CP R76SP.30 Security System AdministrationGuide
CP R76SP.30 Security System AdministrationGuide
R76SP.30
Administration Guide
Classification: [Protected]
© 2015 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on 61000/41000
Security System R76SP.30 Administration Guide).
Revision History
Date Description
20 Oct 2015 Moved Hotfix Installer topic to the Upgrade Guide.
Terms
Chassis Management Module. Hardware
component that controls and monitors
Chassis operation. This includes fan speed,
Active/Standby Chassis and module temperature, and
component hot-swapping.
A High Availability cluster where only one
member handles connections. Cluster
VSX
Definition: Virtual System Extension - Check
Point virtual networking solution, hosted on a
single computer or cluster containing virtual
abstractions of Check Point Security
Gateways and other network devices. These
virtual devices provide the same functionality
as their physical counterparts.
VSX Gateway
Physical server that hosts VSX virtual
networks, including all virtual devices that
provide the functionality of physical network
devices. It holds at least one Virtual System,
which is called VS0.
Warp Link
An interface between a Virtual System and a
Virtual Switch or Virtual Router that is
created automatically in a VSX topology.
CHAPTE R 1
Introduction
In This Section:
Syntax Notation .............................................................................................................13
Licensing .......................................................................................................................13
Syntax Notation
This table shows the syntax characters used in this document.
> Right angle Prompt: Run command in clish or gclish (Use in procedures or
bracket examples only)
Licensing
For information on how to monitor and administer licenses, see licenses in the R76 Gaia
Administrator’s Guide http://supportcontent.checkpoint.com/documentation_download?ID=22928.
Run all licensing commands in Global clish.
Syntax
> set ipv6-state on|off
> show ipv6-state
Parameter Description
on|off on = Enable IPv6 support
off = Disable IPv6 support
Syntax
> set ipv6 static-route <source_ip> nexthop gateway <gw_ip> [priority <p_val>]
on|off [interface <gw_if> [priority <p_val>]] on
> set ipv6 static-route <source_ip> nexthop [<gw_ip>] blackhole|reject|off
Parameter Description
gateway Defines the next hop path.
Parameter Description
<gw_if> Identifies the next hop gateway by the interface that connects to it. Use this
option only if the next hop gateway has an unnumbered interface.
priority Assigns a path priority when there are many different paths. The available
path with the lowest priority value is selected. The gateway with the lowest
priority value is selected.
interface Identifies the next hop gateway by the interface that connects to it. Use this
option only if the next hop gateway has an unnumbered interface.
reject Drops packets and sends an error message to the traffic source.
Note - There are no add or show commands for the static route feature.
Output
Codes: C - Connected, S - Static, B - BGP, Rg - RIPng, A - Aggregate,
O - OSPFv3 IntraArea (IA - InterArea, E - External),
K - Kernel Remnant, H - Hidden, P - Suppressed
Parameter Description
<dest_ip> Destination IPv6 address
Example:
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 on
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 interface eth3
on
Run this command for each path. Assign a priority value to each. You can define two or more paths
using the same priority to specify a backup path with the same priority.
Example:
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 priority 3 on
Examples:
> set ipv6 static-route 3100:192::0/64 nexthop reject
> set ipv6 static-route 3100:192::0/64 nexthop blackhole
Example:
> set ipv6 static-route 3100:192::0/64 off
Example:
> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 off
Syntax
> add interface <physical_if> 6in4 <6in4_id> remote <remote_ipv4> [ttl <ttl>]
Parameter Description
<physical_if> The physical interface encapsulated traffic leaves the system from.
For example:
eth1-01
<ttl> Time-to-live: the number of router hops before packets are discarded.
Example
> add interface eth1-01 6in4 999 remote 50.50.50.10
1_01:
Success
Notes
• The virtual (sit_6in4_) interface is created for eth1-01 on all SGMs, even though you
specified a single physical interface (eth1-01) in the command line.
• To see the virtual interfaces for each SGM, run:
show interface eth1-01 6in4s
Use this command to set the interface.
Syntax
> set interface <sit_if_name> ipv6-address <ipv6_address> mask-length 64
Parameter Description
<sit_if_name> The name of the virtual interface, which begins:
sit_6in4_<ID_num_from_previous_command>
Example
> set interface sit_6in4_999 ipv6-address 30:30:30::1 mask-length 64
Output
1_01:
Success
Example
> delete interface eth1-01 6in4 999
Output
1_01:
success
MAC tables
These are the MAC tables:
• OS - Not synchronized across SGMs
• Firewall - Synchronized across SGMs
• Destination port
• Source MAC Address
• No Layer-2 connectivity between Chassis. This topology does not require Spanning Tree
Protocol on the switches.
BPDU
The BDPU maximum age timer controls the maximum time before a bridge port saves its BPDU
information. By default this is 20 seconds. This means that on the default setting it takes 20
seconds to fail over. You can change the BDPU maximum age timer to 6 seconds.
For example, on Cisco switches use spanning-tree vlan on each VLAN to configure the BDPU
maximum age timer.
Syntax
> spanning-tree vlan <vlan_id> max-age <age>
Parameter Description
<vlan_id> VLAN ID
Syntax
> add bridging group <group_id> interface <if_name>
> delete bridging group <group_id> interface <if_name>
> show bridging group <group_id>
Parameter Description
<group_id> Integer that identifies the bridging group
Example
> add bridging group 2 interface eth3
> show bridging group 2
Output
Bridge Configuration
Bridge Interfaces
eth3
If you are using a dual Chassis 61000/41000 Security System, reboot the Standby Chassis first
and then reboot the Active Chassis.
To learn more, see sk98927 http://supportcontent.checkpoint.com/solutions?id=sk98927.
Item Description
1 LSP Port Group (full syntax)
2 Interface Group
If there is no configured management interface, the Unique MAC Identifier is assigned the default
value 254.
You can use asg_unique_mac_utility to set:
• Data interface Unique MAC Identifier
• Host name
Note - You must reboot the system to apply the new Unique MAC Identifier.
The setup number replaces the Unique MAC Identifier value of 254. After reboot, all data interface
MAC addresses now have the new Unique MAC Identifier value 16.
For example: eth1-01 00:1C:7F:XY:ZW:16
Note - The last octet for eth1-01 (shown in bold) is 16 hex (22 decimal).
Example
# ifconfig eth1-01
eth1-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:16
inet6 addr: fe80::21c:7fff:fe81:116/64 Scope:Link
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:154820 errors:0 dropped:0 overruns:0 frame:0
TX packets:23134 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0 RX bytes:15965660 (15.2 MiB)
TX bytes:2003398 (1.9 MiB)
Note - The last octet for eth1-01 (shown in bold) is 16 hex (22 decimal).
Configuring VLANs
Use these commands to configure VLANs.
Syntax
> add interface <if_name> vlan <vlan_id>
> set interface <if_name>.<vlan_id> ip-address <ip_addr> mask-length <mask-len>
> delete interface <if_name> vlan <vlan_id>
Parameter Description
<if_name> Name of the physical interface
Output
1_01:
success
Output
1_01:
success
Output
1_01:
success
Example
> show interface eth2-03 vlans
Output
1_01:
eth2-03.444
Note - This procedure is applicable for Security Gateway environments only. Management
interface changes are not supported for VSX.
4. Install policy.
Parameter Description
<new_mng_if> Interface name of the new management interface.
For example: eth1-Mgmt3
Syntax
> set static-route <network> nexthop gateway address <gw_ip> on
Parameter Description
<network> The IP address of the destination network
Example
> set static-route 50.50.50.0/24 nexthop gateway address 20.20.20.101 on
> set static-route 50.50.50.0/24 nexthop gateway address 20.20.20.102 on
> set static-route 50.50.50.0/24 nexthop gateway address 20.20.20.103 on
Notes
To get to addresses on the 50.50.50.0/24 network, packets must first be forwarded to one of these
gateways:
• 20.20.20.101
• 20.20.20.102
• 20.20.20.103
To make sure static routes to the next-hop gateways are being enforced:
Run:
> show route static
1_01:
Codes: C - Connected, S - Static, R - RIP, B - BGP,O - OSPF IntraArea (IA - InterArea,
E - External, N - NSSA)A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed
The output shows that the static route to 50.50.50.0/24 is through three next-hop gateways.
Disabling ECMP
ECMP is enabled by default. To disable it:
1. Open this file for editing:
$PPKDIR/boot/modules/simkern.conf
If simkern.conf does not exist, create it.
2. Add this line:
sim_routing_by_source=0
3. Save the file and reboot.
Note - You can configure enhanced ECMP failover after you configure an ECMP static
route.
Parameter Description
<network> The IP address of the destination network
Example
1. Set ECMP for destination 5.5.5.0/24.
> set static-route 5.5.5.0/24 nexthop gateway address 10.33.85.2 on
> set static-route 5.5.5.0/24 nexthop gateway address 10.33.85.4 on
> set static-route 5.5.5.0/24 nexthop gateway address 10.33.85.100 on
61000/41000 Security System Administration Guide R76SP.30 | 30
Managing the Network
Validation
1. Run from gclish:
> show route
2. Make sure that only ECMP static routes with reachable next-hops appear.
Run: tcpdump
3. Make sure that every few seconds there is a ping request on the interface with static route and
ping on.
Syntax
# asg_arp -h
# asg_arp [-b <sgm_ids>] [-v] [--verify] [-i <if>] [-m <mac>] [<hostname>]
# asg_arp --legacy
Parameter Description
-h Shows command syntax and help information
-m <mac> Shows the ARP cache for the specified MAC address
<hostname> Shows the ARP cache for the specified host name
--verify Run MAC address verification on both Chassis and show the results
--legacy Shows the ARP cache for each SGM in the legacy format
This command distributes local.arp to all SGMs in the system, and automatically changes
the MAC values for SGMs on another Chassis.
3. Enable the Merge manual proxy ARP configuration option in SmartDashboard > Global
Properties > NAT.
4. Install policy to apply the updated proxy ARP entries.
Notes:
• When you add an SGM to a system with proxy ARP configured, the local.arp file is
automatically copied to the new SGM from the SMO.
• When you change local.arp on a Virtual System, the changes apply to that Virtual System
only.
• Proxy ARP is also required when configuring Connect Control on the 61000/41000 Security
System.
Verification:
To make sure that all the entries in local.arp are applied correctly on the system, run:
# asg_local_arp_verifier
Command Examples
Verification
# asg_port_speed verify
+------------------------------------------------+
|Port speed verifier |
+---------------+----------+----------+----------+
|Interface |Conf. |Chassis1 |Result |
+---------------+----------+----------+----------+
|eth1-01 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth1-02 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth1-03 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth1-04 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth1-05 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth1-06 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth1-07 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth1-09 |40G |40G |OK |
+---------------+----------+----------+----------+
|eth1-10 |auto |auto |OK |
+---------------+----------+----------+----------+
|eth1-11 |auto |auto |OK |
+---------------+----------+----------+----------+
|eth1-12 |auto |auto |OK |
+---------------+----------+----------+----------+
|eth1-13 |40G |40G |OK |
+---------------+----------+----------+----------+
|eth1-14 |auto |auto |OK |
+---------------+----------+----------+----------+
|eth1-15 |auto |auto |OK |
+---------------+----------+----------+----------+
|eth1-16 |auto |auto |OK |
+---------------+----------+----------+----------+
|eth2-01 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth2-02 |10G |10G |OK |
+---------------+----------+----------+----------+
|eth2-03 |10G |10G |OK |
+---------------+----------+----------+----------+
61000/41000 Security System Administration Guide R76SP.30 | 36
Managing the Network
Changing 40G mode on SSM1 will revert SSM to manufactory defaults. All current
configuration of SSM1 will be deleted.
Run "asg_port_speed config /etc/ssm_port_speed.conf" to apply current configuration
Proceed with configuration?(y/n)
>y
Updating /etc/ssm_port_speed.conf... [ OK ]
Copy /etc/ssm_port_speed.conf to all SGMs... [ OK ]
Executing "ccutil set_qsfp_ports_mode 1 40G" on SGM 1... [ OK ]
In SSM60 use:
• 1/5/1 for ethx-mgmt01
• 1/5/2 for ethX-mgmt02
Example:
> T-HUB4#config
Entering configuration mode terminal
============================================================================
Ethernet Interface
============================================================================
Interface : 1/5/4
Description :
Admin State : up Port State : up
Config Duplex : auto Operational Duplex : full
Config Speed : 100 Operational Speed(Mbps) : 100
-------------------------------------------------------------------------------
Flow Control : disabled
Dual Port : No Active Link : RJ45
-------------------------------------------------------------------------------
Default VLAN : 1 MTU[Bytes] : 1544
MAC Learning :
LAG ID : N/A
============================================================================
To change the PIM Multicast Routing mode between dense and sparse:
Important - You must use this procedure to change the mode. Failure to do so can cause
unexpected behavior.
Validation
Run:
> show pim interfaces
Example
> set pim interface eth1-01 on
1_01:
success
> set pim interface eth1-02 on
1_01:
success
> set pim interface eth2-01 on
1_01:
success
> set pim mode dense
1_01:
success
> show pim interfaces
1_01:
Status flag: V - virtual address option enabled
Mode flag: SR - state refresh enabled
Interface Status State Mode DR Address DR Pri NumNbrs
eth2-01 Up DR dense 2.2.2.10 1 0
eth1-01 Up DR dense 12.12.12.10 1 0
eth1-02 Up DR dense 22.22.22.10 1 0
To configure SMCRoute:
Run:
> g_all dbset process:smcroute:runlevel 4
> g_all dbset process:smcroute:path /bin
> g_all dbset process:smcroute:arg:1 -d
> g_all dbset :save
To add a route:
Run:
> g_all /bin/smcroute -a <InputIntf> <OriginIpAdr> <McGroupAdr> {<OutputIntf1>
<OutputIntf2>…}
To remove route:
Run:
> g_all /bin/smcroute -r <InputIntf> <OriginIpAdr> <McGroupAdr> - remove route
Parameter Description
<InputIntf> Any network interface listed by ifconfig but not the loopback interface.
<OriginIpAdr> The source IP address of the multicast packets routed by this entry. It is a
unicast IP address, not a multicast IP address
<OutputIntf1> A list of one or more network interfaces to which the multicast packets are
<OutputIntf2>… forwarded
Example:
> g_all /bin/smcroute -a eth2-01 2.2.2.1 225.0.90.90 eth1-01 eth1-02
Multicast Restrictions
Multicast access restrictions can be defined on each interface. These restrictions specify
multicast groups (that is, addresses or address ranges) to allow or block.
Configuration
In SmartDashboard edit the Gateway Properties > Topology > Add or Edit interface > Multicast
Restrictions tab.
Parameter Description
Drop multicast packets whose Specifies that outgoing packets from this interface to the
destination is in the list listed multicast destinations are dropped.
Drop all multicast packets Specifies that outgoing packets from this interface to all
except those whose destination multicast destinations except those listed are dropped.
is in the list
Limitations:
Multicast restriction is not supported on bridge interfaces.
61000/41000 Security System Administration Guide R76SP.30 | 42
Managing the Network
Multicast Acceleration
Multicast Acceleration allows SecureXL to accelerate multicast flow, also in Fan-out scenarios.
Configuration
Multicast Acceleration is enabled by default. Use these commands to enable or disable it:
> sim feature mcast_route_v2 {on|off}
> fwaccel off
> fwaccel on
Limitations
Multicast acceleration supports IPv4 only.
Example
This example disables the feature.
> sim feature mcast_route_v2 off
-*- 4 blades: 1_01 1_02 1_03 1_04 -*-
Feature will be disabled the next time acceleration is started/restarted
> fwaccel on
-*- 4 blades: 1_01 1_02 1_03 1_04 -*-
SecureXL device is enabled.
Syntax
> set bootp interface <if_name> [primary default|<ip>] [wait-time <seconds>]
[relay-to <ip1>,<ip2>...] on|off
Parameter Description
interface <if_name> The interface name as defined by the system. Press Tab after you
enter this parameter to see a list of valid interface names.
primary <ip> The IP address of the Security Gateway interface that always gets
requests from the DHCP client. If you do not define a Primary IP
or
address, the system automatically uses the IP address of the
primary default interface that the DHCP request comes from.
Parameter Description
You can use the default value instead of an IP address to force the
system use the IP address of the interface that the DHCP request
comes from. This is useful when you want to change the wait-time
parameter, but not define a Primary IP.
wait-time <seconds> The minimum wait time, in seconds, before a BOOTP request can be
sent. This includes the elapsed time after the client starts to boot.
This delay lets a local configuration server reply, before it sends the
relay to a remote server.
The wait-time keyword is optional. The system assumes that an
integer after the primary value is the wait-time value.
Valid values: 0 - 65535
Default - 60
relay-to <ip> The IP address of the relay server to which BOOTP requests are sent.
You can specify more than one server.
Examples
This example enables DHCP Relay on eth0-4 with default values and no Primary IP. The IP
address is automatically assigned by DHCP server.
> set bootp interface eth0-04 on
This example enables DHCP Relay on eth0-04 and defines the Primary IP address as
30.30.30.1. The wait time is the default value (60 seconds).
> set bootp interface eth0-04 primary 30.30.30.1 wait-time default on
This example enables DHCP Relay on eth1-o4 and sends BOOTP requests to the relay server at
20.20.20.200.
> set bootp interface eth1-04 relay-to 20.20.20.200 on
Verification
Use this command to monitor and troubleshoot the BOOTP implementation:
> show bootp interface|interfaces|stats
Parameter Description
interface BOOTP/DHCP Relay Interface
Destination-Based Routing
Destination-Based Routing sends traffic based on the destination only. These are the advantages
over Source-Based Routing:
• Protects against cache pollution by an attacker.
• Better performance than Source-Based Routing.
Limitations
• ECMP requires Source-Based Routing.
• If you use Policy-Based Routing in a FROM rule, Destination-Based Routing is disabled.
Syntax
> asg_dst_route -e|-d|-a|-v
Parameter Description
-e Enable Destination-Based Routing
Example
> asg_dst_route -v
Output
+------------------------------------------------------------------------------+
| SGM | Current Status | Persistency |
+------------------------------------------------------------------------------+
| 1_01 | Source+Dest based route | Source+Dest based (due to pbr rule) |
| 1_02 | Source+Dest based route | Source+Dest based (due to pbr rule) |
+------------------------------------------------------------------------------+
Syntax
> echo <value> > /proc/sys/net/ipv4/route/src_mask
Parameter Description
<value> Enable or disable Destination-Based Routing
Allowed values:
• 0 - Enable Destination-Based Routing
• -1 - Disable Destination-Based Routing
Syntax
asg_dst_route -s
Output
+------------------------------------------------+
| SGM | Cache load | Hit rate | Effectiveness |
+------------------------------------------------+
| 2_01 | 4 % | 58 % | 100 % |
| 2_02 | 4 % | 50 % | 100 % |
+------------------------------------------------+
Column Description
SGM SGM ID
Cache load Calculated percentage of how hard the route cache works
The route cache starts to clean when this exceeds 100%.
Hit rate Percent of total lookups found in the route cache in the last 3 seconds
Administration
Working with Global Commands
The 61000/41000 Security System operating system includes a set of global commands that apply
to all or specified SGMs in a system.
gclish commands apply globally to all SGMs by default. Some gclish commands are applicable to
the 61000/41000 Security System and its components.
gclish commands do not apply to SGMs that are DOWN. If you run a set command while a SGM is
DOWN, the command does not update that SGM. The SGM synchronizes its database during
startup and applies the changes after reboot.
clish commands are documented in the R76 Gaia Administration Guide
http://supportcontent.checkpoint.com/documentation_download?ID=22928. Most of these
commands are also available in the 61000/41000 Security System.
Notes
• Documentation for the Chassis feature is in the Hardware Monitoring and Chassis High
Availability ("Working with Active/Standby High Availability" on page 180) sections.
• auditlog is enabled by default. All commands are recorded in the audit log. To learn more
about the audit log, see Looking at the Audit Log ("Looking at the Audit Log File (asg_auditlog)"
on page 170).
• config-lock is the command that protects the gclish database. The lock can be held by
single SGM per system. When you try to do gclish set operations from a specific SGM, make
sure that this SGM holds the config-lock. In order to acquire config-lock, run:
# set config-lock on override
• gclish traffic runs on the Sync interface, port 1129/TCP.
• To run a command on specified SGMs, use the blade-range specification. When you use
blade-range, all gclish embedded commands run only on this subset of SGMs. Because all
SGMs must have identical configuration, we recommend that you do not use the
blade-range command.
fwaccel, fwaccel6
These commands let you dynamically enable or disable acceleration for IPv4 traffic while the
61000/41000 Security System is in operation. fwaccel6 has the same functionality as fwaccel, but
is for IPv6 traffic. This setting goes back to the default value after reboot.
When you run these commands from gclish, fwaccel and fwaccel6 are, for most parameters,
comparison global commands that show combined information from all SGMs. The fwaccel
stats and fwaccel notifstats commands show aggregated statistics from all SGMs.
Syntax
> fwaccel {on|off|stat|stats [-s} [-d] |conns [-s] -m <max_entries> [-b <sgm_ids>]
> fwaccel templates[-s] [-m <max_entries>] [-b <sgm_ids>]
> fwaccel6 {on|off|stat|stats [-s} [-d] |conns [-s] -m <max_entries> [-b <sgm_ids>]
> fwaccel6 templates[-s] [-m <max_entries>] [-b <sgm_ids>]
Parameter Description
-b Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Note: You can only select SGMs from one Chassis with this option.
on Starts acceleration
stat Shows the acceleration device status and the status of the Connection
Templates on the local Security Gateway.
Parameter Description
conns -m Limits the number of connections displayed by the conns command to
<max_entries> <max_entries>.
Example
> fwaccel stats
Displaying aggregated data from blades: all
Medium Path
-----------------------------------------------------------------------------
PXL packets 0 PXL async packets 0
PXL bytes 0 PXL conns 0
C PXL conns 0 C PXL templates 0
Firewall Path
-----------------------------------------------------------------------------
F2F packets 10077862 F2F bytes 1185051123
F2F conns 38839 C F2F conns 800
TCP violations 0 C partial conns 0
C anticipated conns 0
General
-----------------------------------------------------------------------------
memory used 0 free memory 0
(*) Statistics marked with C refer to current value, others refer to total value
Monitor Mode
fwaccel_m continuously monitors fwaccel output in real time. When you run this command, the
screen goes into the monitor mode and shows changes in parameters as highlighted text. You
cannot run commands or do other operations while in Monitor mode.
To close Monitor mode, press Ctl-c.
Example
> fwaccel_m stats -p
Output
Displaying aggregated data from blades: all
F2F packets:
--------------
Violation Packets Violation Packets
-------------------- --------------- -------------------- ---------------
pkt is a fragment 0 pkt has IP options 19286
ICMP miss conn 33 TCP-SYN miss conn 28713
TCP-other miss conn 125290 UDP miss conn 95373635
other miss conn 268865 VPN returned F2F 0
ICMP conn is F2Fed 5390 TCP conn is F2Fed 73812
UDP conn is F2Fed 9131 other conn is F2Fed 4827
unidirectional viol 0 possible spoof viol 0
TCP state viol 0 out if not def/accl 0
bridge, src=dst 0 routing decision err 82
sanity checks failed 0 temp conn expired 0
fwd to non-pivot 0 broadcast/multicast 0
cluster message 0 partial conn 1
PXL returned F2F 0 cluster forward 0
chain forwarding 0 general reason 0
port alloc f2f 0 sticky SA F2F 0
fw, fw6
The fw and fw6 commands are global scripts that run the fw and fw6 commands on each SGM.
Example 1
> fw ctl
Output
-*- 6 blades: 1_01 1_02 1_03 2_01 2_02 2_03 -*-
Usage: fw ctl command args...
Commands: install, uninstall, pstat, iflist, arp, debug, kdebug, bench
chain, conn
Example 2
> fw ctl iflist
Output
-*- 6 blades: 1_01 1_02 1_03 2_01 2_02 2_03 -*-
0 : BPEth0
1 : BPEth1
2 : eth1-Mgmt4
3 : eth2-Mgmt4
4 : eth1-01
5 : eth1-CIN
6 : eth2-CIN
8 : eth2-01
16 : Sync
17 : eth1-Mgmt1
18 : eth2-Mgmt1
fw dbgfile
Use these commands to debug the system:
• fw dbgfile collect - Collects firewall debugging information (fw ctl debug).
• fw dbgfile view - Shows the collected debugging information
Syntax
> fw dbgfile collect -f <debug_file_path> [-buf <buf_size>] [<fw_flags>]
> fw dbgfile view [<debug_file_path>] [-o <agg_file_path>]
Parameter Description
<debug_file_path> Full path of the debug file
Example
> asg_reboot -b 1_03,2_05
You are about to perform hard reboot on SGMs: 1_03,2_05
61000/41000 Security System Administration Guide R76SP.30 | 52
Managing the 61000/41000 Security System
Notes
• To run these commands for SGMs on a remote Chassis, at least one SGM must be UP and
running on the remote Chassis.
• To learn how to restart an SSM from the CMM, see asg_chassis_ctrl.
global global_help
asg_cp2blades asg_cp2blades
asg_clear_table asg_clear_table
asg_clear_messages asg_clear_messages
asg_blade_stats asg_blade_stats
Syntax
> update_conf_file <file_name> <var>=<value>
Parameter Description
<file_name> Full path and name of the configuration file to update
You do not need to specify the path for these files:
• fwkern.conf
• simkern.conf
Examples
> update_conf_file /home/admin/MyConfFile.txt var1=hello
> cat /home/admin/MyConfFile.txt
-*- 3 blades: 2_01 2_02 2_03 -*-
var1=hello
Syntax
sim_param show [<filter>]
sim_param get <parameter>
sim_param set <parameter> <value>
sim_param save <file_name>
Parameter Description
show Shows a detailed list of all sim parameters
<filter> Shows only those sim parameters that contain the specified text string
Parameter Description
save Save the sim parameters to the specified file name
Note: To make changes persistent, you must manually edit the applicable parameters in
$PPKDIR/boot/modules/simkern.conf. Use the g_update_conf_file command to do
this.
sim_param Examples
This example shows the usage of the sim_param set command.
# sim_param set sim_mcast_silent_spoof 0
sim_mcast_silent_spoof successfully changed to 0.
This example shows a filtered list of sim parameters. You can see that the
sim_mcast_silent_spoof value changed to 0 from the above example.
# sim_param show mcast
+------------------------------------------+-----------------+----------+-----------+
|Name |Value |Default |Permission |
+------------------------------------------+-----------------+----------+-----------+
|sim_build_mcast_entry_disabled |1 |Identical |R/W |
|sim_drop_standby_mcast |1 |Identical |R/W |
|sim_db_mcast_drop_tmo |15 |Identical |R/W |
|sim_drop_mcast_exceptions |<NULL> |Identical |R/W |
|sim_mcast_packets_to_f2f |10 |Identical |R/W |
|sim_mcast_drop_refresh_route |1 |Identical |R/W |
|sim_drop_mcast_on_standby |1 |Identical |R/W |
|reserved_mcast_check |1 |Identical |R/W |
|sim_mcast_drop_refresh_f2f |1 |Identical |R/W |
|sim_mcast_silent_spoof |0 |1 |R/W |
+------------------------------------------+-----------------+----------+-----------+
This example shows how to show a list of all the sim parameters and their current values. This
command is also useful to show all of the correct parameter names for use with the sim_param
set command.
# sim_param show
+------------------------------------------+-----------------+----------+-----------+
|Name |Value |Default |Permission |
+------------------------------------------+-----------------+----------+-----------+
|sim_reuse_tcp_conn |1 |Identical |R/W |
|sim_gtp_inner_frag_accel |1 |Identical |R/W |
|sim_drop_percentage_to_check_overall_drops|35 |Identical |R/W |
|sim_bond_refresh_interval_ha |1 |Identical |R/W |
|sim_aff_min_accel_pkts_rate |250000 |Identical |R/W |
|bridge_mode_on_ssm60 |0 |Identical |R/W |
| • | | | |
| • | | | |
| • | | | |
|sim_ntquota_pxl_only |0 |Identical |R/W |
|sim_mcast_silent_spoof |1 |Identical |R/W |
|sim_hlqos_log_interval |2 |Identical |R/W |
+------------------------------------------+-----------------+----------+-----------+
Syntax
g_fw ctl get <type> <parameter_name>
g_fw ctl set <type> <parameter_name> <value>
Parameter Description
get Shows the specified parameter and its value
Note: To make changes persistent, you must manually edit the applicable parameters in
$FWDIR/boot/modules/fwkern.conf. Use the g_update_conf_file command to do this.
Syntax
> asg_cp2blades [-b <sgm_ids>][-s] <source_path> [<dest_path>]
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by
<sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Example
> asg_cp2blades /home/admin/note.txt
Output
Operation completed successfully
Verification
> cat /home/admin/note.txt
-*- 3 blades: 2_01 2_02 2_03 -*-
hello world
global help
This command shows the list of global commands you can use in gclish, and how they are
generally used.
Syntax
> global help
Output
> global help
Usage: <command_name> [-b SGMs] [-a -l -r --] <native command arguments>
Executes the specified command on specified blades.
Optional Arguments:
-b blades: in one of the following formats
1_1,1_4 or 1_1-1_4 or 1_01,1_03-1_08,1_10
all (default)
chassis1
chassis2
chassis_active
-a : Force execution on all SGMs (incl. down SGMs).
-l : Execute only on local blade.
-r : Execute only on remote SGMs.
Command list:
arp cat cp cpconfig cplic cpstart cpstop dmesg ethtool fw fw6 fwaccel fwaccel6
fwaccel6_m fwaccel_m ls md5sum mv netstat reboot sim sim6 snapshot_recover
snapshot_show_current tail tcpdump top unlock update_conf_file vpn asg
asg_clear_table
Use this command to delete connections from the firewall connection table. The command runs
up to 15 times, or until there are less than 50 connections.
Syntax
> asg_clear_table [-b <sgm_ids>]
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Note: You can only select SGMs from one Chassis with this option.
Note - If you connected to the machine with SSH, your connection is disconnected.
asg_clear_messages
Use asg_clear_messages to clear all messages in /var/log/messages files.
Syntax
> asg_clear_messages
Output
This action will erase the messages in /var/log/messages
and will be executed on blades: all
Are you sure? (Y - yes, any other key - no) y
Command completed successfully
show interface
Example
> show interface eth1-01 ipv4-address
1_01:
ipv4-address 4.4.4.10/24
1_02:
ipv4-address 4.4.4.10/24
1_03:
ipv4-address 4.4.4.10/24
1_04:
ipv4-address 4.4.4.10/24
1_05:
Blade 1_05 is down. See "/var/log/messages".
2_01:
ipv4-address 4.4.4.10/24
2_02:
61000/41000 Security System Administration Guide R76SP.30 | 58
Managing the 61000/41000 Security System
ipv4-address 4.4.4.10/24
2_03:
ipv4-address 4.4.4.10/24
2_04:
ipv4-address 4.4.4.10/24
2_05:
ipv4-address 4.4.4.10/24
Syntax
> asg chassis_admin -c <chassis_id> down|up
Parameter Description
<chassis_id> Chassis identification number (1 or 2)
Example
> asg chassis_admin
You are about to perform Chassis_admin down on Chassis: 2
Are you sure? (Y - yes, any other key - no) y
Chassis_admin down requires auditing
Enter your full name: John
Enter reason for chassis_admin down [Maintenance]: test
WARNING: Chassis_admin down on Chassis: 2, User: John, Reason: test
Chassis 2 is going DOWN...
Chassis 2 state is DOWN
Notes
• This command is audited. (asg log audit)
• Run this command to see the Chassis state:
> asg stat /monitor
Syntax
> asg_ntp_sync_config set primary|secondary <ip>|<hostname> [-v <version>] [-r <timeout>]
> asg_ntp_sync_config disable|enable|delete|show
> asg_ntp_sync_config -h
Parameter Description
set Configure an NTP server
secondary The system uses this if the primary NTP server is not
available
Notes:
• This command runs ntpdate -u on each SGM and the CMM to synchronize to the local time,
• If you define a refresh time that is less than the default (300 seconds), refresh occurs every 300
seconds.
• To allow time synchronization for all SGMs, you must disable the replies_from_any_port
property for the NTP over UDP service:
a) In GuiDBEdit, search for the NTP/UDP service.
b) Go to the replies_from_any_port property.
c) Change the property to false.
d) Install the policy.
Validation
1. Make sure that the time is the same on all SGMs:
> show time
2. Run tcpdump on port 123/UDP for the applicable interface to make sure that all SGMs start
NTP connections.
Syntax
# asg_blade_config pull_config [policy|all] [-force] <ip>
# asg_blade_config full_sync <ip>
# asg_blade_config set_sync_start_ip <ip>
# asg_blade_config reset_uptime
# asg_blade_config reset_uptime_user
# asg_blade_config get_smo_ip
# asg_blade_config is_in_security_group
# asg_blade_config is_in_pull_conf_group|config fetch_smc
# asg_blade_config upgrade_start <new_version> [cu]
# asg_blade_config upgrade_stop|upgrade_stat|upgrade_cu
Parameter Description
pull_config Copy the configuration from another SGM.
set_sync_start_ip <ip> Changes the Synchronization start IP address from the local
SGM to the specified IP address.
reset_uptime Resets the system uptime value on all SGMs to the current time.
reset_uptime_user An interactive command that resets the uptime for all SGMs to a
user configured time.
is_in_security_group Make sure that the local SGM is in the Security Group.
is_in_pull_conf_group Make sure that the local SGM is in the Pulling Configuration
Group. If not, the SGM cannot copy the configuration and policy.
config fetch_smc Get the policy from the Security Management Server, and send it
to all SGMs.
Parameter Description
upgrade_start Start the upgrade procedure.
<new_version> [cu]
<new_version> - New version name.
[cu] - Specifies the Connectivity upgrade.
Troubleshooting asg_blade_config
To troubleshoot problems associated with the asg_blade_config command, examine the logs
stored at: /var/log/blade_config
For example, if the SGM unexpectedly reboots, you can search the log file for the word reboot to
learn why.
Restoring a Configuration
• To restore a backup from a locally held file, run:
set backup restore local <file>
• To restore a backup from a remote server using ftp, run:
set backup restore ftp <ip_address> username <name> password <password> <file>
• To restore a backup from a remote server using tftp, run:
set backup restore tftp <ip_address> file <file>
• To restore a backup from a remote server using scp, run:
set backup restore scp ip <ip_address> username <name> password <password>
<file>
Parameter Description
<file> Name of the backup file
Example:
> set backup restore ftp ip 192.0.2.24 username user1 password pass1 file
backup_gw-24_17_4_2012_11_07.tgz
61000/41000 Security System Administration Guide R76SP.30 | 62
Managing the 61000/41000 Security System
Restoring from backup package. Use the command 'show backups' to monitor restoring
progress.
Please reboot the machine when it's finished.
Syntax
> asg sgm_admin -b <sgm_ids> up|{down [-a]} [-p]
> asg sgm_admin -h
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Example
> asg sgm_admin -b 2_03 -p
You are about to perform blade_admin up on blades: 2_03
Notes
• When an SGM is in the Administrative Down state:
• gclish commands do not run on this SGM.
• Traffic is not sent to this SGM.
• asg stat shows the SGM as DOWN (admin).
• When an SGM is changed to Administrative Up, it automatically synchronizes the configuration
from a different SGM that is in the UP state.
Image Management
You can:
• Revert to a saved image. This restores the system, including the configuration of the installed
products.
• Delete an image from the local system.
• Export an existing image. This creates a compressed version of the image. You can then
download the exported image to a different computer and delete the exported image from the
Gaia computer. This saves disk space. You must not rename the exported image. If you rename
a snapshot image, it is not possible to revert to it.
• Import uploads an exported image and makes an image of it (a snapshot). You can revert to the
image at a later time.
• See a list of saved images.
To delete an image:
> delete snapshot <snapshot_name>
Parameter Description
date Date the image was made
Notes
• You must have sufficient available space on the backup partition to create snapshot image for
all SGMs. The required available disk space is the actual size of the root partition, multiplied by
1.15.
• The available space required in the export file storage location is the size of the snapshot
multiplied by two.
• The minimum size of a snapshot is 2.5G. Therefore, the minimum available space necessary in
the export file storage location is 5G.
Syntax
# g_snapshot [-b <sgm_ids>] show|[revert <snapshot_name>]
Parameter Description
show Shows saved snapshots for the specified SGMs or Chassis.
Examples
• # g_snapshot -b 1_1,1_4 revert My_Snapshot
This example restores SGMs 1_1 and 1_4 to My_Snapshot.
• # g_snapshot –b chassis2 revert My_Snapshot
This example restores Chassis2 to My_Snapshot.
• # g_snapshot -b Chassis1 show
This example shows the saved snapshots for all SGMs on Chassis1.
61000/41000 Security System Administration Guide R76SP.30 | 65
Managing the 61000/41000 Security System
Security
Resetting the Administrator Password
If you forget your administrator password, you can use the Emergendisk utility to restore the
initial system administrator username and password (admin/admin). Run Emergendisk on the
Single Management Object (SMO).
The system automatically copies the new password from the SMO to the other SGMs.
For more information about the Emergendisk utility, see the Emergendisk section in the Gaia
Administration Guide.
Syntax
# asg_gre load | stat | verify
To configure GRE:
Edit this configuration file:
$FWDIR/conf/gre_loader.conf
Tunnel configuration:
tunnel=<tunnel_ifname> local_tun_addr=<local_tunnel_ip>
remote_tun_addr=<remote_tunnel_ip> phy_ifname=<physical_ifname>
local_addr=<local_physical_addr> remote_addr=<remote_physical_addr> ttl=<ttl>
Route configuration:
tunnel_route=<tunnel_ifname> remote_tun_addr=<remote_tunnel_ip>
network=<network>
Parameter Description
<tunnel_ifname> Tunnel interface name
<network> IP and subnet mask that define the network for the route
Configuration Example:
Configure tunnel interface with these parameters:
• Tunnel interface name: "GREtun"
• Local tunnel address: 10.0.0.3
• Remote tunnel address: 10.0.0.4
• Physical interface: eth2-01
Output:
# asg_gre load
Copying configuration file to all blades... done
1_01:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
1_02:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
1_03:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
1_04:
Clearing existing GRE tunnels...
Loading GRE module... Done
Loading tunnel interface: GREtun
Loading route: 50.50.50.11/32 via 10.0.0.4 (GREtun)
Loading tunnel interface: GREtuA
Loading tunnel interface: GREtuB
Loading tunnel interface: GREtuC
Configuration loaded
Example:
> add rba role myRole domain-type System readonly-features Chassis,interface
readwrite-features route
> add user myUser uid 0 homedir /home/myUser
> set user myUser password
> add rba user myUser roles myRole
> show rba role myRole
RADIUS Authentication
RADIUS (Remote Authentication Dial-In User Service) is a client/server authentication system that
supports remote-access applications. User profiles are kept in a central database on a RADIUS
authentication server. Client computers or applications connect to the RADIUS server to
authenticate users.
You can configure the 61000/41000 Security System to work as a RADIUS client. The 61000/41000
Security System does not include RADIUS server functionality. You can configure the 61000/41000
Security System to authenticate users even when they are not defined locally. See Configuring
Non-local RADIUS Users.
You can configure your 61000/41000 Security System computer to connect to multiple RADIUS
servers. If the first server in the list is unavailable, the next RADIUS server in the priority list
connects.
You can delete a server at any time.
> add aaa radius-servers priority <priority> host <host> [port <port>] secret
<secret> timeout <timeout>
Example: Adding a new radius server 1.1.1.1 which listens on port 1812
> add aaa radius-servers priority 1 host 1.1.1.1 port 1812 prompt-secret
timeout 3
Note - The configuration is done according to the priority and not the sever ID or name.
new-priority New RADIUS server priority as an integer between 0 and 999 (default=0).
<priority> When there two or more RADIUS servers, Gaia connects to the server with the
highest priority. Low numbers have the higher priority.
port <port> UDP port on the RADIUS server. This value must match the port as configured
on the RADIUS server. Typically this 1812 (default) or 1645 (non-standard but
a commonly used alternative).
prompt secret Shared secret (password) text string. The system prompts you to enter the
value.
timeout The number of seconds to wait for the server to respond. The default value 3
<timeout> seconds.
secret <secret> The shared secret used to authenticate the RADIUS server and the local
client. You must define this value on your RADIUS server.
Note - After RADIUS client configuration, every authentication request is forwarded to the RADIUS
server. Therefore, every account that is configured locally must be configured on the RADIUS
server as well.
Syntax
> add rba role radius-group-any domain-type System
readonly-features|readwrite-features <list>
Parameter Description
readonly-features <list> Comma separated list of Gaia features that have read only
permissions in the specified role
readwrite-features <list> Comma separated list of Gaia features that have read/write
permissions in the specified role
Example
> add rba role radius-group-any domain-type System readonly-features arp
Verification
Connect to the 61000/41000 Security System with a non-local user:
MyLaptop > ssh my_radius_user@my_61k_server
After successful authentication, the user my_radius_user is assigned the role
radius-group-any granted all the privileges defined in the radius-group-any role.
Syntax
> add user <username> uid 0 homedir <path>
Parameter Description
<username> Login name of the user
Parameter Description
<path> Full path for the user home directory
Example
> add user local uid 0 homedir /home/local
Syntax
> add rba user <username> roles <rolename>
Parameter Description
<username> User name
Adding a role
You can add new roles and give them custom permissions.
Syntax
> add rba role <rolename> domain-type System readonly-features <readonly_list>
readwrite-features <readwrite_list>
Parameter Description
<rolename> Role name
<readonly_list> Comma separated list of features to grant read only permissions for
Example
> add rba role radius domain-type System readonly-features Chassis,configuration
readwrite-features aaa-servers
Syntax
> asg profile [ --delay <timeout>] [ -b <sgm_ids> ] [-v | -p | -g] [--rel] [--tcp
| --udp] [--ipv6 | --ipv4]
> asg profile -m
> asg profile --enable
> asg profile --disable
> asg profile --help
Parameter Description
--delay <timeout> Information refresh interval (seconds).
-v | -p | -g The default view (with none of these options) shows values for each
service, for throughput, packet rate, connection rate and the number of
concurrent connections. Alternatively, you can choose one of these
options:
-v - Show verbose service statistics.
-p - Show service statistics for these paths:
• Acceleration (Accelerated by a SecureXL device)
• Medium
• Firewall
-g - Show graph view of BPS per service
61000/41000 Security System Administration Guide R76SP.30 | 75
Logging and Monitoring
Parameter Description
--rel Show the results as a percentage. For the -v, –p, and default views.
Example
> asg profile -m
Aggregated statistics of SGMs: 1_1 Virtual Systems: 0
+---------------------------------------------------------------------------------------+
|Service distribution summary |
+-------------------------+----------+-----------+---------------+----------------------+
|Service |Throughput|Packet rate|Connection rate|Concurrent connections|
+-------------------------+----------+-----------+---------------+----------------------+
|8116/udp cp-cluster |116.2 K |112 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|22/tcp ssh |4.5 K |5 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|33628/tcp |2.0 K |1 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|33635/tcp |1.2 K |0 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|33624/tcp |1.2 K |0 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|33630/tcp |400 |0 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|33626/tcp |400 |0 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|33632/tcp |336 |0 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|67/udp bootps |288 |0 |0 |0 |
+-------------------------+----------+-----------+---------------+----------------------+
|257/tcp set |48 |0 |0 |2 |
+-------------------------+----------+-----------+---------------+----------------------+
+---------------------------------------------------------------------------------------+
|Totals |
+-------------------------+----------+-----------+---------------+----------------------+
|Total tcp |10.2 K |9 |0 |8 |
|Total udp |116.5 K |112 |0 |0 |
|Total other |0 |0 |0 |2 |
+-------------------------+----------+-----------+---------------+----------------------+
|System |126.7 K |121 |0 |10 |
+-------------------------+----------+-----------+---------------+----------------------+
v) Verbose View
V) Move to a different Virtual System
p) Path View
g) Graph View
O) Online
H) History
S) Move to next sgm
b) Back one menu
e) Exit
Note - This example shows the normal (not verbose) view with absolute values. The
highest throughput and packet rate is from the service 8116/udp cp-cluster. To show
this view, type: a
Syntax
> asg_archive
> asg_archive --height <max_lines>
> asg_archive {--enable|--disable}
> asg_archive --status
> asg_archive --config [<collector> {enable|disable} [<seconds>]]
> asg_archive --refresh <timeout>
> asg_archive --cpu [<cpu_id>]
> asg_archive --remote <path>
Parameter Description
No Parameter Shows the System Status and the Options menu.
--enable Start all data collectors, except those that were manually disabled with:
asg_archive –config
Parameter Description
--refresh <timeout> Show or set the default refresh time, in seconds, which applies when no
value is specified with the --config parameter.
--cpu <cpu_id> Show or select the default CPU assigned to the data collection process.
This can help prevent unnecessary performance impact caused by this
command.
--remote <path> Read archive files from a specified remote Security Gateway. Specify the
path to this Security Gateway.
--help Show the command syntax and help text. This option automatically
closes the interactive mode and goes back to the command line.
To select a menu item, enter the number or letter to the left of the item. The letters are case
sensitive. If there is a sub-menu, the first option automatically shows in the upper section of the
61000/41000 Security System Administration Guide R76SP.30 | 78
Logging and Monitoring
screen. To select a different option, enter the applicable letter. Some options open another
sub-menu.
The numbered options show status and system information. The letter options, at the bottom of
the menu, are operations that control the information display.
H History - Shows status historical status information saved in the history files.
Select the sub-menu item to show the specified history file.
S Move to next SGM - Use this option to show the SGMs in sequential order.
V Move to next Virtual System - Use this option to show the different Virtual
Systems in sequential order.
e Exit - Close the interactive mode and go back to the command line.
Syntax
> asg if -h
> asg if [-i <interface> [-v] [enable|disable] [set_speed {0|1000|10000}] [-ip ]
Parameter Description
-h Show command syntax.
Parameter Description
set_speed Set interface port speed.
Valid values:
• 0
• 1000
• 10000
Notes
• This sample output shows:
• This sync interface is a bond-Master
• Interfaces are UP or DOWN
• To add a comment to an interface, run:
> set interface <if_name> comment <comment_text>
Verbose mode
The verbose mode shows extended information, including information retrieved from the switch.
You can use the verbose mode for one interface or a comma-separated list of interfaces. This
operation can take a few seconds for each interface.
# asg if -i eth1-01 -v
Collecting information, may take few seconds
+----------------------------------------------------------------------------------------+
|Interfaces Data |
+----------------------------------------------------------------------------------------+
|Interface|IPv4 Address |Info |State |Speed |MTU |Duplex |
| |MAC Address | |(ch1)/(ch2) | | | |
| |IPv6 Address (global)| | | | | |
| |IPv6 Address (local) | | | | | |
+---------+---------------------+------------+--------------+--------+----------+--------+
|eth1-01 |- |Bond slave |(up)/(up) |10G |1500 |Full |
| |00:1c:7f:a1:01:0 | |master: | | | |
| |- | |bond1(up)/(up)| | | |
| |- | | | | | |
+---------+---------------------+------------+--------------+--------+----------+--------+
|Comment |
+----------------------------------------------------------------------------------------+
|internal interface |
+----------------------------------------------------------------------------------------+
|Traffic |
+----------------------------------------------------------------------------------------+
|media |In traffic |In pkt(uni/mul/brd)|Out traffic |Out pkt(uni/mul/brd) |
+-----------------+-----------+-------------------+---------------+----------------------+
|FTLF8528P2BNV-EM |28.8Kbps |0pps/38pps/5pps |4.1Mbps |0pps/355pps/0pps |
+----------------------------------------------------------------------------------------+
|Errors (total/pps) |
+----------------------------------------------------------------------------------------+
|OutDiscards |InDiscards |InErrors |OutErrors |
+-----------------------------+-------------------+---------------+----------------------+
|0/0 |0/0 |0/0 |0/0 |
+-----------------------------+-------------------+---------------+----------------------+
Syntax
# blade [<chassis_id>_]<sgm_id>
Example
# blade 1_03
Output
Moving to blade 1_3
Notes
• When you only enter the SGM ID, the default Chassis is assumed.
• To go back to the last SGM, run: exit
• You can run more than one blade command to open many SSH sessions.
Syntax
# asg_bond [v] [ -i <filter>] [-help |-h]
Parameter Description
-h|--help Show command syntax.
-i <filter> Enter a bond name or a string. The output shows all bonds that match the
bond name or those names that contain the text string.
Note - You can also specify a substring that is part of a bond name to show all bonds that
contain the substring.
Verification Test
This example shows the verification test results for all bonds, including one with an error.
> asg_bond -v
+-----+------------------------+-----------------+-------+------+-------------------------+
|Name |Address |Mode |Slaves |Result|Comments |
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond1|(MAC) 00:1c:7f:81:02:fe |LACP 802.3ad |eth1-02|Failed|eth1-02 missing LACP pkts|
| |(IPv4)13.13.1.10 |Load Sharing |eth1-03| |eth1-03 missing LACP pkts|
| | | |eth2-03| |eth2-03 missing LACP pkts|
| | | |eth2-02| |eth2-02 missing LACP pkts|
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond3|(MAC) 00:1c:7f:82:04:fe|XOR |eth2-04|OK | |
| |(IPv4) 23.23.1.10 |Load Sharing |eth1-04| | |
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond5|(MAC) 00:1c:7f:81:07:fe|Round-Rubin |eth1-07|OK | |
| |(IPv4) 33.33.1.10 |Load Sharing |eth2-07| | |
+-----+------------------------+-----------------+-------+------+-------------------------+
|bond7|(MAC) 00:00:00:00:00:fe|Active-Backup | |OK | - No slaves exist |
| | |High Availability| | | |
+-----+------------------------+-----------------+-------+------+-------------------------+
Notes
• The comments column shows a description of problems detected by the verification tests.
• Bond7 shows an incomplete definition with no slaves configured.
Example
> set chassis high-availability bond bond1 min_slaves 2
Notes
• The default value for min_slaves is 1.
• The bond is considered Down if the number of slaves in UP state is below min_slaves value.
• Banalyze
Shows accumulated traffic information and traffic distribution between interfaces
Note:
• The analyze and banalyze parameters cannot be used together.
• If you run this command in a Virtual System context, you can only see the output that applies to
that context.
Syntax
> asg_ifconfig [-b <sgm_ids>] [<interface>] [analyze|banalyze] [-d <delay>] [-v] [-a]
Parameter Description
Interface The name of the interface
Parameter Description
Native Usage
This example shows the total traffic sent and received by eth2-01 for all SGMs on Chassis 1 (Active
Chassis). By default, the average traffic volume per second shows.
> asg_ifconfig -b chassis1 eth2-01
as1_02:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:94 errors:0 dropped:0 overruns:0 frame:0
TX packets:63447 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:5305 (5.1 KiB) TX bytes:5688078 (5.4 MiB)
1_03:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:137 errors:0 dropped:0 overruns:0 frame:0
TX packets:26336 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:7591 (7.4 KiB) TX bytes:2355386 (2.2 MiB)
1_04:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:124 errors:0 dropped:0 overruns:0 frame:0
TX packets:3098 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:6897 (6.7 KiB) TX bytes:378990 (370.1 KiB)
1_05:
eth2-01 Link encap:Ethernet HWaddr 00:1C:7F:81:01:EA
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX packets:79 errors:0 dropped:0 overruns:0 frame:0
TX packets:26370 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:4507 (4.4 KiB) TX bytes:2216546 (2.1 MiB)
1_01:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:01:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:225018 bytes:36970520 (37.0 MiB) dropped:0
TX: packets:3522445 bytes:1381032583 (1.4 GiB) dropped:0
1_02:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:02:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:221395 bytes:35947248 (35.9 MiB) dropped:0
TX: packets:4674143 bytes:1850315554 (1.9 GiB) dropped:0
1_03:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:03:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:10 bytes:644 (644.0 b) dropped:0
TX: packets:67826313 bytes:7345458105 (7.3 GiB) dropped:0
1_04:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:04:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:13 bytes:860 (860.0 b) dropped:0
TX: packets:68489217 bytes:7487476060 (7.5 GiB) dropped:0
1_05:
eth2-Sync Link encap:Ethernet HWaddr 00:1C:7F:05:04:FE
UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1
RX: packets:203386 bytes:19214238 (19.2 MiB) dropped:0
TX: packets:7164109 bytes:2740761091 (2.7 GiB) dropped:0
-----------------------------------------------------------------------------
SGM ID RX packets RX bytes RX dropped TX packets TX bytes TX dropped
-----------------------------------------------------------------------------
1_01 34.6% 40.1% 0.0% 2.3% 6.6% 0.0%
1_02 34.1% 39.0% 0.0% 3.1% 8.9% 0.0%
1_03 0.0% 0.0% 0.0% 44.7% 35.3% 0.0%
1_04 0.0% 0.0% 0.0% 45.2% 36.0% 0.0%
1_05 31.3% 20.9% 0.0% 4.7% 13.2% 0.0%
-----------------------------------------------------------------------------
You can run a summary report that shows the number of routes in different categories and
protocols. The summary report also makes sure that the routing information is the same on all
SGMs.
Basic Syntax
> asg_route -h
> asg_route -v
> asg_route [-a] [-b <sgm_ids>] [-ipv6] [--vs <vs_ids>] [<inactive>] [<filter>]
> asg_route [-a] [-b <sgm_ids>] [-ipv6] [--vs <vs_ids>] --comp_os_db
Parameter Description
-h Show command syntax, help information and examples.
-v Collect route information from all SGMs and save to a file at:
/var/log/asg_route/all_routes
-ipv6 Show IPv6 routes only (default shows IPv4 routes only).
-a Show all SGMs, including those that are in the admin down state.
--vs <vs_ids> Show the routing table only for the specified Virtual System. This option is
available only for VSX environments.
<vs_ids> can be:
• No <vs_ids> (default) - Shows the current Virtual System context.
• One Virtual System.
• A comma-separated list of Virtual Systems (1, 2, 4, 5).
• A range of Virtual Systems (VS 3-5).
• all - Shows all Virtual Systems.
<inactive> Optional inactive route filter parameters ("Using the Advanced Filters" on
page 92)
--compare-os-db Compares the routing data in the database with the operating system and
shows:
• All routes in the database that are in the operating system routing table
• All routes in the operating system routing table that are not in the database
Note - You can put together many basic options on one line, but you can only use one
advanced_filter option.
Routes:
C 127.0.0.0/8 is directly connected, lo
C 130.0.0.0/24 is directly connected, eth1-CIN
C 172.23.9.0/24 is directly connected, eth1-Mgmt4
C 192.0.2.0/24 is directly connected, Sync
S 0.0.0.0/0 via 172.23.9.4, eth1-Mgmt4, cost 0
Example 2
The next example shows a complex SGM filter that includes 4 SGMs. Note that the results show
route inconsistencies between the 61000/41000 Security System database and the operating
system.
> asg_route -b 1_1,2_1-2_3
Collecting routing information, may take few seconds...
==============================================================================
-------------------------------------------------------
Status: DB Routes info is NOT identical on all SGMs
OS Routes info is NOT identical on all SGMs
-------------------------------------------------------
Inconsistent DB Routes:
1_01:
-
2_01:
R 10.33.96.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
R 15.0.2.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
2_02:
-
2_03:
R 10.33.96.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
R 15.0.2.0/24 via 192.168.33.96, bond1.33, cost 2, tag 13142
Example:
> asg_route --summary
Collecting routing information, may take few seconds...
OSPF interfaces -
-*- 6 blades: 1_02 1_03 1_04 2_01 2_02 2_03 -*-
Name IP Address Area ID State DR Interface BDR Interface
bond1.34 192.168.34.86 0.0.0.86 DR 192.168.34.86 0.0.0.0
bond2.163 10.33.87.1 0.0.0.91 BDR 10.33.87.88 10.33.87.1
Status: OK
==============================================================================
OSPF neighbors -
-*- 6 blades: 1_02 1_03 1_04 2_01 2_02 2_03 -*-
Neighbor Pri State Address Interface
10.33.87.88 1 FULL/DR 10.33.87.88 10.33.87.1
Status: OK
==============================================================================
BGP peers -
-*- 1 blade: 1_02 (DR Manager) -*-
PeerID AS State ActRts Routes InUpds OutUpds Uptime
192.168.33.96 86 Active 0 0 0 0 00:00:00
Status: OK
61000/41000 Security System Administration Guide R76SP.30 | 90
Logging and Monitoring
==============================================================================
-------------------------------------------------------
Status: DB Summary info is NOT identical on all SGMs
OS Summary info is identical on all SGMs
-------------------------------------------------------
Inconsistent DB Summary:
1_02:
bgp 6
kernel 4294967293
1_03:
bgp 3
kernel 0
1_04:
bgp 3
kernel 0
2_01:
bgp 3
kernel 0
2_02:
bgp 3
kernel 0
2_03:
bgp 3
kernel 0
-------------------------------------------------------
Identical OS Summary: (649 records)
Example:
> asg_route --compare-os-db
Collecting routing information, may take few seconds...
==============================================================================
--dynamic-filter Shows specified OSPF and BGP route information and makes sure
that there are no inconsistencies between SGMs
Each advanced filter type has many different parameters that you can use to show a precisely
filtered route list.
===============================================================================
Fetching Routes info from SGMs:
1_01
Routes:
B 10.33.88.0/24 via 192.168.34.33, bond1.34, cost -1
B 10.33.94.0/24 via 192.168.33.94, bond1.33, cost -1
B 10.34.94.0/24 via 192.168.34.94, bond1.34, cost -1
-------------------------------------------------------
===============================================================================
Status: OK
Routes:
O H i 10.33.87.0/24 is an unusable route
O H i 192.168.33.0/24 is an unusable route
O H i 192.168.34.0/24 is an unusable route
O E i 194.29.40.138/32 via 10.33.87.88, bond2.163, cost 2:0
-------------------------------------------------------
===============================================================================
Note - Do not use -v with an advanced filter. If you use -v, the command ignores the
advanced filter and shows all routes.
Dynamic Routing
When Dynamic Routing is enabled, one SGM is designated as the Dynamic Routing peer. This SGM
is called the Dynamic Routing Manager (DR Manager). The DR Manager communicates with DR
peers and updates the SGMs' DR information. Before an SGM goes to the UP state, it updates its
dynamic routing information from the DR Manager.
The SSM sends Dynamic Routing packets to an arbitrary SGM based on the SSM's distribution
decision, not necessarily the DR Manager. If the SGM is not the DR Manager, the packets are
forwarded to the DR Manager.
Unicast Routing
When an SGM that is not the DR Manager receives unicast IP routing packets, the SGM forwards
them to the DR Manager. The DR Manager then communicates with its DR peers and updates the
other SGMs' DR information.
Use asg_route to administer unicast routing.
Multicast Routing
When an SGM receives multicast IP routing packets, the SGM forwards them to all other SGMs.
Each SGM handles these packets on its own.
61000/41000 Security System Administration Guide R76SP.30 | 94
Logging and Monitoring
Chassis ID: 2
-------------
Task (Task ID) SGM ID
UIPC (5) 1
General (1) 2
LACP (2) 3
CH Monitor (3) 4
Limitation:
• Only IPv4 routing protocols are supported.
Syntax
> asg_mroute -h
> asg_mroute [-d <dest_route>] [-s <src_route>] [-i <src_if>][-b <sgm_ids>]
Parameter Description
-h Show command syntax.
-s Source IP address.
Parameter Description
When no optional parameters are specified, all routes, interfaces and SGMs are shown.
Syntax
> asg_pim -h
> asg_pim [-b <sgm_ids>] [-i <if>] [-n <neighbor>]
> asg_pim neighbors
Parameter Description
-h Show command syntax.
-n Show only the specified PIM neighbor. This parameter is relevant only with the
<neighbor> neighbors option.
neighbors Runs verification test to make sure that PIM neighbors are the same on all SGMs
and shows this information:
• Verification - Results of verification test.
• Neighbor - PIM neighbor.
• Interface - Interface name.
• Holdtime - Time in seconds to hold a connection open during peer negotiation.
• Expires - Minimum and Maximum expiration values for all SGMs.
• When no optional parameters are specified, all routes, interfaces and SGMs are shown.
• In this version, only the Dense Mode is supported.
Example: Show PIM Information for the specified interface on all SGMs.
> asg_pim -i eth1-02 -b all
+--------------------------------------------------------------------------------------+
|PIM (All SGMs) |
+--------------------------------------------------------------------------------------+
|SGM 1_01 |
+--------------------------------------------------------------------------------------+
|source |dest |Mode |Flags|In. intf |RPF |Out. intf |State |
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.90 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.91 |Dense-Mode|L |eth1-02 |none |eth1-01 |Forwarding|
| | | | | | |eth2-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
|SGM 1_02 |
+--------------------------------------------------------------------------------------+
|source |dest |Mode |Flags|In. intf |RPF |Out. intf |State |
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.90 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
|22.22.22.1 |225.0.90.91 |Dense-Mode|L|M |eth1-02 |none |eth1-01 |Forwarding|
| | | | | | |eth2-01 |Forwarding|
+-----------+------------+----------+-----+---------+----------+------------+----------+
Syntax
> asg_igmp -h
> asg_igmp [-i <if>] [-b <sgm_ids>]
Parameter Description
-h Show command syntax.
+------------------------------------------------------------------------------------------+
|Interface: eth1-02 |
+------------------------------------------------------------------------------------------+
|Verification: |
|Group Verification: Failed - Found inconsistency between blades |
| -Group 225.0.90.92: missing in blades 1_02 |
|Global Properties Verification: Passed - Information is identical on all blades |
+------------------------------------------------------------------------------------------+
|Group |Age |Expire |
+--------------------+----------+----------------------------------------------------------+
|225.0.90.92 |2m |3m |
+--------------------+----------+----------------------------------------------------------+
|Flags |IGMP Ver |Query Interval |Query Response Interval |protocol |Advertise Address|
+----------+---------+---------------+-------------------------+---------+-----------------+
|Querier |2 |125 |10 |PIM |22.22.22.10 |
+------------------------------------------------------------------------------------------+
+------------------------------------------------------------------------------------------+
|Interface: eth2-01 |
+------------------------------------------------------------------------------------------+
|Verification: |
|Group Verification: Passed - Information is identical on all blades |
|Global Properties Verification: Passed - Information is identical on all blades |
+------------------------------------------------------------------------------------------+
|Group |Age |Expire |
+--------------------+----------+----------------------------------------------------------+
|225.0.90.90 |2m |3m |
+--------------------+----------+----------------------------------------------------------+
|Flags |IGMP Ver |Query Interval |Query Response Interval |protocol |Advertise Address|
+----------+---------+---------------+-------------------------+---------+-----------------+
|Querier |2 |125 |10 |PIM |2.2.2.10 |
+------------------------------------------------------------------------------------------
+--------------------+----------+----------------------------------------------------------+
|Flags |IGMP Ver |Query Interval |Query Response Interval |protocol |Advertise Address|
+----------+---------+---------------+-------------------------+---------+-----------------+
|Querier |2 |125 |10 |PIM |12.12.12.11 |
+------------------------------------------------------------------------------------------+
To see: Run:
Source and destination IP addresses • # g_tcpdump for ip proto 50
(For Site-to-Site VPN)
• # g_tcpdump for UDP port 4500
(For SecureClient and Endpoint VPN clients)
The output can include Security Associations (SAs) with an MSPI of 0. These are dummy SAs and
can safely be ignored.
SmartView Monitor
You must not activate the Monitoring Blade on the 61000/41000 Security System. But, you can still
use the Tunnels information in SmartView Monitor to see VPN tunnel status and details.
SNMP
• You can use the tunnelTable sub-tree in Check Point MIB .1.3.6.1.4.1.2620.500.9002 to see
VPN status with SNMP.
• For VSX environments, search for the SNMP Monitoring section in the R76 VSX Administration
Guide (http://supportcontent.checkpoint.com/documentation_download?ID=22932).
61000/41000 Security System Administration Guide R76SP.30 | 100
Logging and Monitoring
CLI Tools
Use these CLI commands:
• Run # cpstat -f all vpn (Expert Mode) to see VPN statistics per SGM.
• Run # vpn tu (Expert Mode) to monitor VPN tunnels per SGM.
Since VPN tunnels are synchronized to all SGMs, you can use run this command from the
scope of one SGM.
• Run > vpn shell tu (gclish) to monitor VPN tunnels in the non-interactive mode.
This command is supported for versions R76SP.20 and higher.
Note - In a VSX environment, you must run these commands from the applicable Virtual System
contact.
Syntax
# asg_traffic_stats {<ssm_id> | <if_name>} [<delay>]
Parameter Description
<ssm_id> SSM name (1-4)
Shows the traffic statistics for the specified SSM
<delay> Length of time, in seconds, that traffic statistics are collected (Default = 5
seconds).
eth1-04 statistics
---------------------
Incoming traffic:
------------------
Throughput: 164.9 Kbps
Packet rate: [Total: 252 pps], [Unicast: 14 pps], [Multicast: 161 pps], [Broadcast: 76 pps]
Outgoing traffic:
------------------
Summary on SSM1
----------------
Incoming traffic:
------------------
Throughput: 319.1 Kbps
Packet rate: [Total: 409 pps], [Unicast: 167 pps], [Multicast: 166 pps], [Broadcast: 75 pps]
Outgoing traffic:
------------------
Throughput: 408.2 Kbps
Packet rate: [Total: 156 pps], [Unicast: 156 pps], [Multicast: 0 pps], [Broadcast: 0 pps]
Syntax
> asg_blade_stats [-6] corr [[-p [-v]] [-a] | [-reset]]
> asg_blade_stats [-6] corr_online
> asg_blade_stats [-6] iterator
> asg_blade_stats [-6] smo
> asg_blade_stats [-6] vpn [-v]
> asg_blade_stats [-6] 6in4 [-v]
> asg_blade_stats [-6] gre [-v]
> asg_blade_stats [-6] icmp_error [-v]
> asg_blade_stats [-6] all
> asg_blade_stats -h | Help
Parameter Description
-6 Show only IPv6 traffic
corr Show correction layer statistics (for predefined services) for each SGM
-p Show correction layer statistics for each service (for predefined services)
for each SGM
Use with corr.
smo Show statistics for SMO task and logs for each SGM
Parameter Description
6in4 Show statistics for 6in4 tunnel forwarded packets
vs Show Virtual System stateless correction layer statistics. (VSX Mode only)
Traceroute (asg_tracert)
Use this enhanced command to show correct tracert results on the 61000/41000 Security System.
The native tracert cannot handle tracert pings correctly because of the stickiness
mechanism used in the 61000/41000 Security System firewall. The asg_tracert command
supports all native tracert command options and parameters.
Syntax
> asg_tracert <ip> [<tracert_options>]
Parameter Description
<ip> IP address
Example
> asg_tracert 100.100.100.99
Output
traceroute to 100.100.100.99 (100.100.100.99), 30 hops max, 40 byte packets
1 (20.20.20.20) 0.722 ms 0.286 ms 0.231 ms
2 (100.100.100.99) 1.441 ms 0.428 ms 0.395 ms
Note - For the SSM60, it is necessary to pre-configure the Base Switch to enable the
SNMP server before you enable the feature itself. See ("SSM60 snmp-server
configuration" on page 104) for details. After you configure the SNMP server, run:
# set chassis high-availability mgmt-monitoring on
> asg stat -v
--------------------------------------------------------------------------------
| Chassis 1 ACTIVE |
--------------------------------------------------------------------------------
| SGM ID State Process FW Policy Date |
| 1 (local) UP Enforcing Security 01Sep14 20:04 |
| 2 UP Enforcing Security 01Sep14 20:04 |
| 3 UP Enforcing Security 01Sep14 20:04 |
| 4 UP Enforcing Security 01Sep14 20:04 |
--------------------------------------------------------------------------------
| Chassis 2 STANDBY |
--------------------------------------------------------------------------------
| SGM ID State Process FW Policy Date |
| 1 UP Enforcing Security 01Sep14 20:04 |
| 2 UP Enforcing Security 01Sep14 20:04 |
| 3 UP Enforcing Security 01Sep14 20:04 |
| 4 UP Enforcing Security 01Sep14 20:04 |
--------------------------------------------------------------------------------
| Chassis Parameters |
--------------------------------------------------------------------------------
| Unit Chassis 1 Chassis 2 Unit Weight |
| |
| SGMs 4 / 4 4 / 4 6 |
| Ports |
| Standard 2 / 2 2 / 2 11 |
| Bond 2 / 2 2 / 2 11 |
| Mgmt 1 / 1 1 / 1 11 |
| Other 0 / 0 0 / 0 6 |
| Sensors |
| Fans 4 / 4 4 / 4 5 |
| SSMs 2 / 2 2 / 2 11 |
| CMMs 2 / 2 2 / 2 6 |
| Power Supplies 5 / 5 3 / 5 6 |
| |
| Chassis Grade 163 / 163 163 / 163 - |
--------------------------------------------------------------------------------
| Minimum grade gap for chassis failover: 11 |
| Synchronization |
| Within chassis: Enabled (Default) |
| Between chassis: Enabled (Default) |
| Exception Rules: (Default) |
--------------------------------------------------------------------------------
| Chassis HA mode: Active Up |
--------------------------------------------------------------------------------
Chassis 2:
----------
SSM1: OK
SSM2: OK
Syntax
> asg stat [-v] [-vs <vs_ids>] [-l]
Note - If you run this command in a VSX context, the output is for the applicable Virtual
System.
Parameter Description
-v Show detailed Chassis status (verbose mode).
-l Show the meaning of the abbreviations in the output for a Chassis with more
than 3 SGMs.
Notes
• SGM ID is the Identifier of the SGM. (local) is the SGM on which you ran the command.
• State is the state of the SGM. This can be:
• UP - The SGM is processing traffic
• DOWN - The SGM is not processing traffic
• Detached - No SGM has been detected in a slot.
Note - To manually change the state of an SGM, use the asg sgm_admin command. This
command administratively changes the state to UP or DOWN. An SGM that is down
because of a software or hardware problem cannot be changed to UP using this
command.
| Other 0 / 0 0 / 0 6 |
| Sensors |
| Fans 9 / 9 9 / 9 5 |
| SSMs 2 / 2 2 / 2 11 |
| CMMs 2 / 2 2 / 2 6 |
| Power Supplies 4 / 4 4 / 4 6 |
| |
| Chassis Grade 133 / 139 139 / 139 - |
--------------------------------------------------------------------------------
| Minimum grade gap for chassis failover: 11 |
| Synchronization |
| Within chassis: Enabled (Default) |
| Between chassis: Enabled (Default) |
| Exception Rules: (Default) |
--------------------------------------------------------------------------------
Notes
• The X/X notation shows the number of components that are UP and the components must be
UP. For example, on the SGMs line, 6/6 means that 6 SGMs are UP and 6 must be UP.
• Chassis grade is the sum of the grades of all components. In a Dual-Chassis deployment, the
Chassis with a higher grade (by at least the Minimum grade gap) becomes ACTIVE. The grade
of each component is the Unit Weight multiplied by the number of components that are UP.
You can configure the Unit Weight of each component to show the importance of the
component in the system. To configure the Unit Weight run:
> set chassis high-availability factors <sensor_name>
For example, to change the weight of the SGM to 12, run:
> set chassis high-availability factors sgm 12
If you run asg stat -v, the output shows a higher unit weight and Chassis grade:
• Minimum threshold for traffic processing - The minimum grade required for the Chassis to
become ACTIVE.
• Minimum grade gap for chassis failover - Chassis failover occurs to the Chassis with the
higher grade only if its grade is greater than the other Chassis by more than the minimum gap.
• Synchronization - The status of synchronization:
• Within chassis - between SGMs located in the same Chassis.
• Between chassis - between SGMs located in different Chassis.
• Exception Rules - user configured exception rules. To configure, use the command
g_sync_exception.
• Distribution Control blade - Shows if this option is enabled. When enabled, the SMO handles
only management traffic. You always have access immediately to the system with an SSH
connection.
------------------------------------------------------------------------------
| 2 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| Chassis 2 ACTIVE |
------------------------------------------------------------------------------
|SGM |1 (l)|2 |3 |4 | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
|State | UP | UP | UP | UP | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| VS ID |
------------------------------------------------------------------------------
| 0 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| 1 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| 2 | ES | ES | ES | ES | - | - | - | - | - | - | - | -|
------------------------------------------------------------------------------
| Chassis Parameters
------------------------------------------------------------------------------
| Unit Chassis 1 Chassis 2 Unit Weight |
| |
| SGMs 3 / 4 (!) 4 / 4 6 |
| Ports |
| Standard 0 / 0 0 / 0 50 |
| Other 0 / 0 0 / 0 6 |
| Sensors |
| Fans 6 / 6 6 / 6 5 |
| SSMs 2 / 2 2 / 2 11 |
| CMMs 2 / 2 2 / 2 6 |
| Power Supplies 6 / 6 6 / 6 6 |
| |
| Chassis Grade 118 / 124 124 / 124 - |
------------------------------------------------------------------------------
| Minimum grade gap for chassis failover: 11 |
| Synchronization |
| Within chassis: Enabled (Default) |
| Between chassis: Enabled (Default) |
| Exception Rules: (Default) |
| Distribution |
| Control Blade: Disabled (Default) |
| Chassis HA mode: Active Up |
------------------------------------------------------------------------------
SGM States:
VS States:
Note - If you run this command in a Virtual System context, you see only the output for
that Virtual System. You can also specify the Virtual System as a command parameter.
Syntax
> asg monitor
> asg monitor [-v|-all] [-amw] [-vs <vs_ids>] <interval>
> asg monitor -l
> asg monitor -h
Parameter Description
No parameters Shows the SGM status.
-amw Shows the Anti-Malware policy date instead of the Firewall policy date.
<interval> Sets the data refresh interval (in seconds) for this session.
-vs <vs_ids> Shows the component status for one or more Virtual Systems. <vs_ids> can
be:
• No <vs_ids> (default) - Shows the current Virtual System context.
• One Virtual System.
• A comma-separated list of Virtual Systems (1, 2, 4, 5).
• A range of Virtual Systems (VS 3-5).
• all - Shows all Virtual Systems.
Examples
This example shows the SGM status with the Anti-Malware policy date.
> asg monitor -amw
---------------------------------------------------------------------------
| Chassis 1 ACTIVE |
---------------------------------------------------------------------------
| SGM ID State Process AMW Policy Date |
| 1 UP Enforcing Security 10Feb14 19:56 |
| 2 (local) UP Enforcing Security 10Feb14 19:56 |
| 3 UP Enforcing Security 10Feb14 19:56 |
| 4 UP Enforcing Security 10Feb14 19:56 |
61000/41000 Security System Administration Guide R76SP.30 | 110
Logging and Monitoring
---------------------------------------------------------------------------
| Chassis 2 STANDBY |
---------------------------------------------------------------------------
| SGM ID State Process AMW Policy Date |
| 1 UP Enforcing Security 10Feb14 19:56 |
| 2 UP Enforcing Security 10Feb14 19:56 |
| 3 UP Enforcing Security 10Feb14 19:56 |
| 4 UP Enforcing Security 10Feb14 19:56 |
---------------------------------------------------------------------------
| Chassis HA mode: Active Up |
---------------------------------------------------------------------------
This example shows the status of the SGMs and Virtual System 3.
> asg monitor –vs 3
--------------------------------------------------------------------------------
| Chassis 1 ACTIVE |
--------------------------------------------------------------------------------
|SGM |1 (l)|2 |3 |4 | - | - | - | - | - | - | - | - |
--------------------------------------------------------------------------------
|State | UP | UP | UP | DWN | - | - | - | - | - | - | - | - |
--------------------------------------------------------------------------------
| VS ID |
--------------------------------------------------------------------------------
| 3 | ES | ES | ES | IAC | - | - | - | - | - | - | - | - |
--------------------------------------------------------------------------------
Syntax
> asg perf -h
> asg perf [-b <sgm_ids>] [-vs <vs_ids>] [-k] [-v] [-vv] [-p] [-4|-6] [-c]
> asg perf [-b <sgm_ids>] [-vs <vs_ids>] [-k] [--peak_hist|--perf_hist] [-e]
[--delay <seconds>]
> asg perf [-b <sgm_ids>] [-vs <vs_ids>] [-v] [-vv [ mem [fwk|cpd|fwd|all_daemons]
| cpu [1m|1h|24h] ] ]
Parameter Description
-h Shows command syntax with help
-vs <vs_ids> For VSX Gateways only. Shows performance for Virtual Systems as specified
by <vs_ids>.
<vs_ids> can be:
• No <vs_ids> (default) - Shows the current Virtual System context.
• One Virtual System.
• A comma-separated list of Virtual Systems (1, 2, 4, 5).
• A range of Virtual Systems (VS 3-5).
• all - Shows all Virtual Systems.
-vv For VSX Gateways only. Shows statistics for each Virtual System.
-p Show detailed statistics and traffic distribution between these paths on the
Active Chassis:
• Acceleration path (Performance Pack).
• Medium path (PXL).
• Slow path (Firewall).
Parameter Description
-4|-6 -4 - Shows IPv4 information only.
-6 - Shows IPv6 information only.
If no value is specified, the combined performance information for both IPv4
and IPv6 shows.
--peak_hist Creates an exportable text file that contains all data saved in the peak
performance files. You must use this parameter together with -k.
--perf_hist Creates exportable text files that contain all performance data saved in the
history files. You must use this parameter together with -k.
-e Reset peak values and delete all peaks files and system history files.
--delay Temporarily changes the update interval for the current asg perf session.
<seconds> Enter a delay value in seconds. Default = 10 seconds
Notes:
• The -b <sgm_ids> and -vs <vs_ids> parameters must written be at the start of the command
string. If both parameters are used, -b <sgm_ids> must be written first.
• If your 61000/41000 Security System is not configured for VSX, the VSX related commands are
not available. They do not show when you run asg perf -h.
Notes
• By default, absolute values are shown.
• Unless otherwise specified, the combined statistics for IPv4 and IPv6 are shown.
• When no SGMs are specified, performance statistics are shown for the active SGM only.
61000/41000 Security System Administration Guide R76SP.30 | 113
Logging and Monitoring
+-------------------------------------------------------------------------+
|Per SGM Distribution Summary |
+-----+-----------+--------+--------+--------+----------+----------+------+
|SGM |Throughput |Packet |Conn. |Concu. |Accel. |Instances |Mem. |
|ID | |Rate |Rate |Conn |Cores% |Cores% |Usage%|
+-----+-----------+--------+--------+--------+----------+----------+------+
|1_01 |10.2 K |11 |0 |22 |6/6/6 |5/4/9 |55% |
+-----+-----------+--------+--------+--------+----------+----------+------+
|Total|10.2 K |11 |0 |22 |6/6/6 |5/4/9 |55% |
+-----+-----------+--------+--------+--------+----------+----------+------+
+-----------------------------------+
|Per VS CPU Usage Summary |
+-----+---------+---------+---------+
|VS ID|Avg. Cpu%|Min. Cpu%|Max. Cpu%|
| | |(SGM id) |(SGM id) |
+-----+---------+---------+---------+
| 0 |2 |1 (1_02)|2 (1_01)|
| 1 |0 |0 (1_01)|0 (1_04)|
+-----+---------+---------+---------+
* CPU stats is aggregated over the last 24hrs
Notes
• Make sure that resource control monitoring is enabled on all SGMs.
To enable resource control monitoring, run: g_fw vsx resctrl monitor enable from the
Expert mode.
• By default, absolute values are shown.
• Average, minimum and maximum values are calculated across all active SGMs.
• The SGM ID with the minimum and maximum value shows in brackets for each SGM.
• Unless otherwise specified, the combined statistics for both IPv4 and IPv6 are shown.
• When no SGMs are specified, performance statistics are shown for the active SGM only.
Example:
> asg perf -vs all -vv mem
Tue Jul 29 16:05:44 IDT 2014
Aggregated statistics (IPv4 Only) of SGMs: chassis_active VSs: all
+--------------------------------------------------------------+
|Performance Summary |
+----------------------------------------------+---------------+
|Name |Value |
+----------------------------------------------+---------------+
|Throughput |684.5 K |
|Packet rate |700 |
|Connection rate |3 |
|Concurrent connections |144 |
|Load average |2% |
|Acceleration load (avg/min/max) |0%/0%/1% |
|Instances load (avg/min/max) |2%/0%/12% |
|Memory usage |10% |
+----------------------------------------------+---------------+
* Instances / Acceleration Cores: 8 / 4
+--------------------------------------------------------------------------+
|Per VS Memory Summary |
+--------+-------------+-------------+-------------+-------------+---------+
| VS ID | User Space | Memory in | FWK memory | Total memory| CPU |
| | memory | Kernel | | | Usage % |
+--------+-------------+-------------+-------------+-------------+---------+
| 0 max|222.3M (1_01)|1.658G (1_04)|47.11M (1_04)|1.880G (1_04)| N/A |
| min|215.8M (1_03)|1.213G (1_01)|45.55M (1_03)|1.249G (1_01)| N/A |
+--------+-------------+-------------+-------------+-------------+---------+
| 1 max|56.34M (1_02)| 0K (1_04) |31.16M (1_02)|56.34M (1_02)| N/A |
| min|54.24M (1_01)| 0K (1_04) |29.52M (1_03)|54.24M (1_01)| N/A |
+--------+-------------+-------------+-------------+-------------+---------+
* Maximum and minimum values are calculated across all active SGMs
Notes:
• The SGM which uses the most user-space memory on Virtual System 1 is SGM 1_01.
• The SGM which uses the least fwk daemon memory on Virtual System 3 is SGM 1_02.
• This information is shown only if vsxmstat is enabled for perfanalyze use.
• Make sure that vsxmstat feature is enabled (vsxmstat status_raw).
+---------------------------------------------------------------------------------------+
|Per SGM Distribution Summary |
+-------+------------+------------+-----+-----------+-------------+--------------+------+
|SGM ID |Throughput |Packet rate |Conn.|Concurrent |Core usage |Core Instances|Memory|
| | | |Rate |Connections|avg/min/max %|avg/min/max % |Usage |
+-------+------------+------------+-----+-----------+-------------+--------------+------+
|1_01 |644.3 M |1.2 M |0 |520 |52/44/62 |6/3/10 |18% |
|1_02 |526.7 M |997.1 K |0 |512 |61/51/68 |2/0/5 |18% |
|1_03 |526.6 M |997.0 K |0 |512 |62/53/73 |2/1/3 |18% |
+-----------------------------------------------------------------------------------+
|Per Path Distribution Summary |
+-------------------------+------------+------------+------------+------------------+
| |Acceleration|Medium |Firewall |Dropped |
+-------------------------+------------+------------+------------+------------------+
|Throughput |3.2 G |0 |2.1 M |117.6 M |
|Packet rate |6.0 M |0 |1.4 K |222.8 K |
|Connection rate |0 |0 |0 | |
|Concurrent connections |3.2 K |0 |156 | |
+-------------------------+------------+------------+------------+------------------+
+----------------------------------------+--------------------+
|VPN Performance |
+----------------------------------------+--------------------+
|VPN throughput |2.9 G |
|VPN connections |3.1 K |
+----------------------------------------+--------------------+
• Connection rate
• Concurrent connections
• Acceleration load
• Firewall load
• Memory consumption
You can collect the data contained in the historical peak value files and save them into two
comma-separated-value text files. There is one combined file for historical system performance
data and another for peak values. You can export these files and analyze them in a spreadsheet or
statistical analysis application. The combined files are saved at: $FWDIR/conf/asgpeaks.conf
Syntax
set chassis alert_threshold <threshold_name> <value>
show chassis alert_threshold <threshold_name>
Parameter Description
<threshold_name> Threshold name as specified in the table below
Example
> set chassis alert_threshold mem_util_threshold_perc_high 70
This sets the memory utilization high limit to 70% of installed memory.
arp g_arp
cat g_cat
cp g_cp
dmesg g_dmesg
ethtool g_ethtool
ls g_ls
md5sum g_md5sum
Mv g_mv
Netstat g_netstat
Reboot g_reboot
tail g_tail
tcpdump g_tcpdump
ifconfig asg_ifconfig
top g_top
The parameters and options for the standard Linux command are available for the global
command. In addition, you can use the -b parameter to select some or all SGMs for the global
command.
Syntax
{<gclish_command> | <global_command>} [-b <sgm_ids>] <command_options>]
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Note: You can only select SGMs from one Chassis with this option.
You can use one or more flags. However, do not use the –l and –r flags together.
g_reboot syntax
# g_reboot [-a]
g_reboot reboots all SGMs that are in the UP state. Use the -a option to reboot all SGMs in both
the DOWN and UP states.
Global arp
This example shows the interfaces on all SGMs
> arp
1_01:
Address HWtype HWaddress Flags Mask Iface
192.0.2.2 ether 00:1C:7F:02:04:FE C Sync
172.23.9.28 ether 00:14:22:09:D2:22 C eth1-Mgmt4
192.0.2.3 ether 00:1C:7F:03:04:FE C Sync
1_02:
Address HWtype HWaddress Flags Mask Iface
192.0.2.3 ether 00:1C:7F:03:04:FE C Sync
172.23.9.28 ether 00:14:22:09:D2:22 C eth1-Mgmt4
192.0.2.1 ether 00:1C:7F:01:04:FE C Sync
1_03:
Address HWtype HWaddress Flags Mask Iface
192.0.2.1 ether 00:1C:7F:01:04:FE C Sync
172.23.9.28 ether 00:14:22:09:D2:22 C eth1-Mgmt4
192.0.2.2 ether 00:1C:7F:02:04:FE C Sync
Global ls
This example runs ls from Expert Mode on SGMs 1_1, 1_2, and 1_3. The output shows the
combined results for these SGMs.
# g_ls ls –b 1_1-1_3,2_1 /var/
-*- 4 blades: 1_01 1_02 1_03 -*-
CPbackup ace crash lib log opt run suroot
CPsnapshot cache empty lock mail preserve spool tmp
Global top
The global top command shows SGM processor activity in real time. The default output also
shows a list of the most processor-intensive processes. In addition to the standard functionality of
the Linux top command, global top adds these features for the 61000/41000 Security System:
Global top relies on the user configuration for the local top utility. The command uses the local
SGM configuration file for configuring the output on the remote SGMs.
Syntax
> top [local] [-f [-o <filename>] [-n <iter>] | -s <filename>] -b <sgm_ids> [<top_params>] [-h]
Parameter Description
local Use the local configuration file
Syntax
> asg resource [-b <sgm_ids>]
> asg resource -h
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Example
> asg resource
+-----------------------------------------------------------------------------------+
|Resource Table |
+------------+-------------------------+------------+------------+------------------+
|SGM ID |Resource Name |Usage |Threshold |Total |
+------------+-------------------------+------------+------------+------------------+
|1_01 |Memory |14% |50% |31.3G |
| |HD: / |22% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+------------------+
|1_02 |Memory |9% |50% |62.8G |
| |HD: / |23% |80% |19.4G |
| |HD: /var/log |1% |80% |58.1G |
| |HD: /boot |19% |80% |288.6M |
+------------+-------------------------+------------+------------+------------------+
|1_03 |Memory |9% |50% |62.8G |
| |HD: / |23% |80% |19.4G |
61000/41000 Security System Administration Guide R76SP.30 | 122
Logging and Monitoring
Notes
• The SGM column shows the SGM ID.
• The Resource column identifies the resource. There are four types of resources:
• Memory
• HD – Hard drive space (/)
• HD: /var/log – Space on hard drive committed to log files
• HD: /boot - Location of the kernel
• The Usage column shows the percentage of the resource in use.
• The Threshold gives an indication of the health and functionality of the component. When the
value of the resource is greater than the threshold, an alert is sent. The threshold can be
modified in gclish.
• The Total column is the total absolute value in units
For example, the first row shows that SGM1 on Chassis 1 has 31.3 GB of memory, 14% of which is
used. An alert is sent if the usage is greater than 50%.
Parameter Description
-vs <vs_ids> Shows connections for the specified Virtual System. <vs_ids> can be:
• No <vs_ids> (default) - Shows the current Virtual System context.
• One Virtual System.
• A comma-separated list of Virtual Systems (1, 2, 4, 5).
• A range of Virtual Systems (VS 3-5).
• all - Shows all Virtual Systems.
<protocol> IP Protocol.
Notes:
• You must enter the all parameters in the sequence shown in the above syntax.
• You can enter \* as a parameter to show all values for that parameter.
• The -vs parameter is only available for a 61000/41000 Security System running VSX.
Command Line Examples
Legend:
A - Active SGM
B - Backup SGM
C - Correction Layer table
F - Firewall connection table
S - SecureXL connection table
61000/41000 Security System Administration Guide R76SP.30 | 124
Logging and Monitoring
One IPv6 source, all destinations, source port 8080, and TCP protocol
> asg search 2620:0:2a03:16:2:33:0:1 \* 8080 tcp
<2620:0:2a03:16:2:33:0:1, 52117, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
<2620:0:2a03:16:2:33:0:1, 62775, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
<2620:0:2a03:16:2:33:0:1, 54378, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
Legend:
A - Active SGM
B - Backup SGM
Legend:
A - Active SGM
B - Backup SGM
C - Correction Layer table
F - Firewall connection table
S - SecureXL connection table
Example 2 - One IPv6 source with any Destination on port 8080 and TCP
> asg search 2620:0:2a03:16:2:33:0:1 \* 8080 tcp
Enter source IP (press enter for wildcard):
> 2620:0:2a03:16:2:33:0:1
Enter destination IP (press enter for wildcard):
>
Enter destination port (press enter for wildcard):
>8080
Enter IP protocol ('tcp', 'udp', 'icmp' or enter for wildcard):
>tcp
Enter source port (press enter for wildcard):
>
Lookup for conn: <2620:0:2a03:16:2:33:0:1, *, *, 8080, tcp>, may take few seconds...
<2620:0:2a03:16:2:33:0:1, 52117, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
<2620:0:2a03:16:2:33:0:1, 62775, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
<2620:0:2a03:16:2:33:0:1, 54378, 951::69cb:e42d:eac0:652f, 8080, tcp> -> [1_01 A, 2_01 B]
A - Active SGM
B - Backup SGM
Option Description
Full Configuration Wizard Create a new alert
Run Test Run a test simulation to make sure that the alert works correctly
Event types
You can select one or more event types:
• One event type.
• A comma-delimited list of more than one event type.
• all for all event types.
-----------------------------------
1 | SGM State
2 | Chassis State
3 | Port State
4 | Pingable Hosts State
5 | System Monitor Daemon
6 | Route State
7 | Diagnostics
Hardware Monitor events:
8 | Fans
9 | SSM
10 | CMM
11 | Power Supplies
12 | CPU Temperature
Performance events:
13 | Concurrent Connections
14 | Connection Rate
15 | Packet Rate
16 | Throughput
17 | CPU Load
18 | Hard Drive Utilization
19 | Memory Utilization
Alert Modes
• Enabled - An alert is sent for the selected events.
• Disabled - No alert is sent for the selected events.
• Monitor - A log entry is generated instead of an alert.
Diagnostic Events
We recommend that you run the asg diag verify diagnostic tests on a regular basis. Alerts are
sent if there are failed tests. The alerts continue with the Message of the Day (MOTD) until the
issues are resolved. You can optionally disable the MOTD.
When the issues that caused failed tests are resolved, a "Clear Alert" message is sent the next
time that test runs. You can also run asg diag verify manually, to make sure that the issue is
resolved.
• By default, the tests run automatically at 01:00 each day. You can change the time that the
automatic tests run.
• By default, the automatic daily test runs all tests. You can exclude specified tests from the
daily run.
• When you manually run asg diag verify, all of the tests run, including those excluded from
the automatic daily run.
• By default, all failed tests show in the MOTD. You can disable this this feature,
Syntax
asg diag list|verify|print|except [<Test1>][,<Test2>,...]
asg diag purge [<num_logs>]
asg diag stat
Parameter Description
list Show the list of tests to run.
print Run tests and show the full output and summary
of the results.
purge Delete the asg diag logs except for the newest.
This example shows the output for the system component tests.
| Tests Status |
--------------------------------------------------------------------------------
| ID | Title | Result | Reason |
--------------------------------------------------------------------------------
| System Components |
--------------------------------------------------------------------------------
| 1 | System Health | Passed | |
| 2 | Hardware | Passed | |
| 3 | Resources | Failed (!) | (1)Memory capacity |
| | | | (2)Primary HD capacity |
| | | | (3)Log HD capacity |
| | | | (4)Boot HD capacity |
| | | | (5)Primary HD capacity mismatch |
--------------------------------------------------------------------------------
| Tests Status |
--------------------------------------------------------------------------------
| ID | Title | Result | Reason |
--------------------------------------------------------------------------------
| System Components |
--------------------------------------------------------------------------------
| 1 | System Health | Failed (!) | (1)Chassis 1 error |
| | | | (2)Chassis 2 error |
| 2 | Hardware | Failed (!) | (1)Chassis fan is down |
| | | | (2)Chassis fan exceeds threshold |
| | | | (3)Chassis fan is missing |
| | | | (4)CMM is down |
| | | | (5)Power unit is missing |
| | | | (6)Power unit fan is missing |
| 3 | Resources | Failed (!) | (1)Memory capacity |
| | | | (2)Memory capacity mismatch |
| | | | (3)Primary HD capacity mismatch |
| 4 | Software Versions | Failed (!) | |
| 5 | Software Provision | Failed (!) | |
| 6 | CPU Type | Passed | |
| 7 | Media Details | Failed (!) | (1)SSM 1 on chassis 2 |
| | | | (2)SSM 2 on chassis 2 |
| 8 | Chassis ID | Passed | |
--------------------------------------------------------------------------------
| Policy and Configuration |
--------------------------------------------------------------------------------
| 9 | Distribution Mode | Passed | |
| 10 | Policy | Passed | |
| 11 | AMW Policy | Passed | |
| 12 | Software Blades Up | Passed | |
--------------------------------------------------------------------------------
| VSX Configuration |
--------------------------------------------------------------------------------
| 13 | VSX Configuration | Failed (!) | |
--------------------------------------------------------------------------------
| Policy and Configuration |
--------------------------------------------------------------------------------
| 14 | Installation | Passed | |
| 15 | Security Group | Passed | |
| 16 | Cores Distribution | Passed | |
| 17 | SPI Affinity | Passed | |
| 18 | Clock | Passed | |
| 19 | Mgmt Monitor | Passed | |
| 20 | Licenses | Failed (!) | (1)Some licenses are missing |
| 21 | Hide NAT range | Passed | |
| 22 | LTE | Passed | (1)Not configured |
| 23 | IPS Enhancement | Passed | |
--------------------------------------------------------------------------------
| Networking |
--------------------------------------------------------------------------------
| 24 | MAC Setting | Passed | |
| 25 | ARP Consistency | Passed | |
| 26 | Interfaces | Failed (!) | (1)Interface down |
| 27 | Bond | Passed | |
| 28 | Bridge | Passed | (1)Not configured |
--------------------------------------------------------------------------------
| Tests Status |
--------------------------------------------------------------------------------
| ID | Title | Result | Reason |
--------------------------------------------------------------------------------
| System Components |
--------------------------------------------------------------------------------
| 1 | System Health | Failed (!) | (1)Chassis 1 error |
| 2 | Hardware | Failed (!) | (1)SSM is down |
| 3 | Resources | Passed | |
| 4 | Software Versions | Failed (!) | |
| 5 | Software Provision | Passed | |
--------------------------------------------------------------------------------
| Networking |
--------------------------------------------------------------------------------
| 30 | IPv6 Route | Passed | (1)Not configured |
--------------------------------------------------------------------------------
| Tests Summary |
--------------------------------------------------------------------------------
| Passed: 3/6 tests |
| Run: "asg diag list 1,2,4" to view a complete list of failed tests |
| Output file: /var/log/verifier_sum.1-5.30.2014-07-21_11-16-16.txt |
--------------------------------------------------------------------------------
Syntax
> asg_perf_hogs
Output
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
| [PASSED] | Soft lockups |
-----------------------------------------------------------------
When asg diag runs asg_perf_hogs, it shows a general result of in the Misc section of the
diagnostic test output.
• If all of the asg_perf_hogs tests pass, asg diag shows PASSED as the result.
• If at least one of the asg_perf_hogs tests fails, asg diag shows FAILED as the result.
Configuration
You can configure asg_perf_hogs using the file: $FWDIR/conf/performance_hogs.conf
[tests]
long_running_procs=1
accel_off=1
sim_debug_flags=1
fw1_debug_flags=1
local_logging=1
templates_disabled_from_rule=1
correction_table_entries=1
routing_cache_entries=1
swap_saturation=1
delayed_notifications=1
neighbour_table_overflow=1
soft_lockups=1
[correction_table_entries]
threshold=10
[long_running_procs]
elapsed_time=60
processes_to_check=("fw ctl zdebug" "fw ctl debug" "fw ctl kdebug" "fw monitor" "sim
dbg" "tcpdump")
[routing_cache_entries]
threshold=90
[swap_saturation]
threshold=50
[neighbour_table_overflow]
timeout=3600
[soft_lockups]
timeout=3600
The tests section lets you enable and disable which tests to run.
To configure a test:
1. Find the configuration section for the test in $FWDIR/conf/performance_hogs.conf. If it
does not exist, add the section with this format:
[<test_name>]
2. Change or add the parameters for the test. See the tables below for allowed parameters.
long_running_procs
long_running_procs makes sure that certain processes do not run longer than the configured
time.
This test runs on all VSX Contexts.
Parameter Description
elapsed_time Longest time in seconds a process should run
Default: 60 seconds
Minimum recommended value: 30
Example:
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [FAILED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
accel_off
accel_off makes sure that SecureXL is on.
The test runs on the current VSX Context only.
This test has no configuration options.
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [FAILED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] SecureXL acceleration is disabled!
sim_debug_flags
sim_debug_flags makes sure that PPACK debug flags that are not enabled by default are not
enabled.
This test runs on all VSX Contexts.
This test has no configuration options.
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [FAILED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] PPACK debug flags are set: Module: vpn; ; Flags: vpnpkt
fw1_debug_flags
fw1_debug_flags makes sure that FW1 debug flags that are not enabled by default are not
enabled.
This test runs on all VSX Contexts.
This test has no configuration options.
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [FAILED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] FW1 debug flags are set:; Module: fw; ; Flags: error warning packet
local_logging
local_logging makes sure that logs are written to a log server and not locally.
This test runs on the current VSX Context only.
This test has no configuration options.
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [FAILED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Local logging is active: No connection with log server!
templates_disabled_from_rule
templates_disabled_from_rule makes sure that no templates that are disabled because they
mismatch the firewall rules.
This test runs regardless of the VSX Context.
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [FAILED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Templates are being disabled from rule(s): Accept Templates : disabled by
Firewall; disabled from rule #1; NAT Templates: disabled by Firewall; disabled from
rule #1
correction_table_entries
correction_table_entries makes sure that size ratio between corrections table and the
connections table is not above the threshold.
This test runs on the current VSX Context only.
Paramete Description
r
threshold Allowed size ratio between the corrections table and the connections table
Recommended range: 5-95
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [FAILED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Correction table has 5 entries and is larger than 10% of connections table
(20 entries)
delayed_notifications
delayed_notifications makes sure that delayed notifications are enabled. The tests can report if
delayed notifications are disabled for all services, or only for HTTP.
61000/41000 Security System Administration Guide R76SP.30 | 138
Logging and Monitoring
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [FAILED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Delayed notifications for http is disabled.
routing_cache_entries
routing_cache_entries makes sure that the IPv4 route cache capacity is not above a certain
threshold.
This test runs on the current VSX Context only.
Parameter Description
threshold Percent capacity of the IPv4 route cache that should not be exceeded
Default: 90
Recommended range: 75-95
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [FAILED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Routing cache is 93% full (983731 out of 1048576 entries).
swap_saturation
swap_saturation makes sure that the swap file usage is not above the threshold.
This test runs regardless of the VSX Context.
61000/41000 Security System Administration Guide R76SP.30 | 139
Logging and Monitoring
Parameter Description
threshold Percent usage of the swap file allowed
Recommended range: 75-99
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [FAILED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Swap saturation is 90%. Total swap space: 1044216 bytes, used: 950000 bytes.
neighbour_table_overflow
neighbour_table_overflow makes sure ARP cache did not overflow in the time period in the
timeout parameter.
This test runs regardless of the VSX Context.
Parameter Description
timeout Number of seconds to look in /var/log/messages for ARP cache overloaded
messages
Recommended range: 300-86400
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [FAILED] | Neighbour table overflow |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[ All] Neighbour table overflow occurred during the last 3600 seconds. Please see
solution SK43772 for information how to configure arp cache size.
soft_lockups
soft_lockups makes sure there no kernel soft lockups in the timeout period.
This test runs regardless of the VSX Context.
Parameter Description
timeout Number of seconds to look back in /var/log/messages for kernel soft lockup
messages
Default: 3600
Recommended range: 300-86400
Example
-----------------------------------------------------------------
| Status | Test performed |
-----------------------------------------------------------------
| [PASSED] | Long running processes |
| [PASSED] | SecureXL status |
| [PASSED] | PPACK debug flags |
| [PASSED] | FW1 debug flags |
| [PASSED] | Local logging |
| [PASSED] | Templates disabled from rule |
| [PASSED] | Correction table entries |
| [PASSED] | Delayed notifications |
| [PASSED] | Routing cache entries |
| [PASSED] | Swap saturation |
| [PASSED] | Neighbour table overflow |
| [FAILED] | Soft lockups |
-----------------------------------------------------------------
Found the following issues:
-----------------------------------------------------------------
[1_01] Soft lockup occurred during the last 3600 seconds.
Troubleshooting Failures
This example shows how to use asg diag to troubleshoot a failed diagnostic test. In this case, the
test shows that two fans are down and the CPU temperature exceeds its threshold. The output
identifies the failed components.
> asg diag verify 2
------------------------------------------------------------------------------
| Tests Status |
------------------------------------------------------------------------------
| ID | Title | Result | Reason |
------------------------------------------------------------------------------
| System Components |
------------------------------------------------------------------------------
| 2 | Hardware | Failed | (1)Chassis fan is down |
| | | | (2)Chassis fan exceeds threshold |
| | | | (3)CPU exceeds threshold |
------------------------------------------------------------------------------
| Tests Summary |
------------------------------------------------------------------------------
| Passed: 0/1 test |
| Run: "asg diag list 2" to view a complete list of failed tests |
| Output file: /var/log/verifier_sum.2.2014-02-17_10-58-31.txt |
------------------------------------------------------------------------------
Error Types
This table shows some of the errors detected by asg diag verify.
CPU type Non compliant CPU type At least one SGM CPU type is not configured in the
list of compliant CPUs. You can define the
compliant CPU types.
Resource Description
Memory RAM memory capacity in GB.
Resource Description
Skew The maximum permissible clock difference, in seconds, between the SGMs
and SSMs.
Syntax
asg hw_monitor [-v] [-f <filter>]
Parameter Description
-v Show detailed component status report (verbose)
Notes
Column Meaning
Location To identify the location, see the 61000/41000 Security System Front Panel.
Value Most components have a defined threshold value. The threshold gives an indication
Threshol of the health and functionality of the component. When the value of the resource is
d greater than the threshold, an alert is sent ("Configuring Alerts for SGM and
Units
Chassis Events (asg alert)" on page 126).
Note - You can also configure SGMs with this utility, but we recommend that you use:
asg dxl
Syntax
> asg_chassis_ctrl <option> <parameters>
get_lb_dist <ssm_id> Shows the current distribution matrix from the specified
SSM. The matrix is a table containing SGM IDs, and used
to determine to which other SGMs a packet should be
forwarded.
get_dist_md5sum Shows the md5sum of the distribution matrix for the given
SSM. Comparing this checksum against the checksum on
other SSM verifies that they are synchronized.
get_ports_stat <ssm_id> Prints the port status for the specified SSM.
get_dist_mode <ssm_id> Shows the port distribution mode for the specified SSM.
get_matrix_size <ssm_id> Shows the size, in bytes, of the SSM distribution matrix.
get_sel_info <cmm_id> Shows data from the specified CMM event. This
information is useful for troubleshooting and system
forensics.
set_port_mtu <ssm_id> Sets the port MTU size for the specified SSM and Port.
<port_id> <mtu_size> <ssm_id> - SSM identifier (1-4 or all)
<port_id> - Port number
<mtu_size> - This MTU size can be one of these values:
• Integer value up to 12,288
• max - Maximum supported MTU size
• default - System default MTU size (typically 1544)
get_port_mtu <ssm_id> Shows the MTU for the specified SSM and port.
<port_id>
Notes
• To see the full syntax for an option, run the command and option without parameters.
• To make sure that the Chassis Control commands work correctly, run this command on both
Chassis:
> asg_chassis_ctrl get_cmm_status
Syntax
# asg_cores_util
Output
+---------------------+
|CPUs Utilization |
+-----------+----+----+
|CPU \ Blade|2_3 |2_4 |
+-----------+----+----+
|cpu0 |29% |2% |
+-----------+----+----+
|cpu1 |0% |0% |
+-----------+----+----+
|cpu2 |0% |1% |
+-----------+----+----+
|cpu3 |37% |25% |
+-----------+----+----+
|cpu4 |0% |0% |
+-----------+----+----+
|cpu5 |1% |18% |
+-----------+----+----+
|cpu6 |0% |0% |
+-----------+----+----+
|cpu7 |0% |0% |
+-----------+----+----+
|cpu8 |0% |0% |
+-----------+----+----+
|cpu9 |0% |1% |
+-----------+----+----+
|cpu10 |0% |0% |
+-----------+----+----+
|cpu11 |0% |0% |
+-----------+----+----+
|cpu12 |0% |0% |
+-----------+----+----+
|cpu13 |1% |1% |
+-----------+----+----+
|cpu14 |1% |0% |
+-----------+----+----+
|cpu15 |0% |0% |
+-----------+----+----+
Security Monitoring
SYN Defender (sim synatk, sim6 synatk, asg synatk)
A SYN flood attack occurs when a host, typically with a forged address, sends a flood of TCP/SYN
packets. Each of these packets is handled as a connection request, which causes the server to
create a "half-open connection". This occurs because the gateway sends a TCP/SYN-ACK
(Acknowledge) packet, and waits for a response packet, which does not arrive. These half-open
connections eventually exceed the maximum available connections, which causes a denial of
service condition. SYN defender protects the gateway by dropping excessive half-open
connections.
You can use these commands to:
• Configure a defense against an IPv4 SYN Flood attack (sim synatk).
• Configure a defense against an IPv6 SYN Flood attack (sim6 synatk).
• Monitor the system during attacks and normal system operation (asg synatk).
• Simulate a SYN attack on the specified interfaces (asg synatk state -i <interface_name>
-a)
Syntax
> sim synatk [-e] [-d] [-m] [-g] [-t <threshold>] [-a] [monitor] [monitor -v]
> sim6 synatk [-e] [-d] [-m] [-g] [-t <threshold>] [-a] [monitor] [monitor -v]
> sim synatk state -i <interface_name> -a
> asg synatk [-b <sgm_ids>] [-4 | -6]
> sim6 synatk -a
Parameter Description
-e Enable SYN defender. This make the system engage when it
recognizes an attack on an external interface. External interfaces
are defined in SmartDashboard. Internal interfaces are always in
monitor mode.
monitor -v Show the attack monitoring tool with extra (verbose) information.
Example:
enabled = 1
enforce = 1
Field Description
<if_name> Interface name
• disabled - Syn Defender does not protect or monitor the interface
<state>
• monitor- Syn Defender monitors but does not protect the interface
• enforce - Syn Defender protects the interface
Example:
interface eth1-01 state = enforce
interface eth2-01 state = disabled
Output information
Column Description
IF Interface name
non-established conns Peak - The highest number of half-opened connections for this
interface
This can help you to configure the correct threshold.
Current - The number of half-opened connections at this time
Column Description
IF The interface name
Sent SYN cookie rate Number of SYN packets received per second.
F2F Quota
Use these commands to show details of an F2F (Forward to Firewall) DDoS flood attack, and how
the protection works to mitigate it:
• asg f2fq
• fwaccel f2fg stats
• fwaccel6 f2fg stats
F2F detects traffic floods and intelligently prevents performance degradation on the 61000/41000
Security System. It assigns a high priority to known, important packets from Performance Pack
and drops those suspected of being part of a DDoS attack.
Two examples of known F2F flood attacks are UDP floods and fragmentation attacks. These
attacks cause too much resource allocation when they try to put the packet fragments together.
Use fwaccel for IPv4 information and fwaccel6 for IPv6 information.
Syntax
> fwaccel f2fq stats [–v]
> fwaccel f2fq -c <file>
> fwaccel f2fq -a
61000/41000 Security System Administration Guide R76SP.30 | 154
Logging and Monitoring
Example
This example shows details of IPv4 activity for all Firewall instances.
> fwaccel f2fq stats -v
+---------------------------------------------------------------------------+
| DDOS Mitigation |
+---------------------------------------------------------------------------+
| Mode: Enforcing |
| Status Normal |
| Last 10 seconds drops 13146 |
+---------------------------------------------------------------------------+
| Instance | Reason | Drops / Hits |
+---------------------------------------------------------------------------+
| FW 0 | CONN_MISS_TCP_SYN | 103365 / 104629 |
+---------------------------------------------------------------------------+
| FW 1 | FRAG | 6232 / 13816 |
| | CONN_MISS_TCP_SYN | 101096 / 102203 |
| | CONN_MISS_TCP_OTHER | 13146 / 14359 |
+---------------------------------------------------------------------------+
| FW 2 | FRAG | 1339 / 1339 |
| | CONN_MISS_TCP_SYN | 101087 / 102143 |
+---------------------------------------------------------------------------+
| All | FRAG | 7571 / 15155 |
| | CONN_MISS_TCP_SYN | 305548 / 308975 |
| | CONN_MISS_TCP_OTHER | 13146 / 14359 |
+---------------------------------------------------------------------------+
Item Description
Last 10 seconds drops The number of dropped packets during the last 10 seconds.
Item Description
Instance The verbose output shows a historical aggregate of the results, for
each Firewall instance.
Drops / Hits The number of dropped packets out of the total number of
packets, grouped by the attack type.
default_priority Priority for a packet that does not match any rule 100
Field Description
# Interface The interface name. Use * for all interfaces.
service Port number or port range (applicable to TCP and UDP only). Use *
for all ports.
reason Reason why this packet is rejected. Use * for all reasons.
priority • 0-100 - Priority for a packet that matches this rule. Packets with
a higher priority have a lower chance of being dropped.
• Exception - Packets that match this rule are never dropped.
Example
enabled = 1
enforce = 1
config_version = 1
default_priority = 100
dynamic_prio_threshold = 20
snapshots_interval = 1000
load_threshold = 80
Name Description
F2F_IS_ON_ICMP ICMP packet set by the firewall to be rejected
Syntax
> asg_conns [-b <sgm_ids>]
Parameter Description
<sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Example
> asg_conns
1_01:
#VALS #PEAK #SLINKS
246 1143 246
1_02:
#VALS #PEAK #SLINKS
45 172 45
1_03:
#VALS #PEAK #SLINKS
45 212 45
1_04:
#VALS #PEAK #SLINKS
223 624 223
1_05:
#VALS #PEAK #SLINKS
45 246 45
1_01:
There are 60 conn entries in SecureXL connections table
Total conn entries @ DB 0: 4
Total conn entries @ DB 3: 2
.
.
Total conn entries @ DB 26: 4
Total conn entries @ DB 30: 2
1_02:
There are 16 conn entries in SecureXL connections table
Total conn entries @ DB 0: 2
Total conn entries @ DB 1: 2
.
.
Total conn entries @ DB 26: 2
1_03:
There are 16 conn entries in SecureXL connections table
Total conn entries @ DB 0: 2
Total conn entries @ DB 5: 2
.
.
Total conn entries @ DB 30: 2
1_04:
There are 260 conn entries in SecureXL connections table
61000/41000 Security System Administration Guide R76SP.30 | 159
Logging and Monitoring
Syntax
# asg_drop_monitor [-r -6 [-ssm -t <timeout>]]
# asg_drop_monitor -h
Parameter Description
-r Reset statistics to 0
Output
NICs drops (Rx):
0
IP Stack qdisc drops (Tx):
0
CoreXL queue drops (F2F):
0
CoreXL queue drops (PXL F2P)
0
PSL drops(total):
0
PSL drops(udp):
0
PSL rejects:
0
Ppak drops:
Syntax
# asg_sgm_serial [-a]
# asg_serial_info [-a]
Parameter Description
-a Apply command on all SGMs in the security group
Examples
# asg_sgm_serial
1_01:
Board Serial : AKO0769153
1_02:
Board Serial : AKO0585533
2_01:
Board Serial : AKO0462069
2_02:
Board Serial : AKO0447878
# asg_serial_info
chassis 1 CMM1 serial: 1163978/005
chassis 1 CMM2 serial: 1157482/001
chassis 1 SSM1 serial: 0011140011
Notes
To show CMM, SSM and Chassis serial numbers, one of the SGMs on each Chassis must be UP.
For example, if no UP SGM is found on Chassis-2, the serial numbers for components for all
components in the Chassis are not shown or saved.
Syntax
# asg_syslog verify|print [ -v ]|recover
Parameter Description
verify Verify configuration consistency on all SGMs
recover Recover configuration files on all SGMs and restart syslog service
Example 1
# asg_syslog verify
Output
------------------------------------------------------------------
|Service |Path |Result |
------------------------------------------------------------------
|CPLog |/etc/syslog_servers_list.conf |Passed |
------------------------------------------------------------------
|Alert |/etc/syslog.conf |Passed |
------------------------------------------------------------------
61000/41000 Security System Administration Guide R76SP.30 | 162
Logging and Monitoring
Example 2
# asg_syslog print
Output
---------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |disable |
----------------------------------------
|alert |6.6.6.6 |enable |
----------------------------------------
* Firewall logging is disabled
Syntax
Configure remote syslog servers for alerts:
# asg_syslog disable|enable|set|delete alert <ip>|<host_name>
Syntax
# asg_syslog disable|enable|set[-s <status>]|delete cplog <ip>|<host_name>
Note - When you configure alert syslog servers, the syslog service restarts on all SGMs.
Parameter Description
set Set remote syslog server
enable Enable firewall logs and alerts to be sent to a remote syslog server
defined by IP address or host name.
You can use this parameter after the remote server has been
configured.
Examples
# asg_syslog set alert 5.5.5.5
Writing new configuration
Updating all SGMs with new configuration
Restarting syslog service on all SGMs
syslog alert server 5.5.5.5 configured successfully
----------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |enable |
----------------------------------------
Firewall logging is disabled
----------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |disable |
----------------------------------------
* Firewall logging is disabled
----------------------------------------
|Service |Server IP |Status |
----------------------------------------
|alert |5.5.5.5 |disable |
----------------------------------------
|cplog |6.6.6.6 |disable |
----------------------------------------
* Firewall logging is disabled
Syntax
Use this command to disable or enable firewall logs to be sent to the Firewall log server
(SmartView Tracker):
# asg_syslog disable|enable log_server
Parameter Description
disable Disable sending firewall logs to the log server.
Log server is configured in SmartDashboard.
Example
# asg_syslog disable log_server
# asg_syslog print -v
--------------------------------------------------------------------------------
Syntax
> asg_log_servers
Output
+-------------------------------------------------+
| Log Servers Distribution |
+-------------------------------------------------+
Log Servers Distribution Mode: Disabled
>1
+-------------------------------------------------+
| Log Servers Distribution |
+-------------------------------------------------+
If log server distribution is already enabled, the command shows which log servers are assigned
to each SGM:
+-------------------------------------------------+
| Log Servers Distribution |
+-------------------------------------------------+
* LogServer2
+--------------------------------------------------------------+
| Blade id | Chassis 1 | Chassis 2 |
|--------------------------------------------------------------|
| 1 | Gaia | Gaia |
| 2 | LogServer2 | LogServer2 |
| 3 | LogServer | LogServer |
| 4 | Gaia | - |
| 5 | - | - |
| 6 | LogServer | - |
| 7 | - | Gaia |
| 8 | - | LogServer2 |
| 9 | LogServer | LogServer |
| 10 | Gaia | - |
| 11 | LogServer2 | - |
| 12 | - | - |
+--------------------------------------------------------------+
Note - You cannot configure an SGM to send its logs to a particular log server.
Distribution takes place automatically.
Syntax
> set interface <if_name> ipv4-address <ip> mask-length <length>
Parameter Description
<if_name> The interface that connects directly to the log server
Parameter Description
<length> Subnet mask length
Example
> set interface eth1-Mgmt2 ipv4-address 2.2.2.10 mask-length 24
Output
1_0l:
success
1_02:
success
1_03:
success
2_01:
success
2_02:
success
2_03:
success
>
Notes:
• For each SGM, eth1-Mgmt2 is set as a unique logging port.
• 2.2.2.0/24 is the logging server network or leads to the logs server network
Note -
• The SMO in SmartDashboard makes sure that return traffic from the logging server,
such as ACKS, reaches the correct SGM.
• 61000/41000 Security System can be configured to send logs to more than one log
server.
Command Auditing
Command auditing:
• Notifies users about critical actions they are about to do
• Obtains confirmation for critical actions
• Creates forensic logs
If users confirm the action, they are requested to supply their names and a reason for running the
command. If the command affects a critical device or a process (pnote) a second confirmation can
be required.
For example, if you use administrative privileges to change the state of a SGM to DOWN the output
looks like this:
> asg_sgm_admin —b 2_01 down
You are about to perform sgm_admin down on blades: 2_01
Example
# asg log audit
Output
Aug 11 14:14:21 2_01 WARNING: Chassis_admin up on chassis: 1, User: susan, Reason: Maintenance
Aug 11 16:45:15 2_01 WARNING: Reboot on blades: 1_01,1_02,1_03,1_04,1_05,2_02,2_03,2_04,2_05, User:
susan, Reason: Maintenance
Aug 18 14:28:57 2_01 WARNING: Chassis_admin down on chassis: 2, User: susan, Reason: Maintenance
Aug 18 14:31:08 2_01 WARNING: Chassis_admin up on chassis: 1, User: Peter, Reason: Maintenance
Aug 18 14:32:32 2_01 WARNING: Chassis_admin down on chassis: 2, User: O, Reason: Maintenance
Aug 20 15:38:58 2_01 WARNING: Blade_admin down on blades: 2_02,2_03,2_04,2_05, User: Paul, Reason:
Maintenance
Aug 21 10:00:05 2_01 CRITICAL: Reboot on blades: all, user: ms, Reason: Maintenance
Syntax
> ver
Output
Syntax
> asg log [-b <sgm_ids>] <log_name> [-tail [<n>]] [-f <filter>]
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
-tail [<n>] Show only last n lines of the log file for each SGM. For example, -tail 3
shows only the last three lines of the specified log file. Default = 10 lines.
Feb 03 11:50:08 1_01 WARNING: Reset sic on blades: all, User: y, Reason: y
Feb 03 13:32:32 1_01 WARNING: Reset sic on blades: all, User: y, Reason: y
Feb 03 14:30:26 1_01 WARNING: Reset sic on blades: all, User: kaki, Reason: pipi
Feb 03 14:48:03 1_01 WARNING: Reset sic on blades: all, User: kaki, Reason: pipi
Feb 03 15:34:11 1_01 WARNING: Reset sic on blades: all, User: y, Reason: y
Feb 03 17:55:23 1_01 WARNING: Reboot on blades: 1_02,1_03,1_04,1_05,2_01,2_02,2_03,2_04,2_05, User:
y, Reason: y
Syntax
> auditlog [-b <sgm_ids>] [-d <n>] [-tail [n]] [-f <filter>]
Parameter Meaning
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
-d <n> Number of seconds between the same actions that occur on different
SGMs, which show on one output line. Default = 5 seconds.
-tail <n> Show only last n lines of the log file for each SGM. For example, -tail
3 shows only the last three lines of the specified log file. Default = 10
lines.
-f <filter> Word or phrase to use as an output filter. For example, -f t shows only
transient changes.
Notes:
• p + = Permanent action that added or changed an item in the configuration database.
• p - = Permanent action that deleted an item in the configuration database
• t + = Transient action that added or changed an item in the configuration database in memory
only.
• t - = Transient action that deleted an item in the configuration database in memory only.
Example - filter
This example shows only permanent configuration save actions.
> asg_auditlog -f p +configurationSave
Feb 3 15:21:51 admin localhost p +configurationSave t [2 Blades: 1_01,1_02]
Feb 3 15:21:58 admin localhost p +configurationSave t [2 Blades: 1_03,1_04]
Feb 3 15:22:03 admin localhost p +configurationSave t [3 Blades: 1_01,1_02,2_02]
Feb 3 15:22:08 admin localhost p +configurationSave t [4 Blades: 2_01,2_03,2_04,2_05]
Feb 3 15:24:23 admin localhost p +configurationSave t [2 Blades: 1_03,1_04]
Feb 3 15:24:24 admin localhost p +configurationSave t [2 Blades: 1_03,1_04]
Feb 3 15:24:29 admin localhost p +configurationSave t [5 Blades: 1_03,1_04,2_03,2_04,
Feb 3 15:24:30 admin localhost p +configurationSave t [4 Blades: 2_01,2_03,2_04,2_05]
Feb 3 15:24:35 admin localhost p +configurationSave t [2 Blades: 2_01,2_02]
Syntax
> asg config show|save [-t] [<file_path>]
Parameter Description
show Show the existing database configuration
<file_path> Name and path of the saved configuration file. If you do not enter a
path, the configuration is saved to: /home/admin
Example
> asg config save -t mycongfig
Syntax
> asg_version -h
> asg_version [verify] [-v] [-i] [-b <sgm_ids>]
Parameter Meaning
-h Show complete command syntax
verify Makes sure that system hardware components run approved software and
firmware versions
----------
-*- 2 SGMs: 1_01 1_03 -*-
OS build 42, OS kernel version 2.6.18-92cpx86_64, OS edition 64-bit
Hardware
--------
-*- 1 blade: 1_01 -*-
BIOS: 1.30 BL: 1.52 IPMC: 1.52 FPGA: 2.40 FPGARE: 2.40
-*- 1 blade: 1_03 -*-
BIOS: 0.54 BL: 1.42 IPMC: 1.42 FPGA: 2.38 FPGARE: 2.38
OS version
----------
BIOS: 0.54 BL: 1.42 IPMC: 1.42 FPGA: 2.38 FPGARE: 2.
+----------------------------------------------------------------------------+
| Hardware Versions |
+----------------------------------------------------------------------------+
| Component | Type | Configuration | Firmware |
+----------------------------------------------------------------------------+
| Chassis 2 |
+----------------------------------------------------------------------------+
| SSM1 | SSM160 | N/A | 2.4.C7 |
| SSM2 | N/A | N/A | N/A |
| CMM | N/A | N/A | 2.83 |
+----------------------------------------------------------------------------+
SGMs
======
Type
----------
-*- 2 blades: 2_02 2_03 -*-
SGM220
OS version
----------
-*- 2 blades: 2_02 2_03 -*-
OS build 80, OS kernel version 2.6.18-92cpx86_64, OS edition 64-bit
FireWall-1 version
------------------
-*- 2 blades: 2_02 2_03 -*-
This is Check Point VPN-1(TM) & FireWall-1(R) 61000_R76 - Build 083
kernel: 61000_R76 - Build 083
Hardware
--------
-*- 1 blade: 2_02 -*-
BIOS: 1.30 BL: 1.42 IPMC: 1.52 FPGA: 2.40 FPGARE: 2.40
-*- 1 blade: 2_03 -*-
BIOS: 1.30 BL: 1.52 IPMC: 1.54 FPGA: 2.40 FPGARE: 2.40
SSD
---
-*- 1 blade: 2_02 -*-
Firmware Version: 2CV102M3
-*- 1 blade: 2_03 -*-
Firmware Version: 4PC10362
Number of cores
---------------
-*- 1 blade: 2_02 -*-
8
-*- 1 blade: 2_03 -*-
12
CPUs frequency
--------------
-*- 1 blade: 2_02 -*-
2.13GHz
-*- 1 blade: 2_03 -*-
2.4GHz
Syntax
> asg_varlog [-b <sgm_ids>] [-tail <n>] [-f <filter>]
> asg_varlog -h
Parameter Meaning
-b <sgm_ids> The SGMs from which to collect /var/log/messages.
Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
-tail <n> Show only last n lines of the log file for each SGM. For example, -tail 3
shows only the last three lines of the specified log file. Default = 10 lines.
-f <filter> Word or phrase to use as an output filter. For example, -f ospf shows only
OSPF messages.
Example
This example shows messages on Chassis1 containing the word "Restarted".
> asg_varlog -b chassis1 -f Restarted
Feb 5 12:40:07 1_03 Athens-ch01-03 pm[8465]: Restarted /bin/routed[8489], count=1
Feb 5 12:40:09 1_04 Athens-ch01-04 pm[8449]: Restarted /bin/routed[9995], count=1
Feb 5 12:40:09 1_04 Athens-ch01-04 pm[8449]: Restarted /opt/CPsuite-R76/fw1/bin/cmd[11291], count=1
Feb 5 12:40:09 1_04 Athens-ch01-04 pm[8449]: Restarted /usr/libexec/gexecd[11292], count=1
Feb 5 12:40:10 1_03 Athens-ch01-03 pm[8465]: Restarted /usr/libexec/gexecd[9701], count=1
Feb 5 12:40:10 1_03 Athens-ch01-03 pm[8465]: Restarted /bin/routed[11328], count=2
Feb 5 12:40:10 1_05 Athens-ch01-05 pm[8458]: Restarted /bin/routed[9734], count=1
Feb 5 12:40:10 1_05 Athens-ch01-05 pm[8458]: Restarted /usr/libexec/gexecd[11331], count=1
Feb 5 12:40:11 1_01 Athens-ch01-01 pm[8463]: Restarted /bin/routed[12253], count=3
Feb 5 12:40:11 1_04 Athens-ch01-04 pm[8449]: Restarted /bin/routed[11378], count=2
Feb 5 12:40:11 1_04 Athens-ch01-04 pm[8449]: Restarted /opt/CPsuite-R76/fw1/bin/cmd[11379], count=2
Syntax
# cpha_vsx_util monitor start|stop <vs_ids>
# cpha_vsx_util monitor show
Parameter Description
show Show all unmonitored Virtual Systems
Parameter Description
<vs_ids> <vs_ids> can be:
• No <vs_ids> (default) - Shows the current Virtual System context.
• One Virtual System.
• A comma-separated list of Virtual Systems (1, 2, 4, 5).
• A range of Virtual Systems (VS 3-5).
• all - Shows all Virtual Systems.
Note - When you stop Virtual System monitoring, you must run cpha_vsx_util
monitor start to start it again. Monitoring does not start automatically after reboot.
SNMP Traps
The 61000/41000 Security System supports this SNMP trap only:
iso.org.dod.internet.private.enterprise.checkpoint.products.asgTrap
(OID 1.3.6.1.4.1.2620.1.2001)
Note - The set snmp traps command is not supported. You must use the asg alert
configuration wizard for this purpose.
To learn more about SNMP, see Configuring asg alerts ("Configuring Alerts for SGM and Chassis
Events (asg alert)" on page 126).
Note:
<IPver_index>= 20 for IPv4 or 21 for IPv6
Mode ID Description
0 Active/Standby - Active Up
The currently Active Chassis stays Active unless it goes DOWN or the Standby
Chassis has a higher Chassis quality grade.
To make sure that the most reliable Chassis is always Active and to prevent unnecessary failovers,
the 61000/41000 Security System calculates a quality grade for each Chassis. This is based on
continuous monitoring of critical components and traffic characteristics. See Setting Chassis
Weights ("Setting Chassis Weights (chassis high-availability factors)" on page 182) for a detailed
explanation of the quality grade system.
Chassis High Availability works on the principle that the Chassis with the highest quality grade
becomes the Active Chassis. A configurable minimum grade differential prevents unnecessary
failovers, which can cause performance degradation. Automatic failover occurs only when the
Standby Chassis quality grade is greater that the Active Chassis quality grand grade plus the
minimum differential. See Setting the quality grade differential (on page 183) for details.
Each Chassis data port has a unique MAC address. The MAC addresses for the Chassis SGMs are
the same. A Chassis failover event sends GARP/ICMv6 packets to each interface. This tells the
network to use the other interfaces. See GARP Chunk Mechanism ("Working with the GARP Chunk
Mechanism" on page 258) for details.
You can use gclish commands to configure these High Availability parameters:
• Active/Standby mode (Active UP/Primary UP)
• Chassis quality grade factors
• Failover grade difference for failover
• Failover freeze interval
• Port priority
Note - If the 61000/41000 Security System is up and running, change the Chassis ID on
the Standby Chassis. You must perform Chassis failover.
14. Attach the correct identification labels to the Chassis and CMMs.
This step is required if the Chassis has already been configured (after the First Time
Configuration Wizard).
15. Remove all SGMs from the Chassis and then reinsert them.
This step causes a hard reboot of the system.
Examples
> set chassis high-availability factors sgm 100
> set chassis high-availability factors Port high 70
> set chassis high-availability factors Port standard 50
> set chassis high-availability factors sensor cmm 40
> set chassis high-availability factors sensor fans 30
> set chassis high-availability factors sensor power_supplies 20
> set chassis high-availability factors sensor ssm 45
> set chassis high-availability factors pnote pingable_hosts 99
Syntax
> set chassis high-availability failover <trigger>
Parameter Description
<trigger> Minimum difference in Chassis quality grade to trigger failover
Valid values: 1-1000
Syntax
> set chassis high-availability freeze_interval <freeze_interval>
Parameter Description
<freeze_interval> Minimum time in seconds to wait until the next Chassis failover
Valid range: 1-1000
Note - When you run asg stat after Chassis failover, the freeze time shows in the
output.
Syntax
> set chassis high-availability port <if_name> priority <priority>
Parameter Description
<if_name> Interface name
Use this command together with: set chassis high-availability factors port
1. Set the port grade as standard or high.
For example:
> set chassis high-availability factors port standard 50
This sets the standard grade at 50.
2. Set the port to high grade or standard grade.
For example:
> set chassis high-availability port eth1-01 priority 2
This assigns to eth1-01 the standard port grade.
Advanced Features
Working with Link Preemption
The Link Preemption Mechanism prevents constant Chassis fail-over and failback when there is
interface link flapping. When you enable this feature, an interface state that changes from DOWN
to UP, is only included in the Chassis grade if the link state is up for X seconds (default is 10 sec).
Configuration:
The Link Preemption Mechanism is enabled by default with a preemption time of 10 seconds.
To configure the preemption time, run:
> fw ctl set int fwha_ch_if_preempt_time <preemp_time>
> update_conf_file fwkern.conf fwha_ch_if_preempt_time=<preemp_time>
Parameter Description
<preemp_time> Link Preemption Mechanism time
Default: 10 seconds
Example
> fw ctl set int fwha_ch_if_preempt_time 20
> update_conf_file fwkern.conf fwha_ch_if_preempt_time=20
To prevent the two Chassis from changing their states to Active, a SYNC_LOST CCP is sent over
the non-sync interface (the Data Ports and Management interfaces) to the other Chassis. This
causes the two Chassis to freeze their current states until connectivity between the two Chassis is
restored. During the Sync Loss, the Standby Chassis does not change its state to Active until it
stops receiving SYNC_LOST packets from the other Chassis.
The 61000/41000 Security System sends SYNC_LOST messages in this manner:
• For VSX environments - All interfaces of the VS0 context only
• For non-VSX environments - All Chassis interfaces
Sync Lost Mechanism is enabled by default.
(1-enabled, 0-disabled)
Parameter Description
Idx Rule sequence number. Rules are applied in sequence, starting with rule 1.
Option Description
Add new Sync exceptions rule Add a new rule to the sync exceptions table
The user can hit enter at any stage to apply the default
value. Specific rules allow the use of wildcards within
5-tuple. The new rule applies to new connections.
Delete old sync exception rule Delete a rule from the sync exceptions table
Set sync between Chassis flag on / off Global system setting - Enable synchronization
connections to the Standby Chassis
Set sync within local Chassis flag on / Global system setting - Enable synchronization
off connections to the Active Chassis
Configure sync between Chassis Minimal SGMs ratio between active and backup Chassis
SGMs ratio for synchronization to occur
If the number of UP SGMs in standby Chassis is
significantly low, compared to active Chassis,
synchronization might overload them. Default ratio for
synchronization is 70% and it can be re-configured here.
After configuration, user can also choose to restore
default settings.
Set default delay notifications Default delayed synchronization setting are divided to
HTTP related services (30) and all other services (5)
You can reconfigure these settings here. Note - When you
configure service delayed synchronization in
SmartDashboard it overrides these settings.
Enable / Disable unicast sync Enable or disable unicast sync (correction layer is enabled
and disabled accordingly) and returns to the legacy
synchronization scheme (synchronize connections to all
SGMs).
If you change this setting, you musts reboot of all SGMs.
Example
This example shows how to add a Sync Exception rule for all Virtual Systems that only
synchronizes HTTP traffic from 3.3.3.0/24 to 4.4.4.0/24 on the Active Chassis.
Enter vs range: [default: 0]
>all
Enter source IP [0.0.0.0]:
>3.3.3.0
Enter source IP mask length [0]:
>24
Enter destination IP [0.0.0.0]:
>4.4.4.0
Enter destination IP mask length [0]:
>24
Enter destination port [0]:
>80
Enter IP protocol number (for example: tcp = 6, udp = 17):
>6
Enter the sync exception rule [3 - sync to all chassis]:
0 = no sync
+---------------------------------------------------------------------------------------+
|Sync chassis |
+----+----------------+----------------+--------------------+--------------------+------+
|VS |Between chassis |Within chassis |Unicast sync |Correction layer |Ratio |
+----+----------------+----------------+--------------------+--------------------+------+
|0 |Enabled |Enabled |Enabled |Enabled |50 |
|1 |Enabled |Enabled |Enabled |Enabled |50 |
|2 |Enabled |Enabled |Enabled |Enabled |50 |
+----+----------------+------*---------+--------------------+--------------------+------+
+---------------------------------------------------------+
|Delay |
+---------------+--------------------+--------------------+
|VS |http |default |
+---------------+--------------------+--------------------+
|0 |30 |5 |
|1 |30 |5 |
|2 |30 |5 |
+---------------+--------------------+--------------------+
Active Chassis, there must be at least five UP SGMs on the Standby Chassis. SyncXL is
automatically disabled if this condition is not successful. You can change the ratio parameter.
To make sure that each active connection has backups on both Chassis in a Dual
Chassis system
Run:
# asg_sync_manager
To learn more about the asg_blade_stats command, see Showing SGM Forwarding Statistics
(asg_blade_stats) (on page 102).
Notes:
• VoIP connections are synchronized to all SGMs
• Local connections (to/from the 61000/41000 Security System pseudo IP) are not synchronized
• SyncXL does not work on the Sync interface or the Management Interface
Syntax
> set chassis high-availability down_on_first_join <first_join>
Parameter Description
<first_join> Sets whether Admin DOWN on First Join is enabled
0 - Admin DOWN on First Join is disabled
1 - Admin DOWN on First Join is enabled
Notes
• Only one SGM "owns" the UIPC task.
• The UIPC feature is disabled by default.
• If the 61000/41000 Security System is not managed by a management port, you can add the
unique IP to one of the data ports.
Use set chassis id command to assign a unique IP address to a Chassis.
Syntax
> set chassis id <chassis_id> general unique_ip <ip>
> delete chassis id <chassis_id> general unique_ip
> show chassis id <chassis_id> general unique_ip
Parameter Description
<chassis_id> Chassis ID
Valid values:
• 1
• 2
• all
<ip> An alias IP address on the same network as one of the SGMs interfaces
Manual configuration
UIPC is automatically enabled after you run the configuration commands. You can also manually
enable or disable it.
Link Aggregation binds many physical interfaces together into one virtual interface called a Bond.
This provides connection redundancy and traffic load sharing for better throughput. Each physical
interface in a Bond is known as a slave interface.
Syntax
add bonding group <bond_id>
add bonding group <bond_id> interface <slave_interface>
set bonding group <bond_id>
[primary <slave_interface>]
[mii-interval <value>]
[up-delay <value>]
[down-delay <value>]
[arp-polling-interval <interval>]
[mode <value>]
[lacp-rate <value> ]
[xmit-hash-policy <value>]
[abxor-threshold <value>]
Parameter Description
<bond_id> Bond identifier, an integer between 1 and 1024.
Parameter Description
mii-interval <interval> Frequency (in ms) that the system polls the Media
Independent Interface (MII) to get status.
Valid values = 1-5000 ms. Default = 200 ms.
up-delay <value> Wait time (in ms) before the system confirms that a slave
down-delay <value> interface is UP or DOWN.
Valid values = 1-5000 ms. Default = 200 ms.
Parameter Description
abxor-threshold <value> Minimum number of slave interfaces that must be UP for a
bundle to be Active.
Valid values = 1-8 interfaces. Default = 3 interfaces.
This parameter is applicable to the ABXOR mode only.
Examples:
> add bonding group 4 interface eth1-03
This command creates a new Bond (bond4) with one slave interface.
> add bonding group 4 interface eth2-03
This command adds another slave interface to bond4.
> set bonding group 4 mode xor down-delay 300 mii-interval 100
This command changes the mode, down-delay and mii_interval parameters for bond4.
Syntax
add bonding group <bond_id> [interface <slave_interface>]
Parameter Description
<bond_id> Bond identifier, an integer between 1 and 1024
Examples
> add bonding group 4 interface eth1-02
Syntax
set bonding group <bond_id> mode <bond_mode>
Parameter Value
<bond_id> Bond identifier, an integer between 1 and 1024.
Parameter Value
<bond_mode> Bond interface mode:
• active-backup - Selects the Primary slave interface as the Active slave
interface. If the Primary slave interface goes down, it fails over to a different
slave interface.
• xor - All UP slave interfaces are Active for Load Sharing. Traffic is assigned
to Active interfaces based on the transmit hash policy (Layer2 or Layer3+4).
• 8023AD -Dynamically uses Active slave interfaces to share the traffic load
based on the LACP protocol. This protocol uses full interface monitoring
between the Security Gateway and a switch.
• abxor - Slave interfaces are assigned to sub-groups called bundles. Only
one bundle is active at a time. All slave interfaces in the active bundle
share the traffic load. The system assigns traffic to all interfaces in the
active bundle based on the defined transmit hash policy.
Note - The Round-Robin option is not supported on the 61000/41000 Security
System.
Example
> set bonding group 4 mode 8023AD
1_01:
success
1_02:
success
1_03:
success
2_01:
success
2_03:
success
Syntax
> set bonding group <bond_id> mii-interval <interval>
Parameter Description
<bond_id> Bond ID
mii-interval<interval> Frequency (in ms) that the system polls the Media Independent
Interface (MII) to get status.
Valid values = 1-5000 ms. Default = 200 ms.
Syntax
> set interface <bond_interface> state on
Parameter Description
<bond_interface> Slave interface name
Example
> set interface bond4 state on
Syntax
> delete bonding group <bond_id> interface <slave_interface>
Parameter Description
<bond_id> Bond identifier, an integer between 1 and 1024.
Example
> delete bonding group 1 interface eth1-02
Deleting a Bond
Use this command to delete a Bond.
Important - You must delete all slave interfaces in a Bond before you can delete that
Bond.
Syntax
> delete bonding group <bond_id>
Parameter Description
<bond_id> Bond identifier, an integer between 1 and 1024.
Bundles provide Active/Backup redundancy, where only one bundle is active at any given time. The
system selects the active bundle based on these rules:
• The active bundle has the lowest index and at least as many active (UP) slave interfaces as the
abxor threshold defined for the Bond. The abxor threshold is the minimum number of active
slave interfaces necessary for a bundle to become active. You define an abxor threshold for
each Bond.
• If no bundle has the minimum number of active slave interfaces, the bundle with the most
active slave interfaces becomes the active bundle.
For example, a bundle has four slave interfaces and the Bond has an abxor threshold of three. The
active bundle must have at least three active interfaces. If no bundle has the minimum quantity of
active interfaces, the bundle with the most UP interfaces becomes active.
You can use abxor bonds with a different switch connected to each bundle. This provides both SSM
and switch redundancy with Load Sharing. In the above example, each bundle connects to a
different switch and has slave interfaces from both SSMs. If one of the switches and/or one of the
SSMs fail, there will be no traffic interruption.
Configuring ABXOR
To create an ABXOR Bond:
1. Create a new Bond ("Configuring Link Aggregation " on page 193).
2. Add slave interfaces ("Creating a New Bond and Adding Slave Interfaces" on page 195) to the
new Bond.
3. Create the bundles.
Run: add bonding group <bond_id> bundle <bundle_id>
4. Assign slave interfaces to each bundle.
Run for each slave interface:
add bonding group <bond_id> bundle <bundle_id> interface <slave_interface>
5. Set the abxor-threshold
set bonding group <bond_id> abxor-threshold <value>
61000/41000 Security System Administration Guide R76SP.30 | 198
Working with Link Aggregation (Interface Bonds)
The <value> can be from one to eight and the default value is three.
6. Set the Bond mode to abxor:
set bonding group <bond_id> mode abxor
Limitations:
• You cannot include ethX-Mgmt4 interfaces in a management Bond
• You cannot configure VLANs for a management Bond
• A Bond can be for Data or Management, but not both
• We recommend that you do not mix 1G and 10G management interfaces in a Bond
Example
This example creates a management Bond with two slaves:
> add bonding group 4 mgmt interface eth1-Mgmt3
> add bonding group 4 interface eth2-Mgmt3
> set bonding group 4 mode 8023AD
1_02:
Bond Configuration
xmit-hash-policy layer2
down-delay 200
1_03:
Bond Configuration
xmit-hash-policy layer2
down-delay 200
primary Not configured
lacp-rate slow
mode 8023AD
up-delay 200
mii-interval 100
type mgmt
Bond Interfaces
eth1-Mgmt3
eth2-Mgmt3
Notes:
• A Chassis with one SSM always uses eth1-Sync. eth2-Syncs not assigned.
• A chassis with two or more SSMs always uses these slave interfaces:
• eth1-Sync
• eth2-Sync
• Sync ports on SSM3 and SSM4 are not used when there are more than two SSMs
• The system automatically creates the Sync Bond during installation and assigns these IP
addresses:
• SGM1_1 - 192.0.2.1
• SGM1_12 - 192.0.2.14
• SGM2_1 - 192.0.2.15
• SGM2_12 - 192.0.2.28
Limitations:
• LACP is not supported.
• VLANs are not supported for Sync slave interfaces.
• A Sync Bond can have up to two slave interfaces.
• Sync ports cannot be changed to data ports. This is true for both Single and Dual Chassis
systems.
Sync Lost
Sync Lost is a Check Point feature that makes sure that both Chassis do not become Active if the
Sync network fails. The system sends special SYNC_LOST packets to the other Chassis over the
data and management interfaces. This action prevents a state change on both Chassis until the
Sync network is restored.
The Sync Lost mechanism is enabled by default.
Configure "Link State Tracking" (Cisco), or an equivalent mechanism, so that Sync port peers
go Down on both Chassis after a failure on one Chassis. If you do not do this, and the Sync port
fails on one Chassis, the related peer Sync port will stay UP.
Provisioning VSX
Create VSX objects with one of these procedures:
• Create new Security Gateways, Virtual Systems and other virtual objects in SmartDashboard.
• Run vsx_util reconfigure from glish.
Notes:
• The SMO reboots automatically when you create a new Virtual System.
• Before you start one of these procedures, make sure that the SMO is the only SGM in the
security group. After successful configuration, you can add more SGMs to the security group.
Note - This policy applies only to traffic destined for the VSX Gateway. Traffic destined
for Virtual Systems, other virtual devices, external networks, and internal networks is
not affected by this policy.
Virtual System
After you create a Virtual System on a 61000/41000 Security System, it is recommended that you
limit the maximum number of concurrent connections to 500,000.
Syntax
> vsx_util reconfigure
Input
• VSX Gateway name
• SIC activation key assigned to the Security Management Server or Domain Management Server
• Retype to confirm the SIC activation key
Notes
• This command is also useful for restoring a gateway or cluster member after a system failure.
• Run the command and follow the instructions on the screen.
• A new gateway must have the same hardware specifications and configuration as its
replacement and other cluster members. Most importantly, it must have the same number of
interfaces (or more) and the same management IP address.
• The new or replacement machine must be a new installation. You cannot use a machine with a
previous VSX configuration.
The virtual devices are listed according to the VSIDs. Run vsx stat -v to show the VSID for the
virtual devices.
You must be in expert mode to run vsxmstat.
Managing vsxmstat
Use the vsxmstat command to enable or disable memory information collection on the VSX
Gateway.
Syntax
# vsxmstat {enable_raw|disable_raw|status_raw}
Parameter Description
enable_raw Enables memory resource monitoring for perfanalyze use.
Example
# vsxmstat disable_raw
Output
VSX memory resource control is disabled for perfanalyze use
Syntax
# vsxmstat [-vs <vsid>] [unit <unit>] [sort <top>]
Parameter Description
-vs Shows the memory usage of the specified virtual devices.
Parameter Description
unit Change the memory measurement unit shown in the command output.
<top> Maximum number of virtual devices to show. Only those virtual devices that use
the most memory are shown.
Use with the sort parameter.
Use all to show all virtual devices.
Example
# vsxmstat -vs 0 1 3 5-8 unit MB sort 5
# vsxmstat sort 5
Syntax
# vsxmstat swap <minutes>
Parameter Description
<minutes> Number of minutes that the system measures memory swaps to determine
the swap-in rate. Only integers are valid values.
The default swap-in sample rate is 10.
Example
# vsxmstat swap 5
Output
Swap-in sample rate was changed successfully to 5 minutes.
Comments
Swap-in sample rate is a system wide Linux setting. When you change the value for memory
monitoring, all the swap-in rates are calculated according to the new value.
When you enable the monitoring memory resources feature, the swap-in rate setting is saved.
When you disable the feature, the system restores the saved setting.
Syntax
# vsxmstat debug
Output
VSX Memory Status
=================
Memory Total: 1021152.00 KB
Memory Free: 324788.00 KB
Swap Total: 2096472.00 KB
Swap Free: 2096404.00 KB
Swap-in rate: 375.34 KB
Comments
By default the debug parameter shows these memory fields:
Field Description
Private_Clean Clean private pages. (/proc/[pid]/smaps)
Field Description
Private_Dirty Dirty private pages. (/proc/[pid]/smaps)
Syntax
> fw -i k ctl set int fw_vsx_legacy_bridge_mode <mode>
Parameter Description
<mode> Sets the VSX Legacy Bridge Mode
Valid values:
• 0 (Default) - Disable VSX Legacy Bridge Mode
• 1 - Enable VSX Legacy Bridge Mode
The 61000/41000 Security System includes features that support advanced LTE
telecommunication. Most of these features are configured with SmartDashboard or on the
management server. See the R76 LTE Release Notes
http://downloads.checkpoint.com/dc/download.htm?ID=29339 for detailed information and
configuration procedures. Configuration procedures for SGMs are included in this section for your
convenience.
These LTE features include:
• LTE S1 VPN
• Firewall GX support
• GTPv2 support
• GTP CoreXL support
• GTP Signaling rate limit
• SCTP support
• Diameter inspection
• Third-Party Syslog
• MSS adjustment
• CGNAT
• Stateless NAT46 translation
• NAT 64
• Large Scale VPN
Limitations:
• Connections are synchronized to all SGMs, not just the standby SGM.
• You must not enable SPI distribution ("SPI Distribution on SSM160 (asg dxl spi)" on page 220).
VPN Sticky SA
By default, the VPN Sticky Security Association (SA) feature is enabled. This feature makes sure
that the 61000/41000 Security System has only one outgoing SA to remote peers. This is a
requirement for some network device manufacturers to minimize security vulnerabilities.
Important - Make sure that SPI distribution and Sticky SA are not enabled. at the same
time.
Verification
To see the VPN Sticky SA status, run this command in the Expert mode:
# g_fw ctl get int fwha_vpn_sticky_tunnel_enabled
-*- 12 blades: 1_01 1_02 1_03 1_04 1_05 1_06 2_01 2_02 2_03 2_04 2_05 2_06 -*-
fwha_vpn_sticky_tunnel_enabled = 0
Notes:
• Only outbound sticky SA connections are synchronized.
• Connections are not synchronized to all SGMS.
To synchronize connections to all SGMs, run:
# asg_lte_config enable
Notes:
• You must configure SCTP in SmartDashboard before you can use this feature. See the R76 LTE
Release Notes http://downloads.checkpoint.com/dc/download.htm?ID=29339 for detailed
information and configuration procedures.
• If SCTP acceleration is activated and SCTP inspection is deactivated, the Performance Pack
accelerates all SCTP packet types.
System Optimization
In This Section:
Firewall Connections Table Size for VSX Gateway ...................................................214
Reserved Connections ................................................................................................214
Policy Acceleration – SecureXL Keep Connections ..................................................218
Extending SecureXL Templates .................................................................................218
VPN Performance Enhancements .............................................................................220
SCTP Acceleration ......................................................................................................222
Configuring DNS Session Rate ..................................................................................223
Fast Packet Drop ........................................................................................................224
Configuring Hyper-Threading ....................................................................................225
Configuring CoreXL on a VSX Gateway (g_cpconfig) ................................................226
System Under Load ....................................................................................................231
Working with Jumbo Frames .....................................................................................232
TCP MSS Adjustment..................................................................................................235
Working with Session Control (asg_session_control) ..............................................236
Hide NAT Behind Range – Sticky for each SGM (asg_hide_behind_range) ............239
Acceleration Not Disabled Because of Traceroute Rule (asg_tmpl_special_svcs) 240
Improving Inbound HTTPS Performance ..................................................................240
Reserved Connections
Normally, when the connection table limit is reached, no more connections are allowed, even ones
critical for operating and managing the gateway. The reserved connections feature allows the
gateway to process these critical connections, even after the connections table limit is reached.
There is a user defined amount of space that is reserved in the connections table for these critical
connections. If the Rule Base allows these connections, they are allowed even if no other
connections can be accepted.
For example, when the connections table limit is reached, the administrator may not be able to
install a new policy that increases the connections limit or open other necessary connections,
such as SSH to the gateway.
Syntax
# asg_reserved_conns
Please choose one of the following:
-----------------------------------
1) Print reserved connections table
2) Add new reserved connection rule
3) Delete reserved connection rule
4) Exit
>
Output
Idx Source Mask Destination Mask DPort Ipp Interface
--- --------------- ---- --------------- ---- ----- ----- ------------
1) 0.0.0.0 0 0.0.0.0 0 1129 6 Sync
2) 0.0.0.0 0 0.0.0.0 0 1130 6 Sync
3) 0.0.0.0 0 0.0.0.0 0 4444 6 Sync
4) 0.0.0.0 0 0.0.0.0 0 22 6 Sync
5) 0.0.0.0 0 0.0.0.0 0 8888 6 Sync
6) 0.0.0.0 0 0.0.0.0 0 2010 6 Sync
7) 0.0.0.0 0 0.0.0.0 0 1131 6 Sync
8) 0.0.0.0 0 0.0.0.0 0 1132 6 Sync
9) 0.0.0.0 0 0.0.0.0 0 256 6 Sync
10) 0.0.0.0 0 0.0.0.0 0 0 1 Sync
11) 0.0.0.0 0 0.0.0.0 0 8116 17 Sync
12) 0.0.0.0 0 0.0.0.0 0 0 1 eth1-CIN
13) 0.0.0.0 0 0.0.0.0 0 22 6 eth1-CIN
14) 0.0.0.0 0 0.0.0.0 0 23 6 eth1-CIN
15) 0.0.0.0 0 0.0.0.0 0 161 17 eth1-CIN
16) 0.0.0.0 0 0.0.0.0 0 623 17 eth1-CIN
17) 0.0.0.0 0 0.0.0.0 0 0 1 eth2-CIN
18) 0.0.0.0 0 0.0.0.0 0 22 6 eth2-CIN
19) 0.0.0.0 0 0.0.0.0 0 23 6 eth2-CIN
20) 0.0.0.0 0 0.0.0.0 0 161 17 eth2-CIN
21) 0.0.0.0 0 0.0.0.0 0 623 17 eth2-CIN
22) 0.0.0.0 0 0.0.0.0 0 22 6 Any
23) 0.0.0.0 0 0.0.0.0 0 256 6 Any
24) 0.0.0.0 0 0.0.0.0 0 18191 6 Any
61000/41000 Security System Administration Guide R76SP.30 | 215
System Optimization
Source Source IP
If the IP is 0.0.0.0, all IPs are allowed.
Destination Destination IP
If the IP is 0.0.0.0, all IPs are allowed.
4. Delete all current rules from the kernel and reload the rules from
$FWDIR/bin/reserved_conns_tab:
# asg_reserved_conns -f
It is useful if there were changes in network interface names or if
$FWDIR/bin/reserved_conns_table was edited directly.
Configuration
The feature works after installation without additional configuration.
The rules are stored in:
$FWDIR/bin/reserved_conns_table
Variable Description
fwconn_reserved_conn_active Enables or disables the feature
Valid values:
• 1 - Enabled
• Any other integer: Disabled
Legacy Mode
To allow Keep all connections while disabling SecureXL keep connections:
In $FWDIR/boot/modules/fwkern.conf, set cphwd_policy_accel to: 0
Verification
After policy installation, templates of the old policy should be deleted.
To make sure the templates of the old policy were deleted:
1. Run:
# g_fwaccel stats
2. Save the old value of the Policy deleted tmpl statistics.
3. Install the policy
4. Run:
# g_fwaccel stats
5. Make sure that templates were deleted.
SecureXL creates a connection template that matches the accept rule in the firewall Rule Base,
but with a wildcard replacing the source port. New connections that match the template are
processed by SecureXL.
On a busy network, repeated connections to the same DNS server benefit from SecureXL
acceleration, where the DNS source port (53) is replaced by a wildcard. However, multiple IP
addresses can resolve to the same DNS name. In such an environment, replacing the source IP
address with a second wildcard decreases the number of connections processed by the firewall.
To replace source IP addresses with a second wild card, you must extend the existing SecureXL
templates.
To add other services to the template (for example HTTP and Telnet):
On the SMO:
1. Open in a text editor: /etc/fw.boot/modules/fwkern.conf
2. Add cphwd_use_srcip_wildcard_for_template=80,23 to the file.
This adds ports 80 and 23 to the list of permitted destination ports.
• Separate each port number with a comma
• Do not add more than 4 port numbers
For UDP services, add: cphwd_src_ip_tmpl_udp_ports= <UDP_ports>.
3. Copy the file to all SGMs:
# g_cp2blades -a /etc/fw.boot/modules/fwkern.conf
4. Open in a text editor: /etc/ppk.boot/boot/modules/simkern.conf
5. Add sim_src_ip_tmpl_tcp_ports=80,23 to the file.
For UPD services, add: sim_src_ip_tmpl_udp_ports=<UDP_ports>
6. Copy the file to all SGMs:
# g_cp2blades -a /etc/ppk.boot/boot/modules/simkern.conf
7. Reboot all SGMs.
Verification
To make sure extended SecureXL templates are being used:
1. In gclish, run:
> fwaccel templates
2. Examine the output.
An asterisk (*) in the Source column and an increasing Conns counter means the extended
template is being utilized.
Important - You must not enable SPI distribution for the LTE mode ("Working with LTE
Features" on page 211) or when working with 3rd party VPN peers.
When you disable SPI distribution in LTE mode or with a 3rd party peer, you must also
run:
# g_update_conf_file fwha_vpn_sticky_tunnel_enabled=1
Syntax
# asg_spi_affinity mode|vlan <ssm_id> on|off
# asg_spi_affinity verify
Parameter Description
mode Configure VPN affinity for specified SSM.
<ssm_id> SSM ID
Valid values:
• Integer between 1 and 4
• all - All SSMs
on|off Enable or disable SPI affinity. You must enable vlan and mode (VPN)
affinity separately.
Notes:
• When some SSM interfaces are not configured as VLANs, we recommend that you enable
VLAN affinity only if most traffic passes through VLAN interfaces.
61000/41000 Security System Administration Guide R76SP.30 | 221
System Optimization
• SPI affinity can affect the distribution of clear packets. We recommend that you use SPI affinity
only if most of the inbound traffic is VPN traffic.
Examples
# asg_spi_affinity mode 1 on - Enable VPN affinity for SSM 1
# asg_spi_affinity mode 2 off - Disable VPN affinity for SSM 2
# asg_spi_affinity vlan all on - Enable VLAN affinity for all SSM interfaces
# asg_spi_affinity vlan all off - Disable VLAN affinity for all SSM interfaces
VPN Templates
VPN templates accelerate the session rate, particularly for short connections (HTTP, DNS). These
templates, which are part of the SecureXL template set, let you create new connections in the
acceleration layer. They only send a notification to the Firewall layer if the connection is too long
or if an F2F attack is detected. VPN templates are enabled by default.
SCTP Acceleration
To enable SCTP Acceleration:
1. In SmartDashboard, create SCTP as Other using IP protocol 132
2. Enable Accept Replies in the Advanced tab of the SCTP service.
61000/41000 Security System Administration Guide R76SP.30 | 222
System Optimization
To make sure that DNS connections are delayed by the set value:
1. Open a number of DNS connections from the same client to the same server.
2. Run:
> fwaccel templates
Source SPort Destination DPort PR Flags Conns Open LCT DLY
--------------- ----- --------------- ----- -- --------- ------ ------ ---- ---
10.33.87.12 * 192.168.15.31 53 17 ......... 25 0 2 30
Note - The default value for this parameter is 30 seconds. The maximum value is 60.
Note
• The number of services is limited to 8.
• The command must contain 8 values. If you configure less than 8 services, enter 0 for the others.
• This is the only way to extend DNS session rate enhancements to other UDP services. The fw ctl set
int command is not supported.
• The configuration takes effect only after reboot.
Syntax
> sim dropcfg -l
> sim dropcfg -f <file> [-y]
> sim dropcfg -r [-y]
> sim dropcfg -h
Parameter Description
-l Show current configuration
Parameter Description
src <src_ip>/<subnet> Source IP address and subnet. Subnet is optional
Notes:
• If subnet is not specified, one IP address is used.
• Use * to specify 'Any'. It is the same as not specifying the parameter.
• Use # at the start of the line to add comments.
• Empty lines are ignored.
Configuring Hyper-Threading
Hyper-threading lets a compatible operating system run more than one process run
simultaneously on a CPU core. A Hyper-threading processor adds one or more logical processors,
which the operating system sees as independent processors.
61000/41000 Security System Administration Guide R76SP.30 | 225
System Optimization
Syntax
# g_cpconfig ht stat
# g_cpconfig ht enable
# g_cpconfig ht disable
# g_cpconfig ht show stat
Parameter Description
stat Shows whether hyper-threading is enabled for the 61000/41000 Security
System
Notes:
• Hyper-threading is enabled by default on the SGM260.
• You must reboot all SGMs after you enable or disable hyper-threading.
Note - If you run this command in a Virtual System, the output applies to VS0.
Syntax
> g_cpconfig corexl stat
> g_cpconfig corexl enable <n> [-6 <k>]
> g_cpconfig corexl disable
> g_cpconfig corexl instances <n> [-6 <k>]
> g_cpconfig corexl show instances
> g_cpconfig corexl show stat
Parameter Description
stat Show current status and number of instances on all SGMs.
Parameter Description
instances <n> [-6 <k>] Change the number instances
<n> - Number of IPv4 Firewall instances
-6 <k> - Number of IPv6 Firewall instances
Valid values: 2 - 32
Default - 16
CoreXL was successfully enabled with 8 IPv4 and 8 IPv6 firewall instances.
Important: This change will take effect after rebooting all blades.
• The number of CoreXL instances (user-mode threads) changes from 1 to 3. Each Virtual
System still has one CoreXL instance.
• CPUs 0-7 are still assigned to Firewall packet inspection.
• CPUs 8-11 are still assigned to Performance Pack.
Important - Do not add Check Point processes to the exception list. This can cause
system instability.
Affinity Priorities
When a CPU core has more than one affinity, the affinity is applied based on these priorities:
1. Firewall instance
2. Process
3. Virtual System
Setting Affinities
Use fw ctl affinity -s -d to set these CPU affinities:
• Firewall instance
• Processes
• Virtual System
You can set Firewall instance affinity to one or more CPUs on each Virtual System individually.
Syntax
> fw ctl affinity -s -d
> fw ctl affinity -s -d [-vsid <vs_ids>] -cpu <cpu_id>
> fw ctl affinity -s -d -pname <process> [-vsid <ranges>] -cpu <cpu_id>
> fw ctl affinity -s -d -inst <instance_id> -cpu <cpu_id>
Parameter Description
-s -d Set affinity for a VSX environment.
-cpu <cpu_id> One or more CPU cores. You can define a range from which the
system selects the instances. The format for a range is:
<from_cpu_id>-<to_cpu_id>.
Parameter Description
-inst <instance_id> One or more Firewall instances. You can define a range from which
the system selects the instances. The format for a range is:
<from_instance_id>-<to_instance_id>.
Setting Affinity for all Virtual Systems (fw ctl affinity -s -d -fwkall)
Use fw ctl affinity -s -d -fwkall to assign the specified number of CPU cores to all Virtual
Systems at one time.
Syntax
> fw ctl affinity -s -d -fwkall <cores>
Parameter Description
-s -d Set affinity for a VSX environment.
-fwkall <cores> Defines the number of cores assigned to all Virtual Systems.
Example
This example assigns three cores to Firewall instances for all Virtual Systems.
> fw ctl affinity -s -d -fwkall 3
VDevice 0-2 : CPU 0 1 2 - set successfully
Note - You can run this command from the VS0 context only.
Syntax
> fw ctl affinity -l -x [-vsid <vsid>] [-flags {e|h|k|n|t|o}]
Parameter Description
<vsid>
Shows the affinity for processes for these Virtual System IDs.
Use a dash to set a range of Virtual Systems.
e Do not show processes that are affinity exceptions. You define affinity exceptions
in:
$FWDIR/conf/vsaffinity_exception.conf
Parameter Description
o Print the list to a file.
Example
> fw ctl affinity -l -x -vsid 1 -flags tn
-----------------------------------------------------------------------
|PID |VSID | CPU |SRC|V|KT |EXC| NAME
-----------------------------------------------------------------------
| 4756 | 0 | all | | | | | pm
| 4773 | 0 | all | | | | | confd
| 4774 | 0 | all | | | | | searchd
| 5008 | 0 | all | | | | | |---searchd
| 4780 | 0 | all | | | | | httpd2
| 4781 | 0 | all | | | | | monitord
| 24700 | 0 | 0 1 | P | | | | |---cpd
| 24704 | 0 | 0 1 | P | | | | |---cpd
| 24705 | 0 | 0 1 | P | | | | |---cpd
| 22800 | 0 | all | | | | | mpdaemon
| 24523 | 0 | all | | | | | fwk_forker
| 24525 | 0 | all | | | | | fwk_wd
| 24573 | 0 | 1 3 4 6 | P | | | | fw
| 24667 | 0 | 1 3 4 6 | P | | | | |---fw
| 24668 | 0 | 1 3 4 6 | P | | | | |---fw
| 24670 | 0 | 1 3 4 6 | P | | | | |---fw
| 24671 | 0 | 1 3 4 6 | P | | | | |---fw
| 25412 | 0 | 1 3 4 6 | P | | | | |---fw
| 24642 | 0 | 2 3 4 5 6 7 | P | | | | fwk0_dev
| 24643 | 0 | 2 3 4 5 6 7 | P | | | | |---fwk0_0
| 30186 | 0 | all | | | | | clishd
-----------------------------------------------------------------------
Logs
A log entry is generated for every System Under Load state change (ON/OFF). Only the SMO sends
messages to the log server. This example shows System Under Load logs in SmartView Tracker.
System Under Load log entries are typically a symptom of intensive CPU activity. See Hardware
Monitoring and Control (on page 105) to learn how to resolve these issues.
Limitations
• Jumbo frames are not supported on bridge interfaces.
• You cannot enable Jumbo Frames directly on VLAN interfaces. You must enable Jumbo
Frames on the master interfaces. This limitation does not apply to VSX Gateways.
Note - This step is not applicable to VSX Gateways. In VSX you must configure the MTU in
the Virtual System properties in SmartDashboard.
To enable Jumbo Frames, you must set the MTU on at least one interface to more than 1500. In a
Dual Chassis environment, this enables Jumbo Frames on both Chassis.
To enable Jumbo Frames on the SSM60, you must also do the procedure in SSM60 (on page 233).
Syntax
> set interface <if_name> mtu <size>
Parameter Description
<if_name> Interface name as defined in the operating system
Example
> set interface eth1-01 mtu 9000
Output
1_02:
Note: MTU changes are propagated to the SSMs. Use "asg_jumbo_conf show" to validate
changes
Example
# telnet 198.51.100.32
Trying 198.51.100.32...
Connected to 198.51.100.32.
Escape character is '^]'.
Syntax
# asg_jumbo_conf show [-v]
Parameter Description
-v Detailed report (verbose)
Example
# asg_jumbo_conf show -v
Output
Jumbo frames are enabled on SGMs (SSM1 max MTU: 12288 SSM2 max MTU: 12288 )
Retrieving SSMs Jumbo frames configuration
Chassis1
¯¯¯¯¯¯¯¯
SSMs:
Jumbo frames are enabled on SSM1
Jumbo frames are enabled on SSM2
Interfaces MTU configuration:
interface:BPEth0:mtu 12288
interface:BPEth1:mtu 12288
The MTU of all the interfaces which are not in the list is 1500
SSM160
To run the validation tests on the SSM160:
1. Show the Jumbo Frames configuration on the specified SSM:
> asg_chassis_ctrl jumbo_frames show <ssm_id>
2. Show the configured MTU on the specified port:
> asg_chassis_ctrl get_port_mtu <ssm_id> <port_id>
Example
> asg_chassis_ctrl jumbo_frames show 1
Jumbo frames are enabled on SSM1
> asg_chassis_ctrl get_port_mtu 1 1
MTU of port 1 on SSM1 is 1544
SSM60
To run the validation test:
1. Connect to the SSM using telnet.
The default password is admin.
2. Use Enable Mode:
> en
3. Show the running configuration:
# show run
4. Make sure that all applicable interfaces (downlinks and front panel ports) show the required
packet size limit.
# telnet 198.51.100.32
Trying 198.51.100.32...
Connected to 198.51.100.32.
Escape character is '^]'.
Example
> set interface eth1-01 mtu 1500
Output
1_02:
Note: MTU changes are propagated to the SSMs. Use "asg_jumbo_conf show" to validate
changes
Syntax
> fw ctl set int fw_clamp_tcp_mss|fw_tcp_mss_value <num>
Parameter Description
fw_clamp_tcp_mss <num> Enable or Disable MSS Adjustment:
• 0 - Disable (default)
• 1 - Enable
Parameter Description
fw_tcp_mss_value <num> MSS Value
If this is set to 0, the MSS value is based on the interface's
MTU.
Note - If you want the modified parameters, including state (ON/OFF), to be persistent,
use g_update_conf_file in Expert mode to add them to:
$FWDIR/boot/modules/fwkern.conf
Verification
You can use Packet Sniffers to make sure that MSS is clamped when the feature is enabled
according to the configuration.
Debugging
1. Enable SIM debug:
> sim dbg -m pkt + pkt
2. Start fw debugging:
> fw ctl zdebug + packet
3. Look for output that contains the string: MSS
Syntax
# asg_session_control apply|disable|stats|verify
Parameter Description
No parameters Shows command syntax and helpful information
stats Shows all session rate rules and dropped traffic statistics
verify Makes sure that the session rate rules are the same on all SGMs
Important - Define rules as specifically as possible, so that more than one rule cannot
apply to the same traffic. Overlapping rules can cause unpredictable results. We
recommend that you explicitly define all parameters in each rule.
Rule Syntax
[src <ip>/<mask>] [dst <ip>/<mask>] [dport <port>] [proto <protocol_id>] [limit
<rate>] [limit_ongoing 0|1]
Parameter Description
src <ip>/<mask> Source IP address and net mask
Rule Examples
src * dst 1.1.1.0/24 dport 67 proto 17 limit 20 limit_ongoing 1
This rule defines a limit of 20 new connections per second for traffic going from all sources to:
• Network 1.1.1.0/24
• Port 67
• Using protocol 17 (UDP)
• Including current connections
dst 1.1.1.1/32 dport 80 proto 6 limit 13
This rule defines a limit of 13 new connections per second for traffic going from all sources to:
• Network 1.1.1.1/32
• Port 80
• Using protocol 6 (TCP)
Notes
• New connections above the specified limit are dropped.
61000/41000 Security System Administration Guide R76SP.30 | 237
System Optimization
• If you do not include a parameter, the rule applies to all values for that parameter. For
example, if you do not include the src parameter, the rule applies to all servers.
• The * character as a parameter value explicitly says that a rule applies to all values.
Output:
-*- 2 blades: 1_01 1_02 -*-
Resetting session rate entries
Session rate entries configured successfully
Output
-*- 2 blades: 1_01 1_02 -*-
Rule ID Source Destination DPort PR Limit Ongoing
------- ------------------ ------------------ ----- --- ----- -------
1 * 1.1.1.0/24 67 17 20 1
2 * 2.2.2.2/32 80 6 13 0
Output
1_01:
Rule ID Source Destination DPort PR Limit Drops Attempts
------- ------------------ ------------------ ----- --- ----- ------------- -------------
1 * 1.1.1.0/24 67 17 20 3 19
2 * 2.2.2.2/32 80 6 13 0 12
1_02:
Rule ID Source Destination DPort PR Limit Drops Attempts
------- ------------------ ------------------ ----- --- ----- ------------- -------------
1 * 1.1.1.0/24 67 17 20 0 19
61000/41000 Security System Administration Guide R76SP.30 | 238
System Optimization
2 * 2.2.2.2/32 80 6 13 2 13
The output shows the session control rules for each SGM and the connections dropped by each
rule.
Note - To safely use this feature, the security policy must be configured such that every
NAT rule uses a range object (of at least 24 addresses) as a translated source. See the
notes below.
Syntax
> asg_hide_behind_range [-v|-s|on|off]
Parameter Description
-v Make sure that the current policy does not contain hide NAT rules with a
translated source smaller than 24 addresses.
on Enable feature
Example
> asg_hide_behind_range on
Output
Configuration succeeded.
Note: In order to apply the changes all SGMs must be rebooted.
Important:
This feature will only affect NAT rules which have a range of at least 24 addresses
defined as the translated source.
Note: Manual NAT rules require local.arp configuration.
Notes
• Changes are applied after a reboot.
• Hide NAT behind range rules are manual NAT rules. For more information, see Proxy ARP for
Manual NAT ("Working with Proxy ARP for Manual NAT" on page 34).
• It is not guaranteed that a given source address is always translated to the same NAT address.
This is only a certainty if all connections from the source address are handled by the same
SGM.
• Hide NAT rules with a translated source that are either a range smaller than 24 addresses, or
a single hide address, are not compatible with this feature. The above applies to implied rules
as well.
• If the security policy contains such rules, it is not guaranteed that each SGM hides traffic that
matches them behind an address different from all other SGMs. This can cause port conflicts.
For example, different connections can appear as one after NAT, both in terms of IP address
and source port.
Syntax
> asg_tmpl_special_svcs on|off
Parameter Description
on Acceleration is not disabled because of Traceroute rules
Example
> asg_tmpl_special_svcs on
• This feature requires a patch on the Management side. To get it, contact Check Point Support.
• For this feature to work correctly, the Traceroute service object in SmartDashboard must
remain with default settings and not customized.
• RSA+3DES
You must update the list of supported SSL ciphers on the protected HTTPS servers.
General (1) 3
LACP (2) 4
CH Monitor (3) 5
Chassis ID: 2
-------------
Task (Task ID) SGM ID
During the installation, each SGM sends and receives policy status updates to/from the other
SGMs. This is because the SGMs must install their policies in a synchronized manner. Policy
installation has these stages:
• Policy Started - Policy installation started on the SGM.
• Policy Ready2Finish - Policy installation is completed, but the SGM is waiting for other SGMs
to reach the same stage.
• Policy Completed - The policy is synchronized with the other SGMs.
• Enforcing Security - The SGM enforces the new policy.
Note - When installing the 61000/41000 Security System, SGMs enforce an initial policy
where only the implied rules necessary for management are enforced.
To uninstall a policy:
Open a serial connection to the 61000/41000 Security System and run:
> asg policy unload
Notes:
• You cannot uninstall policies with SmartDashboard.
• To learn more about the working with policies, see asg policy ("Working with Policies (asg
policy)" on page 243).
Action Description
verify Make sure that the correct policies are installed on all SGMs.
verify_amw Makes sure that the correct Anti-malware policies are installed on all SGMs.
Syntax
> asg policy -h
> asg policy verify|verify_mw [-vs <vs_ids>] [-a] [-vs] [-v]
> asg policy unload [--disable_pnotes] [-a]
> asg policy unload --ip_forward
Parameter Description
-h Show syntax and help information.
-vs <vs_ids> Shows verification results for each Virtual System. <vs_ids> can be:
• No <vs_ids> (default) - Shows the current Virtual System context.
• One Virtual System.
• A comma-separated list of Virtual Systems (1, 2, 4, 5).
• A range of Virtual Systems (VS 3-5).
• all - Shows all Virtual Systems.
Parameter Description
-v Shows detailed verification results for SGMs in each Virtual System.
+------------------------------------------------------------------------------+
|Summary |
+------------------------------------------------------------------------------+
|Policy Verification completed successfully |
+------------------------------------------------------------------------------+
|2_2 |Success |
+---------------+---------------+
|2_1 |Success |
+---------------+---------------+
+------------------------------------------------------------------------------+
|Summary |
+------------------------------------------------------------------------------+
|Unload policy completed successfully |
+------------------------------------------------------------------------------+
Note - We recommended that you run this command over a serial connection.
Bit Conventions
BMAC
Bit range Description
1 Distinguishes between VMAC and other MAC address
This is used to prevent possible collisions with VMAC space.
Possible values:
• 0 - BMAC or SMAC
• 1 - VMAC
VMAC
Bit range Description
1 Distinguishes between VMAC and other MAC address
This is used to prevent possible collisions with VMAC space.
Possible values:
• 0 - BMAC or SMAC
• 1 - VMAC
SMAC
Bit range Description
1 Distinguishes between VMAC and other MAC address
This is used to prevent possible collisions with VMAC space.
Possible values:
• 0 - BMAC or SMAC
• 1 - VMAC
15 Always zero
16 Sync interface
Possible values:
• 0 - Sync1
• 1 - Sync2
Syntax
> asg_mac_resolver <mac_addr>
Example
> asg_mac_resolver 00:1C:7F:01:00:FE
Output
[00:1C:7F:01:00:FE, BMAC] [Chassis ID: 1] [SGM ID: 1] [Interface: BPEth0]
Notes
• The specified MAC Address comes from the BPEth0, on SGM 1 on Chassis 1.
• 00:1C:7F:01:00:FE is the Magic MAC attribute, which is identified by FE.
• The index is 16 bits (2 Bytes) identified by 01:00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16.
Syntax
> asg security_group
Example
> asg security_group
Output
+--------------------------------------+
| Security Group Utility |
+------------------------------------- +
+--------------------------------------+
| Chassis | Security Gateway Modules |
|--------------------------------------|
| 1 | 1,2,3 |
|--------------------------------------|
| 2 | 1,2,3 |
+--------------------------------------+
Notes
Select which SGMs must be added or removed from the security group. Note that:
61000/41000 Security System Administration Guide R76SP.30 | 249
61000/41000 Security System Concepts
• An SGM added to the security group automatically joins the Single Management Object of the
Security Gateway and then reboots
• Before you remove an SGM from the security gateway, make sure that its state is DOWN.
• To optimize connection distribution amongst the SGMs, keep the security group updated with
the actual number of SGMs in the appliance.
Important - Run asg security_group verify to make sure that the security group is
correctly configured.
Network Packets are assigned to an SGM based on the packet source. One SSM
General Packets are assigned to an SGM based on both the packet All SSMs in the
source and destination. 61000/41000
Security System
Per-Port Each SSM data interface is configured separately as User mode SSM data interface
or Network mode.
Note - The User and Network modes always work together and are known collectively as
the User/Network mode.
By default, the 61000/41000 Security System automatically configures the Distribution Mode. You
can manually assign the General mode as necessary. There can be some scenarios where you
must manually assign the General mode. The system does not automatically assign the General
mode, with these exceptions:
• For Security Gateway deployments, the General mode is automatically assigned if there is at
least one Bridge Mode interface.
• For VSX environments, the General mode is automatically assigned if there is at least one
Virtual System configured in the Bridge mode.
• VLAN
• Bond
• VLAN over Bond
These examples show how the distribution Mode can be automatically configured for each
interface.
Physical Interfaces
Physical Topology SSM Distribution Mode
Interface
eth1-01 Internal 1 User
eth1-02 Internal
eth2-02 External
In this example, all ports on each SSM are either Internal or External. The Distribution Mode for
the two SSMs is automatically configured as User or Network.
Physical interfaces
Interface Topology SSM Port Distribution Mode
eth1-01 Internal 1 1 User
On at least one of the SSMs, some ports are Internal and others are External. The Distribution
Mode for the SSMs is automatically configured as Per Port.
Three VLANs are defined on one SSM port. On at least one of the SSMs, some VLANs are Internal
and others are External. Therefore, the SSM Distribution Mode is automatically configured as
Per-Port.
Note - Automatic physical and VLAN interface configuration is not supported for the
SSM60. For an SSM60, the Distribution Mode of all the VLANs on each port must be the
same as the Distribution Mode of the port.
Because a Virtual Switch does not have topology, the Distribution Mode is calculated based on the
topologies of the WARP interfaces connected to the Virtual Systems, as shown. In this example,
the Distribution Mode is calculated as Network.
Bond interfaces
Interface Topology Slaves SSM Port Distribution Mode
eth2-01 2 1 User
eth2-02 2 2 Network
In this example, both interfaces on each Bond are configured with the same distribution mode.
Both bond interfaces are configured with one port for SSM1 and one port for SSM2. On both SSMs,
one port is Internal and the other is External. The SSM Distribution Mode is automatically
configured as Per-Port.
The automatic distribute mode configuration is based on the VLAN topology. In this example, both
interfaces on each VLAN are configured with the same distribution mode. Both Bond interfaces
are configured on port 1 for each SSM. The SSM Distribution Mode is automatically configured as
Per-Port.
Note - Automatic VLAN over Bond Interfaces configuration is not supported for the
SSM60. For an SSM60 the Distribution Mode of all the VLANs must be the same.
Note - We do not recommend that you manually change the Distribution mode of a Virtual
System. This can cause performance degradation.
Syntax
> set distribution configuration auto-topology|manual-general
> show distribution configuration
Note
When working with Virtual Systems, you must move to the applicable Virtual System context
before you can change the Distribution mode. To do this, run:
> set virtual-system <vs_ids>
Parameter Description
<vs_ids> Virtual System context
1_02:
configuration update completed successfully
1_03:
configuration update completed successfully
1_02:
manual-general
1_03:
manual-general
Syntax
> set distribution interface <if_name> configuration user|network|policy
> show distribution interface <if_name> configuration
Parameter Description
<if_name> Interface name as assigned by the operation system
Example
This example shows how to:
1. Manually change the Distribution Mode for interface eth1-01 from policy to network.
2. Change the Distribution Mode on interface eth1-01 from network to policy:
> set distribution interface eth1-01 configuration network
1_01:
configuration update completed successfully
1_02:
configuration update completed successfully
1_03:
configuration update completed successfully
1_02:
configuration update completed successfully
1_03:
configuration update completed successfully
Syntax
> show distribution status [verbose]
Parameter Description
verbose Shows a detailed report for all SGMs and SSMs
Example
> show distribution status verbose
Output
Topic: Configuration:
distribution mode user-network
policy mode on
ssm 1 mode user
ssm 2 mode network
ipv6 mode off
spi mode off
40g mode off
matrix size 2048
interface eth1-01 mode policy-internal
interface eth2-01 mode policy-external
Field Description
distribution mode Currently configured Distribution mode
Field Description
spi mode Shows if SPI affinity is enabled for this system (on/off)
40g mode Shows if QSFP ports are working at 40GbE (On) or at 4 x 10GbE
(Off)
Syntax
> show distribution verification [verbose]
Parameter Description
verbose Shows a detailed report for all SGMs and SSMs
Example
Note - This example shows only a small sample of the data. The checksums are truncated
to fit on the page.
> show distribution verification verbose
Test: Configuration Verification Result
chassis 1 blade 1 dxl-general-mode off off Passed
chassis 1 blade 1 dxl-md5sum 5be67561a... 5be675611... Passed
chassis 1 blade 1 dxl-size 2048 2048 Passed
chassis 1 blade 2 dxl-general-mode off off Passed
chassis 1 blade 2 dxl-md5sum 5be67561a... 5be675611... Passed
chassis 1 blade 2 dxl-size 2048 2048 Passed
chassis 1 blade 3 dxl-general-mode off off Passed
chassis 1 blade 3 dxl-md5sum 5be67561a... 5be675611... Passed
chassis 1 blade 3 dxl-size 2048 2048 Passed
chassis 1 ssm 1 ipv6-mode off off Passed
chassis 1 ssm 1 mask ipv4 general destination 0000001f 0000001f Passed
chassis 1 ssm 1 mask ipv4 general source 0000001f 0000001f Passed
chassis 1 ssm 1 mask ipv4 user-network destination 000007ff 000007ff Passed
chassis 1 ssm 1 mask ipv4 user-network source 000007ff 000007ff Passed
Summary:
verification passed successfully
Hybrid System
A 61000/41000 Security System Hybrid System is a deployment with SGMs that have different
quantities of physical CPU cores. In a Hybrid System, the total number of CoreXL and
Performance Pack instances that can run on one SGM is equal to the number of physical CPU
cores. All SGMs must have the same number of CoreXL instances. The number of Performance
Pack instances can be different.
Note - While it is possible to mix SGM220 and SGM260 units in the same environment, we
do not recommend this configuration.
1_03 20 10 10
61000/41000 Security System Administration Guide R76SP.30 | 257
61000/41000 Security System Concepts
Parameter Description
<num_instances> Number of CoreXL instances for all SGMs
Important Notes:
• There is always at least one CPU core configured as a CoreXL instance and one as a
Performance Pack instance.
• The maximum number of Performance Pack instances on an SGM is the lesser of Physical
cores -1 or 16.
• The maximum number of CoreXL instances on an SGM is Physical cores -1.
• If manual Performance Pack core configuration for one SGM causes an invalid configuration on
a different SGM, it automatically goes back to the default Performance Pack configuration.
• It is possible to have overlapping CoreXL and Performance Pack instances, where the number
of instances is greater than the number of physical cores. We do not recommend this
configuration.
• HTU (High Availability Time Unit) - Time interval, after which a chunk is sent.
• The chunk mechanism is iterating on the proxy ARP IPs, and each time sends GARPs only for
some of them until it completes the full list.
In each HA Time Unit (HTU=0.1s) - a chunk of the GARP list is sent.
When the iteration sends the full list, it waits N HTU and sends the list again.
Configuration:
In each HTU (=0.1 second) - a chunk of the GARP list is sent.
For example, to send 10 GARPs each second, set fwha_refresh_arps_chunk to: 1
# fw ctl set int fwha_refresh_arps_chunk 1
Whenever the iteration is finished sending GARPs for the entire list, it waits N HTU and re-sends
the GARPS again. The time between the iterations can be configured with:
fwha_periodic_send_garps_interval1 = (1 HTU) /* should not be changed, send
immediately after failover */
fwha_periodic_send_garps_interval2 = (10 HTU) /* 01 seconds */
fwha_periodic_send_garps_interval3 = (20 HTU) /* 02 seconds */
fwha_periodic_send_garps_interval4 = (50 HTU) /* 05 seconds */
fwha_periodic_send_garps_interval5 = (100 HTU) /* 10 seconds */
In the above (default) configuration, after the iteration sends the list:
• Wait 1 second and start send again.
• Wait 2 seconds and start send again.
• Wait 5 seconds and start send again.
• Wait 10 seconds and start send again.
Verification:
To manually send garp messages:
On the Chassis monitor blade, run:
> fw ctl set int test_arp_refresh 1
This causes garp messages to be sent (same as was failover).
Debug:
> fw ctl zdebug -m cluster + ch_conf | grep fw_refresh_arp_proxy_on_failover
192.168.1.131 192.168.1.130
192.168.1.2 192.168.1.3
192.168.1.3 192.168.1.2
2. Run:
> /etc/summary
This command can take several minutes to run.
3. Run:
> cat /tmp/debug.log
> cat /etc/shmm.cfg
> clia fruinfo 20 0
> clia fruinfo 20 1
> clia fruinfo 20 2
> clia fruinfo 20 3
> clia fruinfo 20 4
> clia fruinfo 20 5
> clia fruinfo 20 6
> clia fruinfo 20 7
> clia fruinfo 20 8
> clia fruinfo 20 9
4. On the NG 61000 Security System, run:
> clia fruinfo 20 10
> clia fruinfo 20 11
> clia fruinfo 20 12
> clia fruinfo 20 13
> clia fruinfo 20 14
> clia fruinfo 20 15
> clia fruinfo 20 16
5. On the 61000/41000 Security System, run:
> clia fruinfo y 10
> clia fruinfo y 12
> clia fruinfo y 82
> clia fruinfo y 84
> clia fruinfo y 86
> clia fruinfo y 88
> clia fruinfo y 8a
> clia fruinfo y 8c
> clia fruinfo y 8e
> clia fruinfo y 90
> clia fruinfo y 92
> clia fruinfo y 94
> clia fruinfo y 96
> clia fruinfo y 98
> clia fruinfo y 9a
> clia fruinfo y 9c
The logs are stored in /tmp/debug.log on the CMM.
2 96 SGM2
3 92 SGM3
4 8e SGM4
5 8a SGM5
6 86 SGM6
7 82 SSM1
8 84 SSM2
9 88 SGM7
10 8c SGM8
11 90 SGM9
12 94 SGM10
13 98 SGM11
14 9c SGM12
8A SGM2
88 SGM3
86 SGM4
84 SSM2
clia alarm
Use this command to:
• Shows the current alarms on the CCM
• Reset the alarms
Syntax
> clia alarm [0]
Parameter Description
0 Reset the alarms
clia board
Use this command to make sure the boards are recognized.
Syntax
> clia board
clia boardreset
Use this command to reset a board.
Syntax
> clia boardreset <slot_num>
Parameter Description
<slot_num> Slot number of the board to reset
clia fru
Use this command to see information for an SGM or SSM.
Syntax
> clia fru <sgm_id>|<ssm_id>
Parameter Description
<sgm_id>|<ssm_id> ID of an SGM or SSM
clia help
Use this command to see a list of available commands.
Syntax
> clia help
clia reboot
Use this command to reboot the CMM.
The Chassis fails over to the standby CMM.
Syntax
> clia reboot
clia shelf pd
Use this command to see power consumption information for all boards.
Syntax
> clia shelf pd
clia sel
Use this command to retrieves event logs.
Syntax
> clia sel
i2c_test
Use this command to:
• Test the I2C connection
• See all devices connected to the CMM using I2C
Syntax
> i2c_test
SSM60 CLI
1. Connect to a serial port on the front panel of the SSM.
The SSM60 has two serial ports, one for the fabric switch (data ports) and one for the base
switch (management ports).
Note - Load balancing commands are run on the fabric switch only.
To Run:
View the current # show running-config
configuration
To Run:
Modify the group of SGMs # configure terminal
amongst which the load is (config)# load-balance mtx-bucket
distributed {<sgm_id1>,<sgm_id2>...}
(config)# load-balance apply
Note: The command does not work if you have an odd number of
SGMs in the group. For example, do not run:
#load-balance mtx-bucket 1,2,3
Run:
#load-balance mtx-bucket 1,2,3,1,2,3
SSM160 CLI
The SSM (Security Switch Module) is the networking module of the gateway. The SSM transmits
traffic to and from the SGM and performs the load distribution among the SGMs.
The SSM includes two modules:
• Fabric switch - includes the Data ports
• Base switch - includes the Management ports
Usually the SSM communicates with the SGM through SNMP. Sometimes you can need to connect
directly to the SSM.
Configuration
You can connect to the SSM CLI:
• With a serial console to the CLI port on the SSM front panel (baud rate 9600).
• From one of the SGMs with SSH.
You can get the SSM IPs in clish/gclish:
• show Chassis id 1|2|all module SSM{1|2} ip
• The password for the SSM is admin.
Because the full configuration is very long, we recommended that you specify the feature that you
are interested in. For example, run show running-config load-balance to see the Load
Balance configuration. Press tab to see a full list of the features.
To see detailed port information (speed, administrative state, link state, etc.):
Run:
# show port <port_id>
61000/41000 Security System Administration Guide R76SP.30 | 266
Advanced Hardware Configuration
Example
# show port 1/3/1 statistics
Output
===============================================================================
Port Statistics
===============================================================================
Input Output
-------------------------------------------------------------------------------
Unicast Packets 5003 7106
Multicast Packets 568409 1880
Broadcast Packets 122151 1972
Flow Control 0 0
Discards 16 0
Errors 0 0
-------------------------------------------------------------------------------
-
Total 695563 10958
===============================================================================
===============================================================================
Ethernet Statistics in Packets
===============================================================================
RX CRC Errors 0 TX Collisions 0
RX Undersize 0
-------------------------------------------------------------------------------
Input Output
-------------------------------------------------------------------------------
Fragments 0 0
Oversize 0 0
Jabbers 0 0
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Packets Input and Output
-------------------------------------------------------------------------------
Octets 71085491
Packets 706521
Packets of 64 Octets 2290
Packets of 65 to 127 Octets 689951
Packets of 128 to 255 Octets 4122
Packets of 256 to 511 Octets 6009
Packets of 512 to 1023 Octets 258
Packets of 1024 to 1518 Octets 994
Packets of 1519 or more Octets 0
-------------------------------------------------------------------------------
-
Total 695563 10958
===============================================================================
===============================================================================
Rates in Bytes per Second
===============================================================================
Input Output
Rate for last 10 sec 1477 25
Rate for last 60 sec 1435 50
===============================================================================
Pay special intention to "Discards" and "Errors" fields which might show a problem if they
constantly increase.
61000/41000 Security System Administration Guide R76SP.30 | 267
Advanced Hardware Configuration
Note - You need to provide a full list of the SGMs when you use this command. Otherwise,
traffic might be dropped on the SSM.
Note - This procedure requires you to reload the SSM. It is recommended that you do one
SSM at a time.
ssh admin@ssm<ssm_id>
3. Enter admin password when prompted.
4. Run these commands:
# conf t
# system security user admin
# password
5. Enter the new password.
6. Run these commands:
# commit
# end
# logout
Notes
• This procedure should be done separately on each SSM in the system.
• This procedure does not cause any traffic interruption.
Example
# ssh ssm2
admin@ssm2's password:
BATM T-HUB4
admin connected from 198.51.100.215 using ssh on T-HUB4
T-HUB4#conf t
Entering configuration mode terminal
T-HUB4(config)#system security user admin
T-HUB4(config-user-admin)#password
(<MD5 digest string>): *****
T-HUB4(config-user-admin)#commit
Commit complete.
T-HUB4(config-user-admin)#end
T-HUB4#log
Connection to ssm2 closed.
Each port ID on the SGM maps to a port on the SSM. The table below maps SSM port IDs to SGM
port IDs.
Note - This table relates to SSM1. For SSM2 replace eth1-X with eth2-X.
SGM SSM
eth1-01 1/3/1
eth1-02 1/3/2
eth1-03 1/3/3
eth1-04 1/3/4
eth1-05 1/3/5
eth1-06 1/3/6
eth1-07 1/3/7
61000/41000 Security System Administration Guide R76SP.30 | 269
Advanced Hardware Configuration
SGM SSM
eth1-Sync 1/3/8
eth1-09 1/1/1
eth1-10 1/1/2
eth1-11 1/1/3
eth1-12 1/1/4
eth1-13 1/1/5
eth1-14 1/1/6
eth1-15 1/1/7
eth1-16 1/1/8
eth1-Mgmt1 1/5/1
eth1-Mgmt2 1/5/2
eth1-Mgmt3 1/5/3
eth1-Mgmt4 1/5/4
Verification
To make sure that you have connectivity to the SSMs from the SGMs, ping all the SSM modules
IPs.
You can also make sure that SNMP connectivity is available:
> asg_chassis_ctrl get_ssm_firmware all
Syntax
asg_ssm_amount <ssm_quantity>
Notes:
• You must run this command if you add or remove SSMs in your Chassis.
• Run this command in the Expert mode.
• Make sure that only SGM is turned on when you run this command.
Examples:
[expert@gw:0] # asg_ssm_amount 1
[expert@gw:0] # asg_ssm_amount 2
[expert@gw:0] # asg_ssm_amount 4
Syntax
# asg_detection [ -b <sgm_ids> ] [ -t <time> | off ]
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
-t off Stops LED flashes if they continue after the time in -t <time>
SGM260 LEDs
Item LED Status Description
SGM220 LEDs
Item LED Status Description
1 Out of Red SGM out of service
service
Off 10 Mbps
Off N/A
Syntax
> asg_swb_update_verifier [-v] [-b <sgm_ids> [-m <product>] [-n [-p <ip>:<port>]]
] [-u <product>]
Parameter Description
-v Verbose - Shows detailed output
Parameter Description
-n Force an update download from the internet
Use with -m.
-p <ip>:<port> Force an update download from the internet and use a specific
HTTP proxy. Use with -m.
• <ip> - IP of the HTTP proxy
• <port> - TCP port to use on the HTTP proxy
-u <product> Force a database update for a specific product
Valid values:
• all - All products on the SGM
• Anti-Bot
• Anti-Virus
• APPI
• URLF
Example
> asg_swb_update_verifier
Output
+------------------------------------------------------------------------------+
| product | sgm | status | DB version | next update check |
+------------------------------------------------------------------------------+
| APPI | 2_01 | failed | 14061202 | Thu Jun 12 10:32:55 2014 |
| APPI | 2_02 | failed | 14061202 | Thu Jun 12 10:32:41 2014 |
| Anti-Bot | 2_01 | up-to-date | 1405220911 | Thu Jun 12 09:28:34 2014 |
| Anti-Bot | 2_02 | up-to-date | 1405220911 | Thu Jun 12 09:28:45 2014 |
| Anti-Virus | 2_01 | up-to-date | 1406121233 | Thu Jun 12 09:28:12 2014 |
| Anti-Virus | 2_02 | new | 1406121234 | Thu Jun 12 09:28:10 2014 |
| URLF | 2_01 | not-installed | N/A | N/A |
| URLF | 2_02 | not-installed | N/A | N/A |
+------------------------------------------------------------------------------+
Report:
------------------------------ APPI --------------------------------------------
DB versions verification [ OK ]
statuses verification [ FAILED ]
sgm SGM ID
Field Description
DB version Product database version
next update check Date and time for the next automatic update
security Prefer security - Keep connections alive even if IPS inspections cannot be
guaranteed
Syntax
asg_ips_enhance [enable |disable] [status] [sync]
Parameter Description
enable Enable HyperSpect on all SGMs
status Show HyperSpect status and consistency for all Security Gateway Modules
sync Synchronize the HyperSpect configuration file across all Security Gateway
Modules
Examples
# asg_ips_enhance enable
Note - You can find the CMM configuration information on the label on the outside of the
CMM packaging box.
If your Chassis Type is not the same as the Chassis Type on the label on the outside
of the CMM packaging box:
Do this procedure on the Standby Chassis:
1. Put the Chassis in Standby state:
> asg chassis_admin -c <Chassis_id> down
2. Remove all CMMs from the Chassis.
3. Insert the replacement CMM into the Chassis.
4. Open a console connection to the CMM:
a) Connect one end of a serial cable to the serial port on the CMM front panel.
b) Connect the other end of the serial cable to a computer.
c) Open a console window. Use the default serial connection parameters: 9600, 8, N, 1.
5. Start the installation:
# install.sh
6. For the NG 61000 Security System, select the applicable Chassis type.
The menu can be different according to CMM firmware. This menu is displayed when firmware
2.74 is installed.
-----------------------------------------------------------------
| Select one of following options. |
| 1: Press 1 for 13U chassis (Telkoor PSU). |
| 2: Press 2 for 14U chassis (Telkoor PSU). |
| 3: Press 3 for 14U chassis (Lambda PSU). |
| Q: Press Q for to skipp. |
-----------------------------------------------------------------
• If the Chassis type is AC Telkoor PSU or a DC Chassis, enter: 2
• If the Chassis type is AC Lambda, enter: 3
7. Insert the second CMM.
8. For the 41000 Security System: When presented with the option to upgrade EEprom – select
option 1.
------------------------------------------------------
| EEprom upgrading |
| 1: Press 1 for EEProm upgrading. |
| 2. Press 2 to skip. |
------------------------------------------------------
9. Return the Chassis to the Standby state:
> asg chassis_admin –c <chassis_id> u
Validating Chassis ID
Make sure that the Chassis ID on the label on the outside of the CMM packaging box is the same
as the label on the Chassis. If the Standby Chassis ID is different from the RMA CMM Chassis ID,
change the RMA CMM Chassis ID. To learn how to change the Chassis ID, see Setting the Chassis
ID (on page 181).
Note - In Dual Chassis configuration, we recommended that you create a snapshot on the
Standby Chassis.
6. When creation process is done, export the snapshot to a tar file under /mnt/usb:
# set snapshot export <snapshot_name_without_.tar> path /mnt/usb
7. Monitor the export process progress:
> show snapshots
8. Un-mount /usb/mnt:
# umount /mnt/usb
9. Remove the USB drive from the SGM.
Example
> set global-mode off
> add snapshot rma_62 desc rma
Taking snapshot. You can continue working normally.
You can use the command ‘show snapshots’ to monitor creation progress,
> show sna
snapshot - show snapshot data
snapshots — list of local snapshots
> show snapshots
Restore points:
---------------
armdilo62_2
Restore point now under creation:
riua_62 (19%)
# blade 2_3
Moving to blade 2_3
This system is for authorized use only.
Last login: Wed Jun 20 08:43:28 2012 from test—chO2—03
CLINFRO771 This gclish instance cannot run “set” operations. To allow running “
set” operations, run “set config—lock omm Override”
> shell
# cd /mnt/usb
# ls
rzna_62.tar
> exit
Connection to 192.0.2.17 closed.
# umount /uint/usb
To learn how to mount a USB drive, see Mounting and Dismounting a USB Disk (on page 284).
3. Connect to the SGM using a console connection.
4. Import the snapshot file:
> set snapshot import <filename_without_.tar> path /mnt/usb/
5. Monitor the import progress:
> show snapshots
6. Dismount /mnt/usb and remove the removable disk:
# umount /mnt/usb
7. Revert the RMA to the snapshot image:
# set snapshot revert <snapshotname>
8. The revert procedure can take a long time and includes reboot. When the reboot starts,
continue to the next step.
Troubleshooting
In This Section:
Collecting System Information (asg_info) .................................................................286
Verifiers .......................................................................................................................290
Resetting SIC (g_cpconfig sic init) .............................................................................296
Troubleshooting Hardware ........................................................................................298
Debug files ..................................................................................................................305
Commands
The commands that are being run by asg_info are divided into three groups.
• System commands run on the SMO
• Commands run on only one SGM for each Chassis
• Commands that run on all SGMs
• VSX Mode only: Commands are divided into two groups:
• For each VS: Run on all vs range given by user
• Global: Run only on VS0 context
Files
asg_info collects specified files from all SGMs. Files are sent to specified folders. For example,
all core dump files are located under the folder core_dump. To indicate where data was collected
from, the SGM ID is added to file names.
For example:
File name format for files that are part of core_dump folder:
• global_1_02_coredump.gz
• global_2_03_coredump.gz
The first one was collected from SGM 2 in Chassis 1, and the second was collected from SGM 3 in
Chassis 2. No other files exist in the core_dump folder. That means that none of the other SGMs
have any information to send.
General
Information about core dumps created by the system can be found in core_dump_global.txt.
Syntax
> asg_info [-b <sgm_ids>] [-vs <vs_ids>] [-f] [-c] [-i] [-all] [-h] [-v]
Parameter Description
-b <sgm_ids> Works with SGMs and/or Chassis as specified by <sgm_ids>.
<sgm_ids> can be:
• No <sgm_ids> specified or all shows all SGMs and Chassis
• One SGM
• A comma-separated list of SGMs (1_1,1_4)
• A range of SGMs (1_1-1_4)
• One Chassis (Chassis1 or Chassis2)
• The active Chassis (chassis_active)
Example: asg_info -c
> asg_info -c
Collecting asg_info data to file
Starting processes in background : 100%
Note - This option collects relatively light-weight information. It can complete in a few
minutes.
Note - This command collects all available data. Its run time is relatively long and can
exceed 10 minutes.
Example 3: asg_info -c
This command collects core dumps from the SGM if available.
Verifiers
MAC Verification (mac_verifier)
Each MAC address contains information about the Chassis ID, SGM ID and interfaces. Use this
command to make sure that the virtual MACS on physical and bond interfaces are the same for all
SGMs on each Chassis. Run this command in Expert mode.
Syntax
# mac_verifier [-l] [-v]
# mac_verifier -h
Parameter Description
-l Shows MAC address consistency on the active Chassis
-h Help screen
Example
# mac_verifier
Starting mac address verification on local chassis... (Chassis 1)
No inconsistency found on local chassis
Syntax
> asg_br_verifier
> asg_br_verifier -v
Parameter Description
-v Verbose mode
Example
> asg_br_verifier
Output
================================================================================
-*- 10 blades: 1_01 1_02 1_03 1_04 1_05 2_01 2_02 2_03 2_04 2_05 -*-
11
Status: OK
================================================================================
Example
> asg_br_verifier -v
Output
================================================================================
-*- 9 blades: 1_01 1_03 1_04 1_05 2_01 2_02 2_03 2_04 2_05 -*-
11
-*- 1 blade: 1_02 -*-
0
================================================================================
61000/41000 Security System Administration Guide R76SP.30 | 291
Troubleshooting
Collecting table info from all SGMs. This may take a while.
-*- 9 blades: 1_01 1_03 1_04 1_05 2_01 2_02 2_03 2_04 2_05 -*-
address="00:00:00:00:00:00" Interface="eth1-07"
address="00:10:AA:7D:08:81" Interface="eth2-07"
address="00:1E:9B:56:08:81" Interface="eth1-07"
address="00:23:FA:4E:08:81" Interface="eth1-07"
address="00:49:DC:58:08:81" Interface="eth2-07"
address="00:7E:60:77:08:81" Interface="eth1-07"
address="00:80:EA:55:08:81" Interface="eth1-07"
address="00:8D:86:52:08:81" Interface="eth2-07"
address="00:9E:8C:7F:08:81" Interface="eth1-07"
address="00:E5:DB:78:08:81" Interface="eth2-07"
address="00:E5:F7:78:08:81" Interface="eth2-07"
-*- 1 blade: 1_02 -*-
fdb_shadow table is empty
Status: Table entries in fdb_shadow table is different between SGMs
================================================================================
Syntax
# asg_pingable_hosts --help
# asg_pingable_hosts status
# asg_pingable_hosts load_ips
# asg_pingable_hosts disable
# asg_pingable_hosts enable [-i <interval>] [-monitor]
Parameter Description
--help Show commands and syntax
-monitor Enable monitor only mode, which does not change the Chassis grade if
connectivity verification detects an error.
Notes:
• asg stat shows the Pingable Posts and verification results in the bottom row for each
Chassis.
> asg stat
--------------------------------------------------------------------------------
| System Status - 61000 |
--------------------------------------------------------------------------------
| Up time | 7 days, 01:56:22 hours |
--------------------------------------------------------------------------------
| Current CPUs load average | 4 % |
| Concurrent connections | 0 |
| Health | Pingable Hosts 1 Down |
--------------------------------------------------------------------------------
| Chassis 1 | ACTIVE UP / Required |
| | SGMs 3 / 3 |
| | Ports 0 / 0 |
| | Fans 4 / 4 |
| | SSMs 2 / 2 |
| | CMMs 2 / 2 |
| | Power Supplies 6 / 6 |
| | Pingable Hosts 1 / 1 |
--------------------------------------------------------------------------------
| Chassis 2 | ACTIVE UP / Required |
| | SGMs 3 / 3 |
| | Ports 0 / 0 |
| | Fans 4 / 4 |
| | SSMs 2 / 2 |
| | CMMs 2 / 2 |
| | Power Supplies 6 / 6 |
| | Pingable Hosts 0 / 1 (!) |
--------------------------------------------------------------------------------
• The UP/Required column shows the verification status, not the number of pingable hosts up or
required. The status means:
• 1 / 1 = OK
• 0 / 1 when one of the pingable hosts on the list fails to reply
• Port Connectivity log files are stored at /var/log/pingable_hosts
• The default Port Connectivity Verification value added to the Chassis Score is 50. To change
this value, run
> set chassis high-availability factors pnote pingable_hosts <factor>
Each line contains one port definition, which can include one interface and many host IP
addresses separated by commas. Do not put other data in this file.
3. Run:
# pingable_hosts load_ips
Example:
# pingable_hosts load_ips
Example:
# pingable_hosts enable
1_01:
1_02:
1_03:
No additional settings, using default values:
enable=1 interval=4 monitor=0
Syntax
> asg vsx_verify [-a|-c|-v]
Parameter Description
-a Include SGMs in the administrative DOWN state
Parameter Description
-c Compare these items:
• Database configuration between SGMs
• Operating system and database configuration on each SGM
-v Include Virtual Systems Configuration Verification table
Example
> asg vsx_verify –v
Output
+------------------------------------------------------------------------------+
|Chassis 1 SGMs: |
|1_01 1_02 1_03 |
+------------------------------------------------------------------------------+
+------------------------------------------------------------------------------+
|Chassis 2 SGMs: |
|2_01* 2_02 2_03 |
+------------------------------------------------------------------------------+
+-------------------------------------------------------------------+
|VSX Global Configuration Verification |
+------+---------------------------------+------------------+-------+
|SGM |VSX Configuration Signature |Virtual Systems |State |
| |VSX Configuration ID |Installed\Allowed | |
+------+---------------------------------+------------------+-------+
|all |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
+--------------------------------------------------------------------------+
|Virtual Systems Configuration Verification |
+----+-----+-----------+---------------+----------------+---------+--------+
|VS |SGM |VS Name |VS Type |Policy Name |SIC State|Status |
+----+-----+-----------+---------------+----------------+---------+--------+
|0 |all |VSX_OBJ |VSX Gateway |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|1 |all |VSW-INT |Virtual Switch |<Default Policy>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|2 |all |VSW-INT |Virtual Switch |<Not Applicable>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|3 |all |VS-1 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|4 |all |VS-2 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
Comparing Routes DB & OS. This procedure may take some time...
Press 'y' to skip this procedure...
Comparing..
+--------------------------------------------------------------------------+
|Summary |
+--------------------------------------------------------------------------+
|VSX Configuration Verification completed successfully |
+--------------------------------------------------------------------------+
Example
> asg vsx_verify -v -a
Output
+--------------------------------------------------------------------------+
|Chassis 1 SGMs: |
|1_01* 1_02 1_03 1_04 |
+--------------------------------------------------------------------------+
+--------------------------------------------------------------------------+
|Chassis 2 SGMs: |
|2_01 2_02 2_03 2_04 |
+--------------------------------------------------------------------------+
+-------------------------------------------------------------------+
|VSX Global Configuration Verification |
+------+---------------------------------+------------------+-------+
|SGM |VSX Configuration Signature |Virtual Systems |State |
| |VSX Configuration ID |Installed\Allowed | |
+------+---------------------------------+------------------+-------+
|1_01 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|1_02 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|1_03 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|1_04 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |DOWN |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_01 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_02 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_03 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
|2_04 |8ef02b3e73386afd6e044c78e466ea82 |5\25 |UP |
| |9 | | |
+------+---------------------------------+------------------+-------+
+--------------------------------------------------------------------------+
|Virtual Systems Configuration Verification |
+----+-----+-----------+---------------+----------------+---------+--------+
|VS |SGM |VS Name |VS Type |Policy Name |SIC State|Status |
+----+-----+-----------+---------------+----------------+---------+--------+
|0 |all |VSX_OBJ |VSX Gateway |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|1 |all |VSW-INT |Virtual Switch |<Default Policy>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|2 |all |VSW-INT |Virtual Switch |<Not Applicable>|Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|3 |all |VS-1 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
|4 |all |VS-2 |Virtual System |Standard |Trust |Success |
+----+-----+-----------+---------------+----------------+---------+--------+
Comparing Routes DB & OS. This procedure may take some time...
Press 'y' to skip this procedure...
Comparing..
+--------------------------------------------------------------------------+
|Summary |
+--------------------------------------------------------------------------+
|VSX Configuration Verification completed with the following errors: |
|1. [1_02:1] eth1-06 operating system address doesn't match |
|2. [1_02:1] eth1-06 DB address doesn't match |
|3. [1_01:1] Found inconsistency between addresses in operating system ,DB and NCS ofeth1-06 |
| |
+--------------------------------------------------------------------------+
All logs collected to /var/log/vsx_verify.1360886320.log
Important - This procedure causes downtime for the system and traffic outage because
all SGMs are rebooted.
4. Initialize SIC:
# g_cpconfig sic init
5. Revoke the VSID certificate defined in the management server.
See Part II of sk34098 http://supportcontent.checkpoint.com/solutions?id=sk34098 for the
detailed procedure.
6. In SmartDashboard, open and save the Virtual System object.
This pushes the configuration to the management server and re-establishes SIC trust with the
SMO.
7. Install a policy on the Virtual System.
SIC Cleanup
To resolve other SIC issues, do a SIC cleanup. There are two ways to do a SIC cleanup:
Run:
# asg_blade_config reset_sic -reboot_all <activation_key>
OR
1. Shutdown all SGMs (but not the SMO) using ccutil in Expert mode.
2. Shutdown all SGMs (but not the SMO) using ccutil in Expert mode.
3. Connect to the SMO using a serial console.
4. Initialize SIC in SmartDashboard > General Properties > Communication.
5. Install policy on the SMO.
6. Turn on all SGMs.
Troubleshooting Hardware
This section describes frequently seen problems encountered with 61000/41000 Security System
hardware components along with their corresponding resolutions.
Hardware components:
Problem There is no connectivity to the CMM through one of the CIN interfaces.
Cause The CMM interface is set to the front panel instead of the backplane.
Resolution:
1. Remove the CMM.
2. Change the JP4 jumpers' position to 2-3.
3. Connect the CMM.
Validation
1. Run:
Problem An SGM fails to start, and the SSD not detected at boot time.
Cause The SSD is not correctly assembled.
Resolution
1. Re-assemble SSD connectors.
2. Attach 1 connector to the SSD itself and the other 2 connectors to the motherboard.
Validation SGM starts to load.
Problem An SGM fails to boot and constantly searches for network installation (PXE).
Cause There is no image loaded on the SGM
Resolution
1. Install image from CD/PXE or USB flash drive.
2. Make sure BIOS setup is set to boot from the option you chose.
Validation SGM installs the new image.
Problem An SGM constantly boots after it was DOWN and major configuration changes were
made to the system.
Cause Old configuration conflicts with existing configuration.
Resolution
1. Export snapshots from both problematic and stable SGMs
2. Attach them to the support ticket.
3. Make sure the FCD image is aligned with existing SGMs.
Problem CPU type does not match customer's order. CPU type test fails in asg diag.
Cause You received the SGM220 instead of the SGM220T, or vice versa.
Resolution RMA the SGM
Validation N/A
Problem All SGMs after some time fail to boot. The blue LED lights up.
Cause Some power supply units are not connected. A minimum of 4 PSUs is required for a fully
populated system.
Resolution Make sure that all PSUs are correctly attached to the Chassis by pushing the
insertion latch. Make sure that all power cords are plugged in.
Validation All SGMs in the Chassis can start.
Problem asg dxl dist_mode verify failed and there are traffic issues on pseudo
interfaces.
Cause SSM distribution configuration is not set correctly.
Resolution
1. Reset the distribution mode.
2. Make sure the distribution mode is correct.
3. If the distribution mode is not correct, log in into the applicable SSM and run:
load-balance apply
4. If the distribution mode is still not correct, run:
system reload manufacturing-defaults
Validation Run: asg dxl dist_mode verify
Problem Silent installation on other SGMs does not work after the FTW finished.
Cause The SSM version is incorrect or has an invalid configuration.
Resolution
1. Log in to the appropriate SSM.
2. Make sure the version is correct:
show version
3. If the version is incorrect, upgrade the SSM.
4. If the version is correct, run: system reload manufacturing-defaults
Validation Make sure that the silent installation on other SGMs completes after 5-10 minutes.
Fans
Problem The blue LED on a fan is lit.
Cause The fan is not correctly assembled.
Resolution Extract and insert the fan again. Lock the captive screw (where applicable).
Validation Make sure the blue LED on the fan is turned off and all fans turn at correct speed.
Problem The fan turns too fast. The fans make a lot of noise.
Cause The temperature in the Chassis surroundings is high.
Resolution
• Make sure that all open slots (missing SGMs/CMMs/PSUs) are covered with blanks.
• Make sure that all fans are correctly attached.
• Make sure there the temperature is sufficiently cool around the Chassis.
Validation asg hw_monitor indicates that fans turn at the correct speed and the threshold is
not crossed.
Problem After Chassis RMA: Rightmost Chassis components (SGMs, PSUs) are not
monitored.
Cause The DC PEMs are missing.
Resolution Move the DC PEMs from the old to the new Chassis.
Validation Make sure that all Chassis components are monitored.
Debug files
These are the 61000/41000 Security System debug files:
FWK $FWDIR/log/fwk.elg.*
Policy $FWDIR/log/cpha_policy.log.*
Alerts /var/log/send_alert.*
Distribution $FWDIR/log/dist_mode.log.*
Installation – OS /var/log/anaconda
CPD $CPDIR/log/cpd.elg
FWD $FWDIR/log/fwd.elg
General /var/log/messages*
SMD /var/log/smd_smo.log
SMD /var/log/smd.log*
VPND $FWDIR/log/vpnd.elg*
Page 308
Logging CMM Diagnostic Information • 262 Native Usage • 87
long_running_procs • 137 neighbour_table_overflow • 142
Looking at the Audit Log File (asg_auditlog) • New or Replacement SGM Procedure Using
172 Snapshot • 284
M O
MAC Address Resolver (asg_mac_resolver) • Optimizing IPS (asg_ips_enhance) • 280
250 Optional Port Mirroring Configuration Steps •
MAC Addresses and Bit Conventions • 248 68
MAC tables • 20 Output State Acronyms • 111
MAC Verification (mac_verifier) • 292 Output with Performance Summary • 115
Management Port Speed Configuration • 38
Management Server • 10 P
Managing Connection Synchronization Packet • 10
(asg_sync_manager) • 188 Packet Drop Monitoring • 162
Managing the 61000/41000 Security System • 48 PEM • 10
Managing the Network • 14 Per Path Statistics • 117
Managing vsxmstat • 208 Performance Hogs - asg_perf_hogs • 135
Manual Distribution Configuration Permission Profile • 10
(Manual-General) • 254 Policy • 10
Memory Resources for Each Virtual Device • Policy Acceleration – SecureXL Keep
208 Connections • 219
Monitor Mode • 51 Port Connectivity Verification
Monitoring a Syn Attack - Standard Output • 154 (asg_pingable_hosts) • 294
Monitoring a SYN Attack - Verbose Output • 155 Port Mirroring (SPAN Port) • 66
Monitoring Chassis and Component Status (asg Power Supply Unit (PSU) • 306
monitor) • 111 Primary Multi-Domain Server • 10
Monitoring CPU Utilization (asg_cores_util) • Provisioning VSX • 204
150 PSU • 10
Monitoring Hardware Components (asg
hw_monitor) • 146 R
Monitoring Management Interfaces Link State • RADIUS Authentication • 71
105 Reconfigure (vsx_util reconfigure) • 207
Monitoring Performance (asg perf) • 113 Redirecting Alerts and Logs to External syslog
Monitoring Process Affinity (fw ctl affinity -l -x) server (asg_syslog) • 164
• 231 Removing Slave Interfaces • 199
Monitoring Service Traffic (asg profile) • 76 Replacing Hardware Components • 281
Monitoring SGM Resources (asg resource) • 124 Replacing the CMM • 281
Monitoring System Status • 163 Reserved Connections • 215
Monitoring the 61000/41000 Security System Reset SIC for non-VS0 Virtual Systems • 299
(asg_archive) • 78 Resetting SIC (g_cpconfig sic init) • 298
Monitoring the Network • 76 Resetting SIC on a Security Gateway or VSX
Monitoring Virtual Systems (cpha_vsx_util Gateway (VS0) • 299
monitor) • 177 Resetting the Administrator Password • 68
Monitoring VPN Tunnels • 102 Role Based Administration (RBA) • 71
Monitoring VSX Memory Resources • 207 routing_cache_entries • 141
Mounting and Dismounting a USB Disk • 286 Running a Verification Test (show distribution
Multi Domain Log Server • 10 verification) • 257
Multicast Acceleration • 42 Running all Diagnostic Tests • 134
Multicast Restrictions • 41 Running Specified Diagnostic Tests • 135
Multi-Domain Security Management • 10 Running Validation Tests • 234
Multi-Domain Server • 10
S
N
SCTP Acceleration • 223
NAT and the Correction Layer on a Security Searching for a Connection (asg search) • 125
Gateway • 258 Searching with Interactive Mode • 127
NAT and the Correction Layer on a VSX Gateway Searching with the Command Line • 125
• 258
Page 309
Secondary Multi-Domain Server • 10 Showing Syn Defender Status • 156
Security • 68 Showing System Messages (asg_varlog) • 176
Security Gateway • 10 Showing System Serial Numbers • 163
Security Gateway Module (SGM) • 302 Showing the 61000/41000 Security System
Security Gateway Modules • 273 Version (ver) • 170
Security Group (asg security_group) • 250 Showing the Number of Firewall and SecureXL
Security Management Server • 10 Connections (asg_conns) • 160
Security Monitoring • 151 Showing the Tests • 133
Security Switch Module (SSM) • 304 Showing Traffic Information (asg_ifconfig) • 86
Security Switch Module (SSM) CLI • 266 Showing Verbose Mode • 175
Security Switch Module LEDs • 277 SIC • 10
Selecting Virtual Systems Creation Templates • sim_debug_flags • 138
205 sim_param Examples • 55
Setting a Bond Interface On or Off • 199 Single Management Object and Policies • 243
Setting a Bonding Mode • 197 SmartDashboard • 11
Setting Admin DOWN on First Join • 192 SmartUpdate • 11
Setting Affinity for all Virtual Systems (fw ctl SMO • 11
affinity -s -d -fwkall) • 230 SMO Master • 11
Setting and Showing the Distribution SNMP • 11
Configuration • 254 SNMP Counter • 11
Setting Chassis Weights (chassis SNMP Trap • 11
high-availability factors) • 184 soft_lockups • 143
Setting Firewall Kernel Parameters (g_fw ctl Software Blades Support • 278
set) • 56 Software Blades Update Verification • 278
Setting Port Priority • 186 Special Advertisement Packets • 20
Setting Sim Kernel Parameters • 54 SPI Affinity (asg_spi_affinity) • 222
Setting the Chassis ID • 183 SPI Distribution on SSM160 (asg dxl spi) • 221
Setting the Failover Freeze Interval • 186 SSM • 11
Setting the Minimum Number of Slaves in a SSM160 • 235
Bond • 85 SSM160 CLI • 268
Setting the Polling interval • 198 SSM60 • 234, 235
Setting the Port Speed • 84 SSM60 CLI • 267
Setting the Quality Grade Differential • 185 SSM60 snmp-server configuration • 106
SGM • 10 SSM60 VLAN Legacy Support • 254
SGM Policy Management • 246 Standby Domain Management Server • 11
SGM220 LEDs • 276 Standby Multi-Domain Server • 11
SGM260 LEDs • 274 Summary without Parameters • 115
SGMs and SGM Interfaces (asg_jumbo_conf Supported SSL Ciphers • 241
show) • 235 swap_saturation • 141
show interface • 59 SYN Defender (sim synatk, sim6 synatk, asg
Showing a List of Two SGMs • 175 synatk) • 151
Showing Bond Interfaces (asg_bond) • 84 SYN Defender Configuration File • 153
Showing Chassis and Component States (asg Sync Lost • 203
stat) • 107 Sync Rule Options • 189
Showing Distribution Status • 256 Synchronizing Clusters on a Wide Area Network
Showing History and Peak Value Files • 118 • 183
Showing IGMP Information (asg_igmp) • 100 Synchronizing Policy and Configuration between
Showing Multicast Information • 97 SGMs • 246
Showing Multicast Routing - asg_mroute • 97 Synchronizing SGM Time (asg_ntp_sync_config)
Showing Peak Values • 118 • 60
Showing PIM Information - (asg_pim) • 98 Syntax • 237
Showing Session Control Statistics • 239 Syntax Notation • 13
Showing SGM Forwarding Statistics System Optimization • 215
(asg_blade_stats) • 104 System Under Load • 232
Showing Software and Firmware versions
(asg_version) • 174 T
Showing SSM Traffic Statistics TCP MSS Adjustment • 236
(asg_traffic_stats) • 103 templates_disabled_from_rule • 139
Page 310
Traceroute (asg_tracert) • 105 Working with Active/Standby High Availability •
Traffic • 11 182
Troubleshooting • 288 Working with Alert Thresholds • 119
Troubleshooting Failures • 143 Working with Bridge Mode • 20
Troubleshooting Hardware • 300 Working with Chassis High Availability in Bridge
Troubleshooting SIC reset • 300 Mode • 20
Troubleshooting SIC Trust Initialization Working with ECMP • 29
Problems • 205 Working with Global Commands • 48
Working with Interactive Mode • 79
U Working with Interface Status (asg if) • 80
Understanding the Configuration File List • 246 Working with IPv6 • 14
Unique MAC Identifier Utility Options • 27 Working with Jumbo Frames • 233
Update Configuration Files (update_conf_file) • Working with Link Aggregation (Interface
53 Bonds) • 195
Using an SGM Filter • 90 Working with Link Preemption • 187
Using Debug Mode • 210 Working with Link State Propagation • 24
Using the Advanced Filters • 93 Working with LTE Features • 212
Using the Analyze Option • 88 Working with Management Aggregation • 201
Using the SSM60 in Bridge Mode • 21 Working with Pingable Hosts • 295
Using the Summary Option (--summary) • 91 Working with Policies (asg policy) • 244
Using Third Party VPN Peers with Many Working with Proxy ARP for Manual NAT • 35
External Interfaces • 223 Working with Routing Tables (asg_route) • 89
Working with Session Control
V (asg_session_control) • 237
Verbose mode • 82 Working with SNMP • 178
Verbose Mode Output • 34 Working with Sync Bonds • 202
Verification Test • 85 Working with Sync Rules • 189
Verifiers • 292 Working with SyncXL • 191
Verifying MAC Addresses • 34 Working with the ABXOR Bonds • 199
Verifying the New MAC Address • 27 Working with the ARP Table (asg_arp) • 33
Verifying VSX Gateway Configuration (asg Working with the Distribution Mode • 251
vsx_verify) • 296 Working with the Firewall Database
Viewing a Log File (asg log) • 171 Configuration (asg config) • 174
Virtual Device • 11 Working with the GARP Chunk Mechanism •
Virtual Network Device Configuration • 206 260
Virtual Switch • 11 Working with VSX • 204
Virtual System • 11, 207
Virtual System Context • 11
Virtual System Memory Summary with
Performance Summary • 116
VLAN • 11
VLAN Trunk • 11
VPN • 11
VPN Packet Tracking (bcstats) • 101
VPN Performance Enhancements • 221
VPN Sticky SA • 213
VPN Templates • 223
VSX • 12
VSX Affinity Commands (fw ctl affinity -s -d) •
229
VSX Gateway • 12
VSX Gateway Management • 206
VSX Layer 2 Active/Active Mode • 194
VSX Legacy Bridge Mode • 211
W
Warp Link • 12
Page 311