
> set pim mode dense
1_01:
success
> show pim interfaces
1_01:
Status flag: V - virtual address option enabled
Mode flag: SR - state refresh enabled
Interface Status State Mode DR Address DR Pri NumNbrs
eth2-01 Up DR dense 2.2.2.10 1 0
eth1-01 Up DR dense 12.12.12.10 1 0
eth1-02 Up DR dense 22.22.22.10 1 0
Multicast Restrictions
Multicast access restrictions can be defined on each interface to allow or block multicast groups.
Configuration:
In SmartDashboard edit the Gateway Properties > Topology > Add or Edit interface > Multicast
Restrictions tab.
Field Description
Drop multicast packets whose Specifies that outgoing packets from this interface to the
destination is in the list listed multicast destinations are dropped
Drop all multicast packets Specifies that outgoing packets from this interface to all
except those whose destination multicast destinations except those listed, are dropped
is in the list
Multicast Acceleration
Multicast Acceleration allows SecureXL to accelerate multicast flow in fan-out scenarios as well.
Configuration:
Multicast Acceleration is enabled by default. Use these commands to enable or disable it:
> sim feature mcast_route_v2 {on|off}
> fwaccel off
> fwaccel on
Limitations:
Multicast Acceleration supports IPv4 only.
Example:
This example disables the feature.
> sim feature mcast_route_v2 off
-*- 4 blades: 1_01 1_02 1_03 1_04 -*-
Feature will be disabled the next time acceleration is started/restarted
> fwaccel on
-*- 4 blades: 1_01 1_02 1_03 1_04 -*-
SecureXL device is enabled.
Run a summary report to see the number of routes in different categories and protocols. The
summary report confirms that the routing information is the same on all SGMs.
Basic Syntax
Syntax
> asg_route -h
> asg_route -v
> asg_route [-a] [-b <SGM_IDs>] [-6] [-vs <VS_IDs>] --inactive [<filter>]
> asg_route [-a] [-b <SGM_IDs>] [-6] [-vs <VS_IDs>] --comp_os_db
Parameters
Parameter Description
-h Shows the command syntax, help information and examples.
-v Collects route information from all SGMs, and saves it to a file at:
/var/log/asg_route/all_routes
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-6 Shows IPv6 routes only (default shows IPv4 routes only).
-a Shows all SGMs, including those that are in the Admin DOWN state.
--vs <VS_IDs> Shows the routing table only for the specified Virtual Systems.
<VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
Note - You can put many basic options together on one line, but you can use only one
advanced_filter option.
Example 1:
This example shows a simple filter for one SGM. The route type is a one letter code in the left
column and the route type codes are at the end of the list.
> asg_route -b 1_01
Collecting routing information, may take few seconds...
==============================================================================
Routes:
C 127.0.0.0/8 is directly connected, lo
C 130.0.0.0/24 is directly connected, eth1-CIN
C 172.23.9.0/24 is directly connected, eth1-Mgmt4
C 192.0.2.0/24 is directly connected, Sync
S 0.0.0.0/0 via 172.23.9.4, eth1-Mgmt4, cost 0
Example 2:
This example shows a complex SGM filter that includes 4 SGMs. The results show route
inconsistencies between the Scalable Platform and the operating system.
> asg_route -b 1_1,2_1-2_3
Collecting routing information, may take few seconds...
==============================================================================
-------------------------------------------------------
Status: DB Routes info is NOT identical on all SGMs
OS Routes info is NOT identical on all SGMs
-------------------------------------------------------
Inconsistent DB Routes:
1_01:
-
2_01:
R 10.33.96.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
R 15.0.2.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
60000/40000 Security Systems Administration Guide R76SP.50 | 57
Managing the Network
2_02:
-
2_03:
R 10.33.96.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
R 15.0.2.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
Example:
> asg_route --summary
Collecting routing information, may take few seconds...
OSPF interfaces -
-*- 6 blades: 1_02 1_03 1_04 2_01 2_02 2_03 -*-
Name IP Address Area ID State DR Interface BDR Interface
bond1.34 192.168.34.86 0.0.0.86 DR 192.168.34.86 0.0.0.0
bond2.163 10.33.87.1 0.0.0.91 BDR 10.33.87.88 10.33.87.1
Status: OK
==============================================================================
OSPF neighbors -
-*- 6 blades: 1_02 1_03 1_04 2_01 2_02 2_03 -*-
Neighbor Pri State Address Interface
10.33.87.88 1 FULL/DR 10.33.87.88 10.33.87.1
Status: OK
==============================================================================
BGP peers -
-*- 1 blade: 1_02 (DR Manager) -*-
PeerID AS State ActRts Routes InUpds OutUpds Uptime
192.168.33.96 86 Active 0 0 0 0 00:00:00
Status: OK
==============================================================================
-------------------------------------------------------
Status: DB Summary info is NOT identical on all SGMs
OS Summary info is identical on all SGMs
-------------------------------------------------------
-------------------------------------------------------
Identical OS Summary: (649 records)
Example:
> asg_route --compare-os-db
Collecting routing information, may take few seconds...
==============================================================================
Each Advanced Filter has many different parameters. You can use the filter to show a precisely
filtered route list.
Parameters
<dyn_route_par> Description
ospf Shows OSPF interfaces and neighbors
rip Shows RIP interfaces and neighbors
bgp Shows BGP peers
Syntax
> asg_route [<basic_options>] -r | --route <adv_par>
Parameters
<adv_par> Description
aggregate Shows active aggregate routes
bgp Shows BGP peers
destination <ip_addr> Shows routes to the specified destination
direct Shows directly connected routes
Syntax
> asg_route [<basic_options>] -i | --inactive <inact_route_par>
Parameters
<inact_route_par> Description
aggregate Shows active aggregate routes
bgp Shows BGP routes
direct Shows directly connected routes
ospf Shows routes received from OSPF
static Shows static routes
rip Shows RIP Routes
all Shows all routes (including inactive routes)
===============================================================================
Fetching Routes info from SGMs:
1_01
Routes:
B 10.33.88.0/24 via 192.168.34.33, bond1.34, cost -1
B 10.33.94.0/24 via 192.168.33.94, bond1.33, cost -1
B 10.34.94.0/24 via 192.168.34.94, bond1.34, cost -1
-------------------------------------------------------
==============================================================================
=
Status: OK
Routes:
O H i 10.33.87.0/24 is an unusable route
O H i 192.168.33.0/24 is an unusable route
O H i 192.168.34.0/24 is an unusable route
O E i 194.29.40.138/32 via 10.33.87.88, bond2.163, cost 2:0
-------------------------------------------------------
===============================================================================
Note - Do not use -v with an advanced filter. Otherwise, the command ignores the advanced filter
and shows all the routes.
Dynamic Routing
When you enable Dynamic Routing, one SGM becomes the dynamic routing peer and is called the
Dynamic Routing Manager (DR Manager). The DR Manager communicates with its dynamic
routing peers and updates the dynamic routing information on the SGMs. Before an SGM goes to
the UP state, it updates its dynamic routing information with the information it receives from the
DR Manager.
There are Unicast Routing packets and Multicast Routing packets. The SSM sends dynamic
routing packets to an arbitrary SGM based on the distribution decision of the SSM. The DR
Manager does not necessarily make the distribution decision. If the SGM is not the DR Manager,
the packets are forwarded to the DR Manager.
Unicast Routing
When an SGM that is not the DR Manager gets unicast IP routing packets, the SGM forwards them
to the DR Manager. Use asg_route to run Unicast Routing.
Multicast Routing
When the SGM gets Multicast Routing packets, the SGM forwards them to each of the SGMs. Each
SGM handles its own packets. Use asg_pim, asg_pim_neighbors, and asg_igmp to run
Multicast Routing.
Chassis ID: 2
-------------
Task (Task ID) SGM ID
UIPC (5) 1
General (1) 2
LACP (2) 3
CH Monitor (3) 4
Prerequisites
• If you use a Virtual System only for connectivity between Virtual Systems with Per Virtual
System High Availability or VSLS, you must connect an interface to the Virtual System. See
sk36980 http://supportcontent.checkpoint.com/solutions?id=sk36980 for details.
• Make sure the router ID is the same for all SGMs, but unique for each Virtual System in the
network.
• Make sure the OSPF configuration is the same on all SGMs.
Enabling and Disabling OSPFv2 Multiple Instances
Make sure the default OSPF instance is configured on at least one interface:
> set ospf ospf-instance default on
> set ospf ospf-instance default area backbone on
> set ospf ospf-instance default interface <interface_name> area backbone on
You can use routemaps for route redistribution between instances. You can use the same
procedure as redistribution between protocols.
Monitoring
Example output:
OSPF instance default:
Name IP Address Area ID State NC DR Interface BDR Interface Errors
eth3.19 10.99.12.100 0.0.0.0 DR 0 10.99.12.100 0.0.0.0
30649
OSPF instance 1:
Name IP Address Area ID State NC DR Interface BDR Interface Errors
eth5.2011 10.95.0.161 0.0.0.0 BDR 1 10.95.0.164 10.95.0.161 8434
eth1 10.99.12.70 0.0.0.0 BDR 1 10.99.12.67 10.99.12.70 5
eth3.25 10.99.26.1 0.0.0.0 DR 1 10.99.26.1 10.99.26.2 471
eth5.29 10.99.26.130 0.0.0.0 BDR 1 10.99.26.133 10.99.26.130 0
Example output:
> show ospf ospf-instance 1 neighbors
OSPF instance 1
Neighbor state flag: G - graceful restart
Instance Neighbor ID Pri State Dead Address Interface Errors
1 1.1.201.201 252 FULL/DR 33 10.95.0.164 10.95.0.161 0
1 1.1.11.11 1 FULL/DR 33 10.99.12.67 10.99.12.70 5
1 10.99.26.2 1 FULL/BDR 35 10.99.26.2 10.99.26.1 0
1 165.10.10.57 1 FULL/DR 39 10.99.26.133 10.99.26.130 0
Known Limitations
• OSPF Multiple Instances are not supported with IPv6.
• There is only one Router-ID for the entire Security Gateway/Virtual System.
• Up to 12 OSPF instances are supported.
• When doing OSPF calculations, the routing daemon can be busy and not respond to the CLI
commands. This can result in unexpected output. Repeat the command if there is no response
after two or more seconds.
• If you create a static route in SmartDashboard, it must have a valid and available IP address.
Otherwise, redistribution results can be inconsistent and the router-ID process can be
unstable.
• If the OSPF database on a Virtual System has two or more of the same route prefixes with
equal cost, it adds the route with the lowest next hop IP address to the routing table.
Syntax
> set bootp interface <if_name> [primary default|<ip>] [wait-time <seconds>]
[relay-to <ip1>,<ip2>...] on|off
Parameters
Parameter Description
interface <if_name> The interface name as defined by the system. Press the Tab key after
you enter this parameter to see a list of valid interface names.
primary <ip> The IP address of the Security Gateway interface that always gets
OR requests from the DHCP client. If you do not define a Primary IP
primary default address, the system automatically uses the IP address of the
interface that the DHCP request comes from.
You can use the default value instead of an IP address. This forces
the system to use the IP address of the interface that the DHCP
request comes from. This is useful when you want to change the
wait-time parameter, but not define a Primary IP address.
wait-time <seconds> The minimum wait time, in seconds, before a BOOTP request can be
sent. This includes the elapsed time after the client starts to boot.
This delay lets a local configuration server reply, before it sends the
relay to a remote server.
The wait-time keyword is optional. The system assumes that an
integer after the primary value is the wait-time value.
Valid values: 0 - 65535
Default - 60
relay-to <ip> The IP address of the relay server to which BOOTP requests are sent.
You can specify more than one server.
Parameter Description
on|off Enables or disables BOOTP on the specified interface.
Example 1:
This example enables DHCP Relay on eth0-04 with default values and no Primary IP. The IP
address is automatically assigned by the DHCP server.
> set bootp interface eth0-04 on
Example 2:
This example activates DHCP Relay on eth0-04 and defines the Primary IP address as
30.30.30.1. The wait time is the default value (60 seconds).
> set bootp interface eth0-04 primary 30.30.30.1 wait-time default on
Example 3:
This example activates DHCP Relay on eth1-04 and sends BOOTP requests to the relay server at
20.20.20.200
> set bootp interface eth1-04 relay-to 20.20.20.200 on
Verification:
Use this command to monitor and troubleshoot the BOOTP implementation:
> show bootp {interface <if_name> | interfaces | stats}
Parameters
Parameter Description
interface Shows BOOTP/DHCP Relay for the specified interface
interfaces Shows BOOTP/DHCP Relay for all interfaces
stats Shows BOOTP/DHCP Relay statistics
Advantages
• Protects against cache pollution by an attack.
• Better performance.
Limitations
• ECMP requires Source-Based Routing.
• If you use Policy-Based Routing in a FROM rule, Route Cache Optimization is disabled.
Description
You can enable Route Cache Optimization permanently or temporarily. Use asg_dst_route to
manage Route Cache Optimization.
Syntax
> asg_dst_route [-e|-d|-a|-v][-b <SGM_IDs>] [--g {increase | decrease}]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-g {increase | Increase or decrease route cache garbage aggressiveness
decrease}
-e Enable Route Cache Optimization
-d Disable Route Cache Optimization
-a Restore Route Cache Optimization to the default
-v Show the current and persistent status of Route Cache Optimization
Example:
> asg_dst_route -v
+------------------------------------------------------------------------------+
| SGM | Current Status | Persistency |
+------------------------------------------------------------------------------+
| 1_01 | Source+Dest based route | Source+Dest based (due to pbr rule) |
| 1_02 | Source+Dest based route | Source+Dest based (due to pbr rule) |
+------------------------------------------------------------------------------+
Command Description
asg_dst_route -d Disable Route Cache Optimization
Description
Use the asg_dst_route -s command to show summary Route Cache Optimization statistics.
Syntax
> asg_dst_route -s
Example output
+------------------------------------------------+
| SGM | Cache load | Hit rate | Effectiveness |
+------------------------------------------------+
| 2_01 | 4 % | 58 % |100 % |
| 2_02 | 4 % | 50 % |100 % |
+------------------------------------------------+
Output description
Column Description
SGM SGM ID.
Cache load Calculated percentage of how hard the route cache works.
The route cache starts to clean when this exceeds 100%.
Hit rate Percent of total lookups found in the route cache in the last three seconds.
Effectiveness Estimate of the effectiveness of the route cache.
This values drops if the cache load increases or hit rate decreases.
Administration
The Scalable Platform operating system includes a set of global commands that apply to all or
specified SGMs in a system.
Global Commands:
• auditlog
• Enabled by default.
• All commands are recorded in the audit log.
To learn more about the audit log, see Looking at the Audit Log (on page 218).
• config-lock
• Protects the gClish database by locking it. Each SGM has a single lock.
• To set gClish operations for an SGM, the SGM must hold the config-lock.
• To set config-lock, run:
> set config-lock on override
• gClish traffic runs on the Sync interface, TCP port 1129.
• blade-range
• Runs commands on specified SGMs.
• Runs gClish embedded commands only on this subset of SGMs.
• We do not recommend that you use the blade-range command, because all SGMs must
have identical configurations.
fwaccel, fwaccel6
Description
The fwaccel and fwaccel6 commands dynamically enable or disable acceleration for IPv4 and
IPv6 traffic, while the Scalable Platform is in operation.
The fwaccel6 command is used for IPv6 traffic and resets to the default value of fwaccel after
reboot.
When you run fwaccel and fwaccel6 from gClish, they show combined information from all
SGMs, for most parameters.
The fwaccel stats command shows aggregated statistics from all SGMs.
Syntax
> fwaccel {on|off|stat|stats [-s} [-d] |conns [-s] -m <max_entries> [-b <SGM_IDs>]
> fwaccel templates[-s] [-m <max_entries>] [-b <SGM_IDs>]
> fwaccel6 {on|off|stat|stats [-s} [-d] |conns [-s] -m <max_entries> [-b <SGM_IDs>]
> fwaccel6 templates[-s] [-m <max_entries>] [-b <SGM_IDs>]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Note - You can only select SGMs from one Chassis with this option.
on Starts acceleration.
off Stops acceleration.
stat Shows the acceleration device status and the status of the Connection
Templates on the local Security Gateway.
stats Shows acceleration statistics.
stats -s Shows more summarized statistics.
stats -d Shows dropped packet statistics.
conns Shows all connections.
conns -s Shows the number of connections defined in the accelerator.
conns -m Limits the number of connections shown by conns to <max_entries>.
<max_entries>
templates Shows all connection templates.
templates -m Limits the number of templates shown by the templates to <max_entries>.
<max_entries>
templates -s Shows the number of templates currently defined in the accelerator.
stats -r Resets statistics.
stats -l Shows multicast traffic statistics.
stats -p Shows SecureXL violations (F2F packets) statistics.
Example:
> fwaccel stats
Displaying aggregated data from blades: all
Medium Path
-----------------------------------------------------------------------------
PXL packets 0 PXL async packets 0
PXL bytes 0 PXL conns 0
C PXL conns 0 C PXL templates 0
Firewall Path
-----------------------------------------------------------------------------
F2F packets 10077862 F2F bytes 1185051123
F2F conns 38839 C F2F conns 800
TCP violations 0 C partial conns 0
C anticipated conns 0
General
-----------------------------------------------------------------------------
memory used 0 free memory 0
(*) Statistics marked with C refer to current value, others refer to total value
Monitor Mode
fwaccel_m continuously monitors fwaccel output in real time. In Monitor Mode, the screen
shows changes in parameters as highlighted text. You cannot run commands or other operations
while in Monitor Mode.
To close Monitor Mode, press CTRL-C.
Example:
> fwaccel_m stats -p
Displaying aggregated data from blades: all
F2F packets:
--------------
Violation Packets Violation Packets
-------------------- --------------- -------------------- ---------------
pkt is a fragment 0 pkt has IP options 19286
ICMP miss conn 33 TCP-SYN miss conn 28713
TCP-other miss conn 125290 UDP miss conn 95373635
other miss conn 268865 VPN returned F2F 0
ICMP conn is F2Fed 5390 TCP conn is F2Fed 73812
UDP conn is F2Fed 9131 other conn is F2Fed 4827
unidirectional viol 0 possible spoof viol 0
TCP state viol 0 out if not def/accl 0
bridge, src=dst 0 routing decision err 82
sanity checks failed 0 temp conn expired 0
fwd to non-pivot 0 broadcast/multicast 0
cluster message 0 partial conn 1
PXL returned F2F 0 cluster forward 0
chain forwarding 0 general reason 0
port alloc f2f 0 sticky SA F2F 0
>
fw, fw6
Description
The fw and fw6 commands are global scripts that run the fw and fw6 commands on each SGM.
Example 1:
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > fw ctl
-*- 2 blades: 1_01 1_02 -*-
Usage: fw ctl command args...
Example 2:
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > fw ctl iflist
-*- 6 blades: 1_01 1_02 1_03 2_01 2_02 2_03 -*-
0 : BPEth0
1 : BPEth1
2 : eth1-Mgmt4
3 : eth2-Mgmt4
4 : eth1-01
5 : eth1-CIN
6 : eth2-CIN
8 : eth2-01
16 : Sync
17 : eth1-Mgmt1
18 : eth2-Mgmt1
>
fw dbgfile
Description
Use the fw dbgfile commands to debug the system.
Syntax
> fw dbgfile collect -f <debug_file_path> [-buf <buf_size>] [-m <debug_module_1>
<debug_flags_1> [-m <debug_module_2> <debug_flags_2>] ... [-m <debug_module_N>
<debug_flags_N>]]
> fw dbgfile view [<debug_file_path>] [-o <agg_file_path>]
Parameters
Parameter Description
collect Collects Security Gateway debug information.
view Shows the collected debug information.
<debug_file_path> Full path of the debug file.
-buf <buf_size> Debug buffer size.
Always set the maximal size 32000.
Parameter Description
-m <debug_module> Specifies Security Gateway debug module and debug flags in
<debug_flags> that module.
You can specify more than one debug module.
-o <agg_file_path> Uses an aggregate debug file.
<agg_file_path> - Full path of the aggregate debug file.
You can run global commands from gClish and the Expert mode. See Global Operating System
Commands (on page 154).
Example:
[Expert@MyChassis-ch01-01:0]# asg_reboot -b 1_03,2_05
You are about to perform hard reboot on SGMs: 1_03,2_05
It might cause performance hit for a period of time
Notes:
• At least one SGM must be UP and running on the remote Chassis to run these commands.
• To learn how to restart an SSM from the CMM, run asg_chassis_ctrl (on page 191).
Syntax
> update_conf_file <file_name> <variable>=<value>
Parameters
Parameter Description
<file_name> Full path and name of the configuration file to update
You do not need to specify the path for these files:
• $FWDIR/boot/modules/fwkern.conf
• $PPKDIR/boot/modules/simkern.conf
<variable> Name of the variable to update
Examples:
> update_conf_file /home/admin/MyConfFile.txt var1=hello
> cat /home/admin/MyConfFile.txt
-*- 3 blades: 2_01 2_02 2_03 -*-
var1=hello
This command works with configuration files in a specified format. It is composed of lines where
each line defines one variable.
<variable>=<value>
Notes:
• The fwkern.conf and simkern.conf files use this format.
• Variable name must not include an equal sign (=).
Syntax
> sim_param show [<filter>]
> sim_param get <parameter>
> sim_param set <parameter> <value>
> sim_param save <file_name>
Parameters
Parameter Description
show Shows a detailed list of all SIM parameters
<filter> Shows only those SIM parameters that contain the specified text string
get Shows the value of the specified SIM parameter
set Set the specified SIM parameter to the specified value
<parameter> Name of the SIM parameter to set or show
<value> Value of the SIM parameter
save Save the SIM parameter to the specified file name
<file_name> Path and name of the file with SIM parameters
Note - For the configuration to survive reboot, manually edit the applicable parameters in the
$PPKDIR/boot/modules/simkern.conf file. Use the g_update_conf_file command.
sim_param Example
This example shows a list of all the applicable SecureXL SIM kernel parameters and their current
values.
This command shows all of the correct parameter names for use with the sim_param show
command.
# sim_param show
+------------------------------------------+-----------------+----------+-----------+
|Name |Value |Default |Permission |
+------------------------------------------+-----------------+----------+-----------+
|sim_reuse_tcp_conn |1 |Identical |R/W |
|sim_gtp_inner_frag_accel |1 |Identical |R/W |
Parameters
Parameter Description
get Shows the specified parameter and its value.
set Change the parameter value to the specified value.
<type> Type of parameter value:
int - Integer value
string - String value
Note - You must enter the correct parameter type or the command
returns an error message.
Run this command to see a list of valid parameters:
# modinfo $FWDIR/modules/fwmod.2.6.18.cp.x86_64.o
<parameter_name> Parameter name.
<value> Parameter value.
Note - To make changes persistent, you must manually edit the applicable parameters in
$FWDIR/boot/modules/fwkern.conf. Use the g_update_conf_file command to do this.
Syntax
asg_cp2blades [-b <SGM_IDs>][-s] <source_path> [<dest_path>]
Parameters
Parameter Description
-b <SGM_IDs>
Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-r Copy folders and directories that contain files.
-s Save a local copy of the old file on each SGM
The copy is saved in the same directory as the new file. The old
file has the same name with this at the end:
*.bak.<date>.<time>
<source_path> Full path and name of the file to copy
Example
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg_cp2blades /home/admin/note.txt
Operation completed successfully
[Global] MyChassis-ch01-01 >
[Global] MyChassis-ch01-01 > cat /home/admin/note.txt
-*- 3 blades: 2_01 2_02 2_03 -*-
hello world
[Global] MyChassis-ch01-01 >
global help
Description
The global help command shows the list of global commands you can use in gClish and how
they are generally used.
Syntax
> global help
Example output:
> global help
Usage: <command_name> [-b SGMs] [-a -l -r --] <native command arguments>
Executes the specified command on specified blades.
Optional Arguments:
-b blades: in one of the following formats
1_1,1_4 or 1_1-1_4 or 1_01,1_03-1_08,1_10
all (default)
chassis1
60000/40000 Security Systems Administration Guide R76SP.50 | 78
Managing Scalable Platforms
chassis2
chassis_active
-a : Force execution on all SGMs (incl. down SGMs).
-l : Execute only on local blade.
-r : Execute only on remote SGMs.
Command list:
arp cat cp cpconfig cplic cpstart cpstop dmesg ethtool fw fw6 fwaccel fwaccel6 fwaccel6_m fwaccel_m
ls md5sum mv netstat reboot sim sim6 snapshot_recover snapshot_show_current tail tcpdump top unlock
update_conf_file vpn asg
Syntax
asg_clear_table [-b <SGM_IDs>]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Note: With this option, you can only select SGMs from one Chassis.
Note - If you connected to the machine with SSH, your connection is disconnected.
Syntax
> show interfaces all
> show interface <options>
Example
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > show interface eth1-01 ipv4-address
1_01:
ipv4-address 4.4.4.10/24
1_02:
ipv4-address 4.4.4.10/24
1_03:
ipv4-address 4.4.4.10/24
1_04:
ipv4-address 4.4.4.10/24
1_05:
Blade 1_05 is down. See "/var/log/messages".
2_01:
ipv4-address 4.4.4.10/24
2_02:
ipv4-address 4.4.4.10/24
2_03:
ipv4-address 4.4.4.10/24
2_04:
ipv4-address 4.4.4.10/24
2_05:
ipv4-address 4.4.4.10/24
[Global] MyChassis-ch01-01 >
Syntax
> set chassis id <chassis_id> admin-state {up | down}
> asg chassis_admin -c <chassis_id> {up | down}
Parameters
Parameter Description
<chassis_id> Chassis identification number (1 or 2)
{up | down} Chassis state
Example output:
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > set chassis id 1 admin-state down
You are about to perform Chassis admin-state down on chassis: 1
Are you sure? (Y - yes, any other key - no) y
Chassis admin-state down requires auditing
Enter your full name: John
Enter reason for Chassis admin-state down [Maintenance]: Test
WARNING: Chassis admin-state down on Chassis: 2, User: John, Reason: Test
Chassis 2 is going DOWN...
Chassis 2 state is DOWN
[Global] MyChassis-ch01-01 >
Notes:
• The set chassis and asg chassis_admin commands are audited in the asg log audit
• Run one of these commands to see the Chassis state:
> asg stat
> asg monitor
• In a Dual Chassis environment, a Chassis in the administrative DOWN state causes
degradation of the system performance
Syntax
# gclish
> sol [parameter]
Parameters
Parameter Description
-h Shows the built-in help
-b <SGM_ID> Initiates the SOL session to the selected SGM.
-d Only deactivates any active SOL session.
-f Forces an SOL session.
Deactivates any active session.
-k Keeps the session alive.
The session does not break after 60 seconds.
~. Terminates the connection.
SOL Limitations
• Supported on SGM400 only.
• Supported only internally within the Chassis.
• Can initiate one SOL session simultaneously to each SGM.
• When SOL is active, no input from the RJ-45 console front panel is available. Only output is
available.
• Must have connectivity to one SGM in the Chassis (SSH/Console).
• Must have at least one Active SSM and one Active CMM.
Syntax
> set ntp server primary <NTP Server> version <NTP Version>
> set ntp server secondary <NTP Server> version <NTP Version>
> show ntp servers
> delete ntp server <NTP Server>
Parameters
Parameter Description
set ntp server primary Configures the primary NTP server.
The system uses this NTP server by default.
set ntp server secondary Configures the secondary NTP server.
The system uses this if the primary NTP server is not
available.
show ntp servers Shows the NTP configuration.
<NTP Server> Specifies the IP address or host name of the NTP server.
Validation
To confirm that the time is the same on all SGMs enter:
> show time
To confirm that all SGMs start NTP connections, run tcpdump on UDP port 123 for the applicable
interfaces.
Syntax
# asg_blade_config pull_config
# asg_blade_config full_sync <ip>
# asg_blade_config set_sync_start_ip <ip>
# asg_blade_config reset_uptime
# asg_blade_config reset_uptime_user
# asg_blade_config get_smo_ip
# asg_blade_config is_in_security_group
# asg_blade_config {is_in_pull_conf_group | config} fetch_smc
# asg_blade_config upgrade_start <new_version> [cu]
# asg_blade_config {upgrade_stat | upgrade_stop | upgrade_cu}
Parameters
Parameter Description
pull_config Copies the configuration from another SGM.
full_sync <ip> Runs a full synchronization from another SGM.
<ip> - Synchronization interface on remote SGM
set_sync_start_ip <ip> Changes the synchronization start IP address from the
local SGM to the specified IP address.
reset_uptime Resets the system uptime value on all SGMs to the
current time.
reset_uptime_user An interactive command that resets the uptime for all
SGMs to a user configured time.
get_smo_ip Returns the synchronization IP address of the Single
Management Object, as defined in SmartDashboard.
This address is not shown in SmartDashboard.
is_in_security_group Confirms that the local SGM is in the Security Group.
is_in_pull_conf_group Confirms that the local SGM is in the Pulling
Configuration Group.
If it is not, the SGM cannot copy the configuration and
policy.
config fetch_smc Gets the policy from the Security Management Server,
and send it to all SGMs.
Parameter Description
upgrade_start <new_version> Starts the upgrade procedure.
[cu] <new_version> - New version name.
[cu] - Specifies the Connectivity upgrade.
upgrade_stop Stops the upgrade procedure.
upgrade_stat Shows the upgrade procedure and policy status.
upgrade_cu Changes from Zero Downtime upgrade to Connectivity
upgrade.
reset_sic -reboot_all Starts a SIC cleanup.
<activation_key>
Backing up a configuration:
• To create and save a backup locally, run:
> add backup local
• To create and save a backup on a remote FTP server, run:
> add backup ftp ip <ip_address> path <path> username <name> password
<password>
• To create and save a backup on a remote TFTP server, run:
> add backup tftp ip <ip_address>
• To create and save a backup on a remote SCP server, run:
> add backup scp ip <ip_address> path <path> username <name> password
<password> <file>
Restoring a configuration:
• To restore a backup from a locally stored file, run:
> set backup restore local <file>
• To restore a backup from a remote FTP server, run:
> set backup restore ftp <ip_address> path <path> file <file> username <name>
password <password>
• To restore a backup from a remote TFTP server, run:
> set backup restore tftp <ip_address> file <file>
• To restore a backup from a remote SCP server, run:
> set backup restore scp ip <ip_address> path <path> file <file> username <name>
password <password>
Parameters
Parameter Description
<path> Absolute path on the remote server to the folder where the backup file is
stored
<file>
Name of the backup file including the .tgz extension
<ip_address> The IP address of the remote server
<name> User name to log in to the remote server
<password> Password to log in to the remote server
Example:
> set backup restore ftp ip 192.0.2.24 path /mybackups/ file
backup_gw-24_17_4_2012_11_07.tgz username user1 password pass1
Restoring from backup package. Use the command 'show backups' to monitor restoring progress.
Please reboot the machine when it's finished.
60000/40000 Security Systems Administration Guide R76SP.50 | 86
Managing Scalable Platforms
Syntax
> asg sgm_admin -h
> asg sgm_admin -b <SGM_IDs> {up | down [-a]} [-p]
Parameters
Parameter Description
-h Show the command syntax and help information.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-p Makes the configuration persistent (the setting is kept after reboot).
-a Synchronizes accelerated connections to other SGMs.
Example
> asg sgm_admin -b 2_03 -p
You are about to perform blade_admin up on blades: 2_03
Notes:
• When an SGM is in the Administrative DOWN state:
• gClish commands do not run on this SGM.
• Traffic is not sent to this SGM.
• asg stat shows the SGM as DOWN (admin).
• When an SGM is changed to Administrative UP, it automatically synchronizes the configuration
from a different SGM that is in the UP state.
• This command generates log entries.
Run:
> asg log audit
• This command is useful for debugging.
Best Practice - Do not use this command in production environments because it can cause
performance degradation.
Image Management
Use these commands to manage Image Management.
• Revert to a saved image. This restores the system, including the configuration of the installed
products.
• Delete an image from the local system.
• Export an existing image. This creates a compressed version of the image. You can download
the exported image to a different computer and delete the exported image from the Gaia
computer. This saves disk space. You must not rename the exported image. If you rename a
snapshot image, it is not possible to revert to it.
• Import an exported image.
• See a list of saved images.
Parameters
Parameter Description
> show smo image auto-clone state Shows the current auto-clone state.
Snapshot management
Syntax Description
> add snapshot <snapshot_name> Creates a new image.
desc <description>
> show snapshots Monitors the snapshot creation process or view a list
of existing snapshots.
> delete snapshot <snapshot_name> Deletes an image.
Syntax Description
snapshot <snapshot_name> Name of the image
Notes:
• You must have sufficient available space on the backup partition to create snapshot images for
all SGMs.
The required available disk space is the actual size of the root partition, multiplied by 1.15.
• The available space required in the export file storage location is the size of the snapshot
multiplied by two.
• The minimum size of a snapshot is 2.5G. Therefore, the minimum available space necessary in
the export file storage location is 5G.
Syntax
# g_snapshot [-b <SGM_IDs>] show|[revert <snapshot_name>]
Parameters
Parameter Description
show Shows saved snapshots for the specified SGMs or Chassis.
revert Restores specified SGMs or Chassis to the specified snapshot.
<snapshot_name> Snapshot file name.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Examples:
• # g_snapshot -b 1_1,1_4 revert My_Snapshot
This example restores SGMs 1_1 and 1_4 to My_Snapshot
• # g_snapshot –b chassis2 revert My_Snapshot
This example restores Chassis2 to My_Snapshot
• # g_snapshot -b chassis1 show
This example shows the saved snapshots for all SGMs on Chassis1.
Setting Blade-Range
Description
Use the set blade-range command to configure which SGMs are part of the range.
Syntax
Parameters
Parameter Description
<Chassis-ID> Valid values:
• 1
• 2
<Blade-ID> Valid values:
• 1 to 12
• all (does not work on VSX)
Best Practice:
1. In SmartDashboard, click Policy menu > Global Properties.
2. From the left tree, click Stateful Inspection and refer to the section Out of state packets.
3. Select the Drop out of state TCP packets option.
4. Select the Drop out of state ICMP packets option.
5. Click Exceptions and remove the Scalable Platform object.
6. Click OK.
7. Open the Scalable Platform object properties.
8. From the left tree, click Topology > Get > Interfaces without Topology.
9. Click OK.
10. Configure an applicable Firewall policy.
11. Install policy on the Scalable Platform object.
12. Reboot all SGMs on the Scalable Platform. Run from the Expert mode:
# g_reboot -a
Best Practice:
1. In SmartDashboard, click Policy menu > Global Properties.
2. From the left tree, click Stateful Inspection and refer to the section Out of state packets.
3. Select the Drop out of state TCP packets option.
4. Select the Drop out of state ICMP packets option.
5. Click Exceptions and remove the Scalable Platform and the Virtual System objects.
6. Click OK.
7. Configure an applicable Firewall policy.
8. Install the policy on the Virtual System object.
9. Reboot all SGMs on the Scalable Platform. Run from the Expert mode:
# g_reboot -a
Security
Make sure to add security settings to your system.
Syntax
# asg_gre {load | stat | verify}
Tunnel configuration
tunnel=<tunnel_ifname> local_tun_addr=<local_tunnel_ip>
remote_tun_addr=<remote_tunnel_ip> phy_ifname=<physical_ifname>
local_addr=<local_physical_addr> remote_addr=<remote_physical_addr> ttl=<ttl>
Route configuration
tunnel_route=<tunnel_ifname> remote_tun_addr=<remote_tunnel_ip>
network=<network>
Parameters
Parameter Description
<tunnel_ifname> Tunnel interface name.
<local_tunnel_ip> Local tunnel IP address.
<physical_ifname> Physical interface name.
<local_physical_addr> Local physical address.
<remote_physical_addr> Remote physical address.
<ttl> Time To Live.
<remote_tunnel_ip> Remote tunnel IP address.
<network> IP address and subnet mask that define the network for the route.
Example output
# asg_gre load
Copying configuration file to all blades... done
1_01:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
1_02:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
1_03:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
1_04:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
Example:
> add rba role myRole domain-type System readonly-features chassis,interface readwrite-features route
> add user myUser uid 0 homedir /home/myUser
> set user myUser password
> add rba user myUser roles myRole
> show rba role myRole
RADIUS Authentication
RADIUS (Remote Authentication Dial-In User Service) is a client/server authentication system that
supports remote-access applications. User profiles are kept in a central database on a RADIUS
authentication server. Client computers or applications connect to the RADIUS server to
authenticate users.
You can configure the Scalable Platform to work as a RADIUS client. The Scalable Platform does
not include RADIUS server functionality. You can configure the Scalable Platform to authenticate
users even when they are not defined locally (on page 103).
You can configure your Scalable Platform computer to connect to multiple RADIUS servers. If the
first server in the list is unavailable, the next RADIUS server in the priority list connects.
You can delete a server at any time.
Set the Scalable Platform as a RADIUS client. Use the aaa radius-servers commands to add,
configure, and delete RADIUS authentication servers.
Note - The configuration is done based on priority and not the server ID or name.
Parameters
Parameter Description
priority <priority> RADIUS server priority as an integer between 0 and 999 (default=0).
When there two or more RADIUS servers, Gaia connects to the server
with the highest priority. Low numbers have the higher priority.
port <port> UDP port on the RADIUS server. This value must match the port as
configured on the RADIUS server. Typically this 1812 (default) or 1645
(non-standard but a commonly used alternative).
prompt secret Shared secret (password) text string. The system prompts you to enter
the value.
timeout <timeout> The number of seconds to wait for the server to respond. (Default = 3
seconds).
secret <secret> The shared secret used to authenticate the RADIUS server and the local
client. You must define this value on your RADIUS server.
Note - After RADIUS client configuration, every authentication request is forwarded to the RADIUS
server. Therefore, every account that is configured locally must be configured on the RADIUS
server as well.
Syntax
> add rba role radius-group-any domain-type System readonly-features <list>
readwrite-features <list>
Parameters
Parameter Description
readonly-features <list> Comma separated list of Gaia features that have read-only
permissions in the specified role
readwrite-features <list> Comma separated list of Gaia features that have read and
write permissions in the specified role
Example:
> add rba role radius-group-any domain-type System readonly-features arp
Verification:
Connect to the Scalable Platform with a non-local user:
MyLaptop > ssh my_radius_user@my_61k_server
After successful authentication, the user my_radius_user is assigned the role radius-group-any
given all the privileges defined in the radius-group-any role.
Parameters
Parameter Description
<username> Login name of the user
<path> Full path for the user home directory
Example:
> add user local uid 0 homedir /home/local
Description
You can select a role from pre-existing roles, or create a new role and give it custom permissions.
Syntax
> add rba user <username> roles <rolename>
Parameters
Parameter Description
<username> User name
Adding a Role
Description
You can add new roles and give them custom permissions.
Syntax
> add rba role <rolename> domain-type System readonly-features <readonly_list>
readwrite-features <readwrite_list>
Parameters
Parameter Description
<rolename> Role name
<readonly_list> Comma separated list of features to grant read only permissions.
<readwrite_list> Comma separated list of features to grant read/write permissions.
Example
> add rba role radius domain-type System readonly-features Chassis,configuration
readwrite-features aaa-servers
Action Syntax
To add a TACACS+ server add aaa tacacs-servers priority VALUE
server VALUE key VALUE timeout VALUE
set aaa tacacs-servers priority VALUE
To change the configuration of a TACACS+ key VALUE
server entry new-priority VALUE
server VALUE
timeout VALUE
set aaa tacacs-servers state VALUE
To delete TACACS+ server from the list of delete aaa tacacs-servers priority
servers VALUE
show aaa tacacs-servers
To see the configuration of the TACACS+ list
servers priority VALUE server
priority VALUE timeout
state
Parameters
Parameter Description
priority VALUE The priority value of the TACACS+ server. The value must be unique
for this operating system.
The priority value is used to determine the order in which Gaia
connects to the servers. The server with the lowest priority number
is first.
Example - If three TACACS+ servers have a priority of 1, 5, and 10
respectively, Gaia connects to the servers in that order, and uses
the first server that responds.
The priority value identifies the server in commands. A command
with priority 1 applies to the server with priority 1.
• Range - Integers 1 - 20
• Default - No default
server VALUE The TACACS+ server IPv4 address.
• Default - No default
key VALUE The shared secret used for authentication between the
authentication server and the Gaia client. Enter the shared secret
text string without a backslash. Make sure that the shared string
defined on the Gaia client matches that which is defined on the
authentication server.
• Range - Text strings up to 256 characters, without any
whitespace characters
• Default - No default
timeout VALUE The maximum number of seconds to wait for the server to respond.
• Range - 1-45
• Default - 5
60000/40000 Security Systems Administration Guide R76SP.50 | 107
Managing Scalable Platforms
Parameter Description
new-priority VALUE The new priority.
state VALUE Range:
On - Enable TACACS+ authentication for all servers.
Off - Disable TACACS+ authentication for all servers.
list The list of TACACS+ servers that the system is configured to use.
Example
> set aaa tacacs-servers priority 2 server 10.10.10.99 key MySharedSecretKey
timeout 10
CPView
CPView is a text based utility that runs on Check Point Gateways.
It collects and shows statistical data from the Gateways.
The data it collects contains general system information and information for each Virtual System.
The data updates on a regular basis and is easily accessible and readable. Use cpview to show
information on each Virtual System.
Overview of CPView
Description
The views in cpview show statistics related to a specific area of the Security Gateway.
Syntax
cpview
[-c <conf_file>]
[-p]
Parameters
Parameter Description
-c <conf_file> Use a custom configuration file.
-p Print all statistics to the screen.
Using CPView
Use these keys to navigate the CPView:
Key Description
Arrow keys Moves between menus and views.
Scrolls in a view.
Home Returns to the Overview view.
Enter Switches to view mode.
On a menu with sub-menus, Enter moves you to the lowest level sub-menu.
Esc Returns to menu mode.
Q Quit CPView.
Key Description
R Opens a window where you can change the refresh rate.
The default refresh rate is 2 seconds.
W Switches between wide and normal display modes.
In wide mode, CPView fits the screen horizontally.
S Manually sets the number of rows or columns.
M Switches the mouse on or off.
P Pauses and resumes the collection of statistics.
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file.
The file name format is:
cpview_<cpview process ID>.cap<number of captures>
Section Description
Header The Header shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Network Monitoring
You can monitor and log traffic and settings.
Syntax
> asg profile --help
> asg profile [ --delay <timeout>] [ -b <SGM_IDs> ] [-v | -p | -g] [--rel] [--tcp
| --udp] [--ipv6 | --ipv4]
> asg profile -m
> asg profile --enable
> asg profile --disable
Parameters
Parameter Description
--delay <timeout> Information refresh interval (seconds).
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-v | -p | -g The default view (with none of these options) shows values for each
service - throughput, packet rate, connection rate and the number of
concurrent connections. As an alternative, you can select one of these
options:
• -v - Shows verbose service statistics.
• -p - Shows service statistics for these paths:
• Accelerated (SecureXL)
• Medium
• Slow (Firewall)
• -g - Shows graph view of BPS per service
--rel Shows the results as a percentage for the -v, –p, and default views.
Parameter Description
--tcp | --udp Select one of these options:
• --tcp - Show TCP statistics only
• --udp - Show UDP statistics only
--ipv6 | --ipv4 Select one of these options:
• --ipv4 - Show ipv4 statistics only
• --ipv6 - Show ipv6 statistics only
-m Run in a convenient interactive menu mode.
--enable Enable statistics collection.
--disable Disable statistics collection.
--help Shows the command syntax and help information.
Example:
> asg profile -m
Aggregated statistics of SGMs: 1_1 Virtual Systems: 0
+--------------------------------------------------------------------+
|Service distribution summary |
+-------------------------+----------+-------+-----------+-----------+
|Service |Throughput|Packet |Connection |Concurrent |
+ + +rate +rate |connections|
+-------------------------+----------+-------+-----------+-----------+
|8116/udp cp-cluster |116.2 K |112 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|22/tcp ssh |4.5 K |5 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|33628/tcp |2.0 K |1 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|33635/tcp |1.2 K |0 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|33624/tcp |1.2 K |0 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|33630/tcp |400 |0 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|33626/tcp |400 |0 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|33632/tcp |336 |0 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|67/udp bootps |288 |0 |0 |0 |
+-------------------------+----------+-------+-----------+-----------+
|257/tcp set |48 |0 |0 |2 |
+-------------------------+----------+-------+-----------+-----------+
+-------------------------+----------+-------+-----------+-----------+
|Totals |
+-------------------------+----------+-------+-----------+-----------+
|Total tcp |10.2 K |9 |0 |8 |
|Total udp |116.5 K |112 |0 |0 |
|Total other |0 |0 |0 |2 |
+-------------------------+----------+-------+-----------+-----------+
|System |126.7 K |121 |0 |10 |
+-------------------------+----------+-------+-----------+-----------+
Note - This example shows the normal (not verbose) view with absolute values. The highest
throughput and packet rate is from the service 8116/udp cp-cluster. To show this view, type:
a
Syntax
> asg_archive <parameter>
Parameters
Parameter Description
Command without Shows the system status and the Options menu.
a parameter
--height Sets the maximum number of lines in the output.
--enable Starts all data collectors with asg_archive –config (except those that
were manually disabled).
--disable Disables all information collectors.
--status Shows if asg_archive is enabled or disabled.
--config Shows or sets the configuration of information collectors.
<collector> - Name of the information collector, as shown in the
asg_archive --config output. Enclose the name in double quotes.
<seconds> - Enter a refresh period, in seconds, for the specified collector. If
you do not enter a refresh, the default value is applied automatically.
--refresh Shows or sets the default refresh time, in seconds, which applies when no
<timeout> value is specified with the --config parameter.
--cpu <cpu_id> Shows or selects the default CPU assigned to the data collection process.
This can help prevent unnecessary performance impact caused by this
command.
--remote Reads archive files from a specified remote Security Gateway.
<path> Specifies the path to this Security Gateway.
--help Shows the command syntax and help text.
This option automatically closes the interactive mode and goes back to the
command line.
• To select a menu item, enter the number or letter to the left of the item.
• The letters are case sensitive.
• If there is a sub-menu, the first option automatically shows in the upper section of the screen.
• To select a different option, enter the applicable letter.
Some options can open an additional sub-menu.
The numbered options show status and system information. The letter options, at the bottom of
the menu, are operations that control the information display.
Syntax
> asg if -h
> asg if [-i interface [-v] [enable] [disable]] [-ip ]
Parameters
Parameter Description
-h Shows the command syntax and help information.
-i <interface> Interface status for the specified interface or a comma-separated list of
interfaces. If this parameter is not specified, the status for all interfaces
shows.
-v Verbose - Shows detailed output.
Note - This view is not supported for logical interfaces.
enable | disable Enables or disables the specified interface.
-ip Interface IPv4 or IPv6 address.
| |00:1c:7f:81:05:fe | | | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
|br0 |- |Bridge Mast |(up) |NA |NA |NA |
| |00:1c:7f:81:07:fe | |ports: | | | |
| | | |eth2-07(down)| | | |
| | | |eth1-07(down)| | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
| eth1-07 |- |Bridge port |(down) |10G |1500 |Full |
| |00:1c:7f:81:07:fe | |master: | | | |
| | | |br0(up) | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
| eth2-07 |- |Bridge port |(down) |10G |1500 |Full |
| |00:1c:7f:82:07:fe | |master: | | | |
| | | |br0(up) | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
|eth1-01 |15.15.15.10 |Ethernet |(up) |10G |1500 |Full |
| |00:1c:7f:81:01:fe | | | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
|eth1-Mgmt4 |172.23.9.67 |Ethernet |(up) |10G |1500 |Full |
| |00:d0:c9:ca:c7:fa | | | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
|eth2-01 |25.25.25.10 |Ethernet |(up) |10G |1500 |Full |
| |00:1c:7f:82:01:fe | | | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
|Sync |192.0.2.1 |Bond Mas |(up) |NA |NA |NA |
| |00:1c:7f:01:04:fe | |slaves: | | | |
| | | |eth1-Sync(up)| | | |
| | | |eth2-Sync(up)| | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
| eth1-Sync|- |Bond slave |(up) |10G |1500 |Full |
| |00:1c:7f:01:04:fe | |master: | | | |
| | | |Sync(up) | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
| eth2-Sync|- |Bond slave |(up) |10G |1500 |Full |
| |00:1c:7f:01:04:fe | |master: | | | |
| | | |Sync(up) | | | |
+-----------+------------------+------------+-------------+---------+----------+--------+
>
Notes:
• This sample output shows that this Sync interface is a Bond-Master and if the interfaces are
UP or DOWN.
• To add a comment to an interface, run:
> set interface <if_name> comment <comment_text>
+----------------------------------------------------------------------------------------+
|Traffic |
+----------------------------------------------------------------------------------------+
|media |In traffic |In pkt(uni/mul/brd)|Out traffic |Out pkt(uni/mul/brd) |
+-----------------+-----------+-------------------+---------------+----------------------+
|FTLF8528P2BNV-EM |28.8Kbps |0pps/38pps/5pps |4.1Mbps |0pps/355pps/0pps |
+----------------------------------------------------------------------------------------+
|Errors (total/pps) |
+----------------------------------------------------------------------------------------+
|OutDiscards |InDiscards |InErrors |OutErrors |
+-----------------------------+-------------------+---------------+----------------------+
|0/0 |0/0 |0/0 |0/0 |
+-----------------------------+-------------------+---------------+----------------------+
[Expert@MyChassis-ch01-01:0]#
Example:
# blade 1_03
Moving to blade 1_3
Notes:
• When you only enter the SGM ID, the default Chassis is assumed.
• To go back to the last SGM, run:
exit
• You can run more than one blade command to open many SSH sessions.
Syntax
asg_bond {-h | --help}
asg_bond [-v] [ -i <filter>]
Parameters
Parameter Description
-h | --help Shows the built-in help.
-i <filter> Filters the output for the specified bond name or text string.
The output shows all bonds that match the bond name, or those names
that contain the text string.
-v Runs LACP packet test for the specified interfaces.
Note - You can also specify a substring that is part of a bond name to show all bonds that contain
the substring.
+-----+------------------------+-----------------+-------+------+-------------------------+
|Name |Address |Mode |Slaves |Result|Comments |
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond1|(MAC) 00:1c:7f:81:02:fe |LACP 802.3ad |eth1-02|Failed|eth1-02 missing LACP pkts|
| |(IPv4)13.13.1.10 |Load Sharing |eth1-03| |eth1-03 missing LACP pkts|
| | | |eth2-03| |eth2-03 missing LACP pkts|
| | | |eth2-02| |eth2-02 missing LACP pkts|
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond3|(MAC) 00:1c:7f:82:04:fe|XOR |eth2-04|OK | |
| |(IPv4) 23.23.1.10 |Load Sharing |eth1-04| | |
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond5|(MAC) 00:1c:7f:81:07:fe|Round-Rubin |eth1-07|OK | |
| |(IPv4) 33.33.1.10 |Load Sharing |eth2-07| | |
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond7|(MAC) 00:00:00:00:00:fe|Active-Backup | |OK | - No slaves exist |
| | |High Availability| | | |
+-----+------------------------+-----------------+-------+------+-------------------------+
[Expert@MyChassis-ch01-01:0]#
Notes:
• The comments column shows a description of problems detected by the verification tests.
• Bond7 shows an incomplete definition with no slaves configured.
Syntax
> set chassis high-availability bond <bond_port> min_slaves <number>
Example
> set chassis high-availability bond bond1 min_slaves 2
Notes:
• The default value for min_slaves is 1.
• The bond is considered DOWN if the number of slaves in the UP state, is below the
min_slaves value.
Syntax
> asg_ifconfig [-b <SGM_IDs>] [<interface>] [analyze|banalyze] [-d <delay>] [-v]
[-a]
Parameters
Parameter Description
Interface The name of the interface
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-d delay Delay, in seconds, between data samples. Default = 5.
Parameter Description
-vLogging and verbose mode - Shows traffic distribution between interfaces.
Monitoring
-a Shows total traffic volume.
By default (without -a), the average traffic volume per second
shows.
-h Shows help information and exit.
analyze Shows accumulated traffic information.
Use the -v, -a, and -d <delay> parameters to show traffic
distribution between interfaces.
banalyze Shows accumulated traffic information.
Use the -v, -a, and -d <delay> parameters to show traffic
distribution between interfaces.
You can use these parameters to sort the traffic distribution table:
-rp X packets
-rb X bytes
-rd X dropped packets
-tp X packets
-tb X bytes
-td X dropped packets
For example, if you sort with the -rb option, the higher values
appear at the top of the RX bytes column in the traffic
distribution table:
SGM ID RX packets RX bytes RX dropped
1_03 70%
1_02 20%
1_01 10%
Native Usage
This example shows the total traffic sent and received by eth2-01 for all SGMs on Chassis1
(Active Chassis). By default, the average traffic volume per second shows.
> asg_ifconfig -b chassis1 eth2-01
as1_02:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:94 errors:0 dropped:0 overruns:0 frame:0
TX packets:63447 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:5305 (5.1 KiB) TX bytes:5688078 (5.4 MiB)
1_03:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:137 errors:0 dropped:0 overruns:0 frame:0
TX packets:26336 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:7591 (7.4 KiB) TX bytes:2355386 (2.2 MiB)
1_04:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:124 errors:0 dropped:0 overruns:0 frame:0
1_05:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:79 errors:0 dropped:0 overruns:0 frame:0
TX packets:26370 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:4507 (4.4 KiB) TX bytes:2216546 (2.1 MiB)
1_01:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:01:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:225018 bytes:36970520 (37.0 MiB) dropped:0
TX: packets:3522445 bytes:1381032583 (1.4 GiB) dropped:0
1_02:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:02:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:221395 bytes:35947248 (35.9 MiB) dropped:0
TX: packets:4674143 bytes:1850315554 (1.9 GiB) dropped:0
1_03:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:03:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:10 bytes:644 (644.0 b) dropped:0
TX: packets:67826313 bytes:7345458105 (7.3 GiB) dropped:0
1_04:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:04:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:13 bytes:860 (860.0 b) dropped:0
TX: packets:68489217 bytes:7487476060 (7.5 GiB) dropped:0
1_05:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:05:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:203386 bytes:19214238 (19.2 MiB) dropped:0
TX: packets:7164109 bytes:2740761091 (2.7 GiB) dropped:0
-----------------------------------------------------------------------------
SGM ID RX packets RX bytes RX dropped TX packets TX bytes TX dropped
-----------------------------------------------------------------------------
1_01 34.6% 40.1% 0.0% 2.3% 6.6% 0.0%
1_02 34.1% 39.0% 0.0% 3.1% 8.9% 0.0%
1_03 0.0% 0.0% 0.0% 44.7% 35.3% 0.0%
1_04 0.0% 0.0% 0.0% 45.2% 36.0% 0.0%
1_05 31.3% 20.9% 0.0% 4.7% 13.2% 0.0%
-----------------------------------------------------------------------------
[Global] MyChassis-ch01-01 >
Field Run:
Source and destination IP addresses • For Site-to-Site VPN
# g_tcpdump for ip proto 50
• For Remote Access VPN clients
# g_tcpdump for UDP port 4500
Which SGM encrypted packets are # bcstats vpn -v
forwarded
Which SGM holds the outbound SA # g_fw tab -t outbound_SPI -f
Search for MSPI in the output. MSPI is the Meta SA,
and shows which SGM holds the outbound SA.
Example:
#g_fw tab -t outbound_SPI -f
using cptfmt
Formatting table’s data — this might take a while...
local host:
Date: Nov 14, 2011
12:37:15 172.16.6.171 > : (+)====================================(÷); Table_Name: outbound_sPi; : (÷);
Attributes: dynamic, id 285,
attributes: keep, sync, kbuf 6 7, expires 3600, limit 20400, hashsize 32768; product: VPN—1 & Firewall—1;
12:37:15 1172.16.6.171 >1 : (+); peer: 172.16.6.189; ,sPi: fs9baoec; CPTFMT_sep: sPI: 1; Ic00MB1:
c5364f5e6414aad9; ,cookieR:
95a478b10f9544a6; Expires: 3540/3610; product: VPN—1 & Firewall—1;
The output can include Security Associations (SAs) with an MSPI of 0. These are dummy SAs and
can safely be ignored.
SmartView Monitor
You must not activate the Monitoring Blade on the Scalable Platform. But, you can still use the
tunnels information in SmartView Monitor to see VPN tunnel status and details.
SNMP
• You can use the tunnelTable sub-tree in Check Point MIB .1.3.6.1.4.1.2620.500.9002 to see
VPN status with SNMP.
• For VSX environments, search for the SNMP Monitoring section in the R76 VSX Administration
Guide http://supportcontent.checkpoint.com/documentation_download?ID=22932 for VSX
related SNMP information.
CLI Tools
Use these CLI commands:
• To see VPN statistics per SGM, in Expert Mode run:
# cpstat -f all vpn
• To monitor VPN tunnels per SGM, in Expert Mode run:
# vpn tu
VPN tunnels are synchronized to all SGMs, therefore you can use run this command from the
scope of one SGM.
• To monitor VPN tunnels in the non-interactive mode, in gClish run:
> vpn shell tu
Note - In a VSX environment, you must run these commands from the applicable Virtual System
context.
Syntax
# asg_traffic_stats {<ssm_id> | <if_name>} [<delay>]
Parameters
Parameter Description
<ssm_id> SSM ID (1 - 4)
Shows the traffic statistics for the specified SSM
<if_name> The interface name: eth1-04 or eth1-Sync
Shows the total traffic statistics for a specified SSM
<delay> Length of time, in seconds, that traffic statistics are collected
Default = 5 seconds
eth1-04 statistics
---------------------
Incoming traffic:
------------------
Throughput: 164.9 Kbps
Packet rate: [Total: 252 pps], [Unicast: 14 pps], [Multicast: 161 pps], [Broadcast: 76 pps]
Outgoing traffic:
------------------
Throughput: 4.0 Kbps
Packet rate: [Total: 2 pps], [Unicast: 2 pps], [Multicast: 0 pps], [Broadcast: 0 pps]
Summary on SSM1
----------------
Incoming traffic:
------------------
Throughput: 319.1 Kbps
Packet rate: [Total: 409 pps], [Unicast: 167 pps], [Multicast: 166 pps], [Broadcast: 75 pps]
Outgoing traffic:
------------------
Throughput: 408.2 Kbps
Packet rate: [Total: 156 pps], [Unicast: 156 pps], [Multicast: 0 pps], [Broadcast: 0 pps]
Syntax
> asg_blade_stats [-6] corr [[-p [-v]] [-a] | [-reset]]
> asg_blade_stats [-6] iterator
> asg_blade_stats [-6] smo
> asg_blade_stats [-6] vpn [-v]
> asg_blade_stats [-6] 6in4 [-v]
> asg_blade_stats [-6] gre [-v]
> asg_blade_stats [-6] icmp_error [-v]
> asg_blade_stats [-6] all
> asg_blade_stats -h | Help
Parameters
Parameter Description
-6 Shows only IPv6 traffic.
corr Shows correction layer statistics (for predefined services) for each SGM.
-p Shows correction layer statistics for each service (for predefined services)
for each SGM. Use with corr
-reset Resets correction layer statistics. Use with corr
-a Shows aggregate statistics. Use with corr
-v Shows verbose statistics.
iterator Shows information about the last iterator process.
smo Shows statistics for SMO task, and logs for each SGM.
vpn Shows statistics for VPN forwarded packets.
6in4 Shows statistics for 6in4 tunnel forwarded packets.
gre Shows statistics for GRE forwarded packets.
icmp_error Shows statistics for ICMP ERROR forwarded packets.
vs Show Virtual System stateless correction layer statistics (VSX mode only).
arp_forw Shows statistics for ARP forwarded packets.
60000/40000 Security Systems Administration Guide R76SP.50 | 129
Logging and Monitoring
Parameter Description
all Shows all correction layer statistics mentioned above.
help Shows help information.
Traceroute (asg_tracert)
Description
Use this enhanced command to show correct tracert results on the Scalable Platform.
The native tracert cannot handle tracert pings correctly because of the stickiness
mechanism used in the Scalable Platform firewall.
The asg_tracert command supports all native tracert command options and parameters.
Syntax
> asg_tracert <ip> [<tracert_options>]
Parameters
Parameter Description
<ip> IP address
<tracert_options> Native tracert command options
Example:
> asg_tracert 100.100.100.99
traceroute to 100.100.100.99 (100.100.100.99), 30 hops max, 40 byte packets
1 (20.20.20.20) 0.722 ms 0.286 ms 0.231 ms
2 (100.100.100.99) 1.441 ms 0.428 ms 0.395 ms
>
Syntax
tcpdump [-b <SGM_IDs>] -mcap -w <capture_path> [<tcpdump_ops>]
tcpdump -view -r <capture_path> [<tcpdump_ops>]
Note - To stop the capture and save the data to the capture file, enter CTRL-C at the prompt.
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-w <capture_path>
Saves full file path.
In addition to the merged capture file, per SGM capture files are
created in the same directory, suffixed by their SGM ID.
-r <capture_path>
Read full file path.
Regular tcpdump output, prefixed by SGM ID of the processing SGM.
Syntax
asg_mroute -h
asg_mroute [-d <dest_route>] [-s <src_route>] [-i <src_if>][-b <SGM_IDs>]
Parameters
Parameter Description
-h Shows the built-in help.
-d <dest_route> Destination multicast group IP address.
-s <src_route> Source IP address.
-i <src_if> Source interface name.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Example - Shows all multicast routes for all interfaces and SGMs:
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg_mroute
+-----------------------------------------------------------------------------------+
|Multicast Routing (All SGMs) |
+-----------------------------------------------------------------------------------+
|Source |Dest |Iif |Oif |
+-------------------------+-------------------------+---------------+---------------+
|12.12.12.1 |225.0.90.90 |eth1-01 |eth1-02 |
+-------------------------+-------------------------+---------------+---------------+
|22.22.22.1 |225.0.90.90 |eth1-02 |eth1-01 |
+-------------------------+-------------------------+---------------+---------------+
|22.22.22.1 |225.0.90.91 |eth1-02 |eth1-01 |
+-------------------------+-------------------------+---------------+---------------+
[Global] MyChassis-ch01-01 >
When no optional parameters are specified, all routes, interfaces and SGMs are shown.
Syntax
asg_pim -h
asg_pim [-b <SGM_IDs>] [-i <if>]
asg_pim neighbors [-n <neighbor>]
Parameters
Parameter Description
-h Shows the built-in help.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-i <if> Shows only the specified source interface.
neighbors Runs verification tests to make sure that PIM neighbors are the same on
all SGMs and shows this information:
• Verification - Results of verification test
• Neighbor - PIM neighbor
• Interface - Interface name
• Holdtime - Time in seconds to hold a connection open during peer
negotiation
• Expires - Minimum and Maximum expiration values for all SGMs
-n <neighbor> Shows only the specified PIM neighbor.
Example 1 - Shows PIM information and multicast routes for all interfaces and SGMs
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg_pim
+--------------------------------------------------------------------------------------+
|PIM (All SGMs) |
+--------------------------------------------------------------------------------------+
|source |dest |Mode |Flags|In. intf |RPF |Out. intf |State |
+-----------+------------+----------+-----+---------+----------+------------+----------+
|12.12.12.1 |225.0.90.90 |Dense-Mode|L|M |eth1-01 |none | | |
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.90 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.91 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
| | | | | | |eth2-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
Flags: L - Local source, M - MFC State
[Global] MyChassis-ch01-01 >
• When no optional parameters are specified, all routes, interfaces and SGMs are shown.
• In this version, both the Dense Mode and the Sparse Mode are supported.
Example 2 - Shows PIM Information for the specific interface on all SGMs
[Expert@MyChassis-ch01-01:0]# asg_pim -i eth1-02 -b all
+--------------------------------------------------------------------------------------+
|PIM (All SGMs) |
+--------------------------------------------------------------------------------------+
|SGM 1_01 |
+--------------------------------------------------------------------------------------+
|source |dest |Mode |Flags|In. intf |RPF |Out. intf |State |
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.90 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.91 |Dense-Mode|L |eth1-02 |none |eth1-01 |Forwarding|
| | | | | | |eth2-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
|SGM 1_02 |
+--------------------------------------------------------------------------------------+
|source |dest |Mode |Flags|In. intf |RPF |Out. intf |State |
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.90 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.91 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
| | | | | | |eth2-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
[Expert@MyChassis-ch01-01:0]#
Syntax
asg_igmp -h
asg_igmp [-i <interface>] [-b <SGM_IDs>]
Parameters
Parameter Description
-h Shows the built-in help.
-i <interface> Source interface name.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Example 1 - Shows IGMP information and multicast routes for all interfaces and SGMs
Note - In this example, the verification detected an interface inconsistency.
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg_igmp
+------------------------------------------------------------------------------------------+
|Interface: eth1-02 |
+------------------------------------------------------------------------------------------+
|Verification: |
|Group Verification: Failed - Found inconsistency between blades |
| -Group 225.0.90.92: missing in blades 1_02 |
|Global Properties Verification: Passed - Information is identical on all blades |
+------------------------------------------------------------------------------------------+
|Group |Age |Expire |
+--------------------+----------+----------------------------------------------------------+
|225.0.90.92 |2m |3m |
+--------------------+----------+----------------------------------------------------------+
|Flags |IGMP Ver |Query Interval |Query Response Interval |protocol |Advertise Address|
+----------+---------+---------------+-------------------------+---------+-----------------+
|Querier |2 |125 |10 |PIM |22.22.22.10 |
+------------------------------------------------------------------------------------------+
+------------------------------------------------------------------------------------------+
|Interface: eth2-01 |
+------------------------------------------------------------------------------------------+
|Verification: |
|Group Verification: Passed - Information is identical on all blades |
|Global Properties Verification: Passed - Information is identical on all blades |
+------------------------------------------------------------------------------------------+
|Group |Age |Expire |
+--------------------+----------+----------------------------------------------------------+
|225.0.90.90 |2m |3m |
+--------------------+----------+----------------------------------------------------------+
|Flags |IGMP Ver |Query Interval |Query Response Interval |protocol |Advertise Address|
+----------+---------+---------------+-------------------------+---------+-----------------+
|Querier |2 |125 |10 |PIM |2.2.2.10 |
+------------------------------------------------------------------------------------------
Note - If you run this command in a VSX context, the output is for the applicable Virtual System.
Parameters
Parameter Description
-v Shows detailed Chassis status (Verbose Mode).
-vs <VS_IDs> Shows the Chassis status of Virtual Systems.
<VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
If <VS_IDs> is omitted, output shows the information for the current Virtual
System context.
For a Chassis with more than 3 SGMs, the output uses abbreviations to make
the output more compact.
-l Show the meaning of the abbreviations in the output for a Chassis with more
than 3 SGMs.
Example output:
> asg stat
-----------------------------------------------------------------------------
| VSX System Status |
-----------------------------------------------------------------------------
| Up time | 1 day, 20:04:39 hours |
-----------------------------------------------------------------------------
| Current CPUs load average | N/A |
| Concurrent connections | 400 |
| Health | SGMs 1 Inactive |
| | Power Supplies 2 Down |
| | Virtual Systems 6 / 6 |
-----------------------------------------------------------------------------
|Chassis 1 | STANDBY UP / Required |
| | SGMs 3 / 4 (!) |
| | Ports 2 / 2 |
| | Fans 6 / 6 |
| | SSMs 2 / 2 |
| | CMMs 2 / 2 |
| | Power Supplies 3 / 5 (!) |
-----------------------------------------------------------------------------
|Chassis 2 | ACTIVE UP / Required |
| | SGMs 4 / 4 |
| | Ports 2 / 2 |
| | Fans 6 / 6 |
| | SSMs 2 / 2 |
| | CMMs 2 / 2 |
| | Power Supplies 5 / 5 |
-----------------------------------------------------------------------------
>
Field Description
SGM ID Identifier of the SGM.
(local) is the SGM, on which you ran the command.
State State of the SGM:
• UP - The SGM is processing traffic
• DOWN - The SGM is not processing traffic
• Detached - No SGM is detected in a slot
To manually change the state of an SGM, use the asg sgm_admin command. This
command administratively changes the state to UP or DOWN. An SGM that is DOWN
because of a software or hardware problem cannot be changed to UP with this
command.
Process Status of the SGM security enforcement:
• Enforcing Security - UP and works properly
• Inactive - DOWN and is experiencing a problem. It is not handling traffic.
• Initial policy - The SGM is UP but the policy is not installed on the SGM.
Example output (bottom section):
... ... ...
--------------------------------------------------------------------------------
| Chassis Parameters |
--------------------------------------------------------------------------------
| Unit Chassis 1 Chassis 2 Unit Weight |
| |
| SGMs 5 / 6 (!) 6 / 6 (!) 6 |
| Ports |
| Standard 0 / 0 0 / 0 11 |
| Bond 2 / 2 2 / 2 11 |
Other 0 / 0 0 / 0 6 |
| Sensors |
| Fans 9 / 9 9 / 9 5 |
| SSMs 2 / 2 2 / 2 11 |
| CMMs 2 / 2 2 / 2 6 |
| Power Supplies 4 / 4 3 / 3 6 |
| |
| Chassis Grade 133 / 139 139 / 139 - |
--------------------------------------------------------------------------------
| Minimum grade gap for chassis failover: 11 |
| Synchronization |
| Within chassis: Enabled (Default) |
| Between chassis: Enabled (Default) |
| Exception Rules: (Default) |
--------------------------------------------------------------------------------
Note - The X/X notation shows the number of components that are UP and the components must
be UP. For example, on the SGMs line, 6/6 means that 6 SGMs are UP and 6 must be UP.
Field Description
Chassis Grade The sum of the grades of all components. In a Dual-Chassis deployment,
the Chassis with a higher grade (by at least the Minimum grade gap)
becomes ACTIVE. The grade of each component is the unit weight
multiplied by the number of components that are UP.
You can configure the unit weight of each component to show the
importance of the component in the system.
To configure the unit weight run:
> set chassis high-availability factors <sensor_name>
For example, to change the weight of the SGM to 12, run:
> set chassis high-availability factors sgm 12
If you run asg stat -v, the output shows a higher unit weight and
Chassis grade
Minimum grade gap Chassis failover occurs to the Chassis with the higher grade only if its
for chassis failover grade is greater than the other Chassis by more than the minimum gap.
Minimum threshold for traffic processing - The minimum grade
required for the Chassis to become Active.
Synchronization Status of synchronization:
• Within chassis - Between SGMs located in the same Chassis
• Between chassis - Between SGMs located in different Chassis
• Exception Rules - User configured exception rules. To configure, run:
g_sync_exception
Example output:
> asg stat -v -vs 0,1,2
------------------------------------------------------------------------------
| Chassis 1 STANDBY |
------------------------------------------------------------------------------
|SGM |1 |2 |3 |4 | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
|State | UP | UP |DOWN | UP | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| VS ID |
------------------------------------------------------------------------------
| 0 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| 1 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| 2 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| Chassis 2 ACTIVE |
------------------------------------------------------------------------------
|SGM |1 (l)|2 |3 |4 | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
|State | UP | UP | UP | UP | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| VS ID |
------------------------------------------------------------------------------
| 0 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| 1 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| 2 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
60000/40000 Security Systems Administration Guide R76SP.50 | 142
Logging and Monitoring
| Chassis Parameters
------------------------------------------------------------------------------
| Unit Chassis 1 Chassis 2 Unit Weight |
| |
| SGMs 3 / 4 (!) 4 / 4 6 |
| Ports |
| Standard 0 / 0 0 / 0 50 |
| Other 0 / 0 0 / 0 6 |
| Sensors |
| Fans 6 / 6 6 / 6 5 |
| SSMs 2 / 2 2 / 2 11 |
| CMMs 2 / 2 2 / 2 6 |
| Power Supplies 6 / 6 6 / 6 6 |
| |
| Chassis Grade 118 / 124 124 / 124 - |
------------------------------------------------------------------------------
| Minimum grade gap for chassis failover: 11 |
| Synchronization |
| Within chassis: Enabled (Default) |
| Between chassis: Enabled (Default) |
| Exception Rules: (Default) |
| Distribution |
| Control Blade: Disabled (Default) |
| Chassis HA mode: Active Up |
------------------------------------------------------------------------------
Example output:
> asg stat -l
Legend:
SGM States:
VS States:
Syntax
> asg monitor -h
> asg monitor
> asg monitor [-v|-all] [-amw] [-vs <VS_IDs>] <Interval>
> asg monitor -l
Parameters
Parameter Description
No Parameters Shows the SGM status.
-h Shows the command syntax and help information.
-amw Shows the Anti-Malware policy date instead of the Firewall policy
date.
-v Shows only Chassis component status.
-all Shows both SGM and Chassis component status.
<Interval> Sets the data refresh interval (in seconds) for this session.
-vs <VS_IDs> Shows the component status for one or more Virtual Systems.
<VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
If <VS_IDs> is omitted, output shows the information for the current
Virtual System context.
For a Chassis with more than 3 SGMs, the output has abbreviations
to make the output more compact
-l Shows legend of column title abbreviations
Example 1- Shows the SGM status with the Anti-Malware policy date:
> asg monitor -amw
---------------------------------------------------------------------------
| Chassis 1 ACTIVE |
---------------------------------------------------------------------------
| SGM ID State Process AMW Policy Date |
| 1 UP Enforcing Security 10Feb14 19:56 |
| 2 (local) UP Enforcing Security 10Feb14 19:56 |
| 3 UP Enforcing Security 10Feb14 19:56 |
| 4 UP Enforcing Security 10Feb14 19:56 |
---------------------------------------------------------------------------
| Chassis 2 STANDBY |
---------------------------------------------------------------------------
| SGM ID State Process AMW Policy Date |
| 1 UP Enforcing Security 10Feb14 19:56 |
| 2 UP Enforcing Security 10Feb14 19:56 |
| 3 UP Enforcing Security 10Feb14 19:56 |
| 4 UP Enforcing Security 10Feb14 19:56 |
---------------------------------------------------------------------------
| Chassis HA mode: Active Up |
---------------------------------------------------------------------------
>
Syntax
> asg perf -h
> asg perf [-b <SGM_IDs>] [-vs <VS_IDs>] [-k] [-v] [-vv] [-p] [-4 | -6] [-c]
> asg perf [-b <SGM_IDs>] [-vs <VS_IDs>] [-k] [--peak_hist | --perf_hist] [-e]
[--delay <seconds>]
> asg perf [-b <SGM_IDs>] [-vs <VS_IDs>] [-v] [-vv [ mem [fwk | cpd | fwd |
all_daemons] | cpu [1m | 1h | 24h]]]
Parameters
Parameter Description
-h Shows the command syntax and help information.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-vs <VS_IDs> Shows the Chassis status of Virtual Systems.
<VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
If <VS_IDs> is omitted, output shows the information for the current Virtual
System context.
-v Shows statistics for each SGM.
-vv Shows statistics for each Virtual System.
Note - This parameter is only relevant in a VSX environment.
60000/40000 Security Systems Administration Guide R76SP.50 | 146
Logging and Monitoring
--peak_hist Creates an exportable text file that contains all data saved in the peak
performance files. You must use this parameter together with -k.
--perf_hist Creates exportable text files that contain all performance data saved in the
history files. You must use this parameter together with -k.
-e Resets peak values and deletes all peaks files and system history files.
--delay Temporarily changes the update interval for the current asg perf session.
<seconds> Enter a delay value in seconds. Default = 10 seconds.
Notes:
• The -b <SGM_IDs> and -vs <VS_IDs> parameters must be at the start of the command.
If both parameters are used, -b <SGM_IDs> must be first.
• If your 60000/40000 Security System is not configured for VSX, the VSX related commands are
not available.
They do not show when you run the asg perf -h command.
Notes:
• By default, absolute values are shown.
• Unless otherwise specified, the combined statistics for IPv4 and IPv6 are shown.
• When no SGMs are specified, performance statistics are shown for the Active SGM only.
+-------------------------------------------------------------------------+
|Per SGM Distribution Summary |
+-----+-----------+--------+--------+--------+----------+----------+------+
|SGM |Throughput |Packet |Conn. |Concu. |Accel. |Instances |Mem. |
|ID | |Rate |Rate |Conn |Cores% |Cores% |Usage%|
+-----+-----------+--------+--------+--------+----------+----------+------+
|1_01 |10.2 K |11 |0 |22 |6/6/6 |5/4/9 |55% |
+-----+-----------+--------+--------+--------+----------+----------+------+
|Total|10.2 K |11 |0 |22 |6/6/6 |5/4/9 |55% |
+-----+-----------+--------+--------+--------+----------+----------+------+
+-----------------------------------+
|Per VS CPU Usage Summary |
+-----+---------+---------+---------+
|VS ID|Avg. Cpu%|Min. Cpu%|Max. Cpu%|
| | |(SGM id) |(SGM id) |
+-----+---------+---------+---------+
| 0 |2 |1 (1_02)|2 (1_01)|
60000/40000 Security Systems Administration Guide R76SP.50 | 148
Logging and Monitoring
| 1 |0 |0 (1_01)|0 (1_04)|
+-----+---------+---------+---------+
* CPU stats is aggregated over the last 24hrs
[Global] MyChassis-ch01-01 >
Notes:
• Average, minimum and maximum values are calculated across all active SGMs.
• The SGM ID with the minimum and maximum value shows in brackets for each SGM.
• Unless otherwise specified, the combined statistics for both IPv4 and IPv6 are shown.
• When no SGMs are specified, performance statistics are shown for the active SGM only.
Virtual System Memory Summary with Performance Summary (asg perf -vs
all -vv mem)
The -vv mem parameter shows memory usage for each Virtual System across all Active SGMs.
Example:
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg perf -vs all -vv mem
Tue Jul 29 16:05:44 IDT 2014
Aggregated statistics (IPv4 Only) of SGMs: chassis_active VSs: all
+--------------------------------------------------------------+
|Performance Summary |
+----------------------------------------------+---------------+
|Name |Value |
+----------------------------------------------+---------------+
|Throughput |684.5 K |
|Packet rate |700 |
|Connection rate |3 |
|Concurrent connections |144 |
|Load average |2% |
|Acceleration load (avg/min/max) |0%/0%/1% |
|Instances load (avg/min/max) |2%/0%/12% |
|Memory usage |10% |
+----------------------------------------------+---------------+
* Instances / Acceleration Cores: 8 / 4
+--------------------------------------------------------------------------+
|Per VS Memory Summary |
+--------+-------------+-------------+-------------+-------------+---------+
| VS ID | User Space | Memory in | FWK memory | Total memory| CPU |
| | memory | Kernel | | | Usage % |
+--------+-------------+-------------+-------------+-------------+---------+
| 0 max|222.3M (1_01)|1.658G (1_04)|47.11M (1_04)|1.880G (1_04)| N/A |
| min|215.8M (1_03)|1.213G (1_01)|45.55M (1_03)|1.249G (1_01)| N/A |
+--------+-------------+-------------+-------------+-------------+---------+
| 1 max|56.34M (1_02)| 0K (1_04) |31.16M (1_02)|56.34M (1_02)| N/A |
| min|54.24M (1_01)| 0K (1_04) |29.52M (1_03)|54.24M (1_01)| N/A |
+--------+-------------+-------------+-------------+-------------+---------+
* Maximum and minimum values are calculated across all active SGMs
[Global] MyChassis-ch01-01 >
Notes:
• The SGM that uses the most user space memory on Virtual System 1 is SGM 1_01
• The SGM that uses the least fwk daemon memory on Virtual System 3 is SGM 1_02
• This information shows only if vsxmstat is enabled for perfanalyze use
• Make sure that the vsxmstat feature is enabled (vsxmstat status_raw)
+---------------------------------------------------------------------------------------+
|Per SGM Distribution Summary |
+-------+------------+------------+-----+-----------+-------------+--------------+------+
|SGM ID |Throughput |Packet rate |Conn.|Concurrent |Core usage |Core Instances|Memory|
| | | |Rate |Connections|avg/min/max %|avg/min/max % |Usage |
+-------+------------+------------+-----+-----------+-------------+--------------+------+
|1_01 |644.3 M |1.2 M |0 |520 |52/44/62 |6/3/10 |18% |
|1_02 |526.7 M |997.1 K |0 |512 |61/51/68 |2/0/5 |18% |
|1_03 |526.6 M |997.0 K |0 |512 |62/53/73 |2/1/3 |18% |
|1_04 |526.7 M |997.0 K |0 |804 |54/48/60 |2/1/3 |18% |
|1_05 |526.7 M |997.1 K |0 |512 |59/45/76 |3/1/5 |18% |
|1_06 |526.7 M |997.1 K |0 |512 |61/52/70 |4/4/5 |18% |
+-------+------------+------------+-----+-----------+-------------+--------------+------+
|Total |3.3 G |6.2 M |0 |3.4 K |58/48/68 |3/1/5 |18% |
+-------+------------+------------+-----+-----------+-------------+--------------+------+
+-----------------------------------------------------------------------------------+
|Per Path Distribution Summary |
+-------------------------+------------+------------+------------+------------------+
| |Acceleration|Medium |Firewall |Dropped |
+-------------------------+------------+------------+------------+------------------+
|Throughput |3.2 G |0 |2.1 M |117.6 M |
|Packet rate |6.0 M |0 |1.4 K |222.8 K |
|Connection rate |0 |0 |0 | |
|Concurrent connections |3.2 K |0 |156 | |
+-------------------------+------------+------------+------------+------------------+
+----------------------------------------+--------------------+
|VPN Performance |
+----------------------------------------+--------------------+
|VPN throughput |2.9 G |
|VPN connections |3.1 K |
+----------------------------------------+--------------------+
[Global] MyChassis-ch01-01 >
Syntax
> set chassis alert_threshold <threshold_name> <value>
> show chassis alert_threshold <threshold_name>
Parameters
Parameter Description
<threshold_name Threshold name as specified in the table below
>
<value> High or low value for the applicable threshold
Example - Set the memory utilization high limit to 70% of installed memory:
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > set chassis alert_threshold
mem_util_threshold_perc_high 70
[Global] MyChassis-ch01-01 >
The parameters and options for the standard Linux command are available for the global
command. You can use the -b parameter to select some or all SGMs for the global command.
Syntax
{<gClish_command> | <global_command>} [-b <SGM_IDs>] <command_options>]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Note - You can only select SGMs from one Chassis with this option.
<gClish_command> Standard command in gClish.
Parameter Description
<global_command> Global command as shown in the table in Expert Mode.
<command_options> Standard command options for the specified command.
Note - You can use one or more flags. However, do not use the –l and –r flags together.
Global 'ls'
Description
This command shows the file in the specified directory on all SGMs.
Syntax
# g_ls [-b <SGM_IDs>] <command_options>]
> ls [-b <SGM_IDs>] <command_options>]
Example
This example runs the 'g_ls' command in the Expert mode on SGMs 1_1, 1_2, and 1_3.
The example output shows the combined results for these SGMs.
[Expert@MyChassis-ch01-01:0]# g_ls –b 1_1-1_3,2_1 /var/
-*- 4 blades: 1_01 1_02 1_03 -*-
CPbackup ace crash lib log opt run suroot
CPsnapshot cache empty lock mail preserve spool tmp
[Expert@MyChassis-ch01-01:0]#
Global 'reboot'
Description
This command reboots all SGMs.
Syntax
# g_reboot [-a]
> reboot [-a]
Parameters
Parameter Description
No Parameter Reboots all SGMs that are in the UP state only.
-a Reboots all SGMs in both the DOWN and UP states.
Global 'top'
Description
The global top command shows SGM processor activity in real time.
The default output also shows a list of the most processor-intensive processes.
The global top command relies on the user configuration for the local top utility.
The command uses the local SGM configuration file for configuring the output on the remote
SGMs.
With the standard functionality of the Linux top command, the global top command adds these
features for the Scalable Platform.
Syntax
# g_top -h
# g_top [local] [-f [-o <filename>] [-n <iter>] | -s <filename>] -b <SGM_IDs>
[<top_params>]
Parameters
Parameter Description
-h Shows the built-in help.
local Use the local configuration file.
-f Export the output to a file.
-o <filename> File and path of the output file.
Default = /vat/log/gtop.<time>
Use with -f
-n <iter> Number of iterations.
Default = 1
Use with -f
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
<top_params> Parameters of the standard top command.
For more information, see the top command documentation.
-s <filename> Shows the content of the output file <filename>.
The top command uses a configuration file to manage output display. By default it copies and
uses this configuration file from the local blade (usually located in the ~/.toprc). This file is
copied to all SGMs and is used when the top is run.
Global 'arp'
Description
This command shows the ARP cache table on all SGMs.
Syntax
# g_arp [-b <SGM_IDs>] <command_options>]
> arp [-b <SGM_IDs>] <command_options>]
Syntax
> asg resource -h
> asg resource [-b <SGM_IDs>]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-h Shows usage and exits
Example:
> asg resource
+-------------------------------------------------------------------------+
|Resource Table |
+------------+-------------------------+------------+------------+--------+
|SGM ID |Resource Name |Usage |Threshold |Total |
+------------+-------------------------+------------+------------+--------+
|1_01 |Memory |14% |50% |31.3G |
| |HD: / |22% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+--------+
|1_02 |Memory |9% |50% |62.8G |
| |HD: / |23% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+--------+
|1_03 |Memory |9% |50% |62.8G |
| |HD: / |23% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+--------+
|2_01 |Memory |9% |50% |62.8G |
| |HD: / |23% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+--------+
|2_02 |Memory |9% |50% |62.8G |
| |HD: / |23% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+--------+
|2_03 |Memory |9% |50% |62.8G |
| |HD: / |23% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+--------+
>
60000/40000 Security Systems Administration Guide R76SP.50 | 158
Logging and Monitoring
Output description
Column Description
SGM Shows the SGM ID.
Resource Identifies the resource. There are four types of resources:
• Memory
• HD – Hard drive space (/)
• HD: /var/log – Space on hard drive committed to log files
• HD: /boot - Location of the kernel
Usage Shows the percentage of the resource in use
Threshold Indicates the health and functionality of the component. When the value of the
resource is greater than the threshold, an alert is sent. The threshold can be
modified in gClish.
Total Total absolute value in units.
For example, the first row shows that SGM1 on Chassis1 has 31.3 GB of
memory, 14% of which is used. An alert is sent if the usage is greater than
50%.
Parameters
Parameter Description
-help Shows the command syntax and help text.
Without parameters Runs in the interactive mode.
-vs <VS_IDs> Shows connections for the specified Virtual System.
<VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
<protocol> IP Protocol.
Parameter Description
-v Shows connection indicators for
• A - Active SGM
• B - Backup SGM
• F - Firewall connection table
• S - SecureXL connection table
• C - Correction Layer table
This is in addition to the indicators for Active and Backup SGM.
Notes:
• You must enter the all parameters in the sequence shown in the above syntax.
• You can enter \* as a parameter to show all values for that parameter.
• The -vs parameter is only available for a Scalable Platform running VSX.
Command Line Examples
Legend:
A - Active SGM
B - Backup SGM
C - Correction Layer table
F - Firewall connection table
S - SecureXL connection table
[Global] MyChassis-ch01-01 >
One IPv6 source, all destinations, source port 8080, and TCP protocol:
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg search 2620:0:2a03:16:2:33:0:1 \* 8080 tcp
Interactive Mode Example - One IPv4 source and destination with '-v'
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg search -v
Legend:
A - Active SGM
B - Backup SGM
C - Correction Layer table
F - Firewall connection table
S - SecureXL connection table
Example 2 - One IPv6 source with any Destination on port 8080 and TCP:
[Global] MyChassis-ch01-01 >
[Global] MyChassis-ch01-01 > asg search 2620:0:2a03:16:2:33:0:1 \* 8080 tcp
Enter source IP (press enter for wildcard):
> 2620:0:2a03:16:2:33:0:1
Enter destination IP (press enter for wildcard):
>
Enter destination port (press enter for wildcard):
>8080
Enter IP protocol ('tcp', 'udp', 'icmp' or enter for wildcard):
>tcp
Enter source port (press enter for wildcard):
>
Lookup for conn: <2620:0:2a03:16:2:33:0:1, *, *, 8080, tcp>, may take few seconds...
<2620:0:2a03:16:2:33:0:1, 52117, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
<2620:0:2a03:16:2:33:0:1, 62775, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
<2620:0:2a03:16:2:33:0:1, 54378, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
A - Active SGM
B - Backup SGM
[Global] MyChassis-ch01-01 >
Option Description
Full Configuration Wizard Create a new alert.
Edit Configuration Change an existing alert.
Show Configuration Show existing alert configurations.
Configure events severity Configure severity for events.
Run Test Run a test simulation to make sure that the alert works correctly.
Define one or more SNMP managers to get SNMP traps sent from the Security Gateway. For each
manager, configure these parameters.
Example
>asg alert
(Main Menu)
Choose one of the following options:
----------------------------------------
1) Full Configuration Wizard
2) Edit Configuration
3) Show Configuration
4) Configure events severity
5) Run Test
e) Exit
>4
Event Categories:
------------------
1) System events
2) Hardware Monitor events
3) Performance events
b) Back
>1
Events:
--------------------
1) Concurrent Connections
2) Connection Rate
3) Packet Rate
4) Throughput
5) CPU Load
6) Hard Drive Utilization
7) Memory Utilization
8) NAT Monitor CoreXL utilization
9) NAT Monitor SecureXL utilization
10) NAT Monitor SecureXL pool state
b) Back
>1
Event: BladeStateEvent
Description: SGM State
SNMP Alert OID: 1.3.6.1.4.1.2620.1.2001.1.2
Severity: 1
Choose one of the following options:
---------------------------------------------------
1) Low
2) Medium
3) High
4) Critical
b) Back
> 3
The new severity of BladeStateEvent event is 3 "High"
Press enter to continue...
Alert Modes
The Alert Modes are:
• Enabled - An alert is sent for the selected events
• Disabled - No alert is sent for the selected events
• Monitor - A log entry is generated instead of an alert
Diagnostic Events
Best Practice - Run the smo verifiers (or show smo verifiers report) command on a
regular basis.
If the test fails, an alert shows. The alerts continue to show on Message of the Day (MOTD) until
the issues resolve. When the issues resolve, a Clear Alert message shows the next time the test
runs. You can manually run the smo verifiers (show smo verifiers report) to confirm the
issue is resolved.
• The tests run at 01:00 each day by default. You can manually reset the default time.
• The test automatically runs all tests but you can select the tests you do not want to include.
• When you manually run the show smo verifiers report command, the complete set of
tests run, even those you de-selected.
• All failed tests show in the MOTD, but you can disable this feature.
Syntax
> show smo verifiers list
[id <TestId1>,<TestId2>,...]
[section <SectionName>]
> show smo verifiers report [except]
[id <TestId1>,<TestId2>,...]
[name <TestName>]
[section <SectionName>]
> show smo verifiers print [except]
[id <TestId1>,<TestId2>,...]
[name <TestName>]
[section <SectionName>]
> show smo verifiers
periodic
last-run report
print
> delete smo verifiers purge [save <Num_Logs>]
Parameters
Parameter Description
list Shows the list of tests to run.
report Runs tests and shows a summary of the test results.
print Runs tests and shows the full output and summary of the test
results.
except Runs all tests except the specified tests.
Shows the requested results.
id <TestId1>,<TestId2>,... Specifies the tests by their IDs (comma separated list).
To see a list of test IDs, run:
> show smo verifiers list
name <TestName> Specifies the tests by their names.
Press the Tab key to see a full list of verifiers names.
Parameter Description
last-run Shows the latest run results.
| DoS |
--------------------------------------------------------------------------------
| 43 | SYN Defender | Passed | |
| 44 | F2F Quota | Passed | |
--------------------------------------------------------------------------------
| Misc |
--------------------------------------------------------------------------------
| 45 | Core Dumps | Passed | |
| 46 | Syslog | Passed | (1)Log server is not configured |
| 47 | Processes | Passed | |
| 48 | Performance hogs | Passed | |
--------------------------------------------------------------------------------
| Tests Summary |
--------------------------------------------------------------------------------
| Passed: 37/48 tests |
| Run: "show smo verifiers list id 1,4,7,9,15,16,23,27,31,34,38" to view a complete list of |
| failed tests |
| Output file: /var/log/alert_verifier_sum.1-48.2017-02-05_01-00-02.txt |
--------------------------------------------------------------------------------
>
Note - The show smo verifiers last-run print shows the verbose output.
This example output shows the summary output for all diagnostic tests.
When a test fails, the reasons for failure show in the Reason column.
> show smo verifiers report
Duration of the tests can vary and can take a few minutes to complete.
---------------------------------------------------------------------------------
| Tests Status |
---------------------------------------------------------------------------------
| ID | Title | Result | Reason |
---------------------------------------------------------------------------------
| System Components |
---------------------------------------------------------------------------------
| 1 | System Health | Failed (!) | (1)Chassis 2 error |
| 2 | Hardware | Failed (!) | (1)Power unit is missing |
| | | | (2)Power consumption exceeds threshold |
| 3 | Resources | Failed (!) | (1)Memory capacity |
| | | | (2)Memory capacity mismatch |
| 4 | Software Versions | Failed (!) | |
| 5 | Software Provision | Passed | |
| 6 | CPU Type | Failed (!) | (1)Non-compliant CPU type |
| 7 | Media Details | Failed (!) | (1)SSM 1 on chassis 2 |
| 8 | Chassis ID | Passed | |
---------------------------------------------------------------------------------
| Policy and Configuration |
---------------------------------------------------------------------------------
| 9 | Distribution Mode | Passed | |
| 10 | DXL Balance | Passed | |
| 11 | Policy | Passed | |
| 12 | AMW Policy | Passed | |
| 13 | SWB Updates | Passed | |
| 16 | Security Group | Failed (!) | (1)DB error |
| 17 | SPI Affinity | Passed | (1)Not configured |
| 18 | Clock | Passed | |
| 19 | Licenses | Passed | (1)Trial license installed |
| 20 | Hide NAT range | Passed | (1)Not configured |
| 21 | LTE | Passed | (1)Not configured |
| 22 | IPS Enhancement | Passed | (1)Not configured |
| 23 | Configuration File | Passed | |
---------------------------------------------------------------------------------
| Networking |
---------------------------------------------------------------------------------
| 24 | MAC Setting | Passed | |
| 25 | ARP Consistency | Passed | |
| 26 | Interfaces | Failed (!) | (1)RX drop |
| 27 | Bond | Passed | (1)Not configured |
| 28 | Bridge | Passed | (1)Not configured |
| 29 | IPv4 Route | Passed | |
| 30 | IPv6 Route | Passed | (1)Not configured |
| 31 | OS Route Cache | Passed | |
60000/40000 Security Systems Administration Guide R76SP.50 | 174
Logging and Monitoring
Note - Press the Tab key after the name parameter to see a full list of verifiers names.
This example collects diagnostic information for specified test.
> show smo verifiers report name System_Health
Duration of tests vary and may take a few minutes to complete
--------------------------------------------------------------------------------
| Tests Status |
--------------------------------------------------------------------------------
| ID | Title | Result | Reason |
--------------------------------------------------------------------------------
| System Components |
--------------------------------------------------------------------------------
| 1 | System Health | Failed (!) | (1)Chassis 1 error |
--------------------------------------------------------------------------------
| Tests Summary |
--------------------------------------------------------------------------------
| Passed: 0/1 test |
| Run: "show smo verifiers list id 1" to view a complete list of failed tests |
| Output file: /var/log/verifier_sum.1.2017-02-20_19-58-03.txt |
| Run "show smo verifiers last-run print" to display verbose output |
--------------------------------------------------------------------------------
>
Note - To see a list of test IDs, run: show smo verifiers list
This example collects diagnostic information for specified tests 1, 2, 3, 4, 5, and 30.
> show smo verifiers report id 1,2,3,4,5,30
Duration of tests can vary and can take a few minutes to complete.
--------------------------------------------------------------------------------
| Tests Status |
--------------------------------------------------------------------------------
| ID | Title | Result | Reason |
--------------------------------------------------------------------------------
| System Components |
--------------------------------------------------------------------------------
| 1 | System Health | Failed (!) | (1)Verifier error - Check raw output |
| 2 | Hardware | Passed | |
| 3 | Resources | Failed (!) | (1)Memory capacity |
| | | | (2)Primary HD capacity |
| | | | (3)Primary HD exceed threshold |
| | | | (4)Log HD capacity |
| | | | (5)Boot HD capacity |
| 4 | Software Versions | Failed (!) | |
| 5 | Software Provision | Failed (!) | |
--------------------------------------------------------------------------------
| Networking |
--------------------------------------------------------------------------------
| 30 | IPv6 Route | Passed | (1)Not configured |
--------------------------------------------------------------------------------
| Tests Summary |
--------------------------------------------------------------------------------
| Passed: 2/6 tests |
| Run: "show smo verifiers list id 1,3,4,5" to view a complete list of failed |
| tests |
| Setting MOTD... |
| Output file: /var/log/verifier_sum.1-5.30.2017-01-29_11-42-13.txt |
| Run "show smo verifiers last-run print" to display verbose output |
--------------------------------------------------------------------------------
>
Syntax
> asg_perf_hogs
Example output
> asg_perf_hogs
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
| [PASSED] | Soft lockups |
-----------------------------------------------------------------
>
Notes:
• If all of the asg_perf_hogs tests pass, smo verifiers shows Passed.
• If even one of the asg_perf_hogs tests fails, smo verifiers shows Failed.
Configuration
You can configure asg_perf_hogs with the $FWDIR/conf/performance_hogs.conf file.
[tests]
long_running_procs=1
accel_off=1
sim_debug_flags=1
fw1_debug_flags=1
local_logging=1
templates_disabled_from_rule=1
correction_table_entries=1
routing_cache_entries=1
swap_saturation=1
delayed_notifications=1
neighbour_table_overflow=1
soft_lockups=1
[correction_table_entries]
threshold=10
[long_running_procs]
elapsed_time=60
processes_to_check=("fw ctl zdebug" "fw ctl debug" "fw ctl kdebug" "fw monitor" "sim dbg" "tcpdump")
[routing_cache_entries]
threshold=90
[swap_saturation]
threshold=50
[neighbour_table_overflow]
timeout=3600
[soft_lockups]
timeout=3600
The tests section lets you enable and disable which tests to run.
To configure a test:
1. Find the configuration section for the test in $FWDIR/conf/performance_hogs.conf. If it
does not exist, add the section with this format:
[<test_name>]
2. Change or add the parameters for the test. See the tables below for allowed parameters.
Note - Not all the tests can be configured.
long_running_procs
The long_running_procs test confirms that certain processes do not run longer than the
configured time.
Note - This test runs in contexts of all Virtual Systems.
Parameters:
Parameter Description
elapsed_time Longest time in seconds a process should run
Default = 60 seconds
Minimum recommended value = 30
processes_to_check List of processes to check:
Each process must be in quotes. Put a space between each test.
Default: "fw ctl zdebug" "fw ctl debug" "fw ctl kdebug"
"fw monitor" "sim dbg" "tcpdump"
Example: processes_to_check=("fw ctl zdebug" "fw ctl
debug" "fw ctl kdebug" "fw monitor" "sim dbg"
"tcpdump")
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [FAILED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
60000/40000 Security Systems Administration Guide R76SP.50 | 178
Logging and Monitoring
accel_off
The accel_off test confirms that SecureXL is working.
Notes:
• This test has no configuration options.
• The test runs in the context of the current Virtual System only.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [FAILED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] SecureXL acceleration is disabled!
sim_debug_flags
The sim_debug_flags test confirms that the PPACK debug flags that are not enabled by default,
stay in the not-enabled position.
This test runs on contexts of all Virtual Systems. This test has no configuration options.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [FAILED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] PPACK debug flags are set: Module: vpn; ; Flags: vpnpkt
s
fw1_debug_flags
The fw1_debug_flags test confirms that Firewall debug flags that are not enabled by default,
stay in the disabled position.
Notes:
• This test has no configuration options.
60000/40000 Security Systems Administration Guide R76SP.50 | 179
Logging and Monitoring
local_logging
The local_logging test confirms that logs are written to a Log Server and not locally.
Notes:
• This test has no configuration options.
• This test runs in the context of the current Virtual System only.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [FAILED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Local logging is active: No connection with log server!
templates_disabled_from_rule
The templates_disabled_from_rule test confirms that SecureXL templates are not disabled
because of the specific Firewall rules.
Notes:
• This test has no configuration options.
• This test runs regardless of the Virtual System context.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [FAILED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
60000/40000 Security Systems Administration Guide R76SP.50 | 180
Logging and Monitoring
correction_table_entries
The correction_table_entries test confirms that the size ratio between Corrections table
and the Connections table is not above the threshold.
Threshold is the size ratio allowed between the Corrections table and the Connections table.
Recommended range is 5 - 95.
Note - This test runs in the context of the current Virtual System only.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [FAILED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Correction table has 5 entries and is larger than 10% of connections table (20 entries)
delayed_notifications
The delayed_notifications test confirms that delayed notifications are enabled. The output
shows if delayed notifications are disabled for all services, or only for HTTP.
Notes:
• This test has no configuration options.
• The test runs in contexts of all Virtual Systems.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [FAILED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Delayed notifications for http is disabled.
routing_cache_entries
The routing_cache_entries test confirms that the IPv4 route cache capacity is not above a
certain threshold.
60000/40000 Security Systems Administration Guide R76SP.50 | 181
Logging and Monitoring
Threshold is the percent capacity of the IPv4 route cache that should not be exceeded:
• Default = 90
• Recommended range = 75 - 95
Note - This test runs in the context of the current Virtual System only.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [FAILED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Routing cache is 93% full (983731 out of 1048576 entries).
swap_saturation
The swap_saturation test confirms that swap file usage is not above the threshold.
Threshold is the percent use of the swap file allowed. Recommended range is 75 - 99.
Note - This test runs regardless of the Virtual System context.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [FAILED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Swap saturation is 90%. Total swap space: 1044216 bytes, used: 950000 bytes.
neighbour_table_overflow
The neighbour_table_overflow test confirms that the ARP cache did not overflow.
Timeout is the number of seconds that specifies for how long to look in the /var/log/messages
file for ARP cache overloaded messages. Recommended range is 300 - 86400.
Notes:
• To learn how to adjust the ARP cache, see sk43772
http://supportcontent.checkpoint.com/solutions?id=sk43772.
• This test runs regardless of the Virtual System context.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [FAILED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Neighbour table overflow occurred during the last 3600 seconds. Please see solution SK43772 for
information how to configure arp cache size.
soft_lockups
The soft_lockups test confirms there are no kernel soft lockups during the timeout period.
Timeout is the number of seconds to look back in the /var/log/messages file for kernel soft
lockup messages:
• Default = 3600
• Recommended range = 300 - 86400
Note - This test runs regardless of the Virtual System context.
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
| [FAILED] | Soft lockups |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[1_01] Soft lockup occurred during the last 3600 seconds.
Description
For each Chassis port, use the set chassis high-availability port ... priority ...
command in gClish to set a port priority (high or standard) for each port.
Syntax
> set chassis high-availability port <if_name> priority <priority>
Parameters
Parameter Description
<if_name> Interface name
<priority> Port grade
Valid values:
• 1 - Standard priority
• 2 - Other priority
Use the set chassis high-availability port ... priority ... command together with
the set chassis high-availability factors port ... command:
• Set the port grade as standard or high.
For example:
> set chassis high-availability factors port standard 50
This sets the standard grade at 50.
• Set the port to high grade or standard grade.
For example:
> set chassis high-availability port eth1-01 priority 1
This assigns to eth1-01 the standard port grade.
Troubleshooting Failures
Use the smo verifiers command to troubleshoot a failed diagnostic test.
In the example below, the test shows that two fans are down and the CPU temperature exceeds its
threshold. The output identifies the failed components.
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > show smo verifiers report id 2
[Global] MyChassis-ch01-01 >
[Global] MyChassis-ch01-01 > show smo verifiers report id 2
--------------------------------------------------------------------------------
| Tests Status |
--------------------------------------------------------------------------------
| ID | Title | Result | Reason |
--------------------------------------------------------------------------------
| System Components |
--------------------------------------------------------------------------------
| 2 | Hardware | Failed (!) | (1)Chassis fan is down |
| | | | (2)Chassis fan exceeds threshold |
| | | | (3)CPU exceeds threshold |
--------------------------------------------------------------------------------
| Tests Summary |
--------------------------------------------------------------------------------
| Passed: 0/1 test |
| Run: "show smo verifiers list id 2" to view a complete list of failed tests |
| Output file: /var/log/verifier_sum.2.2017-01-29_15-46-58.txt |
| Run "show smo verifiers last-run print" to display verbose output |
--------------------------------------------------------------------------------
[Global] MyChassis-ch01-01 >
Error Types
Errors detected by smo verifiers:
Resource Description
Memory RAM memory capacity in GB
HD: / Disk capacity in GB for <disk> - the root (/) partition
HD:/var/log Disk capacity in GB for the /var/log partition
HD: /boot Disk capacity in GB for the /boot partition
Skew The maximum permissible clock difference, in seconds, between the SGMs
and CMMs
Certified cpu Each line represents one compliant CPU type
Syntax
> asg hw_monitor [-v] [-f <filter>]
Parameters
Parameter Description
-v Show detailed component status report (verbose)
-f Show status of one or more specified (filtered) components
<filter> One or more of these component types, in a comma separated list:
• CMM
• CPUtemp
• Fan
• PowerConsumption
• PowerUnit
• SSM
Output description:
Column Description
Location Front panel location.
Value Threshold Units Most components have a defined threshold value. The threshold
gives an indication of the health and functionality of the component.
When the value of the resource is greater than the threshold, an alert
is sent (on page 164).
State • 0 = Component not installed
• 1 = Component is installed
Syntax
# asg_chassis_ctrl <option> <parameters>
Notes
• To see the full syntax for an option, run the command and option without parameters.
• To make sure the Chassis Control commands work correctly, run this command on both
Chassis:
Example
[Expert@MyChassis-ch01-01:0]# asg_chassis_ctrl get_cmm_status
Getting CMM(s) status
CMM #1 -> Health: 1, Active: 1
CMM #2 -> Health: 1, Active: 0
Active CMM firmware version: 2.83
[Expert@MyChassis-ch01-01:0]#
Syntax
# asg_cores_util
Example output
# asg_cores_util
+---------------------+
|CPUs Utilization |
+-----------+----+----+
|CPU \ Blade|2_3 |2_4 |
+-----------+----+----+
|cpu0 |29% |2% |
+-----------+----+----+
|cpu1 |0% |0% |
+-----------+----+----+
|cpu2 |0% |1% |
+-----------+----+----+
|cpu3 |37% |25% |
+-----------+----+----+
|cpu4 |0% |0% |
+-----------+----+----+
|cpu5 |1% |18% |
+-----------+----+----+
|cpu6 |0% |0% |
+-----------+----+----+
|cpu7 |0% |0% |
+-----------+----+----+
|cpu8 |0% |0% |
+-----------+----+----+
|cpu9 |0% |1% |
+-----------+----+----+
|cpu10 |0% |0% |
+-----------+----+----+
|cpu11 |0% |0% |
+-----------+----+----+
|cpu12 |0% |0% |
+-----------+----+----+
|cpu13 |1% |1% |
+-----------+----+----+
|cpu14 |1% |0% |
+-----------+----+----+
|cpu15 |0% |0% |
+-----------+----+----+
#
Security Monitoring
Use these features to monitor your system security.
Syntax
> g_sim synatk [-e] [-d] [-m] [-g] [-t <threshold>] [-a] [monitor] [monitor -v]
> g_sim6 synatk [-e] [-d] [-m] [-g] [-t <threshold>] [-a] [monitor] [monitor -v]
> g_sim synatk state -i <interface_name> -a
> g_sim6 synatk -a
> g_asg synatk [-b <SGM_IDs>] [-4 | -6]
Parameters
Parameter Description
-e Enable SYN defender. This engages the system when it
recognizes an attack on an external interface. External interfaces
are defined in SmartDashboard. Internal interfaces are always in
Monitor Mode.
-d Disable SYN Defender.
-m Set Monitor Mode. SYN defender only sends a log when it
recognizes an attack.
-g Enforce on all interfaces.
-t <threshold> Set the SYN Defender threshold number of half-opened
connections.
-i state <interface_name> Simulate a SYN attack on the specified interface.
-a Use configuration from the $PPKDIR/conf/synatk.conf file.
monitor Show the attack monitoring tool.
Parameter Description
monitor -v Show the attack monitoring tool with extra (verbose) information.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-6 Shows the IPv6 status only.
-4 Shows the IPv4 status only.
Example:
enabled = 1
enforce = 1
Field Description
<if_name> Interface name
<state> • disabled - SYN Defender does not protect or monitor
the interface
• monitor- SYN Defender monitors but does not protect
the interface
• enforce - SYN Defender protects the interface
Example:
interface eth1-01 state = enforce
interface eth2-01 state = disabled
Output:
Field Description
IF Interface name.
Topology Topology as defined in SmartDashboard.
Enforce Action taken by SYN Defender:
Prevent - Detects attacks and enforces protection.
Detect - Detects attacks, but only generates log entries. Does not
enforce protection.
Disabled - Protection is disabled.
State Current SYN Defender state:
Disabled - SYN Defender is disabled for this interface.
Monitor - The interface is not under attack and SYN Defender
monitors connections.
Active - The interface is under attack and SYN Defender enforces
protections.
Grace - The attack on the interface ended and the normal service is
restored.
non-established conns Peak - The highest number of half-opened connections for this
interface. This can help you to configure the correct threshold.
Current - The number of half-opened connections at this time.
+-----------------------------------------------------------------------------+
| Status Under Attack (!) |
| Spoofed SYN/sec 534000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Defend (sec) | SYN cookie rate |
| | | | Sent | BAU (cps) | Spoofed |
+-----------------------------------------------------------------------------+
| eth2-01 | External | 28 | 345345 | 40 | 95 % |
| eth2-02 | External | 12 | 150 | 50 | 33 % |
+-----------------------------------------------------------------------------+
| Sum | 345495 | 90 | 93 % |
+-----------------------------------------------------------------------------+
>
Output:
Column Description
IF The interface name
Topology The interface topology as defined in SmartDashboard
Defend The attack duration in seconds
Sent SYN cookie rate Number of SYN packets received per second
BAU Business as usual - Number of legitimate connections handled per
second
Spoofed The percentage of spoofed SYN packets out of all traffic
F2F Quota
Description
F2F detects traffic floods and intelligently prevents performance degradation on the Scalable
Platform. It assigns a high priority to known, important packets from Performance Pack and drops
those suspected of being part of a DDoS attack.
• asg f2fq
• fwaccel f2fq stats
• fwaccel6 f2fq stats
Two examples of known F2F flood attacks are UDP floods and fragmentation attacks. These
attacks cause too much resource allocation when they try to put the packet fragments together.
• Use fwaccel for IPv4 information
• Use fwaccel6 for IPv6 information
Syntax
> fwaccel f2fq stats [–v]
> fwaccel f2fq -c <file>
> fwaccel f2fq -a
> fwaccel6 f2fq stats [–v]
> fwaccel6 f2fq -c <file>
> fwaccel6 f2fq -a
> asg f2fq [-b <SGM_IDs> ] [-6 | -4]
Parameters
Parameter Description
-v Shows detailed (verbose) statistics.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-6 Shows the IPv6 status only.
-4 Shows the IPv4 status only.
-c <file> Uses the parameters in <file>.
-a Uses the parameters in the $FWDIR/conf/f2fq.conf file.
Example
This example shows details of IPv4 activity for all Firewall instances.
> fwaccel f2fq stats -v
+---------------------------------------------------------------------------+
| DDOS Mitigation |
+---------------------------------------------------------------------------+
| Mode: Enforcing |
| Status Normal |
| Last 10 seconds drops 13146 |
+---------------------------------------------------------------------------+
| Instance | Reason | Drops / Hits |
+---------------------------------------------------------------------------+
| FW 0 | CONN_MISS_TCP_SYN | 103365 / 104629 |
+---------------------------------------------------------------------------+
| FW 1 | FRAG | 6232 / 13816 |
| | CONN_MISS_TCP_SYN | 101096 / 102203 |
| | CONN_MISS_TCP_OTHER | 13146 / 14359 |
+---------------------------------------------------------------------------+
| FW 2 | FRAG | 1339 / 1339 |
| | CONN_MISS_TCP_SYN | 101087 / 102143 |
+---------------------------------------------------------------------------+
| All | FRAG | 7571 / 15155 |
| | CONN_MISS_TCP_SYN | 305548 / 308975 |
| | CONN_MISS_TCP_OTHER | 13146 / 14359 |
60000/40000 Security Systems Administration Guide R76SP.50 | 199
Logging and Monitoring
+---------------------------------------------------------------------------+
>
Output description
Item Description
Last 10 seconds drops The number of dropped packets during the last 10 seconds.
Instance The verbose output shows a historical aggregate of the results, for
each Firewall instance.
Drops / Hits The number of dropped packets out of the total number of
packets, grouped by the attack type.
Global Options
Option Description Default
enabled • 1: F2F Quota is enabled 1
• 0: F2f Quota is disabled
enforce • 1: Drops packets 1
• 0: Does not drop packets, log in the
/var/log/messages
snapshots_interval Milliseconds between F2F calculations. 1000
load_threshold Percent capacity used of the queue load before F2F 80
activates.
Range: 0 -100
dynamic_prio_threshol Dynamic priority threshold. 20
d
F2F drops packets whose dynamic priorities are lower
than dynamic_prio_threshold.
default_priority Priority for a packet that does not match any rule. 100
Packet Priority
Field Description
# Interface The interface name.
Use the asterisk * for all interfaces.
proto The transport layer protocol. Use the asterisk * for all protocols.
service Port number or port range (applicable to TCP and UDP only).
Use the asterisk * for all ports.
ip The destination IP and subnet.
Use the asterisk * for all IP addresses.
reason Reason why this packet is rejected.
Use the asterisk * for all reasons.
priority • 0 - 100 - Priority for a packet that matches this rule. Packets
with a higher priority have a lower chance of being dropped.
• Exception - Packets that match this rule are never dropped.
Example:
enabled = 1
enforce = 1
config_version = 1
default_priority = 100
dynamic_prio_threshold = 20
snapshots_interval = 1000
load_threshold = 80
CONN_MISS_OTHER
No connection found for a packet of any other type.
VPN_F2F
VPN connection.
F2F_IS_ON_ICMP
ICMP packet set by the firewall to be rejected.
F2F_IS_ON_TCP
TCP packet set by the firewall to be rejected.
F2F_IS_ON_UDP
UDP packet set by the firewall to be rejected.
F2F_IS_ON_OTHER
Other type of packet set by the firewall to be rejected.
UNIDIR_VIOL
Unidirectional violation.
SPOOF_VIOL
Possible spoof violation.
TCP_STATE
Possible TCP state violation.
OUT_IF
Outbound Interface is not defined or accelerated.
XMT_EQ_RCV
Incoming interface is the same as the outgoing interface.
ROUTING_ERR
Routing decision error.
SANITY_CHECKS
Sanity checks failed.
TEMP_CONN
Temporary connection expired.
FWD_NON_PIVOT
Device cannot forward to non-pivot member.
BROADCAST
Broadcast / multicast in pivot member.
CLUSTER_MSG
Source address is of FWHA protocol or LS forwarding layer.
PARTIAL_CONN
Partial connection.
PXL_F2F
PXL connection.
CLUSTER_FORWARD
Packet forwarded from another cluster member.
CHAIN_FORWARD
Packet reinjection by the chain forwarding mechanism.
SPORT_ALLOC_F2F
Packet rejected due to port allocation failure.
GENERAL
Packet rejected for a reason not listed above.
Syntax
asg_conns -h
asg_conns [-b <SGM_IDs>]
Parameters
Parameter Description
-h Shows the built-in help.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-6 Shows only IPv6 connections.
Example
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg_conns
1_01:
#VALS #PEAK #SLINKS
246 1143 246
1_02:
#VALS #PEAK #SLINKS
45 172 45
1_03:
#VALS #PEAK #SLINKS
45 212 45
1_04:
#VALS #PEAK #SLINKS
223 624 223
1_05:
#VALS #PEAK #SLINKS
45 246 45
1_01:
There are 60 conn entries in SecureXL connections table
Total conn entries @ DB 0: 4
Total conn entries @ DB 3: 2
.
.
Total conn entries @ DB 26: 4
Total conn entries @ DB 30: 2
1_02:
There are 16 conn entries in SecureXL connections table
Total conn entries @ DB 0: 2
Total conn entries @ DB 1: 2
.
.
Total conn entries @ DB 26: 2
1_03:
There are 16 conn entries in SecureXL connections table
Total conn entries @ DB 0: 2
Total conn entries @ DB 5: 2
.
.
Total conn entries @ DB 30: 2
1_04:
There are 260 conn entries in SecureXL connections table
Total conn entries @ DB 0: 10
Total conn entries @ DB 1: 6
.
.
Total conn entries @ DB 31: 94
1_05:
There are 16 conn entries in SecureXL connections table
Total conn entries @ DB 2: 2
.
.
Total conn entries @ DB 26: 2
Syntax
# asg_drop_monitor -h
# asg_drop_monitor [-d] [-v] [-m <SGM_IDs>] [-i <interfaces>] [-v6] [-f
<refresh_rate>] [-sf <SSM_refresh_rate>] [-le] [-e] [-dm] [-ds] [-r] [-s]
Parameters
Parameter Description
-h Shows the built-in help.
-d Runs the command in debug mode.
--debug
-v Shows detailed drop statistics - for each member and all
--verbose SecureXL statistics.
-m <SGM_IDs> Works with SGMs and/or Chassis as specified by
--members <SGM_IDs> <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs
and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example,
1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Default - Runs on all SGMs that are in the UP state.
Parameter Description
-i <interfaces> Shows drop statistics for the specified network interfaces.
--interfaces <interfaces> Enter a comma-separated list of the interface names.
By default, shows drop statistics only for the backplane
interfaces.
-f <refresh_rate> Specifies the refresh rate in seconds.
--refresh-rate <refresh_rate> The default is 2 seconds.
System Monitoring
Use these features to monitor your system status.
Syntax
# asg_sgm_serial [-a]
# asg_serial_info [-a]
Parameters
Parameter Description
-a Apply command on all SGMs in the Security Group
Example 1 - asg_sgm_serial:
# asg_sgm_serial
1_01:
Board Serial : AKO0769153
1_02:
Board Serial : AKO0585533
2_01:
Board Serial : AKO0462069
2_02:
Board Serial : AKO0447878
Example 2 - asg_serial_info:
# asg_serial_info
chassis 1 CMM1 serial: 1163978/005
chassis 1 CMM2 serial: 1157482/001
chassis 1 SSM1 serial: 0011140011
chassis 1 SSM2 serial: 0011140012
chassis 1 serial: 1159584/016
chassis 2 CMM1 serial: 1163090/041
chassis 2 CMM2 serial: 1155519/014
chassis 2 SSM1 serial: 0311310621
chassis 2 SSM2 serial: 0311310626
chassis 2 serial: 0831232/001
Note - To show CMM, SSM and Chassis serial numbers, one of the SGMs on each Chassis must be
UP. For example, if no SGM in the UP position is found on Chassis-2, the serial numbers for
components in the Chassis are not shown or saved.
Syntax
# asg_syslog {verify | print [ -v ] | recover}
Parameters
Parameter Description
verify Verify configuration consistency on all SGMs
print [-v] Print remote syslog servers configuration
-v - Verbose Mode
recover Recover configuration files on all SGMs and restart syslog service
Example 1:
# asg_syslog verify
------------------------------------------------------------------
|Service |Path |Result |
------------------------------------------------------------------
|CPLog |/etc/syslog_servers_list.conf |Passed |
------------------------------------------------------------------
|Alert |/etc/syslog.conf |Passed |
------------------------------------------------------------------
Example 2:
# asg_syslog print
---------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |disable |
----------------------------------------
|alert |6.6.6.6 |enable |
----------------------------------------
* Firewall logging is disabled
Note - When you configure alert syslog servers, the syslog service restarts on all SGMs.
Parameters
Parameter Description
set Set remote syslog server
-s <status> Set connection status
Valid values:
• enable
• disable
disable Disable firewall logs and alerts to be sent to a remote syslog
server defined by IP address or host name.
Note - This does not remove the configuration. You can enable it
again using enable
enable Enable firewall logs and alerts to be sent to a remote syslog server
defined by IP address or host name.
You can use this parameter after the remote server has been
configured.
delete Delete the remote syslog server
<ip>|<host_name> IPv4 address or hostname of the remote syslog server.
Example 1
# asg_syslog set alert 5.5.5.5
Writing new configuration
Updating all SGMs with new configuration
Restarting syslog service on all SGMs
syslog alert server 5.5.5.5 configured successfully
----------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |enable |
----------------------------------------
Firewall logging is disabled
Example 2
# asg_syslog disable alert 5.5.5.5
Updating all SGMs with new configuration
Restarting syslog service on all SGMs
syslog alert server 5.5.5.5 status changed to disable
----------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |disable |
----------------------------------------
* Firewall logging is disabled
Example 3
#asg_syslog set cplog 6.6.6.6 -s disable
Writing new configuration
Updating all SGMs with new configuration
syslog cplog server 6.6.6.6 configured successfully
----------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |disable |
----------------------------------------
|cplog |6.6.6.6 |disable |
----------------------------------------
* Firewall logging is disabled
Syntax to disable or enable firewall logs to be sent to the firewall Log Server:
# asg_syslog {disable | enable} log_server
Parameters
Parameter Description
disable Disable sending firewall logs to the Log Server.
The Log Server is configured in SmartDashboard.
enable Enable sending firewall logs to the Log Server.
The Log Server is configured in SmartDashboard.
Example
# asg_syslog disable log_server
# asg_syslog print -v
-------------------------------------------------------------------------------------
|Service |Server IP |Port |Protocol# |RFC version |Status |
-------------------------------------------------------------------------------------
* Firewall logging is disabled
Example output:
+-------------------------------------------------+
| Log Servers Distribution |
+-------------------------------------------------+
Log Servers Distribution Mode: Disabled
>1
+-------------------------------------------------+
| Log Servers Distribution |
+-------------------------------------------------+
If Log Server distribution is already enabled, the command shows which Log Servers are assigned
to each SGM:
+-------------------------------------------------+
| Log Servers Distribution |
+-------------------------------------------------+
+--------------------------------------------------------------+
| Blade id | Chassis 1 | Chassis 2 |
|--------------------------------------------------------------|
| 1 | Gaia | Gaia |
| 2 | LogServer2 | LogServer2 |
| 3 | LogServer | LogServer |
| 4 | Gaia | - |
| 5 | - | - |
| 6 | LogServer | - |
| 7 | - | Gaia |
| 8 | - | LogServer2 |
| 9 | LogServer | LogServer |
| 10 | Gaia | - |
| 11 | LogServer2 | - |
| 12 | - | - |
+--------------------------------------------------------------+
Note - You cannot configure an SGM to send its logs to a particular log server. Distribution takes
place automatically.
4. In gClish, configure the SSM port, to which the Log Server connects:
> set interface <if_name> ipv4-address <ip> mask-length <length>
Parameters
Parameter Description
<if_name> The interface that connects directly to the log server
<ip> IPv4 address of the logging server
<length> Subnet mask length
Example
> set interface eth1-Mgmt2 ipv4-address 2.2.2.10 mask-length 24
1_0l:
success
1_02:
success
1_03:
success
2_01:
success
2_02:
success
2_03:
success
>
Notes:
• Each SGM uses the interface eth1-Mgmt2 as a dedicated logging interface.
• 2.2.2.0/24 is the dedicated logging network.
To configure the Scalable Platform to send the logs to the dedicated Log Server
1. In SmartDashboard, open the Single Management Object (SMO) for the Scalable Platform.
2. From the left tree, click Logs and Masters > Log Servers.
3. Select Define Log Servers.
4. Select the dedicated Log Server object.
5. Click OK.
6. Install the policy on the SMO.
Note - The SMO in SmartDashboard makes sure that return traffic from the Log Server reaches
the correct SGM.
Example:
# asg log audit
Aug 11 14:14:21 2_01 WARNING: Chassis admin-state up on chassis: 1, User:
susan, Reason: Maintenance
Aug 11 16:45:15 2_01 WARNING: Reboot on blades:
1_01,1_02,1_03,1_04,1_05,2_02,2_03,2_04,2_05, User: susan, Reason:
Maintenance
Aug 18 14:28:57 2_01 WARNING: Chassis admin-state down on chassis: 2, User:
susan, Reason: Maintenance
Aug 18 14:31:08 2_01 WARNING: Chassis admin-state up on chassis: 1, User:
Peter, Reason: Maintenance
Aug 18 14:32:32 2_01 WARNING: Chassis admin-state down on chassis: 2, User:
O, Reason: Maintenance
Aug 20 15:38:58 2_01 WARNING: Blade_admin down on blades:
2_02,2_03,2_04,2_05, User: Paul, Reason: Maintenance
Aug 21 10:00:05 2_01 CRITICAL: Reboot on blades: all, user: ms, Reason:
Maintenance
#
Syntax
> ver
Syntax
> show smo log auditlog [filter <string>] [from [<n>]] [to [<n>]] [tail [<x>]]
Parameters
Parameter Description
filter <string> Specifies a word or phrase, for which to filter the output.
from <n> Shows logs filtered by time range (number of seconds).
to <n> Shows logs filtered by time range (number of seconds).
tail <x> Shows only the last x lines of the log file for each SGM.
For example, -tail 3 shows only the last three lines of the
specified log file. Default = 10 lines.
Notes:
• p + = Permanent action that added or changed an item in the configuration database
• p - = Permanent action that deleted an item in the configuration database
• t + = Transient action that added or changed an item in the configuration database in memory
only
• t - = Transient action that deleted an item in the configuration database in memory only
Example filter
This example shows only permanent configuration save actions.
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > show smo log auditlog filter update_status
Oct 19 03:19:30 1_02 admin localhost p +installer:update_status -1
Oct 19 03:19:32 1_02 admin localhost p -installer:update_status -1
Oct 19 03:19:32 1_02 admin localhost p +installer:update_status 0
Oct 19 03:19:45 1_06 admin localhost p +installer:update_status -1
Oct 19 03:19:46 1_06 admin localhost p -installer:update_status -1
Oct 19 03:19:46 1_06 admin localhost p +installer:update_status 0
Oct 19 03:20:00 1_07 admin localhost p +installer:update_status -1
Oct 19 03:20:01 1_07 admin localhost p -installer:update_status -1
[Global] MyChassis-ch01-01 >
Syntax
> asg config {show | save} [-t] [<file_path>]
Parameters
Parameter Description
show Show the existing database configuration
save Save the current configuration to a file
Note: If you do not include a path, the file is saved to: /home/admin
-t Add a timestamp to the file name. (save only)
<file_path> Name and path of the saved configuration file. If you do not enter a
path, the configuration is saved to: /home/admin
Example
> asg config save -t mycongfig
Syntax
> asg_version -h
> asg_version [verify] [-v] [-i] [-b <SGM_IDs>]
Parameters
Parameter Description
-h Shows the built-in help.
verify Makes sure that system hardware components run approved software and
firmware versions.
-i Shows Active and Standby SGMs.
----------
-*- 2 SGMs: 1_01 1_03 -*-
OS build 42, OS kernel version 2.6.18-92cpx86_64, OS edition 64-bit
Hardware
--------
-*- 1 blade: 1_01 -*-
BIOS: 1.30 BL: 1.52 IPMC: 1.52 FPGA: 2.40 FPGARE: 2.40
-*- 1 blade: 1_03 -*-
BIOS: 0.54 BL: 1.42 IPMC: 1.42 FPGA: 2.38 FPGARE: 2.38
60000/40000 Security Systems Administration Guide R76SP.50 | 220
Logging and Monitoring
OS version
----------
BIOS: 0.54 BL: 1.42 IPMC: 1.42 FPGA: 2.38 FPGARE: 2.
[Global] MyChassis-ch01-01 >
+----------------------------------------------------------------------------+
| Hardware Versions |
+----------------------------------------------------------------------------+
| Component | Type | Configuration | Firmware |
+----------------------------------------------------------------------------+
| Chassis 2 |
+----------------------------------------------------------------------------+
| SSM1 | SSM160 | N/A | 2.4.C7 |
| SSM2 | N/A | N/A | N/A |
| CMM | N/A | N/A | 2.83 |
+----------------------------------------------------------------------------+
SGMs
======
Type
----------
-*- 2 blades: 2_02 2_03 -*-
SGM220
OS version
----------
-*- 2 blades: 2_02 2_03 -*-
OS build 80, OS kernel version 2.6.18-92cpx86_64, OS edition 64-bit
FireWall-1 version
------------------
-*- 2 blades: 2_02 2_03 -*-
This is Check Point VPN-1(TM) & FireWall-1(R) 61000_R76 - Build 083
kernel: 61000_R76 - Build 083
Hardware
--------
-*- 1 blade: 2_02 -*-
BIOS: 1.30 BL: 1.42 IPMC: 1.52 FPGA: 2.40 FPGARE: 2.40
-*- 1 blade: 2_03 -*-
BIOS: 1.30 BL: 1.52 IPMC: 1.54 FPGA: 2.40 FPGARE: 2.40
SSD
---
-*- 1 blade: 2_02 -*-
Firmware Version: 2CV102M3
-*- 1 blade: 2_03 -*-
Firmware Version: 4PC10362
Number of cores
---------------
-*- 1 blade: 2_02 -*-
8
-*- 1 blade: 2_03 -*-
12
CPUs frequency
--------------
-*- 1 blade: 2_02 -*-
2.13GHz
-*- 1 blade: 2_03 -*-
2.4GHz
Syntax
> show smo log <log file> [filter <string>] [from <date>] [to <date>] [tail <n>]
Parameters
Parameter Description
tail <n> Show only the last n lines of the log file for each SGM.
For example, tail 3 shows only the last three lines of the specified log file.
filter <string> Word or phrase to use as an output filter.
For example, filter ospf shows only OSPF messages.
from <date> Shows only the log from a given date and above.
to <date> Shows only the log until the given date.
log file Enter the name of the common log file or the full path of the file.
Example:
This example shows messages on Chassis1 containing the word Restarted:
> show smo log messages filter Restarted
Feb 5 12:40:07 1_03 Athens-ch01-03 pm[8465]: Restarted /bin/routed[8489], count=1
Feb 5 12:40:09 1_04 Athens-ch01-04 pm[8449]: Restarted /bin/routed[9995], count=1
Feb 5 12:40:09 1_04 Athens-ch01-04 pm[8449]: Restarted /opt/CPsuite-R76/fw1/bin/cmd[11291], count=1
Feb 5 12:40:09 1_04 Athens-ch01-04 pm[8449]: Restarted /usr/libexec/gexecd[11292], count=1
Feb 5 12:40:10 1_03 Athens-ch01-03 pm[8465]: Restarted /usr/libexec/gexecd[9701], count=1
Feb 5 12:40:10 1_03 Athens-ch01-03 pm[8465]: Restarted /bin/routed[11328], count=2
Feb 5 12:40:10 1_05 Athens-ch01-05 pm[8458]: Restarted /bin/routed[9734], count=1
Feb 5 12:40:10 1_05 Athens-ch01-05 pm[8458]: Restarted /usr/libexec/gexecd[11331], count=1
Feb 5 12:40:11 1_01 Athens-ch01-01 pm[8463]: Restarted /bin/routed[12253], count=3
Feb 5 12:40:11 1_04 Athens-ch01-04 pm[8449]: Restarted /bin/routed[11378], count=2
Feb 5 12:40:11 1_04 Athens-ch01-04 pm[8449]: Restarted /opt/CPsuite-R76/fw1/bin/cmd[11379], count=2
Syntax
> asg log [-b <SGM_IDs>] <log_name> [-tail [<n>]] [-f <filter>]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
<log_name> Enter the log file:
• audit - shows the audit logs in /var/log/
For example: /var/log/asgaudit.log.1
• ports - shows the ports logs in /var/log/
For example: /var/log/ports
• dist_mode - shows the logs for Distribution Mode activity.
-tail [<n>] Show only the last n lines of the log file for each SGM. For example, -tail
3 shows only the last three lines of the specified log file. Default = 10 lines.
-f <filter> Word or phrase use as a filter. For example: -f debug
Feb 03 11:33:10 1_01 WARNING: Reset sic on blades: all, User: y, Reason: y
Feb 03 11:50:08 1_01 WARNING: Reset sic on blades: all, User: y, Reason: y
Feb 03 13:32:32 1_01 WARNING: Reset sic on blades: all, User: y, Reason: y
Feb 03 14:30:26 1_01 WARNING: Reset sic on blades: all, User: johndoe, Reason: test
Feb 03 14:48:03 1_01 WARNING: Reset sic on blades: all, User: johndoe, Reason: test
Feb 03 15:34:11 1_01 WARNING: Reset sic on blades: all, User: y, Reason: y
Feb 03 17:55:23 1_01 WARNING: Reboot on blades: 1_02,1_03,1_04,1_05,2_01,2_02,2_03,2_04,2_05, User:
y, Reason: y
Syntax
# cpha_vsx_util monitor show
# cpha_vsx_util monitor {start | stop} <VS_IDs>
Parameters
Parameter Description
show Show all unmonitored Virtual Systems.
stop Stop monitoring the Virtual Systems.
start Start monitoring the Virtual Systems.
<VS_IDs> <VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
Note - When you stop Virtual System monitoring, you must run the cpha_vsx_util monitor
start command to start it again. Monitoring does not start automatically after reboot.
SNMP Traps
The 60000/40000 Security System supports this SNMP trap only:
iso.org.dod.internet.private.enterprise.checkpoint.products.asgTrap
(OID 1.3.6.1.4.1.2620.1.2001)
For VS0:
# snmpwalk -m $CPDIR/lib/snmp/chkpnt.mib -v 3 -l authNoPriv -u johndoe -A mypassword
192.0.2.72 asgThroughput
Mode ID Description
0 Active/Standby - Active Up
The currently Active Chassis stays Active unless it goes DOWN, or the Standby
Chassis has a higher Chassis quality grade.
1 Active/Standby - Primary Up Chassis 1
Chassis 1 always stays Active unless it goes DOWN, or the Standby Chassis has a
higher Chassis quality grade.
2 Active/Standby - Primary Up Chassis 2
Chassis 2 is always Active unless it goes DOWN, or the Standby Chassis has a
higher Chassis quality grade.
Syntax
> set chassis high-availability mode <0-4>
0 - No primary Chassis (Active Up Mode)
1 - Chassis 1 is Primary Chassis
2 - Chassis 2 is Primary Chassis
3 - Active Active Mode
4 - Chassis VSLS
Example:
To configure Chassis 2 to be Primary Up:
> set chassis high-availability mode 2
To make sure that the most reliable Chassis is always Active, and to prevent unnecessary failover,
the Scalable Platform calculates a quality grade for each Chassis. This is based on continuous
monitoring of critical components and traffic characteristics. Setting the Chassis Weights (on page
232), gives a detailed explanation of the quality grade system.
Chassis High Availability works on the principle that the Chassis with the highest quality grade
becomes the Active Chassis. A configurable minimum grade differential prevents unnecessary
failover, which can cause performance degradation. Automatic failover occurs only when the
Standby Chassis quality grade is greater than the Active Chassis quality grade, plus the minimum
differential. For quality grade differential details (on page 234).
Each Chassis data port has a unique MAC address. The MAC addresses for the Chassis SGMs are
the same. A Chassis failover event sends GARP/ICMPv6 packets to each interface. This informs
the network to use the other interfaces (on page 369).
You can use gClish commands to configure these High Availability parameters:
• Active/Standby Mode (Active UP/Primary UP)
• Chassis quality grade factors
• Failover grade difference for failover
• Failover freeze interval
• Port priority
Description
Use the set chassis high-availability factors command to configure a component's
weight.
Syntax
> set chassis high-availability factors sgm <sgm_factor>
> set chassis high-availability factors port {other <port_other_factor> | standard
<port_standard_factor> | mgmt <port_mgmt_factor> | bond <port_bond_factor>}
> set chassis high-availability factors sensor {cmm <cmm_factor> | fans
<fans_factor> | power_supplies <psu_factor> | ssm <ssm_factor>}
> set chassis high-availability factors pnote pingable_hosts <ping_factor>
Parameters
Parameter Description
<sgm_factor> Weight factor for an SGM
Valid range: Integer between 0 and 1000
<port_other_factor> High grade port factor
Valid range: Integer between 0 and 1000
<port_standard_factor> Standard grade port factor
Valid range: Integer between 0 and 1000
<cmm_factor> Weight factor for a CMM
Valid range: Integer between 0 and 1000
Parameter Description
<ssm_factor> Weight factor for an SSM
This factor applies to all SSMs
Valid range: Integer between 0 and 1000
<ping_factor> Weight factor for a pingable hosts test, which shows if they are
properly connected to their hosts
Valid range: Integer between 0 and 1000
<port_mgmt_factor> Valid range: Integer between 0 and 1000
Examples:
> set chassis high-availability factors sgm 100
> set chassis high-availability factors port other 70
> set chassis high-availability factors port standard 50
> set chassis high-availability factors sensor cmm 40
> set chassis high-availability factors sensor fans 30
> set chassis high-availability factors sensor power_supplies 20
> set chassis high-availability factors sensor ssm 45
> set chassis high-availability factors pnote pingable_hosts 99
This step is required if the Chassis has already been configured (after the First Time
Configuration Wizard).
15. Remove all SGMs from the Chassis and then reinsert them.
This step causes a hard reboot of the system.
Syntax
> set chassis high-availability failover <trigger>
Parameters
Parameter Description
<trigger> Minimum difference in Chassis quality grade to trigger failover
Valid values: 1 - 100
Syntax in gClish
> set chassis high-availability freeze_interval <freeze_interval>
Parameters
Parameter Description
<freeze_interval> Minimum time in seconds to wait until the next Chassis failover
Valid range: 1 - 1000
Note - When you run the asg stat command after Chassis failover, the output shows the freeze
time.
Advanced Features
Below are some advanced features of the Scalable Platform.
Parameters
Parameter Description
<preemp_time> Link Preemption Mechanism time
Default: 10 seconds
Example:
[Expert@MyChassis-ch01-01:0]# fw ctl set int fwha_ch_if_preempt_time 20
[Expert@MyChassis-ch01-01:0]# update_conf_file fwkern.conf
fwha_ch_if_preempt_time=20
Go to Showing SGM Forwarding Statistics to learn more about the asg_blade_stats command
(on page 129).
Notes:
• VoIP connections are synchronized to all SGMs
• Local connections (to/from the Scalable Platform pseudo IP) are not synchronized
• SyncXL does not work on the Sync interface or the Management interface
Syntax
> set chassis high-availability down_on_first_join <first_join>
Parameters
Parameter Description
<first_join> Sets whether Admin DOWN on first join is enabled
0 - Admin DOWN on first join is disabled
1 - Admin DOWN on first join is enabled
Notes:
• Only one SGM "owns" the UIPC task.
• The UIPC feature is disabled by default.
• If the Scalable Platform is not managed by a management port, you can add the unique IP to
one of the data ports. The connection to the unique IP reaches a specific blade based on the
distribution configuration.
Description
Use the set chassis id command to assign a unique IP address to a Chassis.
Syntax
> set chassis id <chassis_id> general unique_ip <ip>
> delete chassis id <chassis_id> general unique_ip
> show chassis id <chassis_id> general unique_ip
Parameters
Parameter Description
<chassis_id> Chassis ID
Valid values:
• 1
• 2
• all
<ip> An alias IP address on the same network as one of the SGMs interfaces
UIPC is automatically enabled after you run the configuration commands. You can also manually
enable or disable it.
To manually enable UIPC, run:
> g_fw ctl set int fwha_uipc_enabled 1
To manually disable UIPC, run:
> g_fw ctl set int fwha_uipc_enabled 0
Link Aggregation combines multiple physical interfaces into a virtual interface called a bond.
Bonded interfaces (known as slaves) add redundancy to a connection and increase the connection
throughput to a level beyond what is possible with a single physical interface.
Syntax
> add bonding group <bond_id>
> add bonding group <bond_id> interface <slave_interface>
> set bonding group <bond_id>
[primary <slave_interface>]
[mii-interval <value>]
[up-delay <value>]
[down-delay <value>]
[mode <value>]
[lacp-rate <value> ]
[xmit-hash-policy <value>]
[abxor-threshold <value>]
Parameters
Parameter Description
<bond_id> Bond identifier, an integer between 1 and 1024.
interface <slave_interface> Slave interface name.
primary <slave_interface> Sets the primary slave interface. This parameter is
applicable to the active-backup mode only.
mii-interval <interval> Frequency (in ms) that the system polls the Media
Independent Interface (MII) to get status.
Valid values = 1-5000 ms. Default = 100 ms.
up-delay <value> Wait time (in ms) before the system confirms that a slave
down-delay <value> interface is UP or DOWN.
Valid values = 1-5000 ms. Default = 200 ms.
Parameter Description
mode <value> Bond interface mode:
• active-backup - Selects the Primary slave interface as
the Active slave interface. If the Primary slave interface
goes down, it fails over to a different slave interface.
• xor - All UP slave interfaces are Active for Load Sharing.
Traffic is assigned to Active interfaces based on the
transmit hash policy (Layer2 or Layer3+4).
• 8023AD - Dynamically uses Active slave interfaces to
share the traffic load based on the LACP protocol. This
protocol uses full interface monitoring between the
Security Gateway and a switch.
• ABXOR - Slave interfaces are assigned to sub-groups
called bundles. Only one bundle is active at a time. All
slave interfaces in the active bundle share the traffic
load. The system assigns traffic to all interfaces in the
active bundle based on the defined transmit hash policy.
Note - The Round-Robin option is not supported on the
Scalable Platform.
lacp-rate <value> LACPDU packet transmission rate:
slow - Request LACPDU every 30 seconds.
fast - Request LACPDU every 1 second.
This parameter is applicable to the 8023AD mode only.
xmit-hash-policy <value> Methodology for slave interface selection based on the
TCP/IP layer.
layer2 - Use XOR of hardware MAC addresses.
layer 3+4 - Use upper layer protocol information.
This parameter is applicable to the XOR and ABXOR Modes
only.
abxor-threshold <value> Minimum number of slave interfaces that must be UP for a
bundle to be Active.
Valid values = 1-8 interfaces. Default = 3 interfaces.
This parameter is applicable to the ABXOR Mode only.
Example 1 - Create a new Bond (bond4) with one slave interface eth1-03:
> add bonding group 4 interface eth1-03
> set bonding group 4 mode xor down-delay 300 mii-interval 100
Syntax
> add bonding group <bond_id> [interface <slave_interface>]
Parameters
Parameter Description
<bond_id> Bond identifier, an integer between 1 and 1024.
<slave_interface> Slave interface name.
Syntax
> set bonding group <bond_id> mode <bond_mode>
Parameters
Parameter Value
<bond_id> Bond identifier, an integer between 0 and 1024.
Parameter Value
<bond_mode> Bond interface mode:
• active-backup - Selects the Primary slave interface as the Active slave
interface. If the Primary slave interface goes down, it fails over to a different
slave interface.
• xor - All UP slave interfaces are Active for Load Sharing. Traffic is assigned
to Active interfaces based on the transmit hash policy (Layer2 or Layer3+4).
• 8023AD -Dynamically uses Active slave interfaces to share the traffic load
based on the LACP protocol. This protocol uses full interface monitoring
between the Security Gateway and a switch.
• ABXOR - Slave interfaces are assigned to sub-groups called bundles. Only
one bundle is active at a time. All slave interfaces in the active bundle share
the traffic load. The system assigns traffic to all interfaces in the active
bundle based on the defined transmit hash policy.
Note - The Round-Robin option is not supported on the Scalable Platform.
Example:
> set bonding group 4 mode 8023AD
1_01:
success
1_02:
success
1_03:
success
2_01:
success
2_03:
success
Syntax
> set bonding group <bond_id> mii-interval <interval>
Parameters
Parameter Description
<bond_id> Bond ID
mii-interval<interval> Frequency in ms, that the system polls the Media Independent
Interface (MII) to get status
Valid values = 1-5000 ms. Default = 200 ms.
Syntax
> set interface <bond_interface> state on
<bond_interface> is the slave interface name
Example
> set interface bond4 state on
Syntax
> delete bonding group <bond_id> interface <slave_interface>
Parameters
Parameter Description
<bond_id> Bond identifier, an integer between 0 and 1024.
<slave_interface> Slave interface name.
Example
> delete bonding group 1 interface eth1-02
Deleting a Bond
Description
Use the delete bonding group command to delete a Bond.
Important - You must delete all slave interfaces in a Bond before you can delete that Bond.
Syntax
> delete bonding group <bond_id>
Parameters
Parameter Description
<bond_id> Bond identifier, an integer between 0 and 1024.
You can use abxor bonds with a different switch connected to each bundle. This provides both SSM
and switch redundancy with Load Sharing. In the example above, each bundle connects to a
different switch and has slave interfaces from both SSMs. If one of the switches and/or one of the
SSMs fail, there is no traffic interruption.
Configuring ABXOR
To create an ABXOR Bond:
1. Create a new Bond (on page 246).
2. Add slave interfaces to the new Bond (on page 248).
3. Create the bundles.
Run:
> add bonding group <bond_id> bundle <bundle_id>
Note - The Bundle ID cannot be 0. The legal values are 1..2
4. Assign slave interfaces to each bundle. For each interface, run:
> add bonding group <bond_id> bundle <bundle_id> interface <slave_interface>
5. Set the Bond Mode to ABXOR:
> set bonding group <bond_id> mode abxor
6. Set the ABXOR threshold:
> set bonding group <bond_id> abxor-threshold <value>
The <value> can be from 1 - 8. Default value is 3.
7. Set the minimum number of slave interfaces in a bond:
> set chassis high-availability bond bond1 min_slaves 2
Notes:
• The default value for min_slaves is 1.
• In order to keep standard throughput, the number of slave interfaces has to equal the
ABXOR threshold.
• Configure the Switch with the XOR algorithm. Consult with your switch vendor for the
relevant configuration instructions.
Important - You must delete all slave interfaces in a Bond before you can delete that bond.
Parameters
Parameter Description
<bond_id> Bond identifier, an integer between 1 and 1024.
<slave_interface> Name of slave interface.
<bundle_id> Bundle identifier, an integer between 1 and 2.
Notes:
• Only use the mgmt parameter when you create a new management bond. For all other
configurations, use the standard commands and parameters without the mgmt parameter. For
more information, see Configuring Link Aggregation (on page 245).
• A bond is created for data or management, but not for both.
Best Practice - Do not mix 1G and 10G management interfaces in a bond.
Limitations:
• eth<x>Mgmt4 cannot be used for MAGG configuration
• Only XOR / High Availability configurations are supported
• VLAN configuration is not supported
Example:
This example creates a management bond with two slaves:
> add bonding group 7 mgmt
> add bonding group 7 mgmt interface eth1-Mgmt1
> add bonding group 7 mgmt interface eth2-Mgmt1
> set bonding group 7 mode xor
> set interface magg7 state on
> set interface magg7 ipv4-address X.X.X.X mask-length X
1_02:
Bond Configuration
xmit-hash-policy layer2
down-delay 200
primary Not configured
lacp-rate Not configured
mode xor
up-delay 200
mii-interval 100
abxor-threshold 3
type mgmt
Bond Interfaces
eth1-Mgmt1
eth2-Mgmt1
Example:
This example creates a new interface name:
> set interface magg4 state on
> set interface magg4 ipv4-address X.X.X.X mask-length X
Notes:
• A Chassis with one SSM always uses eth1-Sync. The eth2-Sync is not assigned.
• A chassis with two or more SSMs always uses these slave interfaces:
• eth1-Sync
• eth2-Sync
• Sync ports on SSM3 and SSM4 are not used when there are more than two SSMs
• The system automatically creates the Sync Bond during installation and assigns these IP
addresses:
• SGM1_1 - 192.0.2.1
• SGM1_12 - 192.0.2.14
• SGM2_1 - 192.0.2.15
• SGM2_12 - 192.0.2.28
No manual configuration is necessary.
• The system automatically assigns the Sync slave to port 8 on SSM1 and SSM2.
• The system sets the Sync slave port speed to 10 Gb by default. We recommend that your do not
change this parameter.
• Sync Bonds support both LR and SR transceivers.
• The Sync Bond uses the XOR Mode (on page 248).
• The default network (192.0.2.X) is defined by the applicable RFC as a private network for
documentation. It is unlikely to cause collisions with user networks.
Limitations:
• LACP is not supported.
• VLANs are not supported for Sync slave interfaces.
• A Sync Bond can have up to two slave interfaces.
• Sync ports cannot be changed to data ports. This is true for both Single and Dual Chassis
systems.
60000/40000 Security Systems Administration Guide R76SP.50 | 258
Working with Link Aggregation (Interface Bonds)
Sync Lost
Sync Lost is a Check Point feature that makes sure that both Chassis do not become Active if the
Sync network fails. The system sends special sync_lost packets to the other Chassis over the
data and management interfaces. This action prevents a state change on both Chassis until the
Sync network is restored.
The Sync Lost mechanism is enabled by default.
Provisioning VSX
Create VSX objects with one of these procedures:
• Create new Security Gateways, Virtual Systems and other virtual objects in SmartDashboard.
• Run the vsx_util reconfigure command on the Management Server.
Notes:
• The SMO reboots automatically when you create a new Virtual System.
• Before you start one of these procedures, make sure that the SMO is the only SGM in the
Security Group. After successful configuration, you can add more SGMs to the Security Group.
Syntax
> vs_bits [-stat | 32 | 64 ]
Parameters
Parameter Description
stat Shows the current mode
32 Configures the 32-bit mode
64 Configures the 64-bit mode
Known limitation:
This feature only works if Gaia runs the 64-bit kernel edition.
60000/40000 Security Systems Administration Guide R76SP.50 | 260
Working with VSX
Virtual System
After you create a Virtual System on a Scalable Platform, we recommend that you limit the
maximum number of concurrent connections to no more than 500,000.
Syntax
> vsx_util reconfigure
Input
• VSX Gateway name
• SIC activation key assigned to the Management Server
• Retype to confirm the SIC activation key
Notes:
• This command is also useful for restoring a gateway or cluster member after a system failure.
• Run the command and follow the instructions on the screen.
• A new gateway must have the same hardware specifications and configuration as its
replacement and other cluster members. Most importantly, it must have the same number of
interfaces (or more) and the same management IP address.
• The new or replacement machine must be a new installation. You cannot use a machine with a
previous VSX configuration.
Example:
Chassis1 has two UP SGMs and Chassis 2 has five UP SGMs. The ratio is 2/5 (40%), which is
less that the default threshold of 50%. VSLS selects Chassis 2 as the Primary Chassis.
3. Virtual System with a problem
When a Virtual System fails, VSLS automatically fails over to the related Virtual System on the
other Chassis, which becomes the Active Chassis.
4. Primary Chassis
If none of the above criteria causes VSLS to select an Active Chassis, the Primary Chassis
automatically becomes the Active Chassis.
To change the SGM threshold value, run:
> set chassis vsls sgm_ratio <percent_value>
SGM Failover
When an SGM fails, it no longer receives traffic. When a single Virtual System fails on an SGM, this
Virtual System can do a Virtual System Chassis Failover. If a Virtual System Chassis failover does
not occur, the failed Virtual System on the SGM continues to receive traffic.
Monitoring VSLS
Monitor VSLS with the asg_stat command.
Output: VSLS
-----------------------------------------------------------------------
| VSX System Status - 61000 |
-----------------------------------------------------------------------
| Chassis Mode | VSLS |
| Up time | 4 days, 16:05:08 hours |
| SGMs | 1 / 3 (!) |
| Virtual Systems | 4 |
| Version | R76SP.50 (Build Number 2) |
-----------------------------------------------------------------------
| VSID | VS Type & Name | Chassis 1 | Chassis 2 | Health |
-----------------------------------------------------------------------
| 0 | V 61000-VSLS | DOWN (P) | ACTIVE | Problem |
| 1 | S VS1 | DOWN | ACTIVE (P) | Problem |
| 2 | S VS2 | DOWN (P) | ACTIVE | Problem |
-----------------------------------------------------------------------
| Active Virtual Systems | 0 | 3 | |
-----------------------------------------------------------------------
| Errors: |
| VSID's not on Primary chassis: 0 2 |
-----------------------------------------------------------------------
| Synchronization |
| Within chassis: Enabled (Default) |
| Between chassis: Disabled (Auto) |
| Reason: Chassis states doesn't allow Sync between chassis |
| Exception Rules: (Default) |
-----------------------------------------------------------------------
------------------------------------------------------------------------
| VSX System Status - 61000 |
------------------------------------------------------------------------
| Chassis Mode | Active Up |
| Up time | 4 days, 12:04:35 hours |
| SGMs | 19/24 (!) |
| Virtual Systems | 103 |
| Version | R76SP.40 (Build Number 53) |
------------------------------------------------------------------------
| VSID | VS Type & Name | Chassis 1 | Chassis 2 | Health |
------------------------------------------------------------------------
| 0 | V na-core-gw | STANDBY | ACTIVE | Problem |
| 1 | S MEX-T2-VS | STANDBY | ACTIVE | Problem |
| 2 | S EQU-T2-VS | STANDBY | ACTIVE | Problem |
| 3 | S CAN-T2-VS | STANDBY | ACTIVE | Problem |
| 4 | S SHR-T2-VS | STANDBY | ACTIVE | Problem |
| 5 | S EQU-T3-VS | STANDBY | ACTIVE | Problem |
| 6 | S EXTRANET-VS | STANDBY | ACTIVE | Problem |
| 7 | S MEX-T3-VS | STANDBY | ACTIVE | Problem |
| 8 | S SHR-T3-VS | STANDBY | ACTIVE | Problem |
| 9 | S FUSION-VS | STANDBY | ACTIVE | Problem |
| 10 | S IPT-VS | STANDBY | ACTIVE | Problem |
| 11 | S JP-T3-VS | STANDBY | ACTIVE | Problem |
| 12 | S AB-T3-VS | STANDBY | ACTIVE | Problem |
| 13 | S MGMT-VS | STANDBY | ACTIVE | Problem |
| 14 | S VENDOR-VS | STANDBY | ACTIVE | Problem |
| 15 | S ALM-T3-VS | STANDBY | ACTIVE | Problem |
| 16 | B VSB_1_TAP | STANDBY | ACTIVE | Problem |
| 19 | B VSB_2_Access | STANDBY | ACTIVE | Problem |
| 22 | S VS_Barakeo | STANDBY | ACTIVE | Problem |
| 25 | B VSB_Packet_Bro | STANDBY | ACTIVE | Problem |
| 26 | B VSB_Packet_Bro | STANDBY | ACTIVE | Problem |
| 27 | S VS027 | STANDBY | ACTIVE | Problem |
| 28 | S VS028 | STANDBY | ACTIVE | Problem |
| 29 | S VS029 | STANDBY | ACTIVE | Problem |
| 30 | S VS030 | STANDBY | ACTIVE | Problem |
Example:
# vsenv 1
# asg stat vs
--------------------------------------------------------------------------
| VSX System Status - 61000 |
--------------------------------------------------------------------------
| VS ID 1 |
| VS Name VS1 |
| Chassis Mode VSLS |
| FW Policy Date 09Jun14 19:12 |
--------------------------------------------------------------------------
| Chassis 1 (Primary) STANDBY |
--------------------------------------------------------------------------
| SGM ID State Process Health |
| 1 DOWN Inactive fwk |
| 2 (local) UP Enforcing Security OK |
| 3 UP Enforcing Security OK |
| 4 UP Enforcing Security OK |
--------------------------------------------------------------------------
| Chassis 2 ACTIVE |
--------------------------------------------------------------------------
| SGM ID State Process Health |
| 1 UP Enforcing Security OK |
| 2 UP Enforcing Security OK |
| 3 UP Enforcing Security OK |
| 4 UP Enforcing Security OK |
--------------------------------------------------------------------------
| Active Chassis: 2 |
| Primary chassis has a problem. Secondary chassis health is better. |
--------------------------------------------------------------------------
| Chassis 1 Chassis 2 |
| Ports 1 / 1 1 / 1 |
| Bonds 0 / 0 0 / 0 |
| FWKs 3 / 4 4 / 4 |
| SGMs 4 / 4 4 / 4 |
--------------------------------------------------------------------------
#
Using SNMP
SNMP information for VSLS is located in:
iso.org.dod.internet.private.enterprise.checkpoint.products.asg.asgVSX.asgVsls
Info (OID 1.3.6.1.4.1.2620.1.48.30.20)
VSX Functionality
The VSX commands run only on a VSX machine.
Syntax Description
stat Prints information about the VSX environment
verify Verifies integrity and correctness of the configurations on all the
blades
logs Collects VSX related logs
hw_utilization Hardware utilization
mstat Prints VSX memory related information
Syntax
# hw_utilization <parameter>
Parameters
Parameter Description
cpu Shows alerts for CPU configuration issues.
conn Shows alerts for connection capacity issues.
wizard Shows recommendations for optimum CPU distribution between
Multi-Queue and fwk instances. Shows recommendations for the optimal
number of CoreXL instances for each Virtual System.
configure Changes the default parameter values for this command.
set_suppress Toggle display of alerts that show if CoreXL is enabled for VS0.
Examples:
# hw_utilization cpu
CPU utilization:
================
FWK cores: 0 1 10 11 2 20 21 22 23 24 25 26 27 28 29 3 31 39 4 5 6 7 8 9
MQ cores: 12 13 14 15 16 17 18 19 32 33 34 35 36 37 38 39
No overlapping CPU/s
Unused CPU ID/s: 30
Overlapping CPU ID/s:39
60000/40000 Security Systems Administration Guide R76SP.50 | 275
Working with VSX
# hw_utilization conn
Connection capacity utilization:
=================================
+------+---------+-----------------+-----------------+---------------+-------------+
| VSID | Type | Name | [SGM_ID] | [SGM_ID] | Conn. limit |
| | | | Max Conn. | Max Conn. | |
| | | | Number | Peak | |
+------+---------+-----------------+-----------------+---------------+-------------+
| 0 | VSX | Guru-T3-127 | [1_05] 572 | [1_02] 9312 | 31800 |
| 1 | VS | vs1-T3 | [1_02] 4900 | [1_08] 95 | 49800 |
| 3 | VS | vs2-T3 | [1_11] 8 | [1_03] 540 | 1999900 |
| 4 | VS | vs3-T3 | [2_03] 9 | [1_02] 530 | 999900 |
| 5 | VS | vs4-T3 | [1_02] 19502 | [1_02] 0 | 24900 |
| 7 | VSB | vsb1-T3 | [1_03] 350 | [1_05] 0 | 49800 |
+------+---------------------------+-----------------+----------------+------------+
All virtual devices are above the minimum connection capacity limit (24000)
**Concurrent connections amount almost exceeds connection limit**
Virtual devices 1 5 are close to their connection limit (less than 25000 new connections can be opened)
# hw_utilization wizard
How much traffic is accelerated (in percentage)?
Give the traffic distribution for each configured VS (in percentage).
According to the given information a recommended CPU tuning for the system is presented. For example:
How much traffic is accelerated (in percentage)?
40
How much traffic is distributed to the following 7 VSs (in percentage):
vs1-T3: 10
vs2-T3: 10
vs3-T3: 10
vs4-T3: 10
vs5-T3: 10
vsb1-T3: 40
Recommended optimization:
=========================
4 cores for Multi-queue
8 cores for VSs
Instances per VSs:
1 instance for Gruffalo-T3-127
1 instance for vs1-T3
1 instance for vs2-T3
1 instance for vs3-T3
1 instance for vs4-T3
1 instance for vs5-T3
4 instances for vsb1-T3
Please note that the number of recommended assigned FWK instances (10) is higher by 2 than the number
of CPUs that are available for FWK (8)
Hence, there will be maximum 2 CPUs that will run more than 1 fwk instance simultaneously
**The instances per VS recommendation assumes that all VSs are handling traffic simultaneously
Connections Capacity
According to pre-defined values: MIN_CONN_LIMIT and CONN_DIFF_FROM_LIMIT the following checks will be
performed and the user will be alerted:
1. connections limit < MIN_CONN_LIMIT
2. connections number + CONN_DIFF_FROM_LIMIT >= connections limit
Parameter Description
Memory Total Total physical memory on the VSX Gateway
Memory Free Available physical memory
Swap Total Total of swap memory
Swap Free Available swap memory
Swap-in rate Total memory swaps per second
The Virtual Devices are listed according to the VSIDs. Run the vsx stat -v command to show the
VSID for the Virtual Devices.
You must be in Expert Mode to run the vsxmstat command.
Using 'vsxmstat'
Description
Use the vsxmstat command to enable or disable memory information collection on the VSX
Gateway.
Syntax
# vsxmstat {enable_raw | disable_raw | status_raw}
Parameters
Parameter Description
enable_raw Enables memory resource monitoring for perfanalyze use.
disable_raw Disables memory resource monitoring for perfanalyze use.
status_raw Shows if memory resource monitoring is enabled or disabled for perfanalyze
use.
Example:
# vsxmstat disable_raw
VSX memory resource control is disabled for perfanalyze use
Syntax
# vsxmstat [-vs <VS_ID>] [unit <unit>] [sort <top>]
Parameters
Parameter Description
-vs Shows the memory usage of the specified Virtual Devices.
<VS_ID> Virtual Device identification.
To show multiple devices:
• Put a space between each VSID: -vs 1 3 5
• List a range of VSIDs: -vs 1-4
Note - You can combine VSID ranges together with single VSIDs.
unit Change the memory measurement unit shown in the command output.
Parameter Description
<unit> The memory measurement unit. The default value is megabytes.
Use with the unit parameter.
The values are:
• B - bytes
• K, KB - kilobytes
• M, MB - megabytes (default)
• G, GB - gigabytes
sort Sort the results according to the Virtual Devices that use the most memory.
<top> Maximum number of Virtual Devices to show. Only those Virtual Devices that use
the most memory are shown.
Use with the sort parameter.
Use all to show all Virtual Devices.
Example output:
VSX Memory Status
=================
Memory Total: 997.22 MB
Memory Free: 232.56 MB
Swap Total: 2047.34 MB
Swap Free: 2047.16 MB
Swap-in rate: 0.00 MB
VSID | Memory Consumption
======+====================
0 | 133.50 MB
8 | 92.41 MB
3 | 43.81 MB
6 | 42.47 MB
1 | 42.47 MB
Syntax
# vsxmstat swap <minutes>
<minutes> is the amount of time, in minutes, that the system measures memory swaps to
determine the swap-in rate. Only integers are valid values. The default swap-in sample rate is 10.
Example:
# vsxmstat swap 5
Swap-in sample rate was changed successfully to 5 minutes.
Notes:
• Swap-in sample rate is a system wide Linux setting. When you change the value for memory
monitoring, all the swap-in rates are calculated according to the new value.
• When you enable the monitoring memory resources feature, the swap-in rate setting is saved.
When you disable the feature, the system restores the saved setting.
Syntax
# vsxmstat debug
Example output
VSX Memory Status
=================
Memory Total: 1021152.00 KB
Memory Free: 324788.00 KB
Swap Total: 2096472.00 KB
Swap Free: 2096404.00 KB
Swap-in rate: 375.34 KB
Output description:
Field Description
Private_Clean Clean private pages (/proc/[pid]/smaps)
Private_Dirty Dirty private pages (/proc/[pid]/smaps)
DispatcherHTab Hash table for each Virtual System
DispatcherGConn Global connections for each Virtual System
SecureXL SecureXL memory each Virtual System uses
Parameters
Parameter Description
--version Shows program version number and exit
-h, --help Shows this help message and exits
-p, --policy Prints policies on Virtual Systems
-v, --v Legacy prints policies on Virtual Systems
-s, --sw_blades Prints Software Blades on Virtual Systems
-c, --processes Prints processes on Virtual Systems
-t, --topology Prints topology on Virtual Systems
-r, --routes Prints routes on Virtual Systems
-i, --interfaces Prints interfaces and distributions on Virtual Systems
-u, --cores Prints core allocations on Virtual Systems
-n, --conn_vmems Prints connections and virtual memory on Virtual Systems
-a, --all Prints all the information on Virtual Systems
Example
> vsx stat
Policy Table
=============
+----+-----------+-----------------+--------------+--------------+
| ID | Type & Name | Security Policy | Installed at SIC State |
+----+-------------+-----------------+---------------+-----------+
| 0 | S Cost | NA-Core-GW_VSX | 2016-04-03 17:30:54 | Trust |
| 1 | S MEX-T2-VS | MEX-T2 | 2016-04-03 17:36:47 | Trust |
| 2 | S EQU-T2-VS | EQU-T2 | 2016-04-10 10:47:38 | Trust |
| 3 | S CAN-T2-VS | CAN-T2 | 2016-04-10 10:38:26 | Trust |
| 4 | S SHR-T2-VS | SHARED-T2 | 2016-04-03 17:46:34 | Trust |
| 5 | S EQU-T3-VS | EQU-T3 | 2016-04-03 17:33:46 | Trust |
| 6 | S EXTRANET-VS | EXTRANET | 2016-04-03 17:54:09 | Trust |
| 7 | S MEX-T3-VS | MEX-T3 | 2016-04-03 17:37:56 | Trust |
| 8 | S SHR-T3-VS | SHARED-T3 | 2016-04-03 17:47:40 | Trust |
| 9 | S FUSION-VS | FUSION | 2016-04-03 17:51:28 | Trust |
| 10 | S IPT-VS | IPT | 2016-04-03 17:35:55 | Trust |
| 11 | S JP-T3-VS | JP-T3 | 2016-04-03 17:42:27 | Trust |
| 12 | S AB-T3-VS | AB-T3 | 2016-04-03 17:45:34 | Trust |
| 13 | S MGMT-VS | MGMT | 2016-04-03 17:50:08 | Trust |
| 14 | S VENDOR-VS | VENDOR | 2016-04-03 17:49:02 | Trust |
| 15 | S ALM-T3-VS | ALM-T3 | 2016-04-03 17:43:23 | Trust |
| 16 | B VSB_1_TAP | <Not Applicable> | | Trust |
| 17 | W VSW1 | <Not Applicable> | | Trust |
| 18 | W VSW2 | <Not Applicable> | | Trust |
| 19 | B VSB_2_Access | <Not Applicable> | | Trust |
| 20 | W VSW_Share_identities | <Not Applicable> | | Trust |
| 21 | W VSW_Barakeo1 | <Not Applicable> | | Trust |
| 22 | S VS_Barakeo | Big_Policia1 | 2016-04-10 10:43:31 | Trust |
| 23 | W DMZ_VSW | <Not Applicable> | | Trust |
| 24 | W VPN_DMZ_VSW | <Not Applicable> | | Trust |
| 25 | B VSB_Packet_Brocker | <Not Applicable> | | Trust |
| 26 | S VS026 | Standard | 2016-04-03 17:53:16 | Trust |
| 27 | S VS027 | Standard | 2016-04-03 17:53:36 | Trust |
Processes Table
================
+-----+------------------------+-------+-------+-------+--------+
| ID | Type & Name | FWK | FWD | CPD | ROUTED |
+-----+------------------------+-------+-------+-------+--------+
| 0 | S Cost | 9095 | 23132 | 18466 | 8153 |
| 1 | S MEX-T2-VS | 6899 | 6912 | 6901 | 20694 |
| 2 | S EQU-T2-VS | 5313 | 5308 | 5306 | 1220 |
| 3 | S CAN-T2-VS | 31757 | 31818 | 30765 | 7084 |
| 4 | S SHR-T2-VS | 27556 | 27567 | 27563 | 21253 |
| 5 | S EQU-T3-VS | 15792 | 14992 | 14889 | 8155 |
| 6 | S EXTRANET-VS | 10289 | 10298 | 10288 | 31735 |
| 7 | S MEX-T3-VS | 12681 | 11924 | 11915 | 25467 |
| 8 | S SHR-T3-VS | 28849 | 28876 | 28833 | 21163 |
| 9 | S FUSION-VS | 29471 | 29470 | 29440 | 15220 |
| 10 | S IPT-VS | 7530 | 7545 | 7536 | 15307 |
| 11 | S JP-T3-VS | 15126 | 15149 | 15127 | 20674 |
| 12 | S AB-T3-VS | 4063 | 4045 | 4036 | 7480 |
| 13 | S MGMT-VS | 12592 | 13018 | 13003 | 1001 |
| 14 | S VENDOR-VS | 18563 | 18576 | 18567 | 20665 |
| 15 | S ALM-T3-VS | 23961 | 22049 | 22009 | 7972 |
| 16 | B VSB_1_TAP | 28033 | 28055 | 28040 | - |
| 17 | W VSW1 | 13577 | 13560 | 13540 | - |
| 18 | W VSW2 | 13638 | 13767 | 13704 | - |
| 19 | B VSB_2_Access | 25870 | 25876 | 25868 | - |
| 20 | W VSW_Share_identities | 13670 | 13763 | 13691 | - |
| 21 | W VSW_Barakeo1 | 13630 | 13685 | 13639 | - |
| 22 | S VS_Barakeo | 32648 | 32656 | 32637 | 12980 |
| 23 | W DMZ_VSW | 5952 | 5948 | 5938 | - |
| 24 | W VPN_DMZ_VSW | 13516 | 13538 | 13528 | - |
| 25 | B VSB_Packet_Brocker | 9757 | 9773 | 9756 | - |
| 26 | S VS026 | 14382 | 14306 | 14111 | 29379 |
| 27 | S VS027 | 14485 | 14465 | 14440 | 29381 |
| 28 | S VS028 | 14308 | 14612 | 14463 | 29384 |
| 29 | S VS029 | 7669 | 7733 | 7671 | 25901 |
| 30 | S VS030 | 9471 | 9454 | 9447 | 28496 |
| 31 | S VS031 | 14680 | 14709 | 14691 | 5603 |
| 32 | S VS032 | 14584 | 14697 | 14519 | 29397 |
| 33 | S VS033 | 14502 | 14609 | 14523 | 5616 |
| 34 | S VS034 | 16692 | 18837 | 16815 | 5630 |
| 35 | S VS035 | 21622 | 22052 | 22038 | 5641 |
+-----+------------------------+-------+-------+-------+--------+
Topology Table
===============
+------+------------------+------+--------------------+-----------+
| VSID | Type & Name | VSID | Type & Name | Interface |
+------+------------ -----+------+--------------------+-----------+
| 10 | S IPT-VS | 23 | W DMZ_VSW | wrpj640 |
60000/40000 Security Systems Administration Guide R76SP.50 | 281
Working with VSX
+------+------------------+------+--------------------+-----------+
| 100 | S MyVS | 17 | W VSW1 | wrpj6400 |
+------+------------------+------+--------------------+-----------+
| 12 | S AB-T3-VS | 17 | W VSW1 | wrpj768 |
| | S AB-T3-VS | 20 | W VSW_Share_identities | wrpj769 |
| | S AB-T3-VS | 23 | W DMZ_VSW | wrpj770 |
+------+-----------------+------+---------------------+-----------+
| 17 | W VSW1 | 100 | S MyVS | | wrp6400 |
| | W VSW1 12 | S AB-T3-VS | | wrp768 |
| | W VSW1 3 | S CAN-T2-VS | wrp193 |
+------+-----------------+------+---------------------+-----------+
| 2 | S EQU-T2-VS | 23 | W DMZ_VSW | wrpj130 |
| | S EQU-T2-VS | 24 | W VPN_DMZ_VSW | wrpj131 |
+------+-----------------+------+---------------------+-----------+
| 20 | W VSW_Share_identities | 12 | S AB-T3-VS | wrp769 |
| | W VSW_Share_identities | 3 | S CAN-T2-VS | wrp192 |
+------+------------------------+------+--------------+-----------+
| 23 | W DMZ_VSW | 10 | S IPT-VS | wrp640 |
| | W DMZ_VSW | 12 | S AB-T3-VS | wrp770 |
| | W DMZ_VSW | 2 | S EQU-T2-VS | wrp130 |
| | W DMZ_VSW | 3 | S CAN-T2-VS | wrp194 |
| | W DMZ_VSW | 4 | S SHR-T2-VS | wrp257 |
| | W DMZ_VSW | 5 | S EQU-T3-VS | wrp322 |
| | W DMZ_VSW | 6 | S EXTRANET-VS | wrp384 |
| | W DMZ_VSW | 7 | S MEX-T3-VS | wrp448 |
+------+------------------------+------+---------------+----------+
| 24 | W VPN_DMZ_VSW | 2 | S EQU-T2-VS | wrp131 |
| | W VPN_DMZ_VSW | 4 | S SHR-T2-VS | wrp256 |
| | W VPN_DMZ_VSW | 5 | S EQU-T3-VS | wrp321 |
+------+------------------------+------+---------------+----------+
| 3 | S CAN-T2-VS | 17 | W VSW1 | wrpj193 |
| | S CAN-T2-VS | 20 | W VSW_Share_identities | wrpj192 |
| | S CAN-T2-VS | 23 | W DMZ_VSW | wrpj194 |
+------+------------------+----+------------------------+---------+
| 4 | S SHR-T2-VS | 23 | W DMZ_VSW | wrpj257 |
| | S SHR-T2-VS | 24 | W VPN_DMZ_VSW | wrpj256 |
+------+------------------+----+------------------------+---------+
| 5 | S EQU-T3-VS | 23 | W DMZ_VSW | wrpj322 |
| | S EQU-T3-VS | 24 | W VPN_DMZ_VSW | wrpj321 |
+------+------------------+----+------------------------+---------+
| 6 | S EXTRANET-VS | 23 | W DMZ_VSW | wrpj384 |
+------+------------------+----+------------------------+---------+
| 7 | S MEX-T3-VS | 23 | W DMZ_VSW | wrpj448 |
+------+------------------+----+------------------------+---------+
Routes Table
=============
+----+-------------+----------------+----------------+------------+
| ID | Type & Name | Destination | Gateway | Interface |
+----+-------------+----------------+----------------+------------+
| 1 | S MEX-T2-VS | 120.100.1.96 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.97 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.98 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.99 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.100 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.88 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.91 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.90 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.93 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.92 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.95 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.94 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.87 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.86 | 11.1.1.3 | bond2.120 |
| | | 5.5.5.5 | 10.133.252.27 | bond3.48 |
| | | 120.100.1.58 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.59 | 11.1.1.3 | bond2.120 |
| | | 81.81.81.1 | 11.1.1.4 | bond2.120 |
| | | 120.100.1.60 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.48 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.42 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.43 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.40 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.41 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.46 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.47 | 11.1.1.3 | bond2.120 |
| | | 120.100.1.44 | 11.1.1.3 | bond2.120 |
+-----+------------+-----------------+---------------+------------+
Interfaces Table
=================
60000/40000 Security Systems Administration Guide R76SP.50 | 282
Working with VSX
+----+-------------+-----------+----------+---------+--------------+
| ID | Type & Name | Interface | Address | Netmask | Distribution |
+----+-------------+-----------+----------+---------+--------------+
| | | | | | |
| 1 | S MEX-T2-VS | bond1.2303 | 10.133.242.215 | 28 | policy-internal |
| | | | - | - | |
| | | bond2.2025 | 81.81.81.97 | 30 | policy-external |
| | | | - | - | |
| | | bond2.2024 | 81.81.81.93 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2021 | 81.81.81.81 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2020 | 81.81.81.77 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2023 | 81.81.81.89 | 30 | policy-external |
| | | | - | - | |
| | | bond2.2022 | 81.81.81.85 | 30 | policy-internal |
| | | | - | - | |
| | | bond1.252 | 10.133.242.100 | 28 | policy-external |
| | | | - | - | |
| | | bond2.120 | 11.1.1.1 | 8 | policy-internal |
| | | | - | - | |
| | | bond2.2011 | 81.81.81.41 | 30 | policy-external |
| | | | - | - | |
| | | bond2.2015 | 81.81.81.57 | 30 | policy-internal |
| | | | - | - | |
| | | bond6.562 | 171.171.251.11 | 24 | policy-internal |
| | | | - | - | |
| | | bond1.120 | 111.1.1.1 | 8 | policy-external |
| | | | - | - | |
| | | bond2.2010 | 81.81.81.37 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2012 | 81.81.81.45 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2013 | 81.81.81.49 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2014 | 81.81.81.53 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2018 | 81.81.81.69 | 30 | policy-external |
| | | | - | - | |
| | | bond2.2019 | 81.81.81.73 | 30 | policy-internal |
| | | | - | - | |
| | | bond3.120 | 1.1.1.1 | 8 | policy-internal |
| | | | - | - | |
| | | bond2.2016 | 81.81.81.61 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2017 | 81.81.81.65 | 30 | policy-external |
| | | | - | - | |
| | | bond6.3000 | 31.0.0.1 | 8 | policy-internal |
| | | | - | - | |
| | | bond4.120 | 21.0.0.1 | 8 | policy-external |
| | | | - | - | |
| | | bond2.2007 | 81.81.81.25 | 30 | policy-internal |
| | | | - | - | |
| | | bond2.2006 | 81.81.81.21 | 30 | policy-internal |
| | | | - | - | |
+---+-------------+------------+--------------+-----+-----------------+
| | | | P FWD | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
| | | | P CPD | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
| 5 | S EQU-T3-VS | 3/0 | | |
| | | | P FWK | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
| | | | P FWD | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
| | | | P CPD | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
| 6 | S EXTRANET-VS | 4/0 | | |
| | | | P FWK | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
| | | | P FWD | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
| | | | P CPD | 0 1 2 3 4 5 6 7 8 9 10 11 20 21 22 23 24 25 26 27 28 29 30 31 |
+---+---+---+-------+--------------------------------------------------+
Syntax
> fw -i k ctl set int fw_vsx_legacy_bridge_mode <mode>
Parameters
Parameter Description
<mode> Sets the VSX Legacy Bridge Mode
Valid values:
• 0 (Default) - Disable VSX Legacy Bridge Mode
• 1 - Enable VSX Legacy Bridge Mode
The Scalable Platform includes features that support advanced LTE telecommunication. Most of
these features are configured with SmartDashboard or on the Management Server. See the R76
LTE Release Notes http://downloads.checkpoint.com/dc/download.htm?ID=29339 for detailed
information and configuration procedures. Configuration procedures for SGMs are included in this
section for your convenience.
These LTE features include:
• LTE S1 VPN
• Firewall-1 GX support
• GTPv2 support
• GTP CoreXL support
• GTP Signaling rate limit
• SCTP support
• Diameter inspection
• Third-Party Syslog
• MSS adjustment
• CGNAT
• Stateless NAT46 translation
• NAT64
• Large Scale VPN
To disable hyper-threading:
1. Enter:
#g_cpconfig ht disable
2. Reboot.
Limitations:
• Connections are synchronized to all SGMs, not just the Standby SGM.
• You must not enable SPI distribution.
VPN Sticky SA
By default, the VPN Sticky Security Association (SA) feature is enabled. This feature confirms that
the Scalable Platform has only one outgoing SA to remote peers. This is a requirement for some
network device manufacturers to minimize security vulnerabilities.
Important - Make sure that SPI distribution and Sticky SA are not enabled at the same time.
Configuring VPN Sticky SA:
• To disable VPN Sticky SA, run this command in Expert Mode:
# g_update_conf_file $FWDIR/modules/fwkern.conf
fwha_vpn_sticky_tunnel_enabled=0
• To re-enable VPN Sticky SA, run this command in Expert Mode:
# g_update_conf_file $FWDIR/modules/fwkern.conf
fwha_vpn_sticky_tunnel_enabled=1
• Reboot all SGMs:
# reboot –b all
Verification:
To see the VPN Sticky SA status, run this command in Expert Mode and check the value of the
fwha_vpn_sticky_tunnel_enabled (0 means disabled, 1 means enabled):
# g_fw ctl get int fwha_vpn_sticky_tunnel_enabled
-*- 12 blades: 1_01 1_02 1_03 1_04 1_05 1_06 2_01 2_02 2_03 2_04 2_05 2_06 -*-
fwha_vpn_sticky_tunnel_enabled = 0
Notes:
• Only outbound Sticky SA connections are synchronized.
• Connections are not synchronized to all SGMs.
To synchronize connections to all SGMs, run:
asg_lte_config enable
Troubleshooting
In This Section:
Collecting System Information (asg_info) .................................................................289
Verifiers .......................................................................................................................293
Resetting SIC (g_cpconfig sic init) .............................................................................298
Debug files ..................................................................................................................301
Commands
The asg_info executes commands with this granularity:
• SGMs
• All SGMs
• Single SGM for each Chassis
• Selective SGMs
• VSX
• Per-Virtual System
• VS0 only
• Selective Virtual System
• CMM
Files
The asg_info collects a predefined list of files from the SGM and Virtual Systems. A global file is
located in the global folder.
Examples
1. latest_policy.policy.tgz is collected as a global file, and is located in
\global\VS0\var\CPbackup\asg_backup\
2. dist_mode.log is collected from the SGM and Virtual System folders, and is located in
\SGM_1_01\VS1\var\log\dist_mode.log\
3. start_mbs.log is collected from the SGM folder and not from the Virtual System folder, and
is located in \SGM_1_01\VS0\var\log\start_mbs.log\
Syntax
> asg_info [-b <SGM_IDs>] [--vs <VS_IDs>] <collect_flags> [options]
> asg_info [-b <SGM_IDs>] [--vs <VS_IDs>] [--user_conf <xml_filename>] [options]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Default - All SGMs in the UP state.
-vs <VS_IDs> <VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System
context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
Parameter Description
Collect Flags
Flag Description
--all Collects all log files and commands output
-q Collects major log files and commands output
-f Collects comprehensive log files and commands output
-c Collects core dump information
-i Collects cpinfo output
-m Collects CMM log files
-s Collects setup information
-a Collects archive files
-h Shows the built-in help
--user_conf Adds xml configuration file with files and commands
Options
Option Description
--list Shows all the files and commands to be collected without
collecting them in practice
-h Shows this help message and exit
-v Shows verbose output
-u Uploads asg_info output file to the Check Point User Center
-t Uploads asg_info output file using SFTP only. Default is
HTTPS and SFTP
-uk Uploads result file using cp_uploader-k
-e Semicolon separated list of email addresses for upload
notifications
Configuration Files:
• Default
$FWDIR/conf/asg_info_config.xml
Files and commands are defined automatically
• User defined
The user can define files and commands following the same standard
The user can configure any command and/or file for collection and it is used with the
--user_conf option.
Note - Run the asg_info command and run the user-defined file or the default file. They cannot
be run together.
Verifiers
Below are the verifiers.
Syntax
# mac_verifier -h
# mac_verifier [-l] [-v]
Parameters
Parameter Description
-h Shows the built-in help.
-l Shows MAC address consistency on the Active Chassis.
-v Shows information for each interface MAC Address.
Example
[Expert@MyChassis-ch01-01:0]# mac_verifier
Starting mac address verification on local chassis... (Chassis 1)
No inconsistency found on local chassis
Syntax
> asg_br_verifier [-v]
Parameters
Parameter Description
-v Verbose Mode
Example 1
> asg_br_verifier
================================================================================
-*- 10 blades: 1_01 1_02 1_03 1_04 1_05 2_01 2_02 2_03 2_04 2_05 -*-
11
Status: OK
================================================================================
Example 2
> asg_br_verifier -v
================================================================================
-*- 9 blades: 1_01 1_03 1_04 1_05 2_01 2_02 2_03 2_04 2_05 -*-
11
-*- 1 blade: 1_02 -*-
0
================================================================================
Collecting table info from all SGMs. This may take a while.
-*- 9 blades: 1_01 1_03 1_04 1_05 2_01 2_02 2_03 2_04 2_05 -*-
address="00:00:00:00:00:00" Interface="eth1-07"
address="00:10:AA:7D:08:81" Interface="eth2-07"
address="00:1E:9B:56:08:81" Interface="eth1-07"
address="00:23:FA:4E:08:81" Interface="eth1-07"
address="00:49:DC:58:08:81" Interface="eth2-07"
address="00:7E:60:77:08:81" Interface="eth1-07"
address="00:80:EA:55:08:81" Interface="eth1-07"
address="00:8D:86:52:08:81" Interface="eth2-07"
address="00:9E:8C:7F:08:81" Interface="eth1-07"
address="00:E5:DB:78:08:81" Interface="eth2-07"
address="00:E5:F7:78:08:81" Interface="eth2-07"
-*- 1 blade: 1_02 -*-
fdb_shadow table is empty
Status: Table entries in fdb_shadow table is different between SGMs
================================================================================
When a command fails, the output contains: Command "asg xxx" failed to run on blade
"2_01"
Syntax
> asg vsx_verify [-a | -c | -v]
Parameters
Parameter Description
-a Includes SGMs in the Administrative DOWN state
-c Compares:
• Database configuration between SGMs
• Operating system and database configuration on each SGM
-v Includes Virtual Systems configuration verification table
Example 1
> asg vsx_verify –v
+------------------------------------------------------------------------------+
|Chassis 1 SGMs: |
|1_01 1_02 1_03 |
+------------------------------------------------------------------------------+
+------------------------------------------------------------------------------+
|Chassis 2 SGMs: |
|2_01* 2_02 2_03 |
+------------------------------------------------------------------------------+
+-------------------------------------------------------------------+
|VSX Global Configuration Verification |
+------+---------------------------------+------------------+-------+
|SGM |VSX Configuration Signature |Virtual Systems |State |
| |VSX Configuration ID |Installed\Allowed | |
+------+---------------------------------+------------------+-------+
|all |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
+--------------------------------------------------------------------------+
|Virtual Systems Configuration Verification |
+----+-----+-----------+---------------+----------------+---------+--------+
|VS |SGM |VS Name |VS Type |Policy Name |SIC State|Status |
+----+-----+-----------+---------------+----------------+---------+--------+
|0 |all |VSX_OBJ |VSX Gateway |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|1 |all |VSW-INT |Virtual Switch |<Default Policy>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|2 |all |VSW-INT |Virtual Switch |<Not Applicable>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|3 |all |VS-1 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|4 |all |VS-2 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
Comparing Routes DB & OS. This procedure may take some time...
Press 'y' to skip this procedure...
Comparing..
+--------------------------------------------------------------------------+
|Summary |
+--------------------------------------------------------------------------+
|VSX Configuration Verification completed successfully |
+--------------------------------------------------------------------------+
Example 2
> asg vsx_verify -v -a
Output
+--------------------------------------------------------------------------+
|Chassis 1 SGMs: |
|1_01* 1_02 1_03 1_04 |
+--------------------------------------------------------------------------+
+--------------------------------------------------------------------------+
|Chassis 2 SGMs: |
|2_01 2_02 2_03 2_04 |
+--------------------------------------------------------------------------+
+-------------------------------------------------------------------+
|VSX Global Configuration Verification |
+------+---------------------------------+------------------+-------+
|SGM |VSX Configuration Signature |Virtual Systems |State |
| |VSX Configuration ID |Installed\Allowed | |
+------+---------------------------------+------------------+-------+
|1_01 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|1_02 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|1_03 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|1_04 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |DOWN |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_01 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_02 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_03 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_04 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
+--------------------------------------------------------------------------+
|Virtual Systems Configuration Verification |
+----+-----+-----------+---------------+----------------+---------+--------+
|VS |SGM |VS Name |VS Type |Policy Name |SIC State|Status |
+----+-----+-----------+---------------+----------------+---------+--------+
|0 |all |VSX_OBJ |VSX Gateway |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|1 |all |VSW-INT |Virtual Switch |<Default Policy>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|2 |all |VSW-INT |Virtual Switch |<Not Applicable>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|3 |all |VS-1 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|4 |all |VS-2 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
Comparing Routes DB & OS. This procedure may take some time...
Press 'y' to skip this procedure...
Comparing..
+--------------------------------------------------------------------------+
|Summary |
+--------------------------------------------------------------------------+
|VSX Configuration Verification completed with the following errors: |
|1. [1_02:1] eth1-06 operating system address doesn't match |
|2. [1_02:1] eth1-06 DB address doesn't match |
|3. [1_01:1] Found inconsistency between addresses in operating system ,DB and NCS ofeth1-06 |
| |
+--------------------------------------------------------------------------+
All logs collected to /var/log/vsx_verify.1360886320.log
Example output:
-*- 6 blades: 1_01 1_02 1_03 2_01 2_02 2_03 -*-
Trust State: Trust established
SIC Cleanup
To resolve other SIC issues, do a SIC cleanup. There are two ways to do a SIC cleanup:
Either run:
# asg_blade_config reset_sic -reboot_all <activation_key>
OR
1. Use the ccutil in the Expert Mode to shut down all SGMs (except the SMO).
2. Connect to the SMO using a serial console.
3. Initialize SIC in SmartDashboard > Security Gateway object > General Properties >
Communication.
4. Install policy on the SMO.
5. Turn on all SGMs.
Debug files
Below are the Scalable Platform debug files:
FWK $FWDIR/log/fwk.elg.*
Policy $FWDIR/log/cpha_policy.log.*
Alerts /var/log/send_alert.*
Distribution $FWDIR/log/dist_mode.log.*
Installation – OS /var/log/anaconda
CPD $CPDIR/log/cpd.elg
FWD $FWDIR/log/fwd.elg
General /var/log/messages*
VPND $FWDIR/log/vpnd.elg*
System Optimization
In This Section:
Firewall Connections Table Size for VSX Gateway ...................................................303
Using the Fast Accelerator (sim fastaccel) ...............................................................304
Reserved Connections ................................................................................................307
Policy Acceleration - SecureXL Keep Connections ..................................................310
VPN Performance Enhancements .............................................................................311
Acceleration Not Disabled Because of Traceroute Rule (asg_tmpl_special_svcs) 331
Improving Inbound HTTPS Performance ................................................................332
Layer 4 CoreXL Overview ...........................................................................................333
System Under Load ....................................................................................................339
Parameters
Parameter Description
-h Shows the built-in help information.
show Shows all trusted connections.
add Adds a new trusted connection.
delete Deletes a trusted connection.
<Source_IP> Connection source IP address and optional subnet.
<Source_Port> Connection source port. See IANA - Port Numbers
https://www.iana.org/assignments/service-names-port-numbers/service-na
mes-port-numbers.xhtml.
<Dest_IP> Connection destination IP address and optional subnet.
<Dest_Port> Connection destination port. See IANA - Port Numbers
https://www.iana.org/assignments/service-names-port-numbers/service-na
mes-port-numbers.xhtml.
Parameter Description
<Protocol> IP Protocol Number. See IANA - Protocol Numbers
https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xht
ml (for example, TCP=6, UDP=17).
<Rule_Number> Number of the rule in the list of configured trusted connections.
Notes:
• On a VSX Gateway, you must run the sim fastaccel and sim6 fastaccel commands from
the context of each applicable Virtual System.
Run the vsenv <VS_ID> command and then the sim fastaccel and sim6 fastaccel
commands.
Each Virtual System context has its own independent table.
• You can use the @ character as a wildcard to represent a valid parameter value.
• Enter the subnet in the /nn format. If you do not define a subnet, connection is defined as one,
specified IP address.
• The source is defined as all IPv4 addresses in the 1.1.1.0/24 subnet and all valid ports.
• The destination is defined as the IPv4 address 2.2.2.2 and port 80.
• The connection is over TCP.
• The source is defined as all IPv4 addresses in the 192.168.0.0/16 subnet and all valid ports.
• The destination is defined as all IPv4 addresses and port 123.
• The connection is over UDP.
• The source is defined as all IPv6 addresses in the 2001::/64 subnet and all valid ports.
• The destination is defined as the IPv6 address 2002::2 and port 80
• The connection is over TCP.
• The source is defined as all IPv6 addresses in the 3002::/16 subnet and all valid ports.
• The destination is defined as all IPv6 addresses and port 123.
• The connection is over UDP.
Known Limitation:
• Connections can only be added or deleted. They cannot be enabled or disabled.
Reserved Connections
Description
Normally, when the connection table limit is reached, no more connections are allowed, even ones
critical for operating and managing the Security Gateway. Use the reserved connections feature to
allow the Security Gateway to process these critical connections, even after the connections table
limit is reached. There is a user defined amount of space that is reserved in the connections table
for these critical connections. If the rule base allows these connections, they are allowed even if
no other connections can be accepted.
For example, when the connections table limit is reached, the administrator is limited. He cannot
install a new policy that increases the connections limit or open other necessary connections,
such as an SSH to the Security Gateway.
Syntax
# asg_reserved_conns
Please choose one of the following:
-----------------------------------
1) Print reserved connections table
2) Add new reserved connection rule
3) Delete reserved connection rule
4) Exit
>
Example output
Idx Source Mask Destination Mask DPort Ipp Interface
--- --------------- ---- --------------- ---- ----- ----- ------------
1) 0.0.0.0 0 0.0.0.0 0 1129 6 Sync
2) 0.0.0.0 0 0.0.0.0 0 1130 6 Sync
3) 0.0.0.0 0 0.0.0.0 0 4444 6 Sync
4) 0.0.0.0 0 0.0.0.0 0 22 6 Sync
5) 0.0.0.0 0 0.0.0.0 0 8888 6 Sync
6) 0.0.0.0 0 0.0.0.0 0 2010 6 Sync
7) 0.0.0.0 0 0.0.0.0 0 1131 6 Sync
8) 0.0.0.0 0 0.0.0.0 0 1132 6 Sync
9) 0.0.0.0 0 0.0.0.0 0 256 6 Sync
10) 0.0.0.0 0 0.0.0.0 0 0 1 Sync
11) 0.0.0.0 0 0.0.0.0 0 8116 17 Sync
12) 0.0.0.0 0 0.0.0.0 0 0 1 eth1-CIN
13) 0.0.0.0 0 0.0.0.0 0 22 6 eth1-CIN
14) 0.0.0.0 0 0.0.0.0 0 23 6 eth1-CIN
15) 0.0.0.0 0 0.0.0.0 0 161 17 eth1-CIN
16) 0.0.0.0 0 0.0.0.0 0 623 17 eth1-CIN
17) 0.0.0.0 0 0.0.0.0 0 0 1 eth2-CIN
Output description
Field Description
Idx Rule number
Source Source IP
If the IP is 0.0.0.0, all IPs are allowed
Mask Subnet mask for the Source
Destination Destination IP
If the IP is 0.0.0.0, all IPs are allowed
Mask Subnet mask for the Destination
DPort TCP/UDP Port
This is ignored with non-TCP/UDP traffic
Ipp IP protocol number
Interface Interface for this rule
To add a reserved connection rule, enter 2, and follow the directions on the screen.
Enter source IP [0.0.0.0]:
>10.10.10.10
Enter source IP mask length [0]:
>24
Enter destination IP [0.0.0.0]:
>20.20.20.0
Enter destination IP mask length [0]:
>24
Enter destination port [0]:
>0
Enter IP protocol number (for example: tcp = 6, udp = 17):
>6
Enter interface number [0 = Any]:
0: Any
1: eth1-Mgmt4
2: eth2-Mgmt4
3: BPEth0
4: BPEth1
5: eth1-Mgmt1
6: eth1-CIN
7: eth1-01
8: eth2-Mgmt1
9: eth2-CIN
10: eth2-01
11: Sync
>0
OK to insert new reserved conn rule: <10.10.10.10/24, 20.20.20.0/24, 0, 6, Any> ? (y/n)
>y
entry inserted, rule will apply when new connection will be opened
Press enter to continue
Configuration
The feature works after installation without additional configuration.
The rules are stored in $FWDIR/bin/reserved_conns_table
The feature uses these kernel global variables:
Variable Description
fwconn_reserved_conn_active Enables or disables the feature
Valid values:
• 1 - Enabled
• Any other integer: Disabled
fwconn_reserved_limit Maximum allowed number of entries in
$FWDIR/bin/reserved_conns_table
Default: 2000
Legacy Mode:
To allow Keep all connections while disabling SecureXL keep connections, in
$FWDIR/boot/modules/fwkern.conf, set cphwd_policy_accel to 0
Verification:
After policy installation, delete the old policy templates.
SPI Distribution
By default, the SSM160 distributes traffic to SGMs based on the IP address in the packet header.
This methodology can be inefficient when working with a small number of remote peers in a
Site-to-Site VPN topology. The SSM160 only sees the VPN tunnel IP address and causes
distribution only to some SGMs.
To resolve this issue, you can enable SPI distribution for VPN traffic. Run this command in gClish:
# set distribution spi mode on|off
Important - You must not enable SPI distribution for the LTE Mode (on page 286) or when working
with 3rd party VPN peers.
Enabling SPI Distribution
When you enable SPI distribution, you must also run:
# g_update_conf_file fwha_vpn_sticky_tunnel_enabled=0
Disabling SPI Distribution
When you disable SPI distribution in LTE Mode or with a 3rd party peer, you must also run:
# g_update_conf_file fwha_vpn_sticky_tunnel_enabled=1
Note - SPI Distribution Mode is disabled by default.
Syntax
# asg_spi_affinity mode <ssm_id> {on | off}
# asg_spi_affinity vlan <ssm_id> {on | off}
# asg_spi_affinity verify
Parameters
Parameter Description
mode Configures VPN affinity for the specified SSMs.
vlan Configures VLAN affinity for all interfaces of the specified SSMs.
verify Shows SPI affinity status.
<ssm_id> SSM ID
Valid values:
• Integer between 1 and 4
• all - All SSMs
on | off Enables (on) or disables (off) SPI affinity.
You must enable VLAN and mode (VPN) affinity separately.
Notes:
• If some SSM interfaces are not configured as VLANs, we recommend that you enable VLAN
affinity only if most traffic passes through VLAN interfaces.
• SPI affinity can affect the distribution of clear packets. We recommend that you use SPI affinity
only if most of the inbound traffic is VPN traffic.
SCTP Acceleration
To enable SCTP Acceleration:
1. In SmartDashboard, create SCTP as Other using IP protocol 132.
2. Enable Accept Replies in the Advanced tab of the SCTP service.
3. On the Scalable Platform, connect to the SMO in Expert Mode: > shell
4. Edit the $FWDIR/boot/modules/fwkern.conf file.
If the file does not exist, create it.
5. Add sxl_accel_proto_list=132 to the file.
6. Edit the $PPKDIR/boot/modules/simkern.conf file.
If the file does not exist, create it.
7. Add sim_accel_non_tcpudp_proto=1 to the file.
8. Copy the files to all SGMs:
# g_cp2blades $FWDIR/boot/modules/fwkern.conf
# g_cp2blades $PPKDIR/boot/modules/simkern.conf
9. Reboot all SGMs:
# g_reboot -a
Notes:
• This is the only way to extend the DNS session rate enhancements to other UDP services.
• The number of services is limited to 8. The command must contain 8 values. If you have to
configure less than 8 services, enter 0 for the others.
• The fw ctl set int command is not supported.
• The configuration takes effect only after reboot.
The number of services is limited to 8. The command must contain 8 values. If you have to
configure less than 8 services, enter 0 for the others.
Notes:
• The fw ctl set int command will not work. The parameter is set to read-only.
• Changes in the $FWDIR/boot/modules/fwkern.conf file take effect only after reboot.
This is the only way to extend the DNS session rate enhancements to other UDP services.
Limitations:
• Accelerated Drop Enhancement does not support IPv6.
• Accelerated Drop Enhancement and the sim template quota exclude list (sim
tmplquota –f) cannot be enabled at the same time.
• Accelerated Drop Enhancement enforces rules only if SecureXL is on. For example, it does not
enforce rules during policy installation.
• Accelerated Drop Enhancement is not supported for VSX environments.
Configuration File
Add the drop rules in this file only for the local SGM. Each line must contain one rule, and each
rule must contain one or more parameters.
Syntax Description
src <Source IP> [<Subnet>] Subnet of the source is optional
dst <Destination IP> [<Subnet>] Subnet of the destination is optional
dport <Destination port> Valid port number
proto <IP protocol> An integer that represents a protocol, according to the IANA -
Protocol Numbers
https://www.iana.org/assignments/protocol-numbers/protoco
l-numbers.xhtml
Example:
src 1.1.1.0/24 dst 2.2.0.0/16 dport 53 proto 17
Control Commands
To send commands to the local SGM in command-line mode:
# asg_sim_dropcfg [enforce [-before | -ext | -nolog] | disable] [status] [conf
[-comp]] [stats] [fix]
Parameters
Parameter Description
enforce Applies configuration to SecureXL to start rule enforcement.
enforce -before Tests packets against drop rules, and then against a connection or a
template.
Use this option to apply drop rules to a new or an existing connection.
enforce -ext Enforces drop rules only on external interfaces.
Default is enforce rules on all interfaces.
enforce -nolog Disables automatic log sent to Management Server.
disable Disables enforcement of rules.
status Shows configuration file and SecureXL configuration status.
conf Shows configuration file settings.
conf -comp Compares configuration files between SGMs.
stats Shows drop counters for each SGM.
fix Sets a consistent configuration across SGMs.
If this fails, disable Accelerated Drop Enhancement.
Use this option for error recovery.
Example
To enforce drop rules in the configuration file on external interfaces of new and existing
connections:
# asg_sim_dropcfg enforce -before -ext
To disable enforcement, run:
# asg_sim_dropcfg disable
Configuring Hyper-Threading
Description
Hyper-Threading lets a compatible operating system run more than one process at the same time
on a CPU core. A Hyper-Threading processor adds one or more logical processors, which the
operating system sees as independent processors.
To enable hyper-threading from Expert Mode, run:
# g_cpconfig
Syntax
# g_cpconfig ht stat
# g_cpconfig ht enable
# g_cpconfig ht disable
# g_cpconfig ht show stat
Parameters
Parameter Description
stat Shows whether Hyper-Threading is enabled for the Scalable Platform
enable Enable Hyper-Threading
disable Disable Hyper-Threading
show stat Shows the Hyper-Threading status for all SGMs
Important
• Hyper-Threading is enabled by default on the SGM260.
• You must reboot all SGMs after you enable or disable Hyper-Threading.
Syntax
> g_cpconfig corexl stat
> g_cpconfig corexl enable <n> [-6 <k>]
> g_cpconfig corexl disable
> g_cpconfig corexl instances <n> [-6 <k>]
> g_cpconfig corexl show instances
> g_cpconfig corexl show stat
Parameters
Parameter Description
stat Shows current status and number of instances on all SGMs.
enable <n> [-6 <k>] Enables CoreXL
<n> - Number of IPv4 Firewall instances
-6 <k> - Number of IPv6 Firewall instances
Valid values: 2 - 32
Default - 16
disable Disables CoreXL.
CoreXL was successfully enabled with 8 IPv4 and 8 IPv6 firewall instances.
Important: This change will take effect after rebooting all blades.
Syntax
> set interface <if_name> mtu <size>
Parameters
Parameter Description
<if_name> Interface name as defined in the operating system
<size> MTU size
Allowed values:
• 68 - 12,200 for SSM160
• 68 - 9,416 for SSM440
• 68 - 9,702 for SGM400
Example
> set interface eth1-01 mtu 9000
1_02:
Note: MTU changes are propagated to the SSMs. Use "asg_jumbo_conf show" to validate
changes
Example:
# asg_chassis_ctrl jumbo_frames show 1
Jumbo frames are enabled on SSM1
# asg_chassis_ctrl get_port_mtu 1 1
MTU of port 1 on SSM1 is 1544
Syntax
# asg_jumbo_conf show [-v]
Parameters
Parameter Description
-v Detailed report (verbose)
Example
[Expert@MyChassis-ch01-01:0]# asg_jumbo_conf show -v
Jumbo frames are enabled on SGMs (SSM1 max MTU: 12288 SSM2 max MTU: 12288 )
Retrieving SSMs Jumbo frames configuration
Chassis1
SSMs:
Jumbo frames are enabled on SSM1
Jumbo frames are enabled on SSM2
Interfaces MTU configuration:
interface:BPEth0:mtu 12288
interface:BPEth1:mtu 12288
The MTU of all the interfaces which are not in the list is 1500
[Expert@MyChassis-ch01-01:0]#
Syntax
> set interface <interface> mtu {1500..1}
Example
> set interface eth1-01 mtu 1500
1_02:
Note - MTU changes are propagated to the SSMs. Use asg_jumbo_conf show to validate
changes.
Syntax
> fw ctl set int clamp_mss|mss_value <num>
Parameters
Parameter Description
clamp_mss <num>
Enables or Disables MSS Adjustment:
• 0 - Disable (default)
• 1 - Enable
mss_value <num>
MSS Value
If the value is set to 0, the MSS value is based on the
interface's MTU.
Notes:
• If you want the modified parameters including state (ON/OFF), to be persistent, use the
g_update_conf command in the Expert Mode to add them to
$FWDIR/boot/modules/fwkern.conf file.
• Verification - You can use Packet Sniffers to make sure that MSS is clamped when the feature
is enabled according to the configuration.
• MSS value is applied on all interfaces, including Management.
Debugging:
1. Enable SIM debug:
> sim dbg -m pkt + pkt
2. Start fw debugging:
> fw ctl zdebug + packet
3. Look for output that contains the string:
MSS
Syntax
# asg_session_control {apply | disable | stats | verify}
Parameters
Parameter Description
No Parameters Shows the command syntax and help information
apply Applies session rate rules to all SGMs
disable Disables session rate rules for all SGMs
stats Shows all session rate rules and dropped traffic statistics
Syntax
Syntax
# asg_session_control {apply | disable | stats | verify}
Parameters
Parameter Description
No Parameters Shows the command syntax and help information
apply Applies session rate rules to all SGMs
disable Disables session rate rules for all SGMs
stats Shows all session rate rules and dropped traffic statistics
verify Confirms that the session rate rules are the same on all SGMs
Rule Syntax
[src <ip>/<mask>] [dst <ip>/<mask>] [dport <port>] [proto <protocol_id>] [limit
<rate>] [limit_ongoing 0|1]
Parameters
Parameter Description
src <ip>/<mask> Source IP address and net mask
dst <<ip>/<mask> Destination IP address and net mask
dport <port> Destination port
proto Protocol code, typically 6 (TCP) or 17 (UDP)
<protocol_id> To learn more about protocol codes, see IANA protocol codes
https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xh
tml.
limit <rate> Maximum number of new connections allowed per second
limit_ongoing • 0 - Do not limit the number of packets on an established connection
0|1
• 1 - Limit the number of packets on an established connection
Rule Example 1:
src * dst 1.1.1.0/24 dport 67 proto 17 limit 20 limit_ongoing 1
This rule defines a limit of 20 new connections per second for traffic going from all sources to:
• Network 1.1.1.0/24
• Port 67
• Using protocol 17 (UDP)
• Including current connections
Rule Example 2:
dst 1.1.1.1/32 dport 80 proto 6 limit 13
This rule defines a limit of 13 new connections per second for traffic going from all sources to:
• Network 1.1.1.1/32
• Port 80
• Using protocol 6 (TCP)
Notes:
• New connections above the specified limit are dropped.
• If you do not include a parameter, the rule applies to all values for that parameter.
For example, if you do not include the src parameter, the rule applies to all servers.
• The * character as a parameter value explicitly means that a rule applies to all values.
Syntax
asg_session_control disable
Example
-*- 2 blades: 1_01 1_02 -*-
Resetting session rate entries
Session rate entries configured successfully
Syntax
asg_session_control apply
Example
-*- 2 blades: 1_01 1_02 -*-
Rule ID Source Destination DPort PR Limit Ongoing
------- ------------------ ------------------ ----- --- ----- -------
1 * 1.1.1.0/24 67 17 20 1
2 * 2.2.2.2/32 80 6 13 0
Syntax
asg_session_control stats
Example
1_01:
Rule ID Source Destination DPort PR Limit Drops Attempts
------- ------------------ ------------------ ----- --- ----- ------------- -------------
1 * 1.1.1.0/24 67 17 20 3 19
2 * 2.2.2.2/32 80 6 13 0 12
1_02:
Rule ID Source Destination DPort PR Limit Drops Attempts
------- ------------------ ------------------ ----- --- ----- ------------- -------------
1 * 1.1.1.0/24 67 17 20 0 19
2 * 2.2.2.2/32 80 6 13 2 13
The output shows the session control rules for each SGM and the connections dropped by each
rule.
Syntax
> asg_tmpl_special_svcs {on | off}
Parameters
Parameter Description
on Acceleration is not disabled because of Traceroute rules
off Acceleration is disable because of Traceroute rules
Example
> asg_tmpl_special_svcs on
• This feature requires a hotfix on the R76 Management Server. For this hotfix, contact Check
Point Support https://www.checkpoint.com/support-services/contact-support/.
• For this feature to work correctly, the Traceroute service object in SmartDashboard must
remain with default settings and not be customized.
Syntax
# g_cpconfig corexl layer4 enable
# g_cpconfig corexl layer4 disable
# g_cpconfig corexl layer4 stat
Parameters
Parameter Description
enable Enables Layer4 CoreXL
CoreXL instance decision function uses:
• Source and destination ports
• Source and destination IPs
• IP protocol
disable Disable Layer4 CoreXL
CoreXL instance decision function uses:
• Source and destination IPs
• IP protocol
stat Shows current status of Layer4 CoreXL on all SGMs
Important - This change will take effect after reboot. It is possible to reboot one chassis at a time.
Important - This change will take effect after reboot. It is possible to reboot one chassis at a time.
Affinity Priorities
When a CPU core has more than one affinity, the affinity is applied based on these priorities:
1. Firewall instance
2. Process
3. Virtual System
Setting Affinities
Description
Use the fw ctl affinity-s -d command to set CPU affinities.
• Firewall instance
• Process
• Virtual System
You can set a Firewall instance affinity to one or more CPUs on each Virtual System individually.
Syntax
> fw ctl affinity-s -d
> fw ctl affinity-s -d [-vsid <VS_IDs>] -cpu <CPU_ID>
> fw ctl affinity-s -d -pname <process> [-vsid <ranges>] -cpu <CPU_ID>
> fw ctl affinity-s -d -inst <Instance_ID> -cpu <CPU_ID>
Parameters
Parameter Description
-s -d Sets affinity for a VSX environment.
-vsid <VS_IDs>
<VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
Setting Affinities for all Virtual Systems (fw ctl affinity-s -d -fwkall)
Description
Use the fw ctl affinity-s -d -fwkall command to assign the specified number of CPU
cores to all Virtual Systems at one time.
Effect on Multi-Queue settings for interfaces that use the IXGBE driver
The use of this command to change the number of cores assigned to Virtual Systems, changes the
number of cores available for ixgbe interface rx queues. Conversely, when you change the
number of cores assigned to ixgbe interface queues, you also change the number of cores
assigned to Virtual Systems.
For example, if your SGM has 16 cores, and you assign 9 cores to Virtual Systems, the remaining 7
cores are available to the ixgbe interfaces.
Syntax
> fw ctl affinity-s -d -fwkall <cores>
Parameters
Parameter Description
-s -d
Set affinity for a VSX environment.
-fwkall <cores> Defines the number of cores assigned to all Virtual Systems.
Example
This example assigns three cores to Firewall instances for all Virtual Systems.
> fw ctl affinity-s -d -fwkall 3
VDevice 0-2 : CPU 0 1 2 - set successfully
Note - You can run this command from the VS0 context only.
Syntax
> fw ctl affinity -l -x [-vsid <VS_ID>] [-flags {e | h | k | n | t | o}]
Parameters
Parameter Description
<VS_ID>
Shows the affinity for processes for these Virtual System IDs.
Note - Use a dash to set a range of Virtual Systems.
e Does not show processes that are affinity exceptions.
Defines affinity exceptions in:
$FWDIR/conf/vsaffinity_exception.conf
h Shows CPU affinity mask in hexadecimal format.
k Does not show kernel threads.
n Shows the process name instead of /proc/<PID>/cmdline
t Shows information about process threads.
o Prints the list to a file.
Example
> fw ctl affinity -l -x -vsid 1 -flags tn
-----------------------------------------------------------------------
|PID |VSID | CPU |SRC|V|KT |EXC| NAME
-----------------------------------------------------------------------
| 4756 | 0 | all | | | | | pm
| 4773 | 0 | all | | | | | confd
| 4774 | 0 | all | | | | | searchd
| 5008 | 0 | all | | | | | |---searchd
| 4780 | 0 | all | | | | | httpd2
| 4781 | 0 | all | | | | | monitord
| 24700 | 0 | 0 1 | P | | | | |---cpd
| 24704 | 0 | 0 1 | P | | | | |---cpd
| 24705 | 0 | 0 1 | P | | | | |---cpd
| 22800 | 0 | all | | | | | mpdaemon
| 24523 | 0 | all | | | | | fwk_forker
| 24525 | 0 | all | | | | | fwk_wd
| 24573 | 0 | 1 3 4 6 | P | | | | fw
| 24667 | 0 | 1 3 4 6 | P | | | | |---fw
| 24668 | 0 | 1 3 4 6 | P | | | | |---fw
| 24670 | 0 | 1 3 4 6 | P | | | | |---fw
| 24671 | 0 | 1 3 4 6 | P | | | | |---fw
| 25412 | 0 | 1 3 4 6 | P | | | | |---fw
| 24642 | 0 | 2 3 4 5 6 7 | P | | | | fwk0_dev
| 24643 | 0 | 2 3 4 5 6 7 | P | | | | |---fwk0_0
| 30186 | 0 | all | | | | | clishd
-----------------------------------------------------------------------
>
Logs:
A log entry is generated for every SUL state change (ON/OFF). Only the SMO sends messages to
the log server. This example shows SUL logs in SmartView Tracker.
SUL log entries are typically a symptom of intensive CPU activity. To learn how to resolve these
issues, see Hardware Monitoring and Control (on page 139).
General (1) 3
LACP (2) 4
CH Monitor (3) 5
Chassis ID: 2
-------------
Task (Task ID) SGM ID
Notes:
• You cannot uninstall policies with SmartDashboard.
• To learn more about the working with policies, see asg policy below.
Syntax
asg policy -h
asg policy {verify | verify_amw} [-vs <VS_IDs>] [-a] [-vs] [-v]
asg policy unload [--disable_pnotes] [-a]
asg policy unload --ip_forward
Best Practice
Run these commands over a serial connection.
Parameters
Parameter Description
-h Shows the built-in help.
verify Confirms that the correct policies are installed on all SGMs.
verify_amw Confirms that the correct Anti-Malware policies are installed on all
SGMs.
60000/40000 Security Systems Administration Guide R76SP.50 | 341
60000/40000 Security Platforms
Parameter Description
unload Uninstalls the policy from the SGMs.
-vs <VS_IDs> Shows verification results for each Virtual System.
<VS_IDs> can be:
• No <VS_IDs> (default) - Uses the current Virtual System context
• One Virtual System
• A comma-separated list of Virtual Systems (1, 2, 4, 5)
• A range of Virtual Systems (VS 3-5)
• all - Shows all Virtual Systems
Note - This parameter is only applicable in a VSX environment.
+------------------------------------------------------------------------------+
|Summary |
+------------------------------------------------------------------------------+
|Policy Verification completed successfully |
+------------------------------------------------------------------------------+
[Expert@MyChassis-ch01-01:0]#
+------------------------------------------------------------------------------+
|Summary |
+------------------------------------------------------------------------------+
|Unload policy completed successfully |
+------------------------------------------------------------------------------+
[Expert@MyChassis-ch01-01:0]#
The action field defines the action to take when the imported (copied) file is different than the local
file:
• /bin/true - Reboot is required
• /bin/false - No reboot is required
• String enclosed in double quotes - Name of a "callback script" that selects the applicable
action.
Example - Configuration file list:
global_context $PPKDIR/boot/modules/sim_aff.conf "sim affinityload"
global_context $PPKDIR/boot/modules/simkern.conf /bin/false
global_context $FWDIR/modules/fwkern.conf /bin/false
all_vs_context $FWDIR/conf/fwauthd.conf /bin/false
all_vs_context $FWDIR/conf/discntd.if /bin/false
global_context /var/opt/fw.boot/ha_boot.conf /bin/false
all_vs_context $FWDIR/conf/sync_exceptions_tab "g_sync_exception -f"
all_vs_context $FWDIR/bin/reserved_conns_tab "g_reserved_conns -f"
global_context /config/active /usr/bin/confd_clone /config/db/cloned_db
global_context /tmp/sms_rate_limit.tmp /bin/true
global_context /tmp/sms_history.tmp /bin/true
global_context /home/admin/.ssh/known_hosts /bin/true
global_context /etc/passwd /bin/true
global_context /etc/shadow /bin/true
all_vs_context $FWDIR/bin/iproute.load /bin/true
all_vs_context $FWDIR/conf/gre_loader.conf /bin/true
global_context $FWDIR/conf/fwha_ch_uptime /bin/true
global_context $FWDIR/modules/mq_aff.conf "mq_affinity -s"
global_context $FWDIR/conf/pingable_hosts.conf "pingable_hosts local on"
all_vs_context $FWDIR/conf/pingable_hosts.ips /bin/true
global_context $FWDIR/conf/alert.conf /bin/true
all_vs_context $FWDIR/conf/asg_log_servers.conf "log_servers_util refresh"
global_context $FWDIR/modules/vlan_mq.conf "vlan_perf_enhancement -c"
global_context $FWDIR/conf/fw_global_params.conf "cpha_blade_config fw_global_params_changed"
global_context $FWDIR/boot/mq.conf "cpmq reconfigure"
global_context /etc/modprobe.conf asg_update_modprobe_conf /tmp/modprobe.conf.new
global_context $FWDIR/boot/modules/vpnkern.conf /bin/false
global_context /etc/ssm_port_speed.conf /bin/asg_update_port_speed /tmp/ssm_port_speed.conf.new
all_vs_context $FWDIR/conf/selective_template_exclude.conf /bin/true
global_context /etc/syslog_servers_list.conf asg_syslog_helper
global_context $FWDIR/conf/vsaffinity_exception.conf /bin/false
all_vs_context $FWDIR/conf/manual.affinity.conf "check_smo_affinity_files manual"
global_context $FWDIR/conf/fwkall.affinity.conf "check_smo_affinity_files fwdir" $FWDIR/tmp/
all_vs_context $CPDIR/conf/*.affinity.conf "check_smo_affinity_files cpdir" $CPDIR/tmp/
global_context $FWDIR/conf/resctrl "$FWDIR/bin/fw vsx resctrl load_configuration"
Type Description
BMAC A MAC address assigned to all interfaces with the BPEthX naming convention.
This is unique for each SGM.
It does not rely on the interface index number.
VMAC A MAC address assigned to all interfaces with the ethX-YZ naming convention.
This is unique for each Chassis.
It does not rely on the interface index number.
SMAC A MAC address assigned to Sync interfaces.
This is unique for each SGM.
It does not rely on the interface index number.
Syntax
asg_mac_resolver <MAC address>
Example
[Expert@MyChassis-ch01-01:0]# asg_mac_resolver 00:1C:7F:01:00:FE
[00:1C:7F:01:00:FE, BMAC] [Chassis ID: 1] [SGM ID: 1] [Interface: BPEth0]
[Expert@MyChassis-ch01-01:0]#
Notes:
• The specified MAC Address comes from BPEth0 on SGM1 on Chassis1.
• 00:1C:7F:01:00:FE is the Magic MAC attribute, which is identified by FE.
• The index length is 16 bits (2 Bytes) identified by 01:00 x x x x x x x x x x x x x x x x.
Security Group
To be part of a Security Gateway, an SGM must belong to a Security Group. Use the add smo
security_group command to add SGM. In the initial installation procedure, run the setup
command in the Expert mode to select the SGMs you want to add. When the first SGM completes
installation, the other SGMs are automatically installed. The SGMs automatically join the SMO of
the Security Gateway, and then reboot.
Use gClish commands to change the SGM.
Syntax Description
add smo security-group Adds the selected SGMs to the current
Security Group
delete smo security-group Removes the selected SGMs from the
current Security Group
Important - All SGMs in the current Security Group and not part of the new Security Group must
be in DOWN state or the command will fail.
Syntax Output
> New Security Group is:
> add smo security-group 1_1-1_3,2_1-2_3 > Chassis 1: 1-3
> Chassis 2: 1-3
> New Security Group is:
> show smo security-group > Chassis 1: 1-3
> Chassis 2: 1-3
Notes:
• Before you remove an SGM from the Security Gateway, make sure that is it in the DOWN state.
• To optimize connection distribution among the SGMs, update the Security Group with the
correct number of the SGMs in the appliance.
Important - Run the show smo verifiers print name Security_Group command to confirm
that the Security Group is correctly configured.
Description
The Multiple Security Groups feature lets you configure more than one Security Group on the
same Scalable Platform.
• Up to 12 Security Groups are supported.
• All configured Security Groups share the same chassis resources.
• Each configured Security Group runs an independent SMO.
• Each configured Security Group runs as a Security Gateway or VSX Gateway.
• Different Security Groups can run with different types of SGMs.
Example:
• SecurityGroup1: SGM260
• SecurityGroup2: SGM400
• Different Security Groups can have different Chassis High Availability modes.
Example:
• SecurityGroup1: Active UP
• SecurityGroup2: VSLS
• Different Security Groups can share the same Trunk interface with different VLANs.
• Each Security Group uses its own independent license.
To support Multiple Security Groups in R76SP.50, it is mandatory to install these on your Scalable
Platform:
1. R76SP.50 Take 148 and above. See sk115735
http://supportcontent.checkpoint.com/solutions?id=sk115735.
2. R76SP.50 Jumbo Hotfix Accumulator Take 161 and above. See sk117633
http://supportcontent.checkpoint.com/solutions?id=sk117633.
Important - Multiple Security Groups feature is not supported in R76SP.50 Build 84 and R76SP.50
Jumbo Hotfix Accumulator Takes 16 - 105. It is mandatory to re-image the SGMs with the required
R76SP.50 Take and install the required Jumbo Hotfix Accumulator Take. If you only install the
required Jumbo Hotfix Accumulator on top of R76SP.50 Build 84, attempt to enable Multiple
Security Groups is blocked.
Notes:
• You need to run this command only once.
• The system scans for other active Security Groups to pull the resource configuration from
them.
• If there are no other active Security Groups, the system asks the administrator to confirm.
Example:
> set smo multiple-security-groups state on
Analyzing the system...
No active Security Groups were detected in the system.
Is this the first Security Group in the system?(Y/N)[N]
y
1_01:
success
1_02:
success
Security Group ID
When you create a Security Group, the system automatically assigns a Security Group ID to it.
The Security Group ID is an integer between 1 (default) and 12.
The system uses these Security Group IDs internally to represent the Security Groups.
The Security Group ID is not fixed and may change during the system life cycle.
To see the Security Group IDs, run:
> show smo multiple-security-groups id
Example output:
> show smo multiple-security-groups id
1_01:
Security Group ID: 1
1_02:
Security Group ID: 1
Example output:
> add smo security-group [Press the Tab key]
Notes:
• The command shows the lists of the available slots in the system (slots not used by other
Security Groups).
• You cannot use the same slot by different Security Groups.
Note - The command shows the lists of the slots used by the local Security Groups.
Example output:
1_07:
Multiple Security Groups feature is Enabled
Notes:
When you run the setup command on the new Security Group, the system tries to detect other
active Security Groups. If the system detects a configured Security Group with the Multiple
Security Groups feature disabled on it, it shows the warning on the screen:
# setup
Trying to detect other configured Security Groups on the system...
In such case, cancel the operation and manually enable the Multiple Security Groups feature (on
page 351) on the current Security Group. Otherwise, the new SGM boots with the Multiple Security
Groups feature disabled.
Step Description
1 Add the interface you need to share to the topology:
Procedure for Gateway mode:
a) Connect to the command line on the Scalable Platform.
b) Log in to the gClish.
c) Change the state of the interface to on:
set interface <if_name> state on
Procedure for VSX mode:
a) Connect with SmartDashboard or SmartConsole to the Management Server that
manages the applicable Virtual System object.
b) Open the applicable Virtual System object.
c) Add the interface to the Virtual System topology.
d) Click OK to push the VSX Configuration.
e) Install the policy on the Virtual System object.
Step Description
3 Create the same shared VLAN Trunk interface on the other Security Group.
Example:
> add bonding group 1
1_07:
INFO: bond1 was detected as shared, the configuration will be derived
from other Security Groups
Notes:
• You can add the VLAN Trunk interface to another Security Group only if there is at least one
VLAN ID configured on the VLAN Trunk interface. Otherwise, the operation fails with error:
KERLAG0029 Resource Manager: Operation not permitted, bond1 is already
used by a different Security Group (1)
• You can only use different VLAN IDs on the same shared VLAN Trunk interface between
different Security Groups.
• When you add the shared VLAN Trunk interface to another Security Group, the system
automatically derives the configuration from Security Groups that use the shared VLAN Trunk
interface.
• The system automatically clones the shared VLAN Trunk interface configuration to all Security
Groups that use the same shared VLAN Trunk interface.
Example: The shared VLAN Trunk interface is Bonding Group 1 (bond1). There are two
Security Groups - Security Group 1 and Security Group 2. When you add a new slave interface X
to this Bonding Group 1 in the Security Group 1, the system automatically adds the same slave
interface X to the same Bonding Group 1 in the Security Group 2.
The system clones this shared VLAN Trunk interface configuration:
• For a Bonding Group:
configuration of slave interfaces
mode
abxor-threshold
lacp-rate
mii-interval
up-delay
xmit-hash-policy
• For a Physical Interface:
MTU
Auto-negotiation
• To delete a Bonding Group from a specific Security Group, use the flag with-interfaces:
> delete bonding group <Bond_Group_ID> with-interfaces
Example output:
> delete bonding group 1 with-interfaces
1_07:
INFO: bond1 was detected as shared, deletion will be applied on local Security
Group only
Global Configuration
The system applies this configuration to all configured Security Groups:
• Distribution matrix maximal size
When you change the distribution matrix maximal size (on page 358), it triggers the change on
all Security Groups. All Security Groups start an iteration for distribution recalculation.
• Distribution IPv6 mode
When you enable IPv6 mode (on page 20) on the Scalable Platform, it triggers an iteration for
distribution recalculation on all configured Security Groups.
• QSFP Mode
The system propagates the QSFP mode (on page 49) configuration to all configured Security
Groups.
Note: Change of the QSFP mode requires the SSM reboot.
Example output:
System Security Groups Overview:
+----+------------------+------------+----------------------------+
| ID | Mode | SGMs | Interfaces (Physical only) |
+----+------------------+------------+----------------------------+
| 1 | Security Gateway | 1_1, 1_2 | eth1-01[s,m], eth2-01[s,m] |
+----+------------------+------------+----------------------------+
| 2 | VSX | 1_7 | eth1-01[s,m], eth2-01[s,m] |
+----+------------------+------------+----------------------------+
| 3 | Security Gateway | 1_11, 1_12 | eth1-10[t] |
+----+------------------+------------+----------------------------+
Interfaces Flags:
(s) - Interface is shared
(t) - Interface is trunk
(m) - Interface is member of bonding group
Example output:
System Interfaces Overview:
+--------------------------+---------+-------+
| Interface | Used By | Trunk |
+--------------------------+---------+-------+
| bond1 (eth2-01, eth1-01) | 1, 2 | Yes |
+--------------------------+---------+-------+
| bond1.1561 | 1 | - |
+--------------------------+---------+-------+
| bond1.1562 | 2 | - |
+--------------------------+---------+-------+
| eth1-10 | 3 | Yes |
+--------------------------+---------+-------+
| eth1-10.2300 | 3 | - |
+--------------------------+---------+-------+
Example output:
SSM Global Configuration:
+------------------+-------+
| Feature | State |
+------------------+-------+
| IPv6 | off |
+------------------+-------+
| L4 Distribution | off |
+------------------+-------+
| SPI Distribution | off |
+------------------+-------+
| Max Matrix Size | 2k |
+------------------+-------+
| SSM1 QSFP Mode | 4x10G |
+------------------+-------+
| SSM2 QSFP Mode | 4x10G |
+------------------+-------+
Important:
• You can delete only the Security Group, to which you are connected.
• Before you add SGMs that were part of a deleted Security Group to another Security Group, we
recommend to reset those SGMs to factory default.
Example:
> delete smo multiple-security-groups id 1
You are about to delete Security Group 1, This will remove all SGMs
Are you sure?(Y/N)[N]
y
1_01:
SGM has been removed from the Security Group.
2_01:
SGM has been removed from the Security Group.
Unregistering Security Group from SGRM...
Security Group ID 1 was unregistered successfully
Done.
Notes:
• You can disable the Multiple Security Groups feature only on the last Security Group.
Example:
> set smo multiple-security-groups state off
Multiple Security Groups can be disabled on the last and only Security Group
• You need to run this command only once on the last and only Security Group.
Example:
> set smo multiple-security-groups state off
1_01:
success
1_02:
success
General Mode
Note - There can be some scenarios where you must manually assign the General Mode.
Physical Interfaces:
In this example, all ports on each SSM are Internal or External. The Distribution Mode for the two
SSMs is automatically configured as User or Network.
Physical Interfaces:
On at least one of the SSMs, some ports are Internal and others are External. The Distribution
Mode for the SSMs is automatically configured as Per Port.
Bond Interfaces:
In this example, both interfaces on each Bond are configured with the same Distribution Mode.
Both bond interfaces are configured with one port for SSM1 and one port for SSM2. On both SSMs,
one port is Internal and the other is External. The SSM Distribution Mode is automatically
configured as Per-Port.
Syntax Notes
> set distribution
configuration <mode>
<mode> can be Auto-topology or Manual-General
> set distribution
configuration <mode>
<version> can be one of the following: ipv4, ipv6, or all
ip-version <version> <mask> must be suitable for the matrix size and in Hex format
ip-mask <mask>
> show distribution
configuration
Shows the configuration
If the system is a VSX Gateway, configure the commands below on VS0 only. It applies immediately
to all Virtual Systems.
60000/40000 Security Systems Administration Guide R76SP.50 | 360
60000/40000 Security Platforms
Parameters
Parameter Description
<if_name> Interface name as assigned by the operating system.
user Manually assign the User Distribution Mode.
network Manually assign the Network Distribution Mode.
policy Use Auto-Topology to automatically assign the Distribution Mode
according to the policy.
Example
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > set distribution interface eth1-01 configuration
network
configuration update completed successfully
[Global] MyChassis-ch01-01 >
[Global] MyChassis-ch01-01 > set distribution interface eth1-01 configuration
policy
configuration update completed successfully
60000/40000 Security Systems Administration Guide R76SP.50 | 361
60000/40000 Security Platforms
Parameters
Parameter Description
<max size> Specifies the maximal size to configure
<mode> Specifies the mode. One of these:
• general
• user-network
• per-port
Example 1 - Set the maximal size for the distribution matrix to 2000 bytes
> set distribution matrix-max-size 2k
2_01:
initialization completed successfully
Syntax
> show distribution status [verbose]
Example output
Topic: Configuration:
distribution mode user-network
policy mode on
ssm 1 mode user
ssm 2 mode network
ipv6 mode off
spi mode off
l4 mode off
40g mode on
matrix max_size 2k
matrix size 2048
mask ipv4 general destination 0000001f
mask ipv4 general source 0000001f
mask ipv4 l4 ip 000001ff
mask ipv4 l4 port 00000003
mask ipv4 user-network destination 000007ff
mask ipv4 user-network source 000007ff
mask ipv6 general destination 0000000000000000000000000000001f
mask ipv6 general source 0000000000000000000000000000001f
mask ipv6 user-network destination 000000000000000000000000000007ff
mask ipv6 user-network source 000000000000000000000000000007ff
mask spi 000007ff
Field Description
interface Shows the Distribution Mode assignment for each interface.
Syntax
> show distribution verification [verbose]
Example
Note - This example shows only a small sample of the data. The checksums are truncated to fit on
the page.
> show distribution verification verbose
Test: Configuration:
Verification: Result:
chassis 2 blade 1 dxl-general-mode off off
Passed
chassis 2 blade 1 dxl-md5sum 9aad1d05e8dc2b4911a1e6a77a790a55
9aad1d05e8dc2b4911a1e6a77a790a55 Passed
chassis 2 blade 1 dxl-size 512 512
Passed
chassis 2 blade 2 dxl-general-mode off off
Passed
chassis 2 blade 2 dxl-md5sum 9aad1d05e8dc2b4911a1e6a77a790a55
9aad1d05e8dc2b4911a1e6a77a790a55 Passed
chassis 2 blade 2 dxl-size 512 512
Passed
chassis 2 blade 3 dxl-general-mode off off
Passed
chassis 2 blade 3 dxl-md5sum 9aad1d05e8dc2b4911a1e6a77a790a55
9aad1d05e8dc2b4911a1e6a77a790a55 Passed
chassis 2 blade 3 dxl-size 512 512
Passed
chassis 2 ssm 1 ipv6-mode off off
Passed
chassis 2 ssm 1 l4-mode on on
Passed
chassis 2 ssm 1 mask ipv4 general destination 0000000f 0000000f
Passed
chassis 2 ssm 1 mask ipv4 general source 0000000f 0000000f
Passed
chassis 2 ssm 1 mask ipv4 l4 ip 0000007f 0000007f
Passed
chassis 2 ssm 1 mask ipv4 l4 port 00000003 00000003
Passed
chassis 2 ssm 1 mask ipv4 user-network destination 000001ff 000001ff
Passed
chassis 2 ssm 1 mask ipv4 user-network source 000001ff 000001ff
Passed
chassis 2 ssm 1 mask ipv6 general destination 00000000000000000000000000000f
00000000000000000000000000000f Passed
chassis 2 ssm 1 mask ipv6 general source 00000000000000000000000000000f
00000000000000000000000000000f Passed
chassis 2 ssm 1 mask ipv6 user-network destination 0000000000000000000000000001ff
0000000000000000000000000001ff Passed
chassis 2 ssm 1 mask ipv6 user-network source 0000000000000000000000000001ff
0000000000000000000000000001ff Passed
chassis 2 ssm 1 mask spi 000001ff 000001ff
Passed
chassis 2 ssm 1 matrix-max_size 2k 2k
Passed
chassis 2 ssm 1 matrix-size 512 512
Passed
chassis 2 ssm 1 mode user user
Passed
chassis 2 ssm 1 signature 1b4608265544a62eaec709c0ee4f4689
1b4608265544a62eaec709c0ee4f4689 Passed
chassis 2 ssm 1 spi-mode off off
Passed
chassis 2 ssm 2 ipv6-mode off off
Passed
chassis 2 ssm 2 l4-mode on on
Passed
chassis 2 ssm 2 mask ipv4 general destination 0000000f 0000000f
Passed
chassis 2 ssm 2 mask ipv4 general source 0000000f 0000000f
Passed
chassis 2 ssm 2 mask ipv4 l4 ip 0000007f 0000007f
Passed
chassis 2 ssm 2 mask ipv4 l4 port 00000003 00000003
Passed
chassis 2 ssm 2 mask ipv4 user-network destination 000001ff 000001ff
Passed
chassis 2 ssm 2 mask ipv4 user-network source 000001ff 000001ff
Passed
chassis 2 ssm 2 mask ipv6 general destination 00000000000000000000000000000f
00000000000000000000000000000f Passed
chassis 2 ssm 2 mask ipv6 general source 00000000000000000000000000000f
00000000000000000000000000000f Passed
chassis 2 ssm 2 mask ipv6 user-network destination 0000000000000000000000000001ff
0000000000000000000000000001ff Passed
chassis 2 ssm 2 mask ipv6 user-network source 0000000000000000000000000001ff
0000000000000000000000000001ff Passed
chassis 2 ssm 2 mask spi 000001ff 000001ff
Passed
chassis 2 ssm 2 matrix-max_size 2k 2k
Passed
chassis 2 ssm 2 matrix-size 512 512
Passed
chassis 2 ssm 2 mode network network
Passed
chassis 2 ssm 2 signature 1b4608265544a62eaec709c0ee4f4689
1b4608265544a62eaec709c0ee4f4689 Passed
chassis 2 ssm 2 spi-mode off off
Passed
Summary:
verification passed successfully
>
Syntax
> set distribution l4-mode enabled [ip-mask <IP mask> [port-mask <port mask>]]
To send 50 GARP Requests each second, set the value of the kernel parameter
fwha_refresh_arps_chunk to 5:
# g_fw ctl set int fwha_refresh_arps_chunk 5
Whenever the iteration is finished sending GARP Requests for the entire list, it waits N HTUs and
sends the GARP Requests again.
The time between the iterations can be configured with these kernel parameters:
In the above (default) configuration, after the iteration sends the list:
• Waits 1 second and sends again
• Waits 2 seconds and sends again
• Waits 5 seconds and sends again
• Waits 10 seconds and sends again
Verification:
To manually send GARP Requests, on the Chassis monitor blade, run:
# fw ctl set int test_arp_refresh 1
Important - To make the above configuration permanent (to survive reboot), add the applicable
kernel parameters to the $FWDIR/modules/fwkern.conf file with the command:
update_conf_file fwkern.conf <parameter>=<value>
Threat Emulation
R76SP.50 supports the Threat Emulation Software Blade installed on the Scalable Platform. The
Threat Emulation and Threat Prevention Software Blades are supported on a Security
Management Server which has the latest Jumbo Hotfix installed.
To learn how to install Threat Emulation on the Scalable Platform, see sk111405
http://supportcontent.checkpoint.com/solutions?id=sk111405. To learn how to work with Threat
Emulation, see the R77 versions Threat Emulation Administration Guide
https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/html_framese
t.htm.
Parameters
Parameter Description
connectivity Prefer connectivity - Closes connections, for which IPS inspection cannot
be guaranteed.
security Prefer security - Keeps connections alive, even if IPS inspection cannot be
guaranteed.
Syntax
# asg_ips_enhance [enable | disable] [status] [sync]
Parameters
Parameter Description
enable Enables HyperSpect on all SGMs
disable Disables HyperSpect on all SGMs
status Shows HyperSpect status and consistency for all SGMs
sync Synchronizes the HyperSpect configuration file across all SGMs
CMM Commands
Use the CMM CLI commands to monitor and manage the CMM.
4. On 61000 N + N, run:
> clia fruinfo 20 10
> clia fruinfo 20 11
> clia fruinfo 20 12
> clia fruinfo 20 13
> clia fruinfo 20 14
> clia fruinfo 20 15
> clia fruinfo 20 16
2 0x96 SGM2
3 0x92 SGM3
4 0x8E SGM4
5 0x8A SGM5
6 0x86 SGM6
7 0x82 SSM1
8 0x84 SSM2
9 0x88 SGM7
10 0x8C SGM8
11 0x90 SGM9
12 0x94 SGM10
13 0x98 SGM11
14 0x9C SGM12
2 0x96 SGM2
3 0x92 SGM3
4 0x8E SGM4
5 0x8A SGM5
8 0x84 SSM2
Physical Slot Number Slot IPMB Address SGM Number SSM Number
11 0x90 SGM9
12 0x94 SGM10
13 0x98 SGM11
14 0x9C SGM12
4 0x88 SGM4
5 0x8A SGM3
6 0x8C SGM2
7 0x8E SGM1
2 0x84 SSM2
3 0x86 SGM4
4 0x88 SGM3
5 0x8A SGM2
6 0x8C SGM1
For additional information, see the R76SP.50 Scalable Platforms Getting Started Guide
https://sc1.checkpoint.com/documents/R76SP.50/CP_R76SP.50_for_40000_60000_SecuritySyste
ms_GettingStartedGuide/html_frameset.htm - Chapter Hardware Components.
SSM CLI
The SSM is the networking module of the gateway. The SSM transmits traffic to and from the SGM
and performs the load distribution among the SGMs.
The SSM includes two modules:
• Fabric switch - Includes the data ports
• Base switch - Includes the management ports
The SSM communicates with the SGM through SNMP, but sometimes it is necessary to connect
directly to the SSM.
Configuration:
You can connect to the SSM CLI:
• With a serial console to the CLI port on the SSM front panel (baud rate 9600)
• From one of the SGMs over SSH
To show the SSM IP addresses in Clish or gClish, run:
> show Chassis id 1|2|all module SSM{1|2} ip
Note - The password for the SSM is admin.
Syntax Description
# show running-config [<feature_name>] Shows the current configuration.
Best Practice - Because the full configuration is very long, we recommended that you specify the
feature you want to see. For example, run the show running-config load-balance
command to see the load balance configuration. Press the Tab key to see a full list of the features.
Example:
# show port 1/3/1 statistics
===============================================================================
Port Statistics
===============================================================================
Input Output
-------------------------------------------------------------------------------
Unicast Packets 5003 7106
Multicast Packets 568409 1880
Broadcast Packets 122151 1972
Flow Control 0 0
Discards 16 0
Errors 0 0
-------------------------------------------------------------------------------
Total 695563 10958
===============================================================================
===============================================================================
Ethernet Statistics in Packets
===============================================================================
RX CRC Errors 0 TX Collisions 0
RX Undersize 0
-------------------------------------------------------------------------------
Input Output
-------------------------------------------------------------------------------
Fragments 0 0
Oversize 0 0
Jabbers 0 0
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Packets Input and Output
-------------------------------------------------------------------------------
Octets 71085491
Packets 706521
Packets of 64 Octets 2290
Packets of 65 to 127 Octets 689951
Packets of 128 to 255 Octets 4122
Packets of 256 to 511 Octets 6009
Packets of 512 to 1023 Octets 258
Packets of 1024 to 1518 Octets 994
Packets of 1519 or more Octets 0
-------------------------------------------------------------------------------
Total 695563 10958
===============================================================================
===============================================================================
Rates in Bytes per Second
===============================================================================
Input Output
Rate for last 10 sec 1477 25
Rate for last 60 sec 1435 50
===============================================================================
#
Pay special intention to the Discards and Errors fields which can show a problem if they
constantly increase.
(config)# commit
(config)# exit
#load-balance apply
Note - Provide a full list of the SGMs when you use this command or traffic might be dropped on
the SSM.
To see the current version information, run: # show version
To log out from current session, run: # logout
Note - This procedure should be done separately on each SSM in the system. It does not cause any
traffic interruption.
Example:
# ssh ssm2
admin@ssm2's password:
BATM T-HUB4
admin connected from 198.51.100.215 using ssh on T-HUB4
T-HUB4#conf t
Entering configuration mode terminal
T-HUB4(config)#system security user admin
T-HUB4(config-user-admin)#password
(<MD5 digest string>): *****
T-HUB4(config-user-admin)#commit
Commit complete.
T-HUB4(config-user-admin)#end
T-HUB4#log
Connection to ssm2 closed.
Each port ID on the SGM maps to a port on the SSM. The table below maps SSM port IDs to SGM
port IDs.
Note - This table is for SSM1. For SSM2 replace eth1-X with eth2-X.
Confirm that you have connectivity to the SSMs from the SGMs.
1. Ping IP addresses of all the SSM modules.
2. Run:
> asg_chassis_ctrl get_ssm_firmware all
Procedure 1
Moving from 1 SSM to 2 SSMs
1 Make sure all SGMs are in the UP state.
2 Using a console connection, in Expert Mode, run this command on the SMO:
asg_ssm_amount 2
3 Reboot the setup (all SGMs) and wait for all the SGMs to be in the UP state.
Note - An additional reboot is expected. The utility prompts you for auto-reboot.
4 Insert the new SSM. Use a console connection to monitor the booting process.
Note - In the case of a setup with more than one Chassis, make sure the new sync slave is
connected.
5 On the SMO in Expert Mode run:
asg_port_speed create_conf
6 Verify the setup integrity. Run:
asg diag verify
Note - When you change the number of SSMs, the setup requires reboot. This results in
traffic interruption.
3 When deleting - Remove excess SSMs and delete the corresponding interface IPs
OR
When adding - Insert new SSMs and monitor their booting process with a console
connection.
Procedure 2
Note - For all SSM amount changes scenarios.
7 When the SGM is UP, run the Example: For verification, see Setting
following verification commands # ccutil active_ssm the Chassis ID (on page 233).
to make sure it matches the SSM1 ACTIVE
SSM2 ACTIVE
desired number of SSMs
SSM3 ACTIVE
SSM4 ACTIVE
# asg stat –v
Make sure the system has
eth3-xx and eth4-xx ports.
# ifconfig
8 Add the rest of the disconnected
SGMs
9 When the Standby Chassis This will cause a traffic
SGMs are UP, disconnect the outage.
Active Chassis Sync and Data
ports
10 Reconnect the Sync and Data The Standby Chassis is now
ports in the Standby Chassis the Active Chassis and will
allow traffic.
11 In the previously Active Chassis,
which is now disconnected, do
Steps 2 - 8
60000/40000 Security Systems Administration Guide R76SP.50 | 385
Advanced Hardware Configuration
Syntax:
asg_ssm_amount <ssm_quantity>
• For 64000, <ssm_quantity> can be 2 or 4
• For 44000, <ssm_quantity> can be 1 or 2
• For 61000 N + N, <ssm_quantity> can be 2 or 4
• For 61000, <ssm_quantity> can be 2 or 4
• For 41000 Security System, <ssm_quantity> can be 1 or 2
Run asg_ssm_amount in Expert Mode. You must run this command if you add or remove SSMs in
your Chassis.
Note - Make sure that only one SGM is turned on when you run this command.
Examples:
[expert@gw:0] # asg_ssm_amount 1
[expert@gw:0] # asg_ssm_amount 2
[expert@gw:0] # asg_ssm_amount 4
Syntax
# asg_detection [ -b <SGM_IDs> ] [ -t <time> | off ]
Parameters
Parameter Description
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
Default is local SGM.
Syntax
asg_swb_update_verifier [-v] [-b <SGM_IDs> [-m <product>] [-n [-p <ip>:<port>]]
] [-u <product>]
Parameters
Parameter Description
-v Shows verbose output.
-b <SGM_IDs> Works with SGMs and/or Chassis as specified by <SGM_IDs>.
<SGM_IDs> can be:
• No <SGM_IDs> specified, or all - Applies to all SGMs and
Chassis
• One SGM (for example, 1_1)
• A comma-separated list of SGMs (for example, 1_1,1_4)
• A range of SGMs (for example, 1_1-1_4)
• One Chassis (chassis1, or chassis2)
• The active Chassis (chassis_active)
-m <product> Forces a manual update for SGMs specified with -b
Valid values:
• all - All products on the SGM
• Anti-Bot
• Anti-Virus
• APPI
• URLF
-n Forces an update download from the Internet
Use with -m.
-p <ip>:<port> Forces an update download from the Internet and uses a specific
HTTP proxy. Use with -m.
• <ip> - IP of the HTTP proxy
• <port> - TCP port to use on the HTTP proxy
Parameter Description
-u <product> Forces a database update for a specific product
Valid values:
• all - All products on the SGM
• Anti-Bot
• Anti-Virus
• APPI
• URLF
Example
[Expert@MyChassis-ch01-01:0]# gclish
[Global] MyChassis-ch01-01 > asg_swb_update_verifier
+------------------------------------------------------------------------------+
| product | sgm | status | DB version | next update check |
+------------------------------------------------------------------------------+
| APPI | 2_01 | failed | 14061202 | Thu Jun 12 10:32:55 2014 |
| APPI | 2_02 | failed | 14061202 | Thu Jun 12 10:32:41 2014 |
| Anti-Bot | 2_01 | up-to-date | 1405220911 | Thu Jun 12 09:28:34 2014 |
| Anti-Bot | 2_02 | up-to-date | 1405220911 | Thu Jun 12 09:28:45 2014 |
| Anti-Virus | 2_01 | up-to-date | 1406121233 | Thu Jun 12 09:28:12 2014 |
| Anti-Virus | 2_02 | new | 1406121234 | Thu Jun 12 09:28:10 2014 |
| URLF | 2_01 | not-installed | N/A | N/A |
| URLF | 2_02 | not-installed | N/A | N/A |
+------------------------------------------------------------------------------+
Report:
------------------------------ APPI --------------------------------------------
DB versions verification [ OK ]
statuses verification [ FAILED ]
Output description
Field Description
product Name of the product.
sgm SGM ID.
status Update status.
DB version Product database version.
next update check Date and time for the next automatic update.
DB versions verification • OK - The database version is correct.
• FAILED - The database version is incorrect.
statuses verification • OK - The update installed correctly or no update is needed.
• FAILED - The update did not install correctly.
8. For the 41000 Security System: When the option to upgrade EEprom shows, select option 1
------------------------------------------------------
| EEprom upgrading |
| 1: Press 1 for EEProm upgrading. |
| 2. Press 2 to skip. |
------------------------------------------------------
8 When the image creation HostName> set snapshot export This file will be copied
is complete, export the <Snapshot_Image_File_Name_Without to the USB later.
snapshot image file to a _the_.TAR> path /home/admin
TAR file on the local
SGM.
16 Connect to the
replacement SGM over a
console connection.
17 Connect a USB 1. Find the device name for the USB In the R75.05x 61000
removable disk to the removable disk in the messages log Security System
USB port of the file or with the fdisk –l Command Line
replacement SGM and command. Reference Guide
mount it to the Example - /dev/sdb1 http://downloads.chec
/mnt/usb/ directory. [Expert@HostName]# tail kpoint.com/dc/downlo
/var/log/messages ad.htm?ID=18161, see
OR Software Upgrade and
[Expert@HostName]# fdisk -l Hardware
2. Create
Replacement:
RMA/Add New SGM
the /mnt/usb directory:
Procedure - Mounting
[Expert@HostName]# mkdir
/mnt/usb
USB
Example:
> set global-mode off
> add snapshot rma_62 desc rma
Taking snapshot. You can continue working normally.
You can use the command ‘show snapshots’ to monitor creation progress,
> show sna
snapshot - show snapshot data
snapshots — list of local snapshots
> show snapshots
Restore points:
---------------
armdilo62_2
Restore point now under creation:
riua_62 (19%)
# blade 2_3
Moving to blade 2_3
> exit
Connection to 192.0.2.17 closed.
# umount /uint/usb