CP R80.40 Gaia AdminGuide
CP R80.40 Gaia AdminGuide
GAIA
R80.40
Administration Guide
Check Point Copyright Notice
© 2020 - 2024 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No
part of this product or related documentation may be reproduced in any form or by any means
without prior written authorization of Check Point. While every precaution has been taken in
the preparation of this book, Check Point assumes no responsibility for errors or omissions.
This publication and features described herein are subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party
licenses.
Important Information
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-
date with the latest functional improvements, stability fixes, security
enhancements and protection against new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check
Point Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
28 October Updated:
2024
n "Hardware Diagnostics" on page 461 - removed the Expert mode
command "diagMain" because it is not supported.
30 April Updated:
2024
n "Introduction to the Gaia Portal" on page 19
17 April Updated:
2024
n "Configuring Cloning Groups in Gaia Portal" on page 216
13 March Updated:
2024
n "Configuring SNMP in Gaia Clish" on page 246
n "Configuring SNMP in Gaia Portal" on page 236
20 June Updated:
2023
n "Authentication Servers" on page 374
16 April Updated:
2023
n "Configuring System Logging in Gaia Clish" on page 290
n "Configuring System Logging in Gaia Portal" on page 286
10 April Updated:
2023
n "Advanced Gaia Configuration" on page 485
Date Description
03 April Updated:
2023
n "Restoring a Factory Default Image on Check Point Appliance" on
page 453
27 March Updated:
2023
n "Configuring Cloning Groups in Gaia Portal" on page 216
30 January Updated:
2023
n "Backing Up and Restoring the System" on page 467
n "Configuring Scheduled Backups" on page 477
n "Proxy" on page 204
18 January Updated:
2023
n "Backing Up and Restoring the System" on page 467
n "Configuring Scheduled Backups" on page 477
12 January Updated:
2023
n "Working with Snapshot Management in Gaia Portal" on page 447
n "Working with Snapshot Management in Gaia Clish" on page 450
n "System Backup" on page 466
n "Backing Up and Restoring the System" on page 467
08 January Updated:
2023
n "Configuring Gaia as a TACACS+ Client" on page 391
14 Updated:
November
2022
n "Download SmartConsole" on page 454
Date Description
11 August Updated:
2022
n "Expert Mode" on page 49
n "Configuring Bond Interfaces in Gaia Clish" on page 113
n "Configuring Job Scheduler in Gaia Portal" on page 259
n "Configuring Job Scheduler in Gaia Clish" on page 262
n "Snapshot Prerequisites" on page 446
n "Working with Snapshot Management in Gaia Portal" on page 447
n "Working with Snapshot Management in Gaia Clish" on page 450
n Improved the term from "slave interface(s)" to "subordinate interface
(s)"
Added:
n "Running Check Point Commands in Shell Scripts" on page 491
28 Updated:
December
2021
n "Running the First Time Configuration Wizard in CLI Expert mode" on
page 69
n "Configuring SNMP in Gaia Portal" on page 236
21 Updated:
November
2021
n "Managing User Accounts in Gaia Clish" on page 311
17 October Updated
2021
n "Configuring ARP in Gaia Clish" on page 156
n "Configuring ARP in Gaia Portal" on page 153
23 June Updated:
2021
n "Working with System Configuration in Gaia Clish" on page 483
Date Description
20 October Updated:
2020
n "Configuring Bond Interfaces in Gaia Portal" on page 110
n "Configuring Bond Interfaces in Gaia Clish" on page 113
n "NetFlow Export" on page 196
21 August Updated:
2020
n "Redirecting RouteD System Logging Messages" on page 295
Table of Contents
Gaia Overview 18
Introduction to the Gaia Portal 19
Gaia Portal Overview 19
Working with the Configuration Lock 23
Using the Gaia Portal Interface Elements 24
Toolbar Accessories 24
Search Tool 24
Navigation Tree 24
Status Bar 25
Configuration Tab 25
Monitoring Tab 25
Unsupported Characters and Words 26
System Information Overview 27
Showing System Overview Information in Gaia Portal 27
Showing System Overview Information in Gaia Clish 29
Getting Started 31
Introduction to the Command Line Interface 32
Syntax Legend 33
Command Completion 35
Commands and Features 37
Command History 39
Command Line Movement and Editing 41
Configuration Locks 42
Environment Commands 44
Client Environment Output Format 47
Expert Mode 49
User Defined (Extended) Commands 52
Gaia Overview
Gaia is the Check Point next generation operating system for security applications. In Greek
mythology, Gaia is the mother of all, which represents closely integrated parts to form one
efficient system. The Gaia Operating System supports the full portfolio of Check Point
Software Blades, Gateway and Security Management products.
Gaia is a unified security Operating System that combines the best of Check Point original
operating systems, and IPSO, the operating system from appliance security products. Gaia is
available for all Check Point Security Appliances and Open Servers.
Designed from the ground up for modern high-end deployments, Gaia includes support for:
n IPv4 and IPv6 - fully integrated into the Operating System.
n High Connection and Virtual Systems Capacity - 64-bit Linux kernel support.
n Load Sharing - ClusterXL and Interface bonding.
n High Availability - ClusterXL, VRRP, Interface bonding.
n Dynamic and Multicast Routing - BGP, OSPF, RIP, and PIM-SM, PIM-DM, IGMP.
n Easy to use Command Line Interface - Commands are structured with the same
syntactic rules. An enhanced help system and auto-completion simplifies user operation.
n Role-Based Administration - Lets Gaia administrators create different roles.
Administrators can let users define access to features in the users' role definitions. Each
role can include a combination of administrative (read/write) access to some features,
monitoring (read-only) access to other features, and no access to other features.
Gaia CPUSE:
n Get updates for licensed Check Point products directly through the operating system.
n Download and install the updates more quickly. Download automatically, manually, or
periodically. Install manually or periodically.
n Get email notifications for newly available updates and for downloads and installations.
n Easy rollback from new update.
Gaia API:
See sk143612 and Check Point Gaia API Reference.
n Browser Support - Microsoft Edge, Microsoft Internet Explorer, Mozilla Firefox, Google
Chrome, and Apple Safari.
n Powerful Search Engine - Makes it easy to find features or functionality to configure.
n Easy Operation - Two operating modes:
l Simplified mode, which shows only basic configuration options.
l Advanced mode, which shows all configuration options.
You can easily change these modes.
n Web-Based Access to Command Line - Clientless access to the Gaia Clish directly from
your web browser.
Item Description
1 Navigation tree
2 Toolbar
3 Status bar
5 Search tool
Note - The browser Back button is not supported. Do not use it.
Step Instructions
Important:
n When you enable the Endpoint Policy Management Software Blade on a Security
Management Server, the SSL connection port to these services automatically
changes from the default TCP port 443 to the TCP port 4434:
l Gaia Portal
n When you disable the Endpoint Policy Management Software Blade on a Security
Management Server, the SSL connection port automatically changes back to the
default TCP port 443.
Make sure that you always log out from the Gaia Portal (in the top right corner) before you
close the web browser. This is because the configuration lock stays in effect even when you
close the web browser or terminal window. The lock remains in effect until a different user
removes the lock, or the defined inactivity time-out period expires (default is 10 minutes).
n
Click the Configuration lock (above the toolbar). The pencil icon (Read/Write
enabled) replaces the lock.
n If you use a configuration settings page, click the Click here to obtain lock link. You
can see this link if a different user overrides your configuration lock.
Note - Only users with Read/Write access privileges can override a configuration lock.
Toolbar Accessories
You can use these toolbar icons to do these tasks
Item Description
Opens the Scratch Pad accessory for writing notes or for quick copy and paste
operations.
Available in the Read/Write mode only.
Search Tool
You can use the search bar to find an applicable configuration page by entering a keyword.
The keyword can be a feature, a configuration parameter or a word that is related to a
configuration page.
The search shows a list of pages related to the entered keyword. To go to a page, click a link in
the list.
Navigation Tree
The navigation three lets you select a page. Pages are arranged in logical feature groups. You
can show the navigation tree in one of these view modes:
Mode Description
To change the navigation tree mode, click View Mode and select a mode from the list.
Status Bar
The status bar, located at the bottom of the window, shows the result of the last configuration
operation.
To see a history of the configuration operations during the current session, click the Expand
icon.
Configuration Tab
The Configuration tab lets you see and configure parameters for Gaia features and settings
groups. The parameters are organized into functional settings groups in the navigation tree.
You must have Read/Write permissions for a settings group to configure its parameters.
Monitoring Tab
The Monitoring tab lets you see status and detailed operational statistics, in real time, for
some routing and high availability settings groups. This information is useful for monitoring
dynamic routing and VRRP cluster performance.
To see the Monitoring tab, select a routing or high availability feature settings group and then
click the Monitoring tab. For some settings groups, you can select different types of
information from a menu.
Character Description
& Ampersand
; Semi-colon
Unsupported Words
n after
n apply
n catch
n eval
n subset
Note - Gaia Portal does not support Content Security Policy (CSP).
This chapter shows you how to see system information in the Gaia Portal and Gaia Clish.
Widget Description
Widget Description
Step Instructions
Step Instructions
Description
Shows how long the Gaia system is up and running.
Syntax
show uptime
Description
Shows the name and versions of the Gaia OS components.
Syntax
n To show the full system version information:
show version os
build
edition
kernel
Parameters
Parameter Description
Getting Started
1. Install the Gaia OS.
See the R80.40 Installation and Upgrade Guide.
2. Run the Gaia First Time Configuration Wizard.
See "Configuring Gaia for the First Time" on page 56.
3. Configure the required interfaces:
A. Enable the required physical interfaces and assign the required IP addresses.
See "Physical Interfaces" on page 90.
B. Configure the required special interfaces (Bond, VLAN, Bridge, and so on).
See "Network Interfaces" on page 89.
4. Configure the required DNS settings.
See "Hosts and DNS" on page 168.
5. Configure the required IPv4 and IPv6 static routes.
See:
n "IPv4 Static Routes" on page 177
n "IPv6 Static Routes" on page 188
6. Configure the required Proxy Server.
See "Proxy" on page 204.
Step Instructions
When you change the OS configuration with in Gaia Clish, changes are applied immediately
to the running system only.
To have the changes survive a reboot, you must run this command:
save config
Syntax Legend
Whenever possible, this guide lists commands, parameters and options in the alphabetical
order.
This guide uses this convention in the Command Line Interface (CLI) syntax:
Character Description
Character Description
Square brackets or Enclose an optional command or parameter, which user can also
brackets enter.
[]
Command Completion
You can automatically complete a command.
This saves time, and can help if you are not sure what to type next.
<SPACE><TAB> Show the arguments that the command for that feature accepts.
Example:
HostName> set interface<SPACE><TAB>
eth0 eth1 lo
HostName> set interface
Other
Description
operations
save Saves the configuration changes made since the last save operation.
start Starts a transaction. Puts the Gaia Clish into transaction mode. All changes
made using commands in transaction mode are either applied at once, or
none of the changes is applied, based on the way transaction mode is
terminated.
expert Enters the Expert shell. Allows low-level access to the system, including
the file system.
Other
Description
operations
help Shows help on navigating the Gaia Clish and some useful commands.
show commands
Command History
You can recall commands you have used before, even in previous sessions.
Command Description
!str Run the most recent command that starts with str.
Command Reuse
You can combine word designators with history commands to refer to specific words used in
previous commands.
Words are numbered from the beginning of the line with the first word being denoted by 0 (digit
zero).
Use a colon (:) to separate a history command from a word designator.
For example, you could enter !!:1 to refer to the first argument in the previous command.
In the command "show interfaces", the interfaces is word 1.
Immediately after word designators, you can add a sequence of one or more of these
modifiers, each preceded by a colon:
Modifier Meaning
s/str1/str2 Replace str1 with str2 in the first occurrence of the word, to which
you refer.
Keystroke
Meaning
combination
Ctrl Alt H Delete the previous word (to the left of the cursor).
Ctrl Shift - Repeat the previous word (from the left of the cursor).
Ctrl B Move to the previous character (to the right of the cursor).
Ctrl F Move to the next character (to the right of the cursor).
Ctrl H Delete the previous character (to the left of the cursor).
Ctrl L Clear the screen and show the current line at the top of the
screen.
Configuration Locks
Only one user can have Read/Write access to Gaia configuration database at a time. All other
users can log in with Read-Only access to see configuration settings, as specified by their
assigned roles (see "Roles" on page 316).
When you log in and no other user has Read/Write access, you get an exclusive configuration
lock with Read/Write access. If a different user already has the configuration lock, you have
the option to override their lock. If you:
n Override the lock. The other user stays logged in with Read-Only access.
n Do not override the lock. You cannot modify the settings.
The "lock database" and "lock database" commands
Description
Use the "lock database override" and "unlock database" commands to get
exclusive read-write access to the Gaia database by taking write privileges away from other
administrators logged into the system.
Syntax
Comments
n Use these commands with caution.
The administrator, whose write access is revoked, does not receive a notification.
n The "lock database override" command is identical to the "set config-
lock on override" command.
n The "unlock database" command is identical to the "set config-lock off"
command.
Description
Configures and shows the state of the configuration lock on Gaia configuration database.
Syntax
set config-lock
off
on [timeout <5-900>] override
show
config-lock
config-state
Parameters
Parameter Description
Comments
n The "set config-lock on override" command is identical to the "lock
database override" command.
n The "set config-lock off" command is identical to the "unlock database"
command.
Environment Commands
Description
Use these commands to set the Gaia Clish environment for a user for a particular session, or
permanently.
Syntax
To show the client environment
show clienv
all
config-lock
debug
echo-cmd
on-failure
output
prompt
rows
syntax-check
save clienv
Parameters
Parameter Description
echo-cmd {on | If set to on, echoes all commands before executing them, when
off} the command execution is done through the "load
configuration" command.
The default is off.
Parameter Description
Structured
XML
Expert Mode
The default Gaia shell is called clish.
Gaia Clish is a restrictive shell (role-based administration controls the number of commands
available in the shell).
While the use of Gaia Clish is encouraged for security reasons, Gaia Clish does not give
access to low level system functions.
For low-level configuration, use the more permissive Expert mode shell. In addition, see
sk144112.
n To enter the Expert shell, run: expert
n To exit from the Expert shell and return to Gaia Clish, run: exit
Description
The Expert mode password protects the Expert shell against unapproved access.
Use these commands to set the Expert password by plain text or MD5 salted hash.
Use the MD5 salted hash option when upgrading or restoring using backup scripts.
set expert-password
Parameters
Parameter Description
hash <Hash The password as an MD5, SHA256, or SHA512 salted hash instead of plain
String> text (the password string must contain at least 6 characters).
Use this option when you upgrade or restore using backup scripts.
You can generate the hash of the password with the "cpopenssl"
command (run: cpopenssl passwd -help).
To configure the default hash algorithm, see:
n "Password Hashing Algorithm" on page 359 (in Gaia Portal)
n "Configuring Hashing Algorithm" on page 368 (in Gaia Clish)
Notes:
n Format:
$<Hash Standard>$<Salt>$<Encrypted>
n The length of this hash string must be less than 128 characters.
n <Hash Standard>
One of these digits:
l 1 = MD5
l 5 = SHA256
l 6 = SHA512
n <Salt>
A string of these characters:
a-z A-Z 0-9 . / [ ] _ ` ^
The length of this string must be between 2 and 16 characters.
n <Encrypted>
A string of these characters:
a-z A-Z 0-9 . / [ ] _ ` ^
The length of this string must be:
l For MD5, less than 22 characters.
Example
gaia> set expert-password
Enter current expert password: *******
Enter new expert password: *****
Enter new expert password (again): *****
Password is only 5 characters long; it must be at least 6
characters in length.
Enter new expert password: ******
Enter new expert password (again): ******
Password is not complex enough; try mixing more different kinds
of characters (upper case, lower case, digits, and punctuation).
Enter new expert password: *******
Enter new expert password (again): *******
Parameters
Parameter Description
To add the free command to the systemDiagnosis role and assign that role to the user john:
Step Instructions
Step Instructions
Step Instructions
3 Type:
show
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Instructions
3 Type:
add
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Instructions
3 Type:
set
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Instructions
3 Type:
delete
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Instructions
2 On your connected computer, configure a static IPv4 address in the same subnet
as the IPv4 address you configured during the Gaia installation.
3 On your connected computer, in a web browser, connect to the IPv4 address you
configured during the Gaia installation:
https://<IP address of Gaia Management Interface>
5 Click Login.
The Check Point First Time Configuration Wizard opens.
Below you can find the description of the First Time Configuration Wizard windows and their
fields.
Setup Continue with R80.40 Use this option to configure the installed Gaia
configuration and Check Point products.
Install Install from Check Use these options to install a Gaia version.
Point Cloud
Install from USB
device
If in the Deployment Options window, you selected Install from Check Point Cloud, the
First Time Configuration Wizard asks you to configure the connection to Check Point Cloud.
These options appear (applies only to Check Point appliances that you configured as a
Security Gateway):
n Install major version - This option let you choose and install major versions available
on Check Point Cloud. The Gaia CPUSE performs the installation.
n Pull appliance configuration - This option applies the initial deployment configuration
that includes different OS version on the appliance. You must prepare the initial
deployment configuration with the Zero Touch Cloud Service. For more information,
see sk116375.
In this window, you select and configure the main Gaia Management Interface. You connect
to this IP address to open the Gaia Portal or CLI session.
Field Description
Interface By default, First Time Configuration Wizard selects the interface you
configured during the Gaia installation (for example, eth0).
Note - After you complete the First Time Configuration Wizard and
reboot, you can select another interface as the main Gaia
Management Interface and configure its IP settings.
Configure Select how the Gaia Management Interface gets its IPv4 address:
IPv4
n Manually - You configure the IPv4 settings in the next fields.
n Off - None.
Configure Select how the Gaia Management Interface gets its IPv6 address:
IPv6
n Manually - You configure the IPv6 settings in the next fields.
n Off - None.
Optional: In this window, you configure the interface that connects the Gaia computer to the
Internet.
Configure IPv4 Select how the applicable interface gets its IPv4 address:
n Manually - You configure the IPv4 settings in the next fields.
n Off - None.
Configure IPv6 Optional. Select how the applicable interface gets its IPv6 address:
n Manually - You configure the IPv6 settings in the next fields.
n Off - None.
In this window, you configure the Host name, the DNS servers and the Proxy server on the
Gaia computer.
Field Description
Primary DNS Enter the applicable IPv4 address of the primary DNS server.
Server
Secondary DNS Optional: Enter the applicable IPv4 address of the secondary
Server DNS server.
Tertiary DNS Optional: Enter the applicable IPv4 address of the tertiary DNS
Server server.
Use a Proxy server Optional: Select this option to configure the applicable Proxy
server.
In this window, you configure the date and time settings on the Gaia computer.
Field Description
Set the time manually Select this option to configure the date and time settings
manually.
Use Network Time Select this option to configure the date and time settings
Protocol (NTP) automatically with NTP.
Primary NTP server Enter the applicable IPv4 address or resolvable hostname of
the primary NTP server.
Version Select the version of the NTP for the primary NTP server.
Version Select the version of the NTP for the secondary NTP server.
In this window, you select which type of Check Point products you wish to install on the Gaia
computer.
Field Description
Products window
In this window, you continue to select which type of Check Point products you wish to install
on the Gaia computer.
n If in the Installation Type window, you selected Security Gateway and/or Security
Management, these options appear:
Field Description
l A Cluster Member.
l A Standalone.
Field Description
l CloudGuard Controller.
l A Standalone.
l CloudGuard Controller.
High Availability.
Select Log Server / SmartEvent only to install:
l A dedicated single Log Server.
n If in the Installation Type window, you selected Multi-Domain Server, these options
appear:
Field Description
Field Description
In this window, you select if this Security Gateway gets its IP address dynamically (DAIP
gateway).
Field Description
Yes Select this option, if this Security Gateway gets its IP address dynamically
(DAIP gateway).
No Select this option, if you wish to configure this Security Gateway with a static
IP address.
In this window, you configure a one-time Activation Key. You must enter this key later in
SmartConsole when you create the corresponding object and initialize SIC.
Field Description
Activation Key Enter one-time activation key (between 4 and 127 characters
long).
In this window, you configure the main administrator for this Security Management Server.
Use Gaia Select this option, if you wish to use the default Gaia
administrator: admin administrator (admin).
In this window, you configure which computers are allowed to connect with SmartConsole to
this Security Management Server.
Field Description
This machine Select this option to allow only a specific computer to connect.
By default, the First Time Configuration Wizard uses the IPv4
address of your computer.
You can change it to another IP address.
Range of IPv4 Select this option to allow a specific range of IPv4 addresses to
addresses connect.
Enter the applicable start and end IPv4 addresses.
In this window, you select the main Leading VIP Interface on this Multi-Domain Server.
Field Description
In this window, you configure which computers are allowed to connect with SmartConsole to
this Multi-Domain Server.
Field Description
In this window, you can see the installation options you selected.
The Improve product experience section:
n By default, the option Send data to Check Point is enabled. For information about this
option, see sk111080.
n By default, the option Send crash data to Check Point that might contain personal
data is disabled.
If you enable this option, Gaia operating system uploads the detected core dump files
to Check Point Cloud.
Check Point R&D can analyze the crashes and issue fixes for them.
Notes:
n At the end of the First Time Configuration Wizard, the Gaia computer reboots and the
initialization process is performed in the background for several minutes.
n If you installed the Gaia computer as a Security Management Server or Multi-Domain
Server, only read-only access is possible with SmartConsole during this initialization
time.
n To make sure the configuration is finished:
1. Connect to the command line on the Gaia computer.
Run:
Example outputs:
l From a Security Gateway or Cluster Member:
Notes:
n The config_system utility is not an interactive configuration tool. It helps
automate the first time configuration process.
n The config_system utility is only for the first time configuration, and not for
ongoing system configurations.
Syntax
n To list the command options, run one of these:
Form Command
n To run the First Time Configuration Wizard from a specified configuration file, run one of
these:
Form Command
n To run the First Time Configuration Wizard from a specified configuration string, run one
of these:
Form Command
Form Command
config_system --dry-run
Form Command
Ste
Instructions
p
Step Instructions
If you do not have a configuration file, you can create a configuration template and fill in the
parameter values as necessary.
Before you run the First Time Configuration Wizard, you can validate the configuration file you
created.
Step Instructions
Parameters
A configuration file contains the <parameter>=<value> pairs described in the table below.
Note - The config_system parameters can change from Gaia version to Gaia
version. Run the "config_system --help" command to see the available
parameters.
mgmt_gui_ Specifies the first address of the range, if Single IPv4 address of a
clients_ the value of the "mgmt_gui_clients_ host.
first_ip_ radio" parameter is set to "range". Example:
field 192.168.0.10
mgmt_gui_ Specifies the last address of the range, if Single IPv4 address of a
clients_ the value of the "mgmt_gui_clients_ host.
last_ip_ radio" parameter is set to "range". Example:
field 192.168.0.20
mgmt_gui_ Specifies the netmask, if the value of the A number from 1 to 32.
clients_ "mgmt_gui_clients_radio" parameter
subnet_ is set to "network".
field
masklen_v4 Configures the IPv4 mask length for the A number from 0 to 32.
management interface.
masklen_v6 Configures the IPv6 mask length for the A number from 0 to 128.
management interface.
The Recent Tasks tab, located in the bottom section of SmartConsole, shows recent
Gaia Security Gateway management tasks done using SmartConsole.
n Run command line scripts on the Security Gateway.
Output from the commands shows in the Recent Tasks window.
Double-click the task to see the complete output.
n Receive notification on local device configuration change
The Status column in the Gateways view indicates changes in the device configuration
n Implement configuration changes without a full policy install (Push Settings to Device
action)
n Automate the configuration of Cloning Groups and synchronization between the
members
Step Instructions
4 Click Run.
The output from the script shows in the Tasks tab > Results column.
n Double-clicking the task shows the output in a larger window
n You can also right-click the task, and select View, and then Copy to
Clipboard
Notes:
l The Run One Time Script window does not support interactive
Step Instructions
4 Click Run.
The output from the script shows in the Tasks tab > Results column.
n Placing the mouse in the Details column shows the output in a larger
window.
n You can also right-click, and select View, or Copy to Clipboard.
You can create new scripts, edit or delete scripts from the script repository.
To manage scripts
Step Instructions
Note - You can also run and manage scripts if you click Scripts in the Gateways view.
Step Instructions
1 In the Gateways & Servers view, right-click the Security Gateways or Security
Management Servers, on which you want to run scripts.
The output from the script shows in the Tasks tab at the bottom of the Gateways & Servers
view.
Notes:
n The Scripts Repository window does not support interactive or continuous
scripts. To run interactive or continuous scripts, open a command shell.
n You can run the script on multiple Security Gateways or Security
Management Servers at the same time.
n For a cluster object, the script will run automatically on all cluster members.
Step Instructions
1 In the Gateways & Servers view, right-click the Security Gateway object you
want to back up.
Note - The path to the backup directory must start and end with forward
slash (/) character. For example: /ftroot/backup/, or just / for the root
directory of the server.
The file name must be according to this convention:
backup_<Name of Security Gateway object>_<Date of
Backup>.tgz
4 Click OK.
The status of the backup operation shows in Tasks.
5 When the task is complete, double-click the entry to see the file path and name
of the backup file.
Notes:
n This name is necessary to do a system restore.
n You can do backup on multiple Security Gateways at the same time.
n When you back up a cluster, the system does backup on all
members.
Step Instructions
1 In the Gateways & Servers view, right-click the Security Gateway object you
want to restore.
4 Click OK.
Step Instructions
Step Instructions
Network Management
This chapter includes configuration procedures for:
n Interfaces (Physical, VLAN, Bond, Bridge, Loopback, VTI, Alias)
n ARP
n DHCP Server
n Hosts
n DNS
n Static Routes
n Netflow Export
Network Interfaces
Gaia supports these network interface types:
n Ethernet physical interfaces
n Alias (Secondary IP addresses for different interface types. This is not supported in
ClusterXL.)
n VLAN
n Bond
n Bridge
n Loopback
n 6in4 tunnel
n PPPoE
Note - When you add, delete or make changes to interface IP addresses, it is possible
that when you use the Get Topology option in SmartConsole in the Security Gateway
or Cluster object, the incorrect topology is shown. If this occurs, run the "cpstop" and
then the "cpstart" commands on the Security Gateway or Cluster Members.
Physical Interfaces
In This Section:
This section has configuration procedures and examples for defining different types of
interfaces on a Gaia platform.
Gaia automatically identifies physical interfaces (NICs) installed on the computer.
You cannot add or delete a physical interface in the Gaia Portal or Gaia Clish.
You cannot add, change or remove physical interface cards while the Gaia computer is
running.
To add or remove an interface card
Step Instructions
Gaia automatically identifies the new or changed physical interfaces and assigns an
interface name. The physical interfaces show in the list in the Gaia Portal.
Note - There are settings that you can configure only in Gaia Clish.
Step Instructions
4 In the Comment field, enter the applicable comment text (up to 100
characters).
Important - First, you must enable the IPv6 Support and reboot (see
"System Configuration" on page 282). R80.40 does not support IPv6
Address on Gaia Management Interface (Known Limitation 01622840).
Step Instructions
8 Click OK.
Syntax
To configure an interface
set interface <Name of Physical Interface>
auto-negotiation {on | off}
comments "Text"
ipv4-address <IPv4 Address> {subnet-mask <Mask> | mask-
length <Mask Length>}
ipv6-address <IPv6 Address> mask-length <Mask Length>
ipv6-autoconfig {on | off}
link-speed {10M/half | 10M/full | 100M/half | 100M/full |
1000M/full | 10000M/full}
mac-addr <MAC Address>
monitor-mode {on | off}
mtu <68-16000 | 1280-16000>
rx-ringsize <0-4096>
state {on | off}
tx-ringsize <0-4096>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
mask-length <Mask Configures the IPv4 or IPv6 subnet mask length using
Length> the CIDR notation (integer between 2 and 32).
Parameter Description
link-speed {10M/half | Configures the interface link speed and duplex status.
10M/full | 100M/half | Available speed and duplex combinations are:
100M/full | 1000M/full
n 10M/half
| 1000M/full}
n 10M/full
n 100M/half
n 100M/full
n 1000M/full
n 10000M/full
mtu <68-16000 | 1280- Configures the Maximum Transmission Unit size for
16000> an interface.
For IPv4:
n Range: 68 - 16000 bytes
n Default: 1500 bytes
For IPv6:
n Range: 1280 - 16000 bytes
n Default: 1500 bytes
Parameter Description
Example
gaia> set interface eth2 ipv4-address 40.40.40.1 subnet-mask
255.255.255.0
gaia> set interface eth2 mtu 1400
gaia> set interface eth2 state on
gaia> set interface eth2 link-speed 100M/full
Aliases
In This Section:
This section shows you how to configure an alias in the Gaia Portal and Gaia Clish.
Interface aliases let you assign more than one IPv4 address to physical or virtual interfaces
(Bonds, Bridges, VLANs, and Loopbacks).
Notes:
n ClusterXL does not support aliases.
n You cannot change settings of an existing interface
alias.
Step Instructions
3 On the IPv4 tab, enter the IPv4 address and subnet mask.
4 On the Alias tab, select the applicable interface, to which this alias is assigned.
5 Click OK.
Note - The new alias interface name is automatically created by adding a
sequence number to the interface name. For example, the name of first alias
added to eth1 is eth1:1. The second alias added is eth1:2, and so on.
Step Instructions
Syntax
Adding an alias
Deleting an alias
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
<Name of Specifies the name of the interface, on which to create an alias IPv4
Interface> address
<Mask Length> Configures alias IPv4 subnet mask length using the CIDR notation
(integer between 2 and 32)
<Name of Specifies the name of the alias interface in the format <IF>:XX,
Alias where XX is the automatically assigned sequence number
Interface>
Example
VLAN Interfaces
In This Section:
This section shows you how to configure VLAN interfaces in the Gaia Portal and Gaia Clish.
You can configure virtual LAN (VLAN) interfaces on Ethernet interfaces.
VLAN interfaces let you configure subnets with a secure private link to Security Gateways and
Management Servers using your existing topology.
With VLAN interfaces, you can multiplex Ethernet traffic into many channels using one cable.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Notes:
n The name of a VLAN interface in Gaia is "<Name of Physical
Interface>.<VLAN ID>".
For example, the name of a VLAN interface with a VLAN ID of 5 on a physical
interface eth1 is "eth1.5".
n The VLAN tunnel is not secure, because it is not encrypted.
Step Instructions
2 Make sure that the physical interface, on which you add a VLAN interface,
does not have an IP address.
4 In the Add VLAN window, select the Enable option to set the VLAN interface to
UP.
5 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 address automatically option.
6 Optional: On the IPv6 tab, enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 address automatically option.
Important - First, you must enable the IPv6 Support and reboot (see
"System Configuration" on page 282).
7 On the VLAN tab, enter or select a VLAN ID (VLAN tag) between 2 and 4094.
9 Click OK.
Step Instructions
4 Click OK.
Note - You cannot change the VLAN ID or physical interface for an existing VLAN
interface. To change these parameters, delete the VLAN interface and then create
a new VLAN interface.
Step Instructions
Syntax
To add a new VLAN interface
show interface<SPACE><TAB>
show interface <Name of VLAN Interface>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
<VLAN ID> Configures the ID of the VLAN interface (integer between 2 and
4094).
subnet-mask Configures the IPv4 subnet mask using the dotted decimal
<Mask> notation (X.X.X.X) - integer between 2 and 32..
mask-length Configures the IPv6 subnet mask length using CIDR notation
<Mask Length> (/xx) - integer between 1 and 128.
Parameter Description
Example
gaia> add interface vlan eth1
gaia> set interface eth1.99 ipv4-address 99.99.99.1 subnet-mask
255.255.255.0
gaia> set interface eth1.99 ipv6-address 209:99:1 mask-length 64
gaia> delete interface eth1 vlan 99
If you configure the switch ports in Access Mode, create the Bridge interface with two VLAN
interfaces as its subordinate interfaces.
For VLAN translation, use different numbered VLAN interfaces to create the Bridge
interface.
You can build multiple VLAN translation bridges on the same Security Gateway.
1. Configure two VLAN interfaces.
2. Create a Bridge interface and select the VLAN interfaces as its subordinate interfaces
(see "Bridge Interfaces" on page 127).
Note - VLAN translation is not supported over bridged ports of a FONIC (Fail-Open
NIC, see sk85560).
Example topology:
Item Description
1 Security Gateway
Item Description
2 Switch
If you configure the switch ports as VLAN trunk, the Check Point Bridge interface should not
interfere with the VLANs.
To configure a Bridge interface with VLAN trunk, create the Bridge interface with two
physical (non-VLAN) interfaces as its subordinate interfaces (see "Bridge Interfaces" on
page 127).
The Security Gateway processes the tagged packet and does not remove VLAN tags from
them.
The traffic passes with the original VLAN tag to its destination.
Item Description
1 Security Gateway
1A Interface 1
1B Interface 2
2 Bond Interface
3 Router
A bond interface (also known as a bonding group or bond) is identified by its Bond ID (for
example: bond1) and is assigned an IP address. The physical interfaces included in the bond
are called subordinate interfaces and do not have IP addresses.
You can configure a bond interface to use one of these functional strategies:
n High Availability (Active/Backup): Gives redundancy when there is an interface or a link
failure. This strategy also supports switch redundancy. Bond High Availability works in
Active/Backup mode - interface Active/Standby mode. When an Active subordinate
interface is down, the connection automatically fails over to the primary subordinate
interface. If the primary subordinate interface is not available, the connection fails over to
a different subordinate interface.
n Load Sharing (Active/Active): All subordinate interfaces in the UP state are used
simultaneously. Traffic is distributed among the subordinate interfaces to maximize
throughput. Bond Load Sharing does not support switch redundancy.
You can configure Bond Load Sharing to use one of these modes:
l Round Robin - Selects the Active subordinate interfaces sequentially.
l 802.3ad (LACP) - Dynamically uses Active subordinate interfaces to share the
traffic load. This mode uses the LACP protocol, which fully monitors the interface
link between the Check Point Security Gateway and a switch.
l XOR - All subordinate interfaces in the UP state are Active for Load Sharing. Traffic
is assigned to Active subordinate interfaces based on the transmit hash policy:
Layer 2 information (XOR of hardware MAC addresses), or Layer 3+4 information
(IP addresses and Ports).
For Bonding High Availability mode and for Bonding Load Sharing mode:
n The number of bond interfaces that can be defined is limited by the maximal number of
interfaces supported by each platform. See the R80.40 Release Notes.
n Up to 8 physical subordinate interfaces can be configured in a single bond interface.
Step Instructions
2 Make sure that the subordinate interfaces, which you wish to add to the Bond
interface, do not have IP addresses.
4 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 Address automatically option.
5 On the IPv6 tab (optional), enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 Address automatically option.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 282).
Availability).
n XOR - Bond uses subordinate interfaces based on a hash function
Sharing).
Step Instructions
9 Click OK.
Note - The name of a Bond interface in Gaia is "bond<Bond Group ID>". For
example, the name of a bond interface with a Bond Group ID of 5 is "bond5".
Step Instructions
1 Make sure that the physical subordinate interfaces do not have IP addresses.
6 Configure other bond parameters: primary interface, media monitoring, and delay
rate.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Note - You configure an IP address on a Bonding Group in the same way as you do
on a physical interface (see "Physical Interfaces" on page 90).
Syntax
Adding a new Bonding Group
Syntax
Example
Syntax
Example
Syntax
Bond operating mode specifies how subordinate interfaces are used in a bond interface.
Syntax
Example
The Up-Delay specifies show much time in milliseconds to wait before enabling a
subordinate interface after link recovery was detected.
Syntax
Example
The Down-Delay specifies how much time in milliseconds to wait before disabling a
subordinate interface after link failure was detected
Syntax
Example
The Media Monitoring Interval specifies how much time in milliseconds to wait before
checking the link on subordinate interfaces for a failure.
Syntax
Example
For more information, see "Configuring Physical Interfaces in Gaia Clish" on page 93.
Syntax
Example
Syntax
Example
Syntax
Parameters
CLI Parameters
Parameter Description
Parameter Description
Parameter Description
Examples
Example 1 - Configuring Bond in "Active-Backup" mode with default settings
gaia> add bonding group 1
gaia> add bonding group 1 interface eth2
gaia> add bonding group 1 interface eth3
gaia> set bonding group 1 mode active-backup primary eth2
gaia> show bonding group 1
Bond Configuration
xmit-hash-policy Not configured
down-delay 200
primary eth2
lacp-rate Not configured
mode active-backup
up-delay 200
mii-interval 100
Bond Interfaces
eth2
eth3
gaia>
Step Instructions
802.3ad info
LACP rate: slow
To enable the Enhanced Bond feature in VRRP Cluster, set the value of the kernel parameter
fwha_bond_enhanced_enable to 1 on each VRRP Cluster Member. You can set the value
of the kernel parameter temporarily, or permanently.
Setting the value of the kernel parameter temporarily
Step Instructions
Step Instructions
5 Add this line to the file (spaces and comments are not allowed):
fwha_bond_enhanced_enable=1
Important - If you change your cluster configuration from VRRP to ClusterXL, you
must remove the kernel parameter configuration from each Cluster Member.
Bridge Interfaces
Configure interfaces as a bridge to deploy security devices in a topology without
reconfiguration of the IP routing scheme. This is an important advantage for large-scale,
complex environments.
Bridge interfaces connect two different interfaces (bridge ports). Bridging two interfaces
causes every Ethernet frame that is received on one bridge port to be transmitted to the other
port. Thus, the two bridge ports participate in the same Broadcast domain (different from router
port behavior). The security policy inspects every Ethernet frame that passes through the
bridge.
Important - Only two interfaces can be connected by one Bridge interface, creating a
virtual two-port switch. Each port can be a physical, VLAN, or bond device.
You can configure bridge mode with one Security Gateway or with a Cluster. The bridge
functions without an assigned IP address. Bridged Ethernet interfaces (including aggregated
interfaces) to work like ports on a physical bridge. You can configure the topology for the
bridge ports in SmartConsole. A separate network or group object represents the networks or
subnets that connect to each port.
Notes:
n Gaia OS supports bridge interfaces that implement native, Layer 2 bridging.
n Gaia OS does not support Spanning Tree Protocol (STP) bridges.
n A subordinate interface that is a part of a bond interface cannot be a part of a
bridge interface.
The bridge interfaces send traffic with Layer 2 addressing. On the same device, you can
configure some interfaces as bridge interfaces, while other interfaces work as Layer 3
interfaces. Traffic between bridge interfaces is inspected at Layer 2. Traffic between two Layer
3 interfaces, or between a bridge interface and a Layer 3 interface is inspected at Layer 3.
Step Instructions
1 In the left navigation tree, click Network Management > Network Interfaces.
2 Make sure that the subordinate interfaces, which you wish to add to the Bridge
interface, do not have IP addresses assigned.
4 On the Bridge tab, enter or select a Bridge Group ID (unique integer between 1
and 1024).
5 Select the interfaces from the Available Interfaces list and then click Add.
Notes:
n Make sure that the subordinate interfaces do not have any IP
addresses or aliases configured.
n Do not select the interface that you configured as Gaia Management
Interface.
n A Bridge interface in Gaia can contain only two subordinate interfaces.
6 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 Address automatically option.
7 On the IPv6 tab (optional), enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 Address automatically option.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 282).
8 Click OK.
Note - The name of a Bridge interface in Gaia is "br<Bridge Group ID>". For
example, the name of a bridge interface with a Bridge Group ID of 5 is "br5".
Note - You configure an IP address on a Bridging Group in the same way as you do
on a physical interface (see "Physical Interfaces" on page 90).
Procedure
Step Instructions
3 Make sure that the subordinate interfaces, which you wish to add to the Bridge
interface, do not have IP addresses assigned:
show interface <Name of Subordinate Interface> ipv4-
address
show interface <Name of Subordinate Interface> ipv6-
address
Step Instructions
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Syntax
To add a new bridging group
Syntax
Syntax
Example
Note - Make sure that the subordinate interfaces do not have any IP addresses or
aliases configured.
Syntax
Syntax
Example
Syntax
Example
Syntax
Syntax
Example
Syntax
Syntax
Parameters
CLI Parameters
Parameter Description
subnet-mask <Mask> Configures the IPv4 subnet mask using dotted decimal
notation (X.X.X.X).
mask-length <Mask Configures the IPv4 or IPv6 subnet mask length using the
Length> CIDR notation (integer between 2 and 32).
Parameter Description
Example
Important - In a Cluster, you must configure all the Cluster Members in the same way.
By default, Security Gateway and Cluster in Bridge mode allows Ethernet frames that carry
protocols other than IPv4 (0x0800), IPv6 (0x86DD), or ARP (0x0806) protocols.
Administrator can configure a Security Gateway and Cluster in Bridge Mode to either accept,
or drop Ethernet frames that carry specific protocols.
When Access Mode VLAN (VLAN translation) is configured, BPDU frames can arrive with the
wrong VLAN number to the switch ports through the Bridge interface. This mismatch can
cause the switch ports to enter blocking mode.
In Active/Standby Bridge Mode only, you can disable BPDU forwarding to avoid such blocking
mode:
Step Instructions
1 Connect to the command line on the Security Gateway (each Cluster Member).
Loopback Interfaces
In This Section:
You can define a virtual loopback interface by assigning an IPv4 or IPv6 address to the lo
(local) interface.
This can be useful for testing purposes or as a proxy interface for an unnumbered interface.
This section shows you how to configure a loopback interface in the Gaia Portal and Gaia
Clish.
Step Instructions
4. On the IPv6 tab (optional), enter the IPv6 address and mask length.
Important - First, you must enable the IPv6 Support and reboot (see
"System Configuration" on page 282).
4 Click OK.
Note - When you add a new loopback interface, Gaia automatically assigns a
name in the format "loop<XX>", where XX is a sequence number that starts from
00. The name of the first loopback interface is loop00. The name of the second
loopback interface is loop01. And so on.
Step Instructions
4 Click OK.
Step Instructions
Syntax
To add a loopback interface
Note - You can only change IPv4 or IPv6 address on a loopback interface.
show interface<SPACE><TAB>
show interface <Name of Loopback Interface>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
<Mask Length> Configures the IPv4 subnet mask length using the CIDR
notation (integer between 2 and 32)
Example
Note - The name of a VPN Tunnel interface in Gaia is "vpnt<VPN Tunnel ID>".
For example, the name of a VPN Tunnel interface with a VPN Tunnel ID of 5 is
"vpnt5".
Procedure:
1. Make sure that the IPsec VPN Software Blade is enabled on the applicable Security
Gateways.
2. Create and configure the Security Gateways.
3. Configure the VPN community in SmartConsole that includes the two peer Security
Gateways.
Configuring VPN community
You must configure the VPN Community and add the member Security Gateways to it
before you configure a VPN Tunnel Interface. This section includes the basic
procedure for defining a Site-to-Site VPN Community. To learn more about VPN
communities and their definition procedures, see the R80.40 Site to Site VPN
Administration Guide.
Step Instructions
4 From the top toolbar, click the New ( ) > select Star Community or
Meshed Community..
Step Instructions
When Domain Based VPN and Route Based VPN are configured for a Security
Gateway, Domain Based VPN is active by default. You must do two short procedures
to make sure that Route Based VPN is always active.
The first procedure configures an empty encryption domain group for your VPN peer
Security Gateways. You do this step one time for each Security Management Server.
The second step is to make Route Based VPN the default option for all Security
Gateways.
Configuring an empty group
Step Instructions
1 In the SmartConsole, click Objects menu > More object types >
Network Object > Group > New Network Group.
4 Click OK.
Step Instructions
3 From the left tree, click Network Management > VPN Domain.
4 Select Manually define and then select the empty Group object you
created earlier.
Step Instructions
Syntax
CLI Parameters
Parameter Description
Parameter Description
dev <Name of Specifies the name of the local interface on this Security
Local Gateway or Cluster Member.
Interface> The new VTI is bound to this local interface.
Applies to the Unnumbered VTI only.
Example
To make sure that your security rules work correctly with Route Based VPN traffic, you
must add directional matching conditions and allow OSPF traffic.
(A) Defining Directional Matching VPN Rules
This section contains the procedure for defining directional matching rules.
Directional matching is necessary for Route Based VPN when a VPN community is
included in the VPN column in the rule.
This is because without bi-directional matching, the rule only applies to connections
between a community and an encryption domain (Domain Based Routing).
Notes:
n MyIntranet is the name of a VPN Community.
n Internal_Clear refers to all traffic from IP addresses to and from the
Step Instructions
Step Instructions
3 Right-click the VPN cell in the applicable rule and select Directional
Match Condition.
5 Click OK.
One advantage of Route Based VPN is the fact that you can use dynamic routing
protocols to distribute routing information between Security Gateways.
The OSPF (Open Shortest Path First) protocol is commonly used with VTIs.
To learn about configuring OSPF, see the R80.40 Gaia Advanced Routing
Administration Guide.
Step Instructions
1 In the Gaia Portal or Gaia Clish, add the applicable VPN Tunnel
Interfaces to the OSPF configuration page.
You must save your configuration to the database and install policies to the Security
Gateways before the VPN can be fully functional.
Step Instructions
Note - You selected this interfaces during the Gaia First Time Configuration Wizard.
Step Instructions
4 Click OK.
Syntax
To see the current interface
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Example
Note - There are some command options and parameters that you cannot configure
in the Gaia Portal.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Description
Add, configure, and delete interfaces and interface properties.
Syntax
To add an interface
add interface<ESC><ESC>
To configure an interface
set interface<ESC><ESC>
To show an interface
show interface<SPACE><TAB>
show interfaces all
ARP
The Address Resolution Protocol (ARP) allows a host to find the physical address of a target
host on the same physical network using only the target's IP address.
ARP is a low-level protocol that hides the underlying network physical addressing and permits
assignment of an arbitrary IP address to every machine.
ARP is considered part of the physical network system and not as part of the Internet
protocols.
Step Instructions
Step Instructions
Step Instructions
and higher
n 16384 entries - In R80.40 Clean Install, or in the R80.40 Jumbo
Step Instructions
4 Enter the IP Address of the static ARP entry and the MAC Address used when
forwarding packets to the IP address.
5 Click OK.
Step Instructions
4 Click Remove.
Step Instructions
Syntax
Adding a static ARP entry
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
table cache-size Configures the maximal number of entries in the ARP cache
<Number of table.
Entries> Range: 1024 - 131072 or 16384 entries
n 131072 entries - In R80.40 Jumbo Hotfix Accumulator
Take 100 and higher
n 16384 entries - In R80.40 Clean Install, or in the R80.40
Jumbo Hotfix Accumulator Takes lower than 100
DHCP Server
You can configure the Gaia device to be a Dynamic Host Configuration Protocol (DHCP)
server.
The DHCP server gives IP addresses and other network parameters to network hosts.
DHCP makes it unnecessary to configure each host manually, and therefore reduces
configuration errors.
You configure DHCP server subnets on the Gaia device interfaces.
A DHCP subnet allocates these network parameters to hosts behind the Gaia interface:
n IPv4 address
n Default Gateway (optional)
n DNS parameters (optional):
l Domain name
l Primary, secondary and tertiary DNS servers
Allocating DHCP parameters to hosts (for the details, see the next section)
Workflow
Step Instructions
Step Instructions
3 Select Enable DHCP to enable DHCP for the subnet you will configure.
In the Network IP Address field, enter the IPv4 address of the applicable
interface's subnet.
In the Subnet mask field, enter the subnet mask.
Note - To do this automatically, click Get from interface and select the
applicable interface. Click OK.
In the Address Pool section, click Add to define the range of IPv4 addresses
that the server assigns to hosts.
Step Instructions
5 Optional: On the Routing & DNS tab, define routing and DNS parameters for
DHCP clients:
n In the Default Gateway field, enter the IPv4 address of the default
gateway for the DHCP clients.
n In the Domain Name field, enter the domain name for the DHCP clients
(for example, example.com).
n In the Primary DNS Server field, enter the IPv4 address of the Primary
DNS server for the DHCP clients.
n In the Secondary DNS Server field, enter the IPv4 address of the
Secondary DNS server for the DHCP clients (to use if the primary DNS
server does not respond).
n In the Tertiary DNS Server field, enter the IPv4 address of the Tertiary
DNS server for the DHCP clients (to use if the primary and secondary
DNS servers do not respond).
6 Click OK.
8 In the DHCP Server Configuration section, select Enable DHCP Server and
click Apply.
Step Instructions
2 In the DHCP Server Subnet Configuration section, select the Subnet and
click Edit.
4 Click OK.
Step Instructions
2 In the DHCP Server Configuration section, clear the Enable DHCP Server.
3 Click Apply.
Step Instructions
2 In the DHCP Server Subnet Configuration section, select the Subnet and
click Delete.
3 Click OK to confirm.
Note - Before you delete the last DHCP subnet, you must disable DHCP server on
all interfaces.
Syntax
To add a DHCP Server subnet
add dhcp server subnet <Subnet Entry>
netmask <Mask>
include-ip-pool start <First IPv4 Address> end <Last IPv4
Address>
exclude-ip-pool start <First IPv4 Address> end <Last IPv4
Address>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
include-ip-pool Specifies the IPv4 address that starts and the IPv4 address
start <First IPv4 that ends the included allocated IP Pool range.
Address> end <Last For example: 192.0.2.20 and 192.0.2.90
IPv4 Address>
exclude-ip-pool Specifies the IPv4 address that starts and the IPv4 address
start <First IPv4 that ends the excluded allocated IP Pool range.
Address> end <Last For example: 192.0.2.155 and 192.0.2.254
IPv4 Address>
default-lease Specifies the default DHCP lease in seconds, for host IPv4
<Lease in Seconds> addresses. Applies only if DHCP clients do not request a
unique lease time. If you do not enter a value, the default is
43,200 seconds.
Parameter Description
max-lease <Maximal Specifies the maximal DHCP lease in seconds, for host
Lease in Seconds> IPv4 addresses. This is the longest lease available. If you
do not enter a value, the configuration default is 86,400
seconds.
domain <Domain Name Optional. Specifies the domain name of the network hosts.
for the DHCP For example: example.com
Clients>
dns <DNS Server Optional. Specifies the DNS servers that the network hosts
IPv4 Address> will use to resolve hostnames. Optionally, specify a
primary, secondary and tertiary server in the order of
precedence.
For example: 192.0.2.101, 192.0.2.102,
192.0.2.103
subnet <Subnet The IP addresses pools in the DHCP Server subnet, and
Entry> ip-pools their status: Enabled or Disabled.
Example
System Name
You set the host name (system name) during initial configuration. You can change the name.
Step Instructions
1 In the navigation tree, click Network Management > Host and DNS.
Description
Configure the host name of your platform.
Syntax
n To configure a hostname:
show hostname
show domainname
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Hosts
You should add host addresses for systems that communicate frequently with the Gaia
system.
You can:
n View the entries in the hosts table.
n Add an entry to the list of hosts.
n Modify the IP address of a host.
n Delete a host entry.
Step Instructions
1 In the navigation tree, click Network Management > Hosts and DNS.
3 Enter:
n Host Name - Must include only alphanumeric characters, dashes ('-'),
and periods ('.'). Periods must be followed by a letter or a digit. The name
may not end with a dash or a period. There is no default value.
n IPv4 address
n IPv6 address
Step Instructions
1 In the navigation tree, click Network Management > Hosts and DNS.
3 Edit:
n Host Name
n IPv4 address
n IPv6 address
Step Instructions
1 In the navigation tree, click Network Management > Hosts and DNS.
Description
Add, edit, delete and show the name and IP addresses for hosts that communicate frequently
with the Gaia system.
Syntax
To add a static host entry
add host name <Name of Host>
ipv4-address <IPv4 Address of Host>
ipv6-address <IPv6 Address of Host>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
name <Name The name of a static host. Must include only alphanumeric characters,
of Host> dashes ('-'), and periods ('.'). Periods must be followed by a letter or a
digit. The name must not end in a dash or a period. There is no default
value.
DNS
Gaia uses the Domain Name Service (DNS) to translate host names into IP addresses.
To enable DNS lookups, you must enter the primary DNS server for your system. You can also
enter secondary and tertiary DNS servers.
When the system resolves host names, it consults the primary name server. If a failure or time-
out occurs, the system consults the secondary name server, and if necessary, the tertiary.
You can also define a DNS Suffix, which is a search for host-name lookup.
Step Instructions
1 In the navigation tree, click Network Management > Hosts and DNS.
Step Instructions
Description
Configure, show and delete the DNS servers and the DNS suffix for the Gaia computer.
Syntax
To configure the DNS servers and the DNS suffix
set dns
primary <IPv4 or IPv6 Address>
secondary <IPv4 or IPv6 Address>
tertiary <IPv4 or IPv6 Address>
suffix <Name for Local Domain>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
primary Specifies the IPv4 or IPv6 address of the primary DNS server, which
<IPv4 or resolve host names.
IPv6 This must be a host that runs a DNS server.
Address>
Parameter Description
secondary Specifies the IPv4 or IPv6 address of the secondary DNS server, which
<IPv4 or resolves host names if the primary server does not respond.
IPv6 This must be a host that runs a DNS server.
Address>
tertiary Specifies the IPv4 or IPv6 address of the tertiary DNS server, which
<IPv4 or resolves host names if the primary and secondary servers do not
IPv6 respond.
Address> This must be a host that runs a DNS server.
suffix Specifies the name that is put at the end of all DNS searches if they fail.
<Name for By default, it must be the local domain name.
Local A valid domain name suffix is made up of subdomain strings separated
Domain> by periods. Subdomain strings must begin with an alphabetic letter and
can consist only of alphanumeric characters and hyphens. The domain
name syntax is described in RFC 1035 (modified slightly in RFC 1123).
Note - Domain names that are also valid numeric IP addresses(for
example: 10.19.76.100), although syntactically correct, are not
permitted.
Example:
You configured the DNS Suffix "example.com" and you try to ping the
host "foo" (with the command "ping foo"). If Gaia cannot resolve
"foo", then Gaia tries to resolve "foo.example.com".
Step Instructions
1 In the navigation tree, click Network Management > IPv4 Static Routes.
3 In the Destination field, enter the IPv4 address of destination host, or network.
6 In the Rank field, leave the default value (60), or enter the relative rank of the
IPv4 static route (an integer from 1 to 255).
This value specifies the rank for the configured route when there are
overlapping routes from different protocols.
8 In the Comment field, enter the applicable comment text (up to 100
characters).
Step Instructions
Notes:
n Priority defines which next hop gateway to select when multiple next
hop gateways are configured. The lower the priority, the higher the
preference - priority 1 means the highest preference, and priority 8
means the lowest preference. You can define two or more paths with
the same priority to specify a backup path with equal priority. A next
hop gateway with no priority configured is preferred over a next hop
gateway with priority configured.
n Multihop ping in Static Routes uses ICMP Echo Request to monitor
reachability of an IP address multiple hops away. Multihop ping in
Static Routes updates the status of an associated next hop in
accordance to the reachability status. The next hop status becomes
"down", if that IP address is unreachable.
10 If you configured a next hop gateway by IP Address, you can select the Ping
option, if you need to monitor next hops for the IPv4 static route with the ping.
The Ping feature sends ICMP Echo Requests to make sure the next hop
gateway for a static route is working.
Gaia includes in the kernel forwarding table only next hop gateways, which are
verified as working.
When Ping is enabled, Gaia adds an IPv4 static route to the kernel forwarding
table only after at least one next hop gateway is reachable.
Step Instructions
11 Click Save.
12 In the Advanced Options section, you can configure the Ping behavior.
If you changed the default settings, click Apply.
You can use the batch mode to configure multiple static routes in one step.
Note - This mode does not allow the configuration of static routes that use a logical
interface as the next hop.
Step Instructions
1 In the navigation tree, click Network Management > IPv4 Static Routes.
3 In the Add Multiple Routes window, select the Next Hop Type:
n Normal - To accept and forward packets
n Blackhole - To drop packets, and not send ICMP unreachable packet to
the traffic source
n Reject - To drop packets, and send ICMP unreachable packet to the
traffic source
5 Click Apply.
The newly configured static routes show in the IPv4 Static Routes section.
Note - The text box shows entries that contain errors with messages at the
top of the page.
Step Instructions
7 In the top right corner, click the Monitoring tab to make sure that the routes are
configured correctly.
Description
Configure, show, and delete IPv4 static routes.
Syntax
Note - There are no "add" commands for the static route feature.
To remove a specific path only, when multiple next hop gateways are configured
set static-route <Destination IPv4 Address> nexthop gateway <IPv4 Address of Next Hop Gateway> off
set static-route <Destination IPv4 Address> nexthop gateway <Name of Local Interface> off
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
comment {"Text" | off} Defines of removes the optional comment for the
static route.
n Write the text in double quotes.
n Text must be up to 100 characters.
n This comment appears in the Gaia Portal and
in the output of the "show configuration"
command.
blackhole Specifies that this next hop drops packets, but does
not send ICMP unreachable packet to the traffic
source.
address <IPv4 Address of Specifies the IPv4 address of the next hop gateway.
Next Hop Gateway>
Parameter Description
logical <Name of Local Identifies the next hop gateway by the name of the
Interface> local interface that connects to it.
Use this option only if the next hop gateway has an
unnumbered interface.
monitored-ip <Monitored Remote IPv4 address to monitor for the next hop
IP Address> {on | off} gateway.
Monitors IP address(es) configured with the "ip-
reachability-detection".
The next hop gateway becomes usable with respect
to reachability of IP address(es) reported from the
"ip-reachability-detection".
Parameter Description
ping {on | off} Enables (on) or disables (off) the ping of specified
next hop gateways for IPv4 static routes.
The Ping feature sends ICMP Echo Requests to
make sure the next hop gateway for a static route is
working.
Gaia includes in the kernel forwarding table only
next hop gateways, which are verified as working.
When Ping is enabled, Gaia adds an IPv4 static
route to the kernel forwarding table only after at
least one next hop gateway is reachable.
To configure the ping behavior, run:
set ping count <value>
set ping interval <value>
Parameter Description
Example
gaia> set static-route 192.0.2.0/24 nexthop gateway address 192.0.2.155 on
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 282).
Step Instructions
1 In the navigation tree, click Network Management > IPv6 Static Routes.
3 In the Destination / Mask Length field, enter the IPv6 address and prefix
(default prefix is 64).
5 In the Rank field, leave the default value (60), or enter the relative rank of the
IPv6 static route (an integer from 1 to 255).
This value specifies the rank for the configured route when there are
overlapping routes from different protocols.
6 In the Comment field, enter the applicable comment text (up to 100
characters).
8 In the Gateway Address field, enter the IPv6 address of the next hop gateway.
Step Instructions
9 In the Priority field, either do not enter anything, or select an integer between 1
and 8.
Priority defines the order for selecting the next hop gateway when multiple next
hop gateways are configured.
The lower the priority, the higher the preference - priority 1 means the highest
preference, and priority 8 means the lowest preference.
A next hop gateway with no priority configured is preferred over a next hop
gateway with priority configured.
You cannot configure two next hop gateways with the same priority, because
IPv6 Equal Cost Multipath Routes are not supported.
10 Click OK.
11 Select the Ping6 option, if you need to monitor next hops for the IPv6 static
route using ping6.
The Ping6 feature sends ICMPv6 Echo Requests to make sure the next hop
gateway for a static route is working.
12 Click Save.
13 In the Advanced Options section, you can configure the Ping6 behavior.
If you changed the default settings, you must click Apply.
Syntax
Note - There are no "add" commands for the static route feature.
To remove the specific path only, when multiple next hop gateways are configured
set ipv6 static-route <Destination IPv6 Address> nexthop gateway <IPv6 Address of Next Hop Gateway> off
set ipv6 static-route <Destination IPv6 Address> nexthop gateway <Name of Local Interface> off
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
<Destination IPv6 Defines the IPv6 address of destination host or network using
Address> the CIDR notation (IPv6 Address / Mask Length).
Example: fc00::/64
Mask length must be in the range 8-128.
comment {"Text" | Defines of removes the optional comment for the static route.
off}
n Write the text in double quotes.
n Text must be up to 100 characters.
n This comment appears in the Gaia Portal and in the
output of the "show configuration" command.
gateway Specifies that this next hop accepts and sends packets to the
specified destination.
blackhole Specifies that this next hop drops packets, but does not send
ICMP unreachable packet to the traffic source.
reject Specifies that this next hop drops packets and sends ICMP
unreachable packet to the traffic source.
address <IPv6 Defines the IPv6 address of the next hop gateway.
Address of Next
Hop Gateway>
interface <Name of Identifies the next hop gateway by the local interface that
Local Interface> connects to it.
Use this option only if the next hop gateway has an
unnumbered interface.
Parameter Description
priority Defines the order for selecting the next hop gateway when
<Priority> multiple next hop gateways are configured.
The lower the priority, the higher the preference - priority 1
means the highest preference, and priority 8 means the
lowest preference.
A next hop gateway with no priority configured is preferred
over a next hop gateway with priority configured.
You cannot configure two next hop gateways with the same
priority, because IPv6 Equal Cost Multipath Routes are not
supported.
ping6 {on | off} Enables (on) or disables (off) the ping of specified next hop
gateways for IPv6 static routes.
The Ping6 feature sends ICMPv6 Echo Requests to make
sure the next hop gateway for a static route is working.
Gaia includes in the kernel forwarding table only next hop
gateways, which are verified as working.
When Ping6 is enabled, Gaia adds an IPv6 static route to the
kernel forwarding table only after at least one next hop
gateway is reachable.
To configure the ping6 behavior, run:
set ping count <value>
set ping interval <value>
rank <Rank> Selects a route, if there are many routes to a destination that
use different routing protocols.
The route with the lowest rank value is selected.
Use the rank keyword in place of the nexthop keyword with
no other parameters.
Accepted values are: default (60), integer numbers from 0
to 255.
In addition, see this command: set protocol-rank
protocol <Rank>
Example
gaia> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 on
gaia> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 interface eth3 on
gaia> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 interface eth3 off
Troubleshooting
Scenario - SmartConsole does not let you enable the VPN Software Blade in the Security
Gateway object
Symptoms
You cannot enable the VPN Software Blade. SmartConsole shows this message:
Cause
IPv6 feature is active on the Security Gateway, but the main IPv6 address is not configured
in the Security Gateway object in SmartConsole.
Next Steps
1. From the left navigation panel, click Gateways & Servers.
2. Double-click the Security Gateway object.
3. From the left tree, click General Properties.
4. Configure the main IPv6 address.
5. Click OK.
6. Install the Access Control Policy on the Security Gateway object.
Note - You can add or delete Neighbor entries only from the Gaia Clish.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 282).
Syntax
n To add an IPv6 neighbor entry:
show neighbor<SPACE><TAB>
show neighbor TABLE
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
<MAC Address of Specifies the MAC address for respective IPv6 address
Neighbor>
<Name of Local Name of the local interface that connects to the Neighbor
Interface>
NetFlow Export
In This Section:
Introduction 196
Configuration Options in Gaia Portal 198
Configuration Options in Gaia Clish 198
Configuration Procedure 201
Introduction
NetFlow is an industry standard for traffic monitoring. Cisco developed this network protocol to
collect network traffic patterns and volume.
One host (the NetFlow Exporter) sends information about its network flows to a different host
(the NetFlow Collector).
A network flow is a unidirectional stream of packets that contain the same set of
characteristics.
You can configure Security Gateways and Cluster Members as an Exporter of NetFlow
records for all the traffic that passes through.
Note - The state of the SecureXL on a Security Gateway is irrelevant for NetFlow export.
The NetFlow Collector is a different external server, and you configure it separately.
NetFlow Export configuration is a list of collectors, to which the service sends records:
n To enable NetFlow, configure at minimum one NetFlow Collector.
n To disable NetFlow, remove all NetFlow Collectors from the Gaia configuration.
You can configure a maxumum of three NetFlow Collectors. Gaia sends the NetFlow records
go to all configured NetFlow Collectors. If you configure three NetFlow Collectors, Gaia sends
each NetFlow record three times.
Regardless of which NetFlow export format you configure, Gaia exports values as set of fields.
The fields
n Source IP address.
n Destination IP address.
n Source port.
n Destination port.
n Ingress physical interface index (defined by SNMP).
n Egress physical interface index (defined by SNMP).
n Packet count for this flow.
n Byte count for this flow.
n Start of flow timestamp (FIRST_SWITCHED).
n End of flow timestamp (LAST_SWITCHED).
n IP protocol number.
n TCP flags from the flow (TCP only).
n VSX VSID.
Notes:
n The IP addresses and TCP/UDP ports the NetFlow reports are the ones, on
which the NetFlow expects to receive traffic.
Therefore, for NAT connections, the NetFlow reports one of the two
directions of the flow with the NATed address.
n NetFlow sends the connection records after the connections terminated.
If the connections are open for a long time, it can take time for the NetFlow to
sends the records.
show netflow
all
collector
enable
export-format
ip
port
srcaddr
for-ip <IPv4 Address of Collector>
enable
export-format
port
srcaddr
for-port <Destination Port on Collector>
enable
export-format
srcaddr
CLI Parameters
Parameter Description
port <Destination Port Specifies the destination UDP port number on the
on Collector> NetFlow Collector, on which the collector listens.
This parameter is mandatory.
There is no default or standard port number for
NetFlow.
srcaddr <Source IPv4 Optional: Specifies the source IPv4 address of the
Address> NetFlow packets.
This must be an IPv4 address of the local host.
The default is an IPv4 address of the network
interface, from which Gaia sends the NetFlow
packets.
We recommend the default.
Parameter Description
Configuration Procedure
Important - In a Cluster, you must configure all the Cluster Members in the same way.
a. In the left navigation tree, click Network Management > NetFlow Export.
b. In the Collectors section, click Add.
c. Enter the required data for each collector:
Parameter Description
UDP Port The destination UDP port number, on which the collector
Number listens.
This parameter is mandatory.
There is no default or standard port number for NetFlow.
d. Click OK.
Important - In the Track column, you must select Log and Accounting.
Services
Destinati & Conte
Source VPN Action Track
on Applicatio nt
ns
System Management
This chapter includes procedures and reference information for:
n Time and Date
n Cloning Groups
n SNMP
n Job Scheduler
n Mail Notification
n Login Messages
n Session in Gaia Portal and Gaia Clish
n Core Dump Files
n System Logging
n Network Access over Telnet
n GUI Clients for Security Management Server
Proxy
Proxy for Gaia Operating System
If this Gaia server connects to a network through a proxy server, then configure the applicable
proxy server.
Note - This proxy configuration applies only to the Gaia Operating System. It does not
apply to Software Blades.
Menu > Global properties > Proxy This proxy configuration applies to the
Management Server and all managed Security
Gateways and Clusters.
Management Server / Security Gateway / This proxy configuration overrides the global
Cluster object properties > Network proxy configuration in SmartConsole.
Management > Proxy
Note - This proxy configuration applies only to Check Point Software Blades that run
on top of the Gaia Operating System.
Step Instructions
6 Click Apply.
Step Instructions
5 Click Apply.
Step Instructions
Step Instructions
4 Click Apply.
Syntax
To configure a proxy server or edit an existing proxy server configuration
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Time
All Security Management Servers, Security Gateways, and Cluster Members must
synchronize their system clocks.
This is important for these reasons:
n SIC trust can fail if devices are not synchronized correctly.
n Cluster synchronization requires precise clock synchronization between members.
n SmartEvent Correlation uses time stamps that must be synchronized to approximately
one a second.
n To make sure that cron jobs run at the correct time.
n To do certificate validation for applications based on the correct time.
You can use these methods to set the system date and time:
n Network Time Protocol (NTP).
n Manually, in the Gaia Portal, or Gaia Clish.
Best Practice - Configure more than one NTP server for redundancy.
Step Instructions
5 Click OK.
Step Instructions
3 Click Set Time and Date automatically using Network Time Protocol (NTP).
Best Practice - Configure more than one NTP server for redundancy.
6 Click OK.
Step Instructions
4 Click OK.
Syntax
show clock
Example
Syntax
n To configure the time:
show time
Parameters
Parameter Description
Syntax
n To configure a date:
show date
Parameters
Parameter Description
Example
To configure the 20th of January 2020, run:
Syntax
n To configure the time zone:
Important - The spaces before and after the slash character (/) are mandatory.
show timezone
Parameters
Parameter Description
Examples
Syntax
n To configure a new NTP server:
set ntp
active {on | off}
server
primary <IPv4 address or Hostname of NTP Server>
version {1|2|3|4}
secondary <IPv4 address or Hostname of NTP
Server> version {1|2|3|4}
show ntp
active
current
servers
Parameters
Parameter Description
current Shows the IP address or Host name of the NTP server Gaia uses
right now.
server Keyword that identifies the NTP server - time server, from which Gaia
synchronizes its clock.
The specified time server does not synchronize to the local clock of
Gaia.
primary Configures the IP address or Host name of the primary NTP server.
Parameter Description
Example
Cloning Group
A Cloning Group is a collection of Gaia Security Gateways that synchronize their OS
configurations and settings for a number of shared features, for example DNS or ARP.
Step Instructions
Step Instructions
7 Click Finish.
The features are listed in the same order, in which they are shown in Gaia Portal.
Table: Shared Features in Gaia Portal
Shared Feature Description
Job Scheduler Schedule automated tasks that perform actions at a specific time.
ARP Configure static ARP entries and proxy ARP entries, control
dynamic ARP entries.
Host Access Configure which hosts are allowed to connect to the cluster
Control devices.
Display Format Configure how the system displays time, date and netmask.
Mail Notification Configure email address, to which Gaia sends mail notifications.
DHCP Relay Configure relay of DHCP and BOOTP messages between clients
and servers on different IPv4 Networks.
IPv6 DHCP Configure relay of DHCPv6 messages between clients and servers
Relay on different IPv6 Networks.
OSPF Configure IPv4 dynamic routing via the Open Shortest-Path First
v2 protocol.
IPv6 OSPF Configure IPv6 dynamic routing via the Open Shortest-Path First
v3 protocol.
Inbound Route Configure Inbound Route Filters for RIP, OSPFv2, BGP, and
Filters OSPFv3 (supports IPv4 and IPv6).
Prefix Lists and Configure dynamic routing prefix lists and trees.
Trees
Policy Based Configure policy based routing (PBR) priority rules and action
Routing tables.
Step Instructions
2 Sign in to the same Gaia Portal using the cadmin account and password.
(Alternatively, log in to the Gaia Portal on the Security Gateway using the
cadmin credentials.)
Important - No unique URL or IP address is needed to access the Cloning
Group Portal or Clish command line. Use the URL or IP address of the
member Security Gateway.
3 In System Management > Cloning Group, select features from the Shared
Features.
Step Instructions
Step Instructions
synchronization
5 Click Finish.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Step Instructions
5 Click Finish.
Note - When run from the cadmin account, these commands apply to all members of
the Gaia group.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Step Instructions
Step Instructions
4 Run the "join cloning group" command to join the Cloning Group.
Step Instructions
CLI Syntax
To Create and configure a Cloning Group
Syntax
set cloning-group
local-ip <IPv4 address>
mode {manual | cluster-xl}
name <Name of Cloning Group>
password <Password>
state {on | off}
Parameters
Parameter Description
mode {manual The mode determines whether the Cloning Group is defined
| cluster-xl} manually, or through ClusterXL.
state {on | Enables (on) or disables (off) the Cloning Group feature.
off} Important - When you configure the state "off", the Security
Gateway is removed from the Cloning Group.
Syntax
Parameters
Parameter Description
<Feature> The name of the feature to be synchronized between the members of the
Cloning Group.
The features are listed in the same order, in which they are shown in Gaia Clish when
you run the "show cloning-group shared-feature" command.
inboundfilters Configure Inbound Route Filters for RIP, OSPFv2, BGP, and
OSPFv3 (supports IPv4 and IPv6).
display-format Configure how the system displays time, date and netmask.
arp Configure static ARP entries and proxy ARP entries, control
dynamic ARP entries.
pbr Configure policy based routing (PBR) priority rules and action
tables.
Syntax
Parameters
Parameter Description
<Feature> The name of the feature to be deleted from the list of shared features.
To see the list of the enabled Shared Features:
a. Enter:
delete cloning-group shared-feature
b. Press <SPACE> and <TAB>.
Syntax
Parameters
Parameter Description
<IPv4 address of Cloning The IPv4 address of the Cloning Group member, to
Group> which you join.
Note - This option is not available, if you are
logged into the cadmin account.
leave cloning-group
Syntax
Parameters
Parameter Description
<IPv4 address of The IPv4 address of the Cloning Group member that
Member> became inaccessible.
Important - Use this command only for troubleshooting purposes, when the remote
Cloning Group member is not accessible. A normal way to remove a member from
a Cloning Group is to run the "leave cloning-group" command on that
member.
Notes:
n The Cloning Group configuration on the remote member itself does not
change, and as soon as the device regains connectivity, it joins the Cloning
Group again.
n This command can only be run if the Cloning Group is in Manual mode.
Syntax
show cloning-group
local-ip
members
mode
name
shared-feature
state
status
Parameters
Parameter Description
local-ip The IPv4 address used to synchronize shared features between the
members of the Cloning Group.
shared- Lists the shared features that are enabled to be used by all members of
feature the Cloning Group.
re-synch cloning-group
When a user (local or remote) receives Cloning Group management privileges, the user can
enable (or disable) the Cloning Group management mode, to create, delete, and edit
Cloning Groups.
Syntax
Parameters
Parameter Description
SNMP
In This Section:
Introduction 231
SNMP v3 - User-Based Security Model (USM) 233
Enabling SNMP 233
SNMP Agent Address 233
SNMP Traps 234
Introduction
Simple Network Management Protocol (SNMP) is an Internet standard protocol. SNMP is
used to send and receive management information to other network devices. SNMP sends
messages, called protocol data units (PDUs), to different network parts. SNMP-compliant
devices, called agents, keep data about themselves in Management Information Bases (MIBs)
and resend this data to the SNMP requesters.
Through the SNMP protocol, network management applications can query a management
agent using a supported MIB. The Check Point SNMP implementation lets an SNMP manager
monitor the system and modify selected objects only. You can define and change one
read-only community string and one read-write community string. You can set, add, and delete
trap receivers and enable or disable various traps. You can also enter the location and contact
strings for the system.
Check Point Gaia supports SNMP v1, v2, and v3.
To view detailed information about each MIB that the Check Point implementation supports
(also, see sk90470):
MIB Location
Notes:
n The Check Point implementation also supports the User-based Security model
(USM) portion of SNMPv3.
n The Gaia implementation of SNMP is built on NET-SNMP. Changes were made
to the first version to address security and other fixes. For more information, see
Net-SNMP.
Warning - If you use SNMP, we recommend that you change the community strings
for security purposes. If you do not use SNMP, disable SNMP or the community
strings.
SNMP, as implemented on Check Point platforms, enables an SNMP manager to monitor the
device using GetRequest, GetNextRequest, GetBulkRequest, and a select number of
traps.
The Check Point implementation also supports using SetRequest to change these attributes:
sysContact, sysLocation, and sysName. You must configure read-write permissions for
set operations to work.
Use Gaia to run these tasks:
n Define and change one read-only community string.
n Define and change one read-write community string.
n Enable and disable the SNMP daemon.
n Create SNMP users.
n Change SNMP user accounts.
n Add or delete trap receivers.
n Enable or disable the various traps.
n Enter the location and contact strings for the device.
Best Practice - Use authentication and encryption. You can use them independently
> by specifying one or the other with your SNMP manager requests. The Gaia responds
accordingly.
SNMP users are maintained separately from system users. You can create SNMP user
accounts with the same names as existing user accounts or different. You can create SNMP
user accounts that have no corresponding system account. When you delete a system user
account, you must separately delete the SNMP user account.
Enabling SNMP
The SNMP daemon is disabled by default.
If you choose to use SNMP, enable and configure it according to your security requirements.
At minimum, you must change the default community string to something other than public.
You can choose to use all versions of SNMP (v1, v2, and v3) on your system, or to grant
SNMPv3 access only.
Best Practice - If your SNMP management station supports SNMP v3, select only
> SNMP v3 on Gaia. SNMPv3 limits community access. Only requests from users with
enabled SNMPv3 access are allowed, and all other requests are rejected.
Note - If you do not plan to use SNMP to manage the network, disable it. Enabling
SNMP opens potential attack vectors for surveillance activity. It lets an attacker learn
about the configuration of the device and the network.
SNMP Traps
Managed devices use trap messages to report events to the Network Management Station
(NMS).
When some types of events occur, the platform sends a trap to the management station.
The Gaia proprietary traps are configured in the /etc/snmp/GaiaTrapsMIB.mib file.
Gaia supports these types of SNMP traps:
Table: SNMP Traps in Gaia
Type of Trap Description
lowVoltage Notifies if one of the voltage sensors falls below its minimum
value.
Step Instructions
3 In the Version drop down list, select the version of SNMP to run:
n 1/v2/v3 (any)
Select this option if your SNMP management station does not support
SNMPv3.
n v3-Only
Select this option if your SNMP management station supports v3.
SNMPv3 provides a higher level of security than v1 or v2.
4 In SNMP Location String, enter a string that contains the location for the
system.
The maximum length for the string is 128 characters.
That includes letters, numbers, spaces, special characters
For example: Bldg 1, Floor 3, WAN Lab, Fast Networks,
Speedy, CA
5 In SNMP Contact String, enter a string that contains the contact information
for the device.
The maximum length for the string is 128 characters.
That includes letters, numbers, spaces, special characters.
For example: John Doe, Network Administrator, (111) 222-3333
6 Click Apply.
Step Instructions
2 By default, all interfaces are selected. You can select the individual interfaces.
Note - If you do not specify agent addresses, the SNMP protocol responds to
requests from all interfaces.
Step Instructions
1 In the V1/V2 Settings section, in Read Only Community String, set a string
other than public.
You must always use this is a basic security precaution.
2 Optional.
Set a Read-Write Community String.
Warning - Set a read-write community string only if you have reason to
enable set operations, and if your network is secure.
Step Instructions
4 In the Security Level, select one of these options from the drop-down list:
n authPriv - The user has authentication and privacy pass phrases and
can connect with privacy encryption.
n authNoPriv - The user has only an authentication pass phrase and
can connect only without privacy encryption.
5 In the User Permissions, select one of these options from the drop-down
list:
n read-only
n read-write
6 In the Authentication Protocol, select one of these options from the drop-
down list:
n MD5
n SHA1
n SHA256
n SHA512
The default is MD5.
7 In the Authentication Pass Phrase, enter a password for the user that is
between 8 and 128 characters in length.
Step Instructions
9 In the Privacy Pass Phrase, enter a pass phrase that is between 8 and 128
characters in length.
Used for protection against disclosure of SNMP message payloads.
10 Click Save.
The new user shows in the table.
Step Instructions
2 In the V3 - User-Based Security Model (USM) section, select the user and
click Edit.
The Edit USM User window opens.
3 You can change the Security Level, User Permissions, the Authentication
Protocol, the Authentication Passphrase, or the Privacy Protocol.
4 Click Save.
Step Instructions
2 In the V3 - User-Based Security Model (USM) section, select the user and
click Remove.
The Deleting USM User Entry window opens.
Step Instructions
3 Click Save.
6 Click Apply.
Step Instructions
4 In the Version, select the SNMP Version for the specified receiver.
5 In the Community String, enter the SNMP community string for the
specified receiver.
6 Click Save.
Step Instructions
2 In the Trap Receivers Settings section, select the SNMP receiver and click
Edit.
The Edit Trap Receiver window opens.
3 You can change the SNMP version or the SNMP community string.
4 Click Save.
Step Instructions
2 In the Trap Receivers Settings section, select the SNMP trap receiver and
click Remove.
The Deleting Trap Receiver Entry window opens.
3 The window shows this message: Are you sure you want to delete "IPv4
address" entry?
Click Yes.
Step Instructions
5 In the Operator field, select the applicable operator to examine the value the
SNMP OID to query returns:
n Equal - The returned value is equal to the value in the Threshold field.
n Not_Equal - The returned value is not equal to the value in the
Threshold field.
n Less_Than - The returned value is less than the value in the
Threshold field.
n Greater_Than - The returned value is greater than the value in the
Threshold field.
n Changed - The returned value is different than the returned value in
the previous SNMP OID query.
Step Instructions
7 In the Frequency, enter the interval (in seconds) between the SNMP OID
queries.
Range: 1 - 4294967295.
9 Click Save.
Step Instructions
2 In the Custom Traps section, select the custom SNMP trap and click Edit.
The Edit Custom Trap window opens.
6 Click Save.
Step Instructions
2 In the Custom Traps section, select the custom SNMP trap and click
Remove.
3 The window shows this message: Are you sure you want to delete "<Name
of Custom Trap>" entry?
Click Yes.
Best Practice:
For commands that include "auth-pass-phrase", "privacy-pass-phrase", or
both, use the hashed commands.
To get the hashed password, run the "show configuration snmp" command.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
1. Enter:
add snmp
2. Press <SPACE>
3. Press <ESC><ESC>
Syntax
Description of commands
Command Description
identifiers:
from X.X to X.X.(124 sub-identifiers more)
l Number range of each sub-identifier: 0 - 4294967295.
o 0
Command Description
add snmp Adds a local interface to the list of local interfaces, on which the
interface ... SNMP daemon listens.
Syntax
Description of commands
Command Description
set snmp agent {on Enables (on) or disables (off) the SNMP Agent.
| off}
set snmp clear- Configures the indication of a custom SNMP trap termination.
trap ...
set snmp community Configures the SNMP community password and if this
<String> {read- password lets you only read the values of SNMP objects
only | read-write} (read-only), or set the values as well (read-write).
set snmp contact Configures the contact name for the SNMP community.
...
set snmp custom- Configures the settings of an existing custom SNMP trap.
trap ... See the explanations in the "add snmp custom-trap"
command.
set snmp location Configures the contact location for the SNMP community.
...
mode.
l On VSX Gateway, SNMP daemon runs only in
set snmp traps Configures the threshold for the SNMP coldStart trap.
coldStart-
threshold
<Seconds>
Command Description
set snmp traps Configures the polling interval for the SNMP traps.
polling-frequency
<Seconds>
set snmp traps Configures the IPv4 address of the SNMP Trap Sink.
receiver ...
set snmp traps Configures the user, which will generate the SNMP traps.
trap-user
<UserName>
set snmp vs- Enables (on) and disables (off) the SNMP direct queries on
direct-access {on the IP address of a Virtual System (not only VS0), or Virtual
| off} Router.
This mode works only when SNMP vs mode is enabled.
See the R80.40 VSX Administration Guide.
Syntax
Description of commands
Command Description
delete snmp contact ... Removes the contact name for the SNMP community.
delete snmp interface Removes the local interface from the list of local
<Name of Interface> interfaces, on which the SNMP daemon listens.
delete snmp location Removes the contact location for the SNMP
... community.
delete snmp traps Removes the threshold for the SNMP coldStart
coldStart-threshold trap.
delete snmp traps Removes the polling interval for the SNMP traps.
polling-frequency
delete snmp traps Removes the IPv4 address of the SNMP Trap Sink.
receiver <IPv4 address>
delete snmp traps trap- Removes the user, which will generate the SNMP
user <UserName> traps.
SNMP PDU
Within the SNMP PDU, the third field can include an error-status integer that refers to a
specific problem.
The integer zero (0) means that no errors were detected.
When the error field is anything other than 0, the next field includes an error-index value that
identifies the variable, or object, in the variable-bindings list that caused the error.
This table lists the error status codes and their meanings:
0 noError 10 wrongValue
1 tooBig 11 noCreation
2 NoSuchName 12 inconsistentValue
3 BadValue 13 resourceUnavailable
4 ReadOnly 14 commitFailed
5 genError 15 undoFailed
6 noAccess 16 authorizationError
7 wrongType 17 notWritable
8 wrongLength 18 inconsistentName
9 wrongEncoding
Note - You might not see the codes. The SNMP manager or utility interprets the
codes and then logs the appropriate message.
Within the SNMP PDU, the fourth field, contains the error index when the error-status field is
nonzero.
That is, when the error-status field returns a value other than zero, which indicates that an
error occurred. The error-index value identifies the variable, or object, in the variable-bindings
list that caused the error. The first variable in the list has index 1, the second has index 2, and
so on.
Within the SNMP PDU, the fifth field, is the variable-bindings field.
This field consists of a sequence of pairs:
n The first element in a pair is the identifier.
n The second element in a pair is one of these options: value, unSpecified,
noSuchOjbect, noSuchInstance, or EndofMibView.
This table describes the elements:
Variable-bindings
Description
element
value Value that is associated with each object instance. This value is
specified in a PDU request.
noSuchObject Indicates that the agent does not implement the object, to which it
refers by this object identifier.
noSuchInstance Indicates that this object does not exist for this operation.
GetRequest
This table lists possible value field sets in the response PDU or error-status messages when
performing an SNMP GetRequest.
noSuch If the variable's name does not exactly match the name of a variable,
Instance its value field is set to noSuchInstance.
genErr If the processing of a variable fails for any other reason, the
responding entity returns genErr and a value in the error-index field
that is the index of the problem object in the variable-bindings field.
tooBig If the size of the message that encapsulates the generated response
PDU exceeds a local limitation or the maximum message size of the
request's source party, then the response PDU is discarded and a
new response PDU is constructed. The new response PDU has an
error-status of tooBig, an error-index of zero, and an empty
variable-bindings field.
GetNextRequest
The only values that can be returned as the second element in the variable-bindings field to a
GetNextRequest when an error-status code occurs are unSpecified or endOfMibView.
GetBulkRequest
The GetBulkRequest minimizes the number of protocol exchanges and lets the SNMPv2
manager request that the response is large as possible.
The GetBulkRequest PDU has two fields that do not appear in the other PDUs: non-
repeaters and max-repetitions. The non-repeaters field specifies the number of variables in the
variable-bindings list, for which a single-lexicographic successor is to be returned. The max-
repetitions field specifies the number of lexicographic successors to be returned for the
remaining variables in the variable-bindings list.
If at any point in the process, a lexicographic successor does not exist, the endofMibView
value is returned with the name of the last lexicographic successor, or, if there were no
successors, the name of the variable in the request.
If the processing of a variable name fails for any reason other than endofMibView, no values
are returned. Instead, the responding entity returns a response PDU with an error-status of
genErr and a value in the error-index field that is the index of the problem object in the
variable-bindings field.
Job Scheduler
You can schedule regular jobs.
You can configure the jobs to run at the dates and times that you specify, or at startup.
Step Instructions
2 Click Add.
The Add A New Scheduled Job window opens.
Server:
source /etc/profile.d/CP.sh ; <Applicable
Check Point Command>
l On a Multi-Domain Server / Multi-Domain Log Server:
source /etc/profile.d/CP.sh ; source
$MDSDIR/scripts/MDSprofile.sh ; source
$MDS_SYSTEM/shared/mds_environment_utils.sh
; source $MDS_SYSTEM/shared/sh_utilities.sh
; <Applicable Check Point Command>
l On a Security Gateway / Cluster Members (non-VSX):
source /etc/profile.d/CP.sh ; <Applicable
Check Point Command>
l On a VSX Gateway / VSX Cluster Members:
source /etc/profile.d/CP.sh ; source
/etc/profile.d/vsenv.sh ; <Applicable Check
Point Command>
5 Below the Schedule, select the frequency (Daily, Weekly, Monthly, At startup)
for this job.
Where applicable, enter the Time of day for the job, in the 24-hour clock format
(HH:MM).
6 Click OK.
The job shows in the Scheduled Jobs table.
Step Instructions
7 In the E-mail Notification, enter the e-mail address, to which Gaia should send
the notifications.
Note - You must also configure a Mail Server (see "Mail Notification" on
page 267).
8 Click Apply.
Step Instructions
2 In the scheduled Jobs table, select the job that you want to edit.
3 Click Edit.
The Edit Scheduled Job opens.
5 Click OK.
Step Instructions
3 Click Delete.
4 Click OK to confirm.
(Click Cancel to abort.)
Description
Use these commands to configure Gaia to schedule jobs. The jobs run on the dates and times
you specify.
You can define an email address, to which Gaia sends the output of the scheduled job.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Syntax
Adding new scheduled jobs
add cron job <Job Name> command "<Command>" recurrence
daily time <HH:MM>
monthly month <1-12> days <1-31> time <HH:MM>
weekly days <0-6> time <HH:MM>
system-startup
Parameters
CLI Parameters
Parameter Description
Parameter Description
SmartEvent Server:
source /etc/profile.d/CP.sh ;
<Applicable Check Point Command>
l On a Multi-Domain Server / Multi-Domain Log
Server:
source /etc/profile.d/CP.sh ;
source
$MDSDIR/scripts/MDSprofile.sh ;
source $MDS_SYSTEM/shared/mds_
environment_utils.sh ; source
$MDS_SYSTEM/shared/sh_
utilities.sh ; <Applicable Check
Point Command>
l On a Security Gateway / Cluster Members (non-
VSX):
source /etc/profile.d/CP.sh ;
<Applicable Check Point Command>
l On a VSX Gateway / VSX Cluster Members:
source /etc/profile.d/CP.sh ;
source /etc/profile.d/vsenv.sh ;
<Applicable Check Point Command>
Parameter Description
recurrence Specifies that the job should run once a day - every day, at
daily time specified time.
<HH:MM> Enter the time of day in the 24-hour clock format -
<Hours>:<Minutes>.
Example: 14:35
recurrence Specifies that the job should run once a month - on specified
monthly month months, on specified dates, and at specified time.
<1-12> days <1- Months are specified by numbers from 1 to 12:
31> time
<HH:MM>
n January = 1
n February = 2
n ...
n December = 12
Dates of month are specified by numbers from 1 to 31.
To specify several consequent months, enter their numbers
separate by commas.
Example: For January, February, and March, enter 1,2,3
To specify several consequent dates, enter their numbers
separate by commas.
Example: For 1st, 2nd and 3rd day of the month, enter 1,2,3
recurrence Specifies that the job should run once a week - on specified days
weekly days <0- of week, and at specified time.
6> time <HH:MM> Days of week are specified by numbers from 0 to 6:
n Sunday = 0
n Monday = 1
n Tuesday = 2
n Wednesday = 3
n Thursday = 4
n Friday = 5
n Saturday = 6
To specify several consequent days of a week, enter their
numbers separate by commas.
Example: For Sunday, Monday, and Tuesday, enter 0,1,2
Parameter Description
mailto <Email Specifies the email address, to which Gaia sends the jobs'
Address> results.
Enter one email address for each command. You must also
configure a mail server (see "Mail Notification" on page 267).
Mail Notification
In This Section:
Introduction 267
Configuring Mail Notification in Gaia Portal 268
Configuring Mail Notification in Gaia Clish 269
Introduction
Mail notifications (also known as Mail Relay) allow you to send email from the Security
Gateway.
You can send email interactively or from a script. The email is relayed to a mail hub that sends
the email to the final recipient.
Mail notifications are used as an alerting mechanism when a Firewall rule is triggered. It is also
used to email the results of cron jobs to the system administrator.
Gaia supports these mail notification features:
n Presence of a mail client or Mail User Agent (MUA) that can be used interactively or from
a script.
n Presence of a Sendmail-like replacement that relays mail to a mail hub by using SMTP.
n Ability to specify the default recipient on the mail hub.
Gaia does not support these mail notification features:
n Incoming e-mail.
n Mail transfer protocols other than outbound SMTP.
n Telnet to port 25.
n E-mail accounts other than admin or monitor.
2 In the Mail Server field, enter the IPv4 Address or Hostname of the mail server.
For example: mail.example.com
4 Click Apply.
Description
Use this group of commands to configure mail notifications.
Syntax
n To configure the mail server that receives the mail notifications:
n To configure the user on the mail server that receives the mail notifications:
show mail-notification
server
username
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
server <IPv4 Address The IPv4 address or Hostname of the mail server, to which
or Hostname> Gaia sends mail notifications.
Example: mail.company.com
username <User Name> The username on the mail server that receives the admin
or monitor mail notifications.
Example: johndoe
Example
Messages
In This Section:
Comparison 270
Configuring Messages in Gaia Portal 270
Configuring Messages in Gaia Clish 271
Limits 274
You can configure Gaia to show a Banner Message and a Message of the Day to users when
they log in.
Comparison
Item Banner Message Message of the Day
When shown in Browser login page, before logging After logging in to the system
Gaia Portal in
When shown in When logging in, before entering the After logging in to the system
Gaia Clish password
5 Click Apply.
n To delete the configured message of the day, perform these two steps:
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Limits
Maximal supported Maximal supported Maximal supported
total number total number number of
Message type
of characters of lines characters
in the message in the message in each line
Banner 1600 20 80
Display Format
In This Section:
You configure format for the Time, Date, and IPv4 netmask on Gaia.
5 Click Apply.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Session
You can manage inactivity timeout for Gaia Portal and Gaia Clish.
2 In the Command Line Shell section, configure the inactivity timeout for the Gaia
Clish.
3 In the Web UI section, configure the inactivity timeout for the Gaia Portal.
n Range: 1 - 720 minutes
n Default: 10 minutes
Syntax
n To configure the timeout:
show inactivity-timeout
Parameters
Parameter Description
<Timeout> The inactivity timeout (in minutes) for the Gaia Clish.
n Range: 1 - 720 minutes
n Default: 10 minutes
Core Dumps
In This Section:
Introduction 278
Configuring Core Dumps in Gaia Portal 278
Configuring Core Dumps in Gaia Clish 280
Introduction
A process core dump file consists of the recorded status of the working memory of the Gaia
computer at the time that a Gaia process terminated abnormally.
When a process terminates abnormally, it produces a core dump file in the
/var/log/dump/usermode/ directory.
If the /log partition has less than 200 MB, no core dumps are created, and all core dumps are
deleted to create space. This prevents the core dump files from filling the /log partition.
Step Instructions
3 Click Apply.
Parameters
Parameter Description
Total space The maximum amount of disk space in MB that is used for storing core
limit dumps.
If disk space is required for a core dump, the oldest core dump is
deleted.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999 MB
n Default: 1000 MB
Dumps per The maximum number of dumps that are stored for each process
process executable (program) file.
A new core dump overwrites the oldest core dump.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999
n Default: 2
Example
There are two programs "A" and "B", and the per-process limit is limit is
2.
Program "A" terminates 1 time and program "B" terminates 3 times.
The core dumps that remain are:
n 1 core dump for program "A"
n 2 core dumps for program "B"
n Core dump 3 for program "B" is deleted because of the per-
process limit.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
total <0- The maximum amount of space that is used for core dumps. If space
99999> is required for a dump, the oldest dump is deleted.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999 MB
n Default: 1000 MB
per_process The maximum number of core dumps that are stored for each process
<0-99999> executable (program) file.
A new core dump overwrites the oldest core dump.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999
n Default: 2
Example
There are two programs "A" and "B", and the per-process limit is limit
is 2.
Program "A" terminates 1 time and program "B" terminates 3 times.
The core dumps that remain are:
n 1 core dump for program "A"
n 2 core dumps for program "B"
n Core dump 3 for program "B" is deleted because of the per-
process limit.
System Configuration
In This Section:
Important:
n Security Management Server R80.40 does not support IPv6 Address on Gaia
Management Interface (Known Limitation 01622840).
n Multi-Domain Server R80.40 does not support IPv6 at all (Known Limitation
PMTR-14989).
Before you can configure IPv6 addresses and IPv6 static routes, you must:
Step Instructions
2 Reboot.
Step Instructions
1 Enable the IPv6 support in Gaia OS on both the Security Management Server and
the Security Gateway (each Cluster Member).
5 Install the Access Control Policy on the Security Gateway (the Cluster) object.
2 From the navigation tree, click System Management > System Configuration.
4 Click Apply.
show ipv6-state
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Procedure
Step Instructions
Step Instructions
5 Reboot:
reboot
Important - IPv6 support is not
available until you reboot.
System Logging
You can configure the settings for the system logs, including sending them to a remote server.
Make sure to configure the remote server to receive the system logs.
Note - There are settings that you can configure only in Gaia Clish.
Step Instructions
Step Instructions
3 Click Apply.
Step Instructions
3 In the IP Address field, enter the IPv4 address of the remote syslog server.
4 In the Priority field, select the severity level of the logs that are sent to the
remote server.
These are the accepted values (as defined by the RFC 5424 - Section-6.2.1):
n All - All messages
n Debug - Debug-level messages
n Info - Informational messages
n Notice - Normal but significant condition
n Warning - Warning conditions
n Error - Error conditions
n Critical - Critical conditions
n Alert - Action must be taken immediately
n Emergency - System is unusable
5 Click OK.
Important - Do not to configure two Gaia computers to send system logs to each
other - directly, or indirectly. Such configuration creates a syslog forwarding loop,
which causes all syslog message to repeat indefinitely on both Gaia computer.
Step Instructions
3 Click Edit.
4 In the IP Address field, enter the IPv4 address of the remote syslog server.
5 In the Priority field, select the severity level of the logs that are sent to the
remote server.
6 Click OK.
Step Instructions
2 In the Remote System Logging section, select the remote syslog server.
3 Click Delete.
If it is necessary to add specific settings manually in these files (that Gaia OS does not
have), then it is necessary to make these files immutable, so Gaia OS does not overwrite
them:
1. Connect to the command line on Gaia OS.
2. Log in to the Expert mode.
3. Edit the applicable Syslog configuration file as required in your environment.
4. Examine the current attributes on the applicable configuration file you edited:
n lsattr /etc/syslog.conf
n lsattr /etc/sysconfig/syslog
5. Add the immutable attribute on the applicable configuration file you edited:
n chattr +i /etc/syslog.conf
n chattr +i /etc/sysconfig/syslog
6. Examine the current attributes on the applicable configuration file you edited:
n lsattr /etc/syslog.conf
n lsattr /etc/sysconfig/syslog
Description
You can configure the System Logging and Remote System Logging.
System Logging configures the Gaia to sends these logs:
n Gaia syslog messages to its Check Point Management Server
n Gaia audit logs upon successful configuration to its Check Point Management Server
n Gaia audit logs upon successful configuration to Gaia syslog facility
Remote System Logging configures a remote server, to which Gaia sends its syslog
messages.
Note - There are some command options and parameters, which you cannot
configure in the Gaia Portal.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
n To send the Gaia configuration audit logs to a Check Point Management Server:
show syslog
all
auditlog
cplogs
filename
mgmtauditlogs
show syslog
all
log-remote-address <IPv4 Address>
log-remote-addresses
CLI Parameters
Parameter Description
cplogs {on | Specifies if the Gaia sends the Gaia system logs to a Check Point
off} Management Server:
n on - Send Gaia system syslogs
n off - Do not send Gaia syslogs
Default: off
Note - This command corresponds to the Send Syslog
messages to management server option in the Gaia Portal
> System Management > System Logging.
mgmtauditlogs Specifies if the Gaia sends the Gaia audit logs (for configuration
{on | off} changes that authorized users make) to a Check Point
Management Server:
n on - Send Gaia audit logs
n off - Do not send Gaia audit logs
Default: on
Note - This command corresponds to the Send audit logs to
management server upon successful configuration option
in the Gaia Portal > System Management > System
Logging.
Parameter Description
auditlog Specifies if the Gaia saves the logs for configuration changes that
{disable | authorized users make:
permanent}
n disable - Disables the Gaia audit log facility
n permanent - Enables the Gaia audit log facility to save
information about all successful changes in the Gaia
configuration. To specify a destination file, run the set
syslog filename </Path/File> command
(otherwise, Gaia uses the default /var/log/messages
file).
Default: permanent
Note - This command corresponds to the Send audit logs to
syslog upon successful configuration option in the Gaia
Portal > System Management > System Logging.
/<Path>/<File> Configures the full path and file name of the system log.
Default: /var/log/messages
Note in Gaia Portal does not let you configure this setting.
<IPv4 Address> IPv4 address of the remote syslog server, to which Gaia sends its
system logs.
n Range: Dotted-quad ([0-255].[0-255].[0-255].[0-255])
n Default: No default value
Parameter Description
Notes:
n Until you configure at least one severity level for a given
remote server, Gaia does not send syslog messages.
n If you specify multiple severities, the most general least
severe severity always takes precedence.
Example
gaia> set syslog auditlog permanent
If it is necessary to add specific settings manually in these files (that Gaia OS does not
have), then it is necessary to make these files immutable, so Gaia OS does not overwrite
them:
1. Connect to the command line on Gaia OS.
2. Log in to the Expert mode.
3. Edit the applicable Syslog configuration file as required in your environment.
4. Examine the current attributes on the applicable configuration file you edited:
n lsattr /etc/syslog.conf
n lsattr /etc/sysconfig/syslog
5. Add the immutable attribute on the applicable configuration file you edited:
n chattr +i /etc/syslog.conf
n chattr +i /etc/sysconfig/syslog
6. Examine the current attributes on the applicable configuration file you edited:
n lsattr /etc/syslog.conf
n lsattr /etc/sysconfig/syslog
/var/log/routed_ Dedicated file that contains only the RouteD log messages.
messages In Gaia versions R80 and higher, the RouteD writes to this file
by default.
/var/log/messages This file contains log messages from different daemons and
from the operating system.
In Gaia versions R77.30 and lower, the RouteD writes to this
file by default.
Important - When you upgrade Gaia from R77.30 and
lower, the RouteD continues to write to this file.
Best Practice - Configure the RouteD to write its log
messages to the /var/log/routed_messages file.
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n When you change this configuration, it is not necessary to restart the RouteD
daemon, or reboot.
Step Instructions
1 From the left navigation tree, click Advanced Routing > Routing Options.
3 In the Maximum File Size field, enter the size (in megabytes) for each log file.
The default size is 1 MB.
When the active log file /var/log/routed_messages reaches the maximal
configured size, the Gaia OS rotates it and creates
the new /var/log/routed_messages file.
4 In the Maximum Number of Files field, enter the maximal number of log files to
keep.
The default is to keep 10 log files:
n /var/log/routed_messages
n /var/log/routed_messages.0
n /var/log/routed_messages.1
n ...
n /var/log/routed_messages.9
If the number of all log files reaches the maximal configured number, the Gaia
OS deletes the oldest file, and rotates the existing files.
The file names end with a number suffix. The greater the suffix number, the
older the file.
5 Click Apply.
Step Instructions
When the number of log files reaches the maximal configured number, the
Gaia OS deletes the oldest log file and rotates the existing log files.
The file names end with a number suffix. The greater the suffix number, the
older the log file.
Shel
Command Expected output
l
Gaia show n If default values were used for "maxnum" and "size":
Clish configura set routedsyslog on
tion
routedsys n If custom values were configured for "maxnum" and
log "size":
set routedsyslog on
set routedsyslog maxnum <Configured_
Value>
set routedsyslog size <Configured_Value>
Exp grep n If default values were used for "maxnum" and "size":
ert routedsys routed:instance:default:routedsyslog t
mod log
e /config/a n If custom values were configured for "maxnum" and
ctive "size":
routed:instance:default:routedsyslog t
routed:instance:default:routedsyslog:siz
e <Configured_Value>
routed:instance:default:routedsyslog:fil
es <Configured_Value>
Note - Disk space is added to the log volume by subtracting it from the disk space
used to store Gaia backup images.
Step Instructions
2 Reboot:
reboot
7 Reboot:
reboot
Network Access
Introduction
Telnet is not recommended for remote login, because it is not secure.
SSH, for example, provides much of the functionality of Telnet with good security.
Network access to Gaia using Telnet is disabled by default. You can allow Telnet access.
3 Click Apply.
Syntax
n To configure Telnet access:
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Host Access
You can configure hosts or networks that are allowed to connect to the Gaia Portal or Gaia
Clish on the Gaia device.
2 Click Add.
The Add a New Allowed Client window opens.
4 Click OK.
Syntax
n To add an allowed client:
add allowed-client
host
any-host
ipv4-address <Host IPv4 Address>
network ipv4-address <Network IPv4 Address> mask-length
<1-31>
delete allowed-client
host
any-host
host ipv4-address <Host IPv4 Address>
network ipv4-address <Network IPv4 Address>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
<Host IPv4 The IPv4 address of the allowed host in dotted decimal format
Address> (X.X.X.X)
<Network IPv4 The IPv4 address of the allowed network in dotted decimal
Address> format (X.X.X.X)
Example
Advanced Routing
Dynamic Routing is fully integrated into the Gaia Portal and Gaia Clish.
BGP, OSPF and RIP are supported.
Dynamic Multicast Routing is supported, with PIM (Sparse Mode (SM), Dense Mode (DM),
Source-Specific Multicast (SSM), and IGMP.
To learn about dynamic routing, see the R80.40 Gaia Advanced Routing Administration Guide.
User Management
This chapter describes how to manage passwords, user accounts, roles, authentication
servers, system groups, and Gaia Portal clients.
Note - When a user logs in to Gaia, the Gaia Portal navigation tree displayed and
Gaia Clish commands that are available depend on the role or roles assigned to the
user. If the user's roles do not provide access to a feature, the user does not see the
feature in the Gaia Portal navigation tree or in the list of commands. If the user has
read-only access to a feature, they can see the Gaia Portal page, but the controls are
disabled. Similarly, the user can run "show commands, but not "set", "add" or
"delete" commands.
Change My Password
A Gaia user can change their Gaia password.
4 In the Confirm New Password field, enter the new password again.
5 Click Apply.
Description
Change your own Gaia password, in an interactive dialog.
Syntax
set selfpasswd
Warning - We do not recommend to use this command:
set selfpasswd oldpass <Old Password> passwd <New
Password>
This is because the passwords are stored as plain text in the command history.
Instead, use the "set selfpasswd" command.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Users
Use the Gaia Portal and Gaia Clish to manage user accounts.
You can:
n Add users to your Gaia system.
n Edit the home directory of the user.
n Edit the default shell for a user.
n Give a password to a user.
n Give privileges to users.
User Description
admin Has full read/write capabilities for all Gaia features, from the Gaia Portal and
the Gaia Clish.
This user has a User ID of 0, and therefore has all of the privileges of a root
user.
monitor Has read-only capabilities for all features in the Gaia Portal and the Gaia Clish,
and can change its own password.
You must give a password for this user before the account can be used.
New users have read-only privileges to the Gaia Portal and the Gaia Clish by default.
You must assign one or more roles before the new users can log in.
Notes:
n You can assign permissions to all Gaia features or a subset of the features
without assigning a user ID of 0.
If you assign a user ID of 0 to a user account (you can do this only in the Gaia
Clish), the user is equivalent to the Admin user and the roles assigned to that
account cannot be modified.
n Do not define a new user for external users.
An external user is one that is configured on an authentication server (such as
RADIUS or TACACS), and not on the local Gaia system.
When you create a user, you can add predefined roles (privileges) to the user. For more
information, see "Roles" on page 316.
Warning - A user with read and write permission to the Users feature can change the
password of another user, or an admin user. Therefore, write permission to the Users
feature should be assigned with caution.
Step Instructions
2 Click Add.
6 In the Real Name field, enter the user's real name or other informative text.
This is an alphanumeric string that can contain spaces.
The default is the user's Login Name with capitalized first letter.
9 Select User must change password at next logon, if you wish to force the
user to change the configured password during the next login.
Note - If the user does not log in within the time limit configured in the Gaia
Portal > User Management > Password Policy page > Mandatory
Password Change section > Lockout users after password expiration >
Lockout user after X days, the user may not be able to log in at all.
Step Instructions
10 Optional: In the UID field, enter or select the applicable User ID:
n 0 for administrator users (this is the default option)
n An integer between 103 and 65533 for non-administrator users (for
example, for users with the default shell /usr/bin/scponly - see
sk88981)
13 Click OK.
* To configure these settings in Gaia Clish, see "Configuring Roles in Gaia Clish" on
page 321.
Login Shells
Shell Description
Shell Description
Step Instructions
3 Click Edit.
4 In the Real Name field, enter the user's real name or other informative text.
7 Select User must change password at next logon, if you wish to force the
user to change the configured password during the next login.
8 In the Available Roles list, select the roles you wish to assign to this user and
click Add >.
9 In the Assigned Roles list, select the roles you wish to remove from this user
and click Remove >.
10 Click OK.
Note - For the default users admin and monitor, you can only change the Shell and
Roles.
Deleting a user
Step Instructions
3 Click Delete.
4 Click OK to confirm.
Note - You cannot delete the default users admin and monitor.
Syntax
Adding a local user account
show users
Note - You cannot delete the default users admin and monitor.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
force- If you wish to force the user to change the configured password during
password- the next login, use the value "yes".
change {yes Note - If the user does not log in within the time limit configured
| no} by the "set password-controls expiration-lockout-
days" command, the user may not be able to log in at all.
Parameter Description
gid <System Configures System Group ID (0-65535) for the primary group, to
Group ID> which a user belongs.
The default is 100.
You can add the user to several groups.
Use the "add group" and "set group" commands to manage the
groups.
lock-out off Unlocks the user, if the user was locked out.
The password expiration date is adjusted, if necessary.
Parameter Description
Notes:
n Format:
$<Hash Standard>$<Salt>$<Encrypted>
n The length of this hash string must be less than 128
characters.
n <Hash Standard>
One of these digits:
l 1 = MD5
l 5 = SHA256
l 6 = SHA512
n <Salt>
A string of these characters:
a-z A-Z 0-9 . / [ ] _ ` ^
The length of this string must be between 2 and 16
characters.
n <Encrypted>
A string of these characters:
a-z A-Z 0-9 . / [ ] _ ` ^
The length of this string must be:
l For MD5, less than 22 characters.
Login Shells
Shell Description
Roles
Role-based administration (RBA) lets you create administrative roles for users. With RBA, an
administrator can allow Gaia users to access specified features by including those features in
a role and assigning that role to users. Each role can include a combination of administrative
(read/write) access to some features, monitoring (read-only) access to other features, and no
access to other features.
You can also specify which access mechanisms (Gaia Portal, or Gaia Clish) are available to
the user.
Note - When users log in to the Gaia Portal, they see only those features to which
they have read-only or read/write access. If they have read-only access to a feature,
they can see the settings pages, but cannot change the settings.
Role Description
Step Instructions
2 Click Add.
6 Click OK.
Step Instructions
3 Click Edit.
6 Click OK.
To delete a role
Step Instructions
3 Click Delete.
4 Click OK to confirm.
Note - You cannot delete the default roles adminRole and monitorRole.
Step Instructions
4 In the Available Users list, left-click the user you wish to add to the role.
To select several users:
a. Press and hold the CTRL key on the keyboard.
b. Left-click the applicable commands. The selected users become
highlighted.
6 Click OK.
Step Instructions
4 In the Users with Role list, left-click the user you wish to remove from the role.
To select several users:
a. Press and hold the CTRL key on the keyboard.
b. Left-click the applicable commands. The selected users become
highlighted.
6 Click OK.
Note - You can assign a user to many roles on the Users page (see "Users" on
page 306).
Syntax
To add an RBA role
add rba role <New Role Name> domain-type System
all-features
readonly-features <List of RO Features>
readwrite-features <List of RW Features>}
Note - You can add "readonly-features" and "readwrite-features" in the
same command.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Notes:
n There are no "set" commands for configured roles.
n You cannot delete the default roles adminRole or
monitorRole.
Parameters
CLI Parameters
Parameter Description
role <Role Name> Role name as a character string that contains letters,
numbers or the underscore (_) character.
The role name must start with a letter.
Parameter Description
virtual-system- Specifies which VSX Virtual Systems this role can access:
access {0 | all |
VSID1, VSID2, ...,
n 0 - Access only to VSX Gateway (VSX Cluster
VSIDn} Member) itself (context of VS0).
n all - Access to all Virtual Systems.
n VSID1,VSID2,...,VSIDn - Access only to
specified Virtual Systems. This is a comma-
separated list of Virtual Systems IDs (spaces are not
allowed in this syntax).
Notes:
n Press <SPACE><TAB> to see the list of
available features.
n You can add read-only and read-write feature
lists in the same "add rba role <Role
Name> domain-type System ..."
command.
Parameter Description
Notes:
n Press <SPACE><TAB> to see the list of
available features.
n You can add read-only and read-write feature
lists in the same "add rba role <Role
Name> domain-type System ..."
command.
user <User Name> User, to which access mechanism permissions and roles
are assigned.
access-mechanisms Defines the access mechanisms that users can work with
{Web-UI | CLI | Web- to manage Gaia:
UI,CLI}
n Web-UI - Access only to Gaia Portal
n CLI - Access only to Gaia Clish
n Web-UI,CLI - Access to both Gaia Portal and Gaia
Clish (spaces are not allowed in this syntax)
Example
gaia> add rba role NewRole domain-type System readonly-features vpn,ospf,rba readwrite-
features snmp
Command name
Command name
in Gaia Clish / Gaia Description
in Gaia Portal
gClish
Command name
Command name
in Gaia Clish / Gaia Description
in Gaia Portal
gClish
Command name
Command name
in Gaia Clish / Gaia Description
in Gaia Portal
gClish
Password Policy
This section explains how to configure your platform:
n To enforce creation of strong passwords.
n To monitor and prevent use of already used passwords.
n To force users to change passwords at regular intervals.
One of the important elements of securing your Check Point cyber security platform is to set
user passwords and create a good password policy.
Note - The password policy does not apply to non-local users that authentication
servers such as RADIUS manage their login information and passwords. In addition,
it does not apply to non-password authentication, such as the public key
authentication supported by SSH.
To set and change user passwords, see "Users" on page 306 and "User Management" on
page 304.
Password Strength
Strong, unique passwords that use a variety of character types and require password
changes, are key factors in your overall cyber security.
Procedure 353
Password Strength 354
Password History 355
Mandatory Password Change 356
Denying Access to Unused Accounts 357
Denying Access After Failed Login Attempts 358
Password Hashing Algorithm 359
Procedure
Step Instructions
3 Click Apply.
Password Strength
Parameter Description
Password History
Parameter Description
History Length The number of former passwords to keep and check against when a
new password is configured for a user.
n Range: 1 - 1000
n Default: 10
Parameter Description
Password Expiration The number of days, for which a password is valid. After that
time, the password expires.
The count starts when the user changes the password.
Users are required to change an expired password the next
time they log in.
Does not apply to SNMP users.
n Range: 1 - 1827, or Passwords never expires
n Default: Passwords never expires
Warn users before How many days before the user's password expires to start
password expiration generating warnings to the user that user must change the
password.
A user that does not log in, does not see this warning.
n Range: 1 - 366
n Default: 7
Force users to change Forces a user to change password at first login, after the
password at first login user's password was changed using the command "set
after password was user <UserName> password", or from the Gaia Portal
changed from Users page User Management > Users page.
n Default: Not selected
Parameter Description
Days of non-use Configures the number of days of non-use before locking out the
before lock-out unused account.
This only takes effect, if Deny access to unused accounts is
enabled.
n Range: 30 - 1827
n Default: 365
Parameter Description
Deny access after If the configured limit is reached, the user is locked out (unable to
failed login log in) for a configured time.
attempts Warning - Enabling this leaves you open to a "denial of service"
- if an attacker makes unsuccessful login attempts often
enough, the affected user account is locked out. Consider the
advantages and disadvantages of this option, in light of your
security policy, before enabling it.
n Default: Not selected
Block admin user This option is available only if Deny access after failed login
attempts is enabled.
If the configured limit of failed login attempts for the admin user is
reached, the admin user is locked out (unable to log in) for a
configured time.
Maximum number This only takes effect if Deny access after failed attempts is
of failed attempts enabled.
allowed The number of failed login attempts that a user is allowed before
being locked out.
After making that many successive failed attempts, future attempts
fail.
When one login attempt succeeds, counting of failed attempts
stops, and the count is reset to zero.
n Range: 2 - 1000
n Default: 10
Parameter Description
Allow access again This only takes effect, if Deny access after failed login attempts is
after time enabled.
Allow access again after a user was locked out (due to failed login
attempts).
The user is allowed access after the configured time, if there were
no login attempts during that time.
n Range: 60 - 604800 seconds
n Default: 1200 seconds (20 minutes)
Examples:
n 60 = 1 minute
n 300 = 5 minutes
n 3600 = 1 hour
n 86400 = 1 day
n 604800 = 1 week
Parameter Description
Password hashing Configures the hashing algorithm to store new passwords in the
algorithm Gaia database.
n Range: MD5, SHA256, or SHA512
n Default: MD5
Password Strength
Syntax
set password-controls
complexity <1-4>
min-password-length <6-128>
palindrome-check {on |off}
show password-controls
complexity
min-password-length
palindrome-check
show password-controls all
Parameters
Parameter Description
Password History
Syntax
set password-controls
history-checking {on | off}
history-length <1-1000>
show password-controls
history-checking
history-length
show password-controls all
Parameters
Parameter Description
history- The number of former passwords to keep and check against when a new
length <1- password is configured for a user.
1000>
n Range: 1 - 1000
n Default: 10
set password-controls
expiration-lockout-days <1-1827 | never>
expiration-warning-days <1-366>
force-change-when {no | password}
password-expiration <1-1827 | never>
show password-controls
expiration-lockout-days
expiration-warning-days
force-change-when
password-expiration
show password-controls all
Parameters
Parameter Description
expiration- How many days before the user's password expires to start
warning-days generating warnings to the user that user must change the
<1-366> password.
A user that does not log in, does not see this warning.
n Range: 1 - 366
n Default: 7
Parameter Description
force- Forces a user to change password at first login, after the user's
change-when password was changed using the command "set user
{no | <UserName> password", or from the Gaia Portal User
password} Management > Users page.
n Range:
l no - Disables this functionality.
password- The number of days, for which a password is valid. After that time,
expiration the password expires.
<1-1827 | The count starts when the user changes the password.
never> Users are required to change an expired password the next time
they log in.
Does not apply to SNMP users.
n Range: 1-1827, or never
n Default: never
Note - To see when Gaia OS changed the password for a specific user, run this
command in the Expert mode:
date -d @"$(dbget passwd:<username>:lastchg)"
n To configure the denial of access to unused accounts based on the number of days:
Parameters
Parameter Description
n To configure the denial of access to unused accounts based on the number of failed
login attempts:
Parameters
Parameter Description
allow-after Allow access again after a user was locked out (due to failed login
<60-604800> attempts).
The user is allowed access after the configured time, if there were no
login attempts during that time.
n Range: 60 - 604800 seconds
n Default: 1200 seconds (20 minutes)
Examples:
n 60 = 1 minute
n 300 = 5 minutes
n 3600 = 1 hour
n 86400 = 1 day
n 604800 = 1 week
Parameter Description
enable {on If the configured limit is reached, the user is locked out (unable to log
| off} in) for a configured time.
Warning - Enabling this leaves you open to a "denial of service" -
if an attacker makes unsuccessful login attempts often enough,
the affected user account is locked out. Consider the advantages
and disadvantages of this option, in light of your security policy,
before enabling it.
n Range: on, or off
n Default: off
Parameters
Parameter Description
Syntax
show password-controls
all
complexity
deny-on-fail
allow-after
block-admin
enable
failures-allowed
deny-on-nonuse
allowed-days
enable
expiration-lockout-days
expiration-warning-days
force-change-when
history-checking
history-length
min-password-length
palindrome-check
password-expiration
password-hash-type
Example
Password Strength
Minimum Password Length 6
Password Complexity 2
Password Palindrome Check on
Password History
Password History Checking off
Password History Length 10
Notes:
n For the initial setup, it is necessary to do each step only one time.
n To configure more SSH users, it is necessary to do only steps 1
through 7.
Procedure
1. Create a pair of SSH keys.
You can use these tools:
n On a Windows OS computer - the PuTTYgen tool.
n On the Gaia server (or on a OS computer) - the "ssh-keygen" command.
Important:
l To use the "ssh-keygen" command on the Gaia
server:
a. Connect to the command line and log in to the
Expert mode.
b. Save the pair of key files in some directory.
l Save the private SSH key file on your SSH client
computer.
l You configure the public SSH key on the Gaia server
later.
2. Configure a new user on the Gaia server for the SSH connection and assign the
administrator role.
You can create and configure a new user in Gaia Portal or Gaia Clish.
n In Gaia Portal:
Create a new user with these settings:
l Default shell: /bin/bash
l Assigned Role: adminRole (you can create another more limited role)
In our example, the username is: filecopy
See:
o "Managing User Accounts in Gaia Portal" on page 307
o "Configuring Roles in Gaia Portal" on page 317
In Gaia Clish:
MyGW>
Example:
cd ~ ; pwd
mkdir -v .ssh
touch ~/.ssh/authorized_keys
vi ~/.ssh/authorized_keys
d. Paste the SSH key you created earlier into this file.
e. Save the changes in the file and exit the editor.
8. Make the required changes in the SSH configuration template for the GaiaOperating
System:
a. Back up the sshd_config.templ file:
cp -v /etc/ssh/templates/sshd_config.templ{,_BKP}d
vi /etc/ssh/templates/sshd_config.templ
PasswordAuthentication yes
to:
PasswordAuthentication no
11. Close the current SSH connection for the new user.
12. Connect with an SSH client to the Gaia server.
13. Log in with the new user with the private SSH key.
In our example, the username is: filecopy
Example:
Authentication Servers
You can configure Gaia to authenticate Gaia users even when they are not configured locally.
This is a good way of centrally managing the credentials of multiple Security Gateways.
To define non-local Gaia users, you define Gaia as a client of an authentication server.
Gaia supports these types of authentication servers:
Server Description
When you configure Gaia OS to use several authentication methods, it uses them in this order:
1. RADIUS
2. TACACS+
3. Local
Authentication flow when a user enters the credentials:
Step Instructions
n Priority
The RADIUS server priority is an integer between -999 and 999 (default is 0).
When there two or more configured RADIUS servers, Gaia connects to the RADIUS server
with the highest priority.
Low numbers have the higher priority.
n Host
Host name or IP address (IPv4 or IPv6) of RADIUS server.
n UDP Port
UDP port used on RADIUS server.
The default port is 1812 as specified by the RADIUS standard.
The range of valid port numbers is from 1 to 65535.
Port 1645 is non-standard, but is commonly used as alternative to port 1812.
Warning - Firewall software frequently blocks traffic on port 1812. Make sure that you
define a Firewall rule to allow traffic on UDP port 1812 between the RADIUS server
and Gaia.
n Shared Secret
Shared secret used for authentication between the RADIUS server and the Gaia client.
Enter the shared secret text string up to 256 characters, without any whitespace characters
and without a backslash.
Make sure that the shared string configured on the Gaia matches the shared string
configured on the RADIUS server.
RFC 2865 recommends that the secret be at least 16 characters in length.
Some RADIUS servers have a maximum string length for shared secret of 15 or 16
characters.
See the documentation for your RADIUS server.
n Timeout in
Optional: Enter the timeout in seconds (from 1 to 5), during which Gaia waits for the
RADIUS server to respond. The default value is 3.
If there is no response after the configured timeout, Gaia tries to connect to a different
configured RADIUS server.
Set this timeout, so that the sum of all RADIUS server timeouts is less than 50.
4 Click OK.
Step Instructions
6 Optional: Select RADIUS Users Default Shell (for details about the shells, see "Users" on page 306).
This setting applies to all configured RADIUS servers.
8 Click Apply.
Step Instructions
3 Click Edit.
4 You can edit only the Host, UDP Port, Shared secret, and Timeout.
5 Click OK.
Step Instructions
3 Click Delete.
4 Click OK to confirm.
Description
Use the "aaa radius-servers" commands to add, configure, and delete Radius
authentication servers.
Syntax
To configure RADIUS for use in a single authentication profile
add aaa radius-servers priority <Priority> host <Hostname, or IP
Address of RADIUS Server> [port <1-65535>]
prompt-secret timeout <1-50>
secret <Shared Secret> timeout <1-50>
To show a list of all configured RADIUS servers associated with an authentication profile
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
prompt secret The system will prompt you to enter the Shared Secret.
secret <Shared Configures the shared secret used for authentication between
Secret> the RADIUS server and the Gaia.
Enter the shared secret text string up to 256 characters, without
any whitespace characters and without a backslash.
Make sure that the shared string configured on the Gaia
matches the shared string configured on the RADIUS server.
RFC 2865 recommends that the secret be at least 16
characters in length.
Some RADIUS servers have a maximum string length for
shared secret of 15 or 16 characters.
See the documentation for your RADIUS server.
timeout <1-50> Configures the timeout in seconds (from 1 to 5), during which
Gaia waits for the RADIUS server to respond.
The default value is 3.
If there is no response after the configured timeout, Gaia tries to
connect to a different configured RADIUS server.
Set this timeout, so that the sum of all RADIUS server timeouts
is less than 50.
default- Optional: Configures the default shell for RADIUS Users (for
shell details about the shells, see "Users" on page 306).
<SPACE><TAB>
super-user-uid Optional: Configures the UID for the RADIUS super user.
<0 | 96> If the UID is 0, there is no need to run the sudo command to get
super user permissions (see "Configuring RADIUS Servers for
Non-Local Gaia Users" on page 382).
Step Instructions
Note - Do not define a new user for external users. An external user is one that is
configured on an authentication server (such as RADIUS or TACACS), and not on the
local Gaia system.
Important - If you define a RADIUS user with a null password (on the RADIUS
server), Gaia cannot authenticate that user.
Step Instructions
a. Copy this file from the Gaia to the RADIUS server to the
/etc/freeradius/ directory:
/etc/radius-dictionaries/dictionary.checkpoint
b. Add this line to the /etc/freeradius/dictionary file:
"$INCLUDE dictionary.checkpoint"
Step Instructions
a. Copy this file from the Gaia to the RADIUS server to the
/etc/openradius/subdicts/ directory:
/etc/radius-dictionaries/dict.checkpoint
b. Add this line /etc/openradius/dictionaries file immediately
after the dict.ascend:
$include subdicts/dict.checkpoint
3 Define the Check Point users that must have superuser access to the Gaia
shell.
Add this Check Point Vendor-Specific Attribute to users in your RADIUS server
user configuration file:
n If this user should not receive superuser permissions:
CP-Gaia-SuperUser-Access = 0
n If this user can receive superuser permissions:
CP-Gaia-SuperUser-Access = 1
To log in as a superuser
A user with super user permissions can use the Gaia shell to do system-level operations,
including working with the file system.
Super user permissions are configured in the Check Point Vendor-Specific Attributes.
Users that have a UID of 0 have super user permissions.
They can run all the commands that the root user can run.
Users that have a UID of 96 must run the sudo command to get super user permissions.
The UIDs of all non-local users are configured in the /etc/passwd file.
To get super user permissions (for users that have a UID of 96)
Step Instructions
3 Run:
sudo /usr/bin/su -
The user now has superuser permissions.
Step Instructions
3 Click Apply.
Step Instructions
servers.
First, Gaia connects to the TACACS+ server with the lowest priority
number.
For example: Three TACACS+ servers have a priority of 1, 5, and
10 respectively.
Gaia connects to these TACACS+ servers in that order, and uses
the first TACACS+ server that responds.
l To identify the TACACS+ server in commands. A command with
6 Click OK.
Step Instructions
Step Instructions
3 Click Apply.
Step Instructions
3 Click Delete.
4 Click OK to confirm.
Syntax
To configure TACACS+ server for use in a single authentication profile
To show a list of all configured TACACS+ servers associated with an authentication profile
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
key <Shared The Shared Secret used for authentication between the
Secret> TACACS+ server and Gaia.
Enter the shared secret text string up to 256 characters,
without any whitespace characters and without a backslash.
Make sure that the shared string defined on the Gaia
matches the shared string defined on the TACACS+ server.
timeout <1-60> Enter the timeout in seconds, during which Gaia waits for the
TACACS+ server to respond.
If there is no response after the configured timeout, Gaia tries
to connect to a different configured TACACS+ server.
n Range: 1 - 60
n Default: 5
Parameter Description
new-priority <New Configures the new priority for the TACACS+ server.
Priority>
Example
Step Instructions
3 Run:
show tacacs_enable
Important:
1. All TACACS+ users must log in to Gaia OS with the password assigned to the
default role TACP-0.
2. To get their applicable TACP role in Gaia OS, after this initial login, TACACS+
users must log in for the second time with the password assigned to their
applicable TACP role.
Privilege Escalation
The Gaia admin user can define roles that make it possible for Gaia users to get temporarily
higher privileges, than their regular privileges.
For example, Gaia user Fred needs to configure the interfaces, but his role does not support
interfaces configuration. To configure the interfaces, Fred enters his user name together
with a password given him by the admin user. This password lets him change his default
role to the role that allows him to configure the interfaces.
There are sixteen different privilege levels (0 - 15) configured in TACACS+.
Each level can be mapped to a different Gaia role.
For example:
n Privilege level 0 - monitor-only
n Privilege level 1 - basic network configuration
n Privilege level 15 - admin user
By default, all non-local TACACS+ Gaia users are assigned the role TACP-0.
The Gaia admin can define for them roles with the name TACP-N that give them different
privileges, where N is a privilege level - a number from 1 to 15.
The TACACS+ users can changes their own privileges by moving to another TACP-N role.
To do this, the TACACS+ users need to get a password from the Gaia admin user.
Step Instructions
Step Instructions
4 Optional: Define one or more roles with the name TACP-N where N is a
privilege level - a number from 1 to 15, and define the features for each role.
You can raise the "TACP" privileges in either Gaia Portal, or Gaia Clish.
Raising "TACP" privileges in Gaia Portal
Step Instructions
3 To raise the privileges to the TACP-N role (N is a number from 1 to 15), click
Enable at the top of the Overview page.
Step Instructions
2 Log in to the Gaia Clish using the username and password of the TACACS+
user.
3 After you are authenticated by the TACACS server, you get the Gaia Clish
prompt.
At this point, you have the privileges of the TACP-0 role.
Run:
tacacs_enable TACP-<N>
Where N is the new TACP role (an integer from 1 to 15).
To go back to the TACP-0 role, press CTRL+D, or enter exit at the command prompt.
The user automatically exits the current shell and goes back to TACP-0.
Note - Do not define a new user for external users. An external user is one that is
configured on an authentication server (such as RADIUS, or TACACS), and not on
the local Gaia system.
Step Instructions
3 Run:
show tacacs_enable
You must configure the TACACS server to correctly authenticate and authorize non-local Gaia
users.
Important - If you define a TACACS user with a null password (on the TACACS
server), Gaia cannot authenticate that user.
System Groups
In This Section:
Introduction 395
Configuring System Groups in Gaia Portal 396
Configuring System Groups in Gaia Clish 398
Introduction
You can define and configure groups with Gaia as you can with equivalent Linux-based
systems.
This function is retained in Gaia for advanced applications and for retaining compatibility with
Linux.
Use groups for these purposes:
n Specify Linux file permissions.
n Control who can log in through SSH.
For other functions that are related to groups, use the role-based administration feature,
described in "Roles" on page 316.
All users are assigned by default to the users group. You can edit a user's primary group ID
(using Gaia Clish) to be something other than the default. However, you can still add the user
to the users group. The list of members of the users group includes only users, who are
explicitly added to the group. The list of does not include users added by default.
Step Instructions
2 Click Add.
3 In the Group Name field, enter the applicable unique name - between 1 and 16
alphanumeric characters without spaces.
4 In the Group ID field, enter a unique Group ID number - between 101 and
65530:
n Group ID range 0-100 and range 65531-65535 are reserved for system
use.
n Group ID 0 is reserved for users with root permissions.
n Group ID 10 is reserved for the predefined Users groups.
If you specify a value in the reserved ranges, an error message is displayed.
5 Click OK.
Step Instructions
3 Click Edit.
Step Instructions
6 Click OK.
Step Instructions
3 Click Edit.
6 Click OK.
Step Instructions
3 Click Delete.
4 Click OK to confirm.
Syntax
To add a System Group
show groups
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
GUI Clients
In This Section:
If this is a Security Management Server, you can configure which computers can connect to
this Security Management Server with SmartConsole.
2 Click Add.
The Add GUI Client window opens.
2 Run:
cpconfig
For more information, see the R80.40 CLI Reference Guide > Chapter Security
Management Server Commands > Section cpconfig.
High Availability
In This Section:
Understanding VRRP
Virtual Routing Redundancy Protocol (VRRP) is a high-availability solution, where two Gaia
Security Gateways can provide backup for each other. Gaia offers two ways to configure
VRRP:
n Monitored Circuit/Simplified VRRP - All the VRRP interfaces automatically monitor
other VRRP interfaces.
n Advanced VRRP - Every VRRP interface must be explicitly configured to monitor every
other VRRP interface.
Important:
n You cannot have a Standalone deployment (Security Gateway and Security
Management Server on the same computer) in a Gaia VRRP cluster.
n You cannot use both the Monitored Circuit/Simplified VRRP and Advanced
VRRP together on the same Cluster Member.
Virtual Router Redundancy Protocol (VRRP) provides dynamic failover of IP addresses from
one router to another in the event of failure. This increases the availability and reliability of
routing paths through gateway selections on an IP network. Each VRRP router has a unique
identifier known as the Virtual Router Identifier (VRID), which is associated with at least one
Virtual IP Address (VIP). Neighboring network nodes connect to the VIP as a next hop in a
route or as a final destination. Gaia supports VRRP as configured in RFC 3768.
VRRP Terminology
The conceptual information and procedures in this chapter use standard VRRP terminology.
This glossary contains basic VRRP terminology and a reference to related Check Point
ClusterXL terms.
ClusterXL
VRRP Term Definition
Term
VRID Cluster Unique Virtual Router identifier The VRID is the also last
name byte of the MAC address.
VRRP on Gaia OS
On Gaia, VRRP can be used with ClusterXL enabled or with ClusterXL disabled.
VRRP with
Description
ClusterXL
Advanced VRRP To configure this advanced VRRP method, in the Gaia Portal go to
High Availability > Advanced VRRP.
This method allows configuration of different VRIDs on different
interfaces.
You configure a VRID on each interface individually. In addition,
each VRRP-enabled interface must be monitored by each VRID
together with an appropriate priority delta. This ensures that when
one interface fails, all the other VRIDs can transition to VRRP
Backup state
n With ClusterXL enabled, you must configure each VRID to
monitor every other VRRP interface.
You must also configure priority deltas that allow complete
node failover.
Advanced VRRP also makes it possible for a VRID to monitor
interfaces that do not run VRRP.
n With ClusterXL disabled, you can configure two VRIDs on
each interface, with one VIP for each VRID.
VRRP advertisements broadcast the operational status of the VRRP Master to the VRRP
Backup.
Gaia uses dynamic routing protocols to advertise the VIP of the Virtual Router (Virtual IP
address or Backup IP address).
Notes:
n Gaia supports OSPF on VPN tunnels that terminate at a VRRP group.
n Active/Backup VRRP environments are supported with ClusterXL enabled.
If ClusterXL is disabled, Active/Active environments can be deployed.
n Active/Active VRRP environments support only static routes. In addition, you
must disable the monitoring of the Check Point Firewall by VRRP.
If the VRRP Master fails, or its VRRP-enabled interfaces fail, VRRP uses a priority algorithm to
make the decision if failover to a VRRP Backup is necessary. Initially, the VRRP Master is the
Security Gateway that has the highest configured priority value. You configure a priority for
each Security Gateway when you create a Virtual Router or change its configuration. If two
VRRP Security Gateways have same priority value, the platform that comes online and
broadcasts its VRRP advertisements first becomes the VRRP Master.
Gaia also uses priorities to select a VRRP Backup Security Gateway upon failover (when there
is more than one VRRP Backup available). In the event of failover, the Virtual Router priority
value is decreased by a predefined Priority Delta value to calculate an Effective Priority value.
The Virtual Router with the highest effective priority becomes the new VRRP Master. The
Priority Delta value is a Check Point proprietary parameter that you configure when configuring
a Virtual Router. If you configure your system correctly, the effective priority will be lower than
the VRRP Backup Security Gateway priority in the other Virtual Routers. This causes the
problematic VRRP Master to fail over for the other Virtual Routers as well.
Note - If the effective priority for the current VRRP Master and VRRP Backup are the
same, the Security Gateway with the highest IP address becomes the VRRP Master.
This is a simple VRRP use case, where Security Gateway 1 is the VRRP Master, and
Security Gateway 2 is the VRRP Backup.
Virtual Router redundancy is available only for connections to and from the internal network.
There is no redundancy for external network traffic.
Item Description
This use case shows an example of an environment, where there is redundancy for internal
and external connections.
Here, you can use Virtual Routers for the two Security Gateways - for internal and for
external connections.
The internal and external interfaces must be on different subnets.
Configure one Security Gateway as the VRRP Master and one Security Gateway as the
VRRP Backup.
Item Description
This use case shows an example of an Active/Active Load Sharing environment for internal
network traffic.
This environment gives load balancing, as well as full redundancy.
This configuration is supported with ClusterXL disabled. Only Static Routes are supported.
The monitoring of the Check Point Firewall by VRRP must be disabled (it is enabled by
default).
A maximum of two VRIDs is supported per interface.
Security Gateway 1 is the VRRP Master for VRID 5, and Security Gateway 2 is the VRRP
Backup.
Security Gateway 2 is the VRRP Master for VRID 7, and Security Gateway 1 is the VRRP
Backup.
The two Security Gateways are configured to back each other up. If one fails, the other
takes over its VRID and IP addresses.
Item Description
1 VRRP Master Security Gateway for VRID 5 and VRRP Backup for VRID 7
2 VRRP Backup Security Gateway for VRID 5 and VRRP Master for VRID7
If you use switches from a different vendor, we recommend that you use the equivalent
feature for that vendor. If you use the Spanning Tree protocol without PortFast, or its
equivalent, you may see delays during VRRP failover.
Step Instructions
3 Optional: Add host names and IP address pairs to the host table on each
Security Gateway (see "Hosts" on page 170).
This lets you use host names as an alternative to IP addresses or DNS servers.
Step Instructions
Step Instructions
Step Instructions
Notes
Gaia starts to monitor the Firewall after the cold start delay completes.
This can cause some problems:
n If all the interfaces in a Virtual Router fail, all VRRP Cluster Members become
VRRP Backups.
None of the VRRP Cluster Members can become the VRRP Master and no traffic is
allowed.
n If you change the time on any of the VRRP Cluster Members, a VRRP failover
occurs automatically.
n In certain situations, installing a policy causes a failover.
This can happen if it takes a long time to install the policy.
This section includes the procedure for configuring Monitored Circuit/Simplified VRRP.
Step Instructions
Step Instructions
password
You must use the same authentication method for all Security
Gateways in a Virtual Router.
n Priority Delta - Enter the value to subtract from the Priority to create an
effective priority when an interface fails. The range is 1-254.
If an interface fails on the VRRP Backup, the value of the priority delta is
subtracted from its priority. This gives a higher effective priority to another
Security Gateway member.
If the effective priority of the current VRRP Master is less than that of the
VRRP Backup, the VRRP Backup becomes the VRRP Master for this
Virtual Router. If the effective priority for the current VRRP Master and
VRRP Backup are the same, the gateway with the highest IP address
becomes the VRRP Master.
n Auto-deactivation - When an interface is reported as DOWN, a cluster
member's Priority value is reduced by the configured Priority Delta
amount. If another cluster member exists with a higher Priority, it will then
take over as VRRP Master to heal the network.
By default, some Cluster Member is elected as VRRP Master, even if all
Cluster Members have issues and are reporting a Priority of zero.
The auto-deactivation option can be enabled to change this behavior and
ensure that no Cluster Member is elected as VRRP Master, if all Cluster
Members have a Priority of zero.
Step Instructions
When this option is enabled, Priority Delta should be set equal to the
Priority value, so that Priority becomes zero, if an interface goes down.
you define this mode for the VRRP Master and the VRRP Backup,
the VMAC is different for each. VRRP IP addresses are related to
different VMACs. This is because they are dependent on the
physical interface MAC address of the currently configured VRRP
Master.
Note -If you configure different VMACs on the VRRP Master and
VRRP Backup, you must make sure that you select the correct
proxy ARP setting for NAT.
l Static - Manually set the VMAC address. Enter the VMAC address
Click OK.
The new VMAC mode shows in the in the Backup Address table.
Step Instructions
7 Click Save.
Syntax
To add Monitored Circuit/Simplified VRRP
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
vmac-mode Configures how the Virtual MAC (VMAC) address is calculated for
{default-vmac the given Virtual IP Address.
| extended- Each Virtual IP Address for a Virtual Router implies the existence of
vmac | a virtual network interface.
interface-
vmac |
n Range:
l default-vmac - Generates the VMAC using the
static-vmac
VALUE} standard method described in Section 7.3 of RFC 3768.
l extended-vmac - Generates the VMAC using an
hello- The interval in seconds, at which the VRRP Master sends VRRP
interval advertisements. For a given Virtual Router, all VRRP cluster
VALUE members should have the same value for Hello Interval.
n Range: default, or 1 - 255
n Default: 1
Parameter Description
Advanced VRRP lets you configure Virtual Routers at the interface level.
This section contains only those procedures that are directly related to Advanced VRRP
configuration.
The general procedures for configuring VRRP clusters are described in "Configuring
Monitored Circuit/Simplified VRRP" on page 414.
With Advanced VRRP, you must configure every Virtual Router to monitor every configured
VRRP interface.
Step Instructions
You cannot move a Backup Address from one interface to another while a Security
Gateway is a VRRP Master.
Perform these steps to delete and add new interfaces with the necessary IP addresses:
Step Instructions
Step Instructions
Step Instructions
Step Instructions
n Preempt Mode - If you keep it selected (the default), when the original
VRRP Master fails, a VRRP Backup system becomes the acting VRRP
Master. When the original VRRP Master returns to service, it becomes
VRRP Master again.
If you clear it, when the original VRRP Master fails, a VRRP Backup
system becomes the acting VRRP Master, and the original does not
become VRRP Master again when it returns to service.
Step Instructions
n VMAC Mode - For each Virtual Router, a Virtual MAC (VMAC) address is
assigned to the Virtual IP address. The VMAC address is included in all
VRRP packets as the source MAC address. The physical MAC address
is not used.
Select the mode:
l VRRP - Sets the VMAC to use the standard VRRP protocol. It is
you define this mode for the VRRP Master and the VRRP Backup,
the VMAC is different for each. VRRP IP addresses are related to
different VMACs. This is because they are dependent on the
physical interface MAC address of the currently configured VRRP
Master.
Note - If you configure different VMACs on the VRRP Master
and VRRP Backup, you must make sure that you select the
correct proxy ARP setting for NAT.
l Static - Manually set the VMAC address. Enter the VMAC address
n Authentication:
l None - To disable authentication of VRRP packets.
password.
You must use the same authentication method for all Security Gateways
in a Virtual Router.
Step Instructions
7 Click Save.
Syntax
To configure Advanced VRRP
set vrrp
accept-connections {on | off}
coldstart-delay VALUE
disable-all-virtual-routers {on | off}
monitor-firewall {on | off}
interface-delay VALUE
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
interface-delay The Interface Delay controls how long to wait (in seconds) after
<VALUE> receiving an interface UP notification before VRRP assesses
whether or not the related VRRP cluster member should
increase its priority, and possibly become the new VRRP
Master. The delay ensures that VRRP does not attempt to
respond to interfaces, which are only momentarily active.
Note - Same value should be configured for both VRRPv2 and
VRRPv3 if both protocols are configured.
n Range: 0 - 3600
n Default: 0
interface VALUE The name of the interface, on which to enable the VRRP.
Parameter Description
Parameter Description
monitored- Configures the list of monitored interfaces names for the given
interface VALUE Virtual Router.
{on | off |
priority-delta
n on - Creates a VRRP Virtual Router
<default | 1 -
n off - Removes a VRRP Virtual Router
254>} n priority-delta - Configures the Priority Delta value
When an interface fails, VRRP causes the backup cluster
member to take over for that interface. The VRRP interface
should also fail over when a different interface fails (if traffic is
routed between the interfaces).
Otherwise, network destinations will become unreachable, etc.
This coordinated failover is achieved by adding all dependent
interfaces to the list of monitored interfaces.
The relative importance of each monitored interface is
expressed by its Priority Delta value. More important interfaces
should have higher Priority Deltas. Priority Delta causes the
correct failover decision, if both cluster members are
experiencing failures on different interfaces.
Refer to the following commands for additional details:
n set vrrp interface <VALUE> monitored-
circuit vrid <VALUE> priority
n set vrrp interface <VALUE> monitored-
circuit vrid <VALUE> monitored-interface
<VALUE> priority-delta
Parameter Description
Troubleshooting VRRP
In This Section:
This section shows known issues with VRRP configurations and fixes.
Step Instructions
2 In the Trace Options section, in the Filter Visible Tables Below drop down list,
select VRRP.
4 Click Add.
The selected options show Enabled.
Step Instructions
Step Instructions
2 In the Trace Options section, in the Filter Visible Tables Below drop down list,
select VRRP.
In the VRRP table, select All.
3 Click Remove.
The options do not show Enabled anymore.
Firewall Policies
Configure the Access Control Policy to accept VRRP packets to and from the Gaia platform.
The multicast destination assigned by the IANA for VRRP is 224.0.0.18. If the Access Control
Policy does not accept packets sent to 224.0.0.18, Security Gateways in one Virtual Router
take on VRRP Master state.
It might be not possible to disable the MAC address caching. If so, set the address aging
value sufficiently low that the MAC addresses age out after a one second or two
seconds. This causes more overhead on the switch. Therefore, find out if this is a viable
option for your switch model.
The Spanning Tree Protocol (STP) prevents Layer 2 loops across multiple bridges. Spanning-
Tree can be enabled on the ports connected to the two sides of a VRRP cluster. It can also
"see" multicast VRRP Hello packets coming for the same MAC address on two different ports.
When the two occur, it can suggest a loop, and the switch blocks traffic on one port. If a port is
blocked, the VRRP cluster members cannot get VRRP Hello packets from each other. As a
result, both VRRP cluster members enter the VRRP Master state.
If possible, turn off Spanning-Tree on the switch to resolve this issue. However, this can have
harmful effects, if the switch is involved in a bridging loop. If you cannot disable Spanning-
Tree, enable PortFast on the ports connected to the VRRP cluster members. PortFast causes
a port to enter the Spanning-Tree forwarding state immediately, by passing the listening and
learning states.
Maintenance
This chapter includes procedures and reference information for:
n Working with License
n Snapshot Management
n Download of SmartConsole
n Hardware Health Monitoring
n Monitoring RAID Synchronization
n Shut Down and Reboot
n System Backup
License Status
In This Section:
Note - While all the "cplic" commands are available in Gaia, they are not
grouped into a Gaia feature.
Step Instructions
Step Instructions
Step Instructions
4 Click New.
5 Enter the license data manually, or click Paste License to enter the data
automatically.
The Paste License button only appears in Internet Explorer.
For other web browsers, paste the license strings into the empty text field.
6 Click OK.
Step Instructions
5 Click Delete.
6 Click OK.
Note - To delete a license in the command line, use the "cplic del" command
(see the R80.40 CLI Reference Guide).
Snapshot Management
A snapshot is a backup of the system settings and products. It includes:
n File system, with customized files
n System configuration (interfaces, routing, hostname, and similar)
n Software Blades configuration
n Management database (on a Security Management Server or a Multi-Domain Server)
A snapshot is very large. A snapshot includes the entire root partition, part of the /var/log
partition, and other important files.
For this reason, snapshots cannot be scheduled the same way that Backups can.
Backup and Restore is the preferred method of recovery.
Notes:
n When Gaia creates a snapshot, all system processes and services continue to
run.
Policy enforcement is not interrupted.
n You can import a snapshot created on a different software release or on this
software release.
You must import a snapshot on the appliance or open server of the same
hardware model, from which it was exported.
n After importing the snapshot, you must activate the device license from the Gaia
Portal or the User Center.
n We do not recommend to use snapshots as a way of regularly backing up your
system.
System Backup is the preferred method.
Schedule system backups on a regular basis, daily or weekly, to preserve the
Gaia OS configuration and Firewall database.
Snapshot Options
Option Description
Snapshot Prerequisites
n Before you revert to a snapshot on a new appliance, or after a reset to factory defaults,
you must run the Gaia First Time Configuration Wizard and configure the same settings
as before you created the snapshot.
n Before you create a new snapshot image, make sure the appliance or storage
destination meets these prerequisites:
l The required free disk space is the size of the system root partition multiplied by
1.15.
3 Run:
show snapshots
The output shows the amount of space on the disk
available for snapshots.
The value in the output does not represent all of the
unallocated space on the disk.
l The free disk space required in the export file location is the size of the snapshot
image multiplied by 2.
Step Instructions
4 Click OK.
Step Instructions
4 Make sure that there is enough free disk space in the /var/log/ partition:
a. Connect to the command line on Gaia.
b. Log in to the Expert mode.
c. Run:
df -kh | egrep "Mounted|/var/log"
Check the value in the Avail column.
6 Click Export.
The Export Image window opens.
Important - You must not rename the exported image. If you rename a snapshot
image, it is not possible to revert to it.
Importing a snapshot
To use the snapshot on another appliance, it has to be the same type of appliance you used
to export the image.
Step Instructions
4 Click Upload.
5 Click OK.
Step Instructions
3 Click Revert.
The Revert window opens.
Important - Pay close attention to the warnings about overwriting settings,
the credentials, and the reboot and the image details.
4 Click OK.
Deleting a snapshot
Step Instructions
3 Click Delete.
The Delete Image window opens.
4 Click OK.
Description
Manage system images (snapshots).
Syntax
Viewing information about existing snapshot images
show snapshots
show snapshot <Name of Snapshot>
all
date
desc
size
Parameters
Parameter Description
export <Name of Selects the snapshot image you export by the specified
Snapshot> name.
You must enter a string that does not contain spaces.
import <Name of Selects the snapshot image you import by the specified
Snapshot> name.
You must enter a string that does not contain spaces.
path <Path> Configures the path to the specified snapshot image file
(for example: /var/log/).
name <Name of Configures the name, under which the exported snapshot
Exported Snapshot> image file is stored on the hard disk.
You must enter a string that does not contain spaces.
name <Name of Configures the name, under which the imported snapshot
Imported Snapshot> image is stored on Gaia.
You must enter a string that does not contain spaces.
Example
Best Practices:
> n Create a snapshot image before you restore a factory default image.
n Export all existing snapshots from the appliance before you restore a factory
default image.
Step Instructions
3 Click Apply.
Step Instructions
3 Run:
set fcd revert<SPACE><TAB>
set fcd revert <Name of Default
Image>
5 Reboot:
reboot
Download SmartConsole
You can download the SmartConsole application package from the Gaia Portal of your
Security Management Server / Multi-Domain Server / Standalone Server.
Step Instructions
For next steps in SmartConsole, refer to the R80.40 Security Management Administration
Guide.
You can see the status of the machine fans, system temperature, the voltages, and (for
supported hardware only) the power supply.
For each component sensor, the table shows the value of its operation, and the status: OK,
Low, or High.
n To see the health history of a component, select the component sensor. A graph shows
the values over time.
n To change the time intervals that the graph shows, click the Minute arrows.
n To view different times, click the Forward/Backward arrows.
n To refresh, click Refresh.
Description
These commands display the status for various system hardware components.
Components, for which the status can be shown, include BIOS, cooling fans, power supplies,
temperature, and voltages.
Note - The command returns information only for installed hardware components and
only on supported hardware.
Syntax
show sysenv
all
bios
fans
ps
temp
volt
Parameters
Parameter Description
Example
Hardware Information
gaia>
Command Description
Description
Shows information about the hardware, on which Gaia is installed.
You can run this command in Gaia Clish only.
The information shown depends on the type of hardware.
Common types of information shown are:
n Serial number
n Amount of physical RAM
n CPU frequency
n Number of disks in the system
n Disk capacity
Syntax
show asset<SPACE><TAB>
show asset all
show asset <Category Name>
Parameters
Parameter Description
Parameter Description
Example output
Description
Shows information from supported hardware sensors.
You can run this command in Gaia Clish, or the Expert mode.
Syntax
cpstat os -f sensors
Example output
Temperature Sensors
------------------------------------------------
|Name |Value|Unit |Type |Status|
------------------------------------------------
|CPU1 Temp |49.50|degrees C|Temperature| 0|
|CPU0 Temp |52.75|degrees C|Temperature| 0|
|Outlet Temp|27.50|degrees C|Temperature| 0|
|Intake Temp|28.75|degrees C|Temperature| 0|
------------------------------------------------
Voltage Sensors
----------------------------------------
|Name |Value|Unit |Type |Status|
----------------------------------------
|VBAT |3.25 |Volts|Voltage| 0|
|5VSB |5.04 |Volts|Voltage| 0|
|3VSB |3.31 |Volts|Voltage| 0|
|VCC 5V |5.03 |Volts|Voltage| 0|
|VCC 3V |3.30 |Volts|Voltage| 0|
|VCC 12V |12.07|Volts|Voltage| 0|
|CPU1 DDR4-2|1.19 |Volts|Voltage| 0|
|CPU1 DDR4-1|1.19 |Volts|Voltage| 0|
|CPU0 DDR4-2|1.19 |Volts|Voltage| 0|
|CPU0 DDR4-1|1.19 |Volts|Voltage| 0|
|CPU1 Vcore |1.81 |Volts|Voltage| 0|
|CPU0 Vcore |1.81 |Volts|Voltage| 0|
----------------------------------------
Hardware Diagnostics
Introduction
On Check Point appliances, you can run the built-in Hardware Diagnostics Tool that supports
these tests:
n Spec Test
n Memory Test
n Network Test
n Disk Test
n Long Disk Test
Related Information
n "Hardware Health Monitoring" on page 455
n "Monitoring RAID Synchronization" on page 463
n sk171436 - HealthCheck Point (HCP) Release Updates
Requirement
To save the tool logs on a USB device, you must format it as FAT, FAT32, EXT2, or EXT3 file
system. (NTFS or extFAT are not supported.)
Limitations
On 3100 and 3200 appliances: The Network Test using an external loopback device in
interfaces eth1, eth2, eth3, and eth4 is not supported.
Description
This command shows data about the RAID and hard disks, with the percent
synchronization done.
Syntax
raid_diagnostic
Raid Status:
VolumeID:0 RaidLevel: RAID-1 NumberOfDisks:2 RaidSize:465GB State:DEGRADED Flags:
ENABLED RESYNC _IN_PROGRESS
DiskID:0 DiskNumber:0 Vendor:ATA ProductID:<HDD Model> Size:465GB State:ONLINE
Flags:NONE
DiskID:1 DiskNumber:1 Vendor:ATA ProductID:<HDD Model> Size:465GB
State:INITIALIZING Flags:OUT_OF-SYNC SyncState: 12%
Description
This command shows almost the same information as the "raid_diagnostic"
command, in tabular format.
Syntax
cpstat os -f raidInfo
Example output
Volume list
---------------------------------------------------------------------------------------
-----
|Volume id|Volume type|Number of disks|Max LBA |Volume state|Volume flags|Volume size
(GB)|
---------------------------------------------------------------------------------------
-----
| 0| 2| 2|975175680| 0| 1|
465|
---------------------------------------------------------------------------------------
-----
Volume list
---------------------------------------------------------------------------------------
----------------------------------------------------
|Volume id|Disk id|Disk number|Disk vendor|Disk product id|Disk revision|Disk max
LBA|Disk state|Disk flags|Disk sync state|Disk size (GB)|
---------------------------------------------------------------------------------------
----------------------------------------------------
| 0| 0| 0|NONE |NONE |NONE | 0|
1| 0| 0| 0|
| 0| 1| 1|NONE |NONE |NONE | 0|
1| 0| 0| 0|
---------------------------------------------------------------------------------------
----------------------------------------------------
Shut Down
There are two ways to shut down:
n Reboot: Shuts down the system and then immediately restarts it.
n Halt: Shuts down the system. You start the system manually with the power switch.
Step Instructions
2 Click Reboot.
Step Instructions
2 Click Halt.
reboot
halt
System Backup
n Back up the configuration of the Gaia operating system and of the Security Management
Server database.
You can restore a previously saved configuration.
You can run the backup manually, or on a schedule.
The configuration backup is saved in a *.tgz file in the
/var/log/CPbackup/backups/ directory (on Check Point Appliances and Open
Servers.
You can store backups locally, or remotely to a TFTP, SCP or FTP server.
n Save your Gaia system configuration settings as a ready-to-run CLI shell script.
This lets you quickly restore your system configuration after a system failure or
migration.
Note - You can only do a migration using the same Gaia version on the source and
target computers.
Important - When you create a backup on a Security Management Server, make sure
to close all SmartConsole clients. Otherwise, backup does not start.
Important:
n You can restore a backup file on Gaia OS with the same software version,
Jumbo Hotfix Accumulator, and hotfixes as installed on the source Gaia OS, on
which you collected this backup file.
Maestro Security Groups that contain different Security Appliance models do
not support Gaia Backup operations (in the Global Gaia Portal or Global Gaia
Clish).
n To collect or import a Gaia Backup in such a Security Group, connect directly to
Gaia Portal or Gaia Clish on each Security Appliance in the Security Group.
n If you restored a backup on a Security Gateway / Cluster Member, install the
Security Policy.
Note - Gaia Operating System uses these templates for the name of a manual
backup output file:
Gaia Date Example for 20 November
Template
Format 2022, 18:04:43
The Gaia Operating System contains backup configuration files (schema files) that control
which files to collect during the backup for different software modules.
Software Managemen
Security
Filer Blade / t Server, Log
Gateway
Feature Server
/var/CPbackup/schemes/cvpn.cpba Mobile
k Access
/var/CPbackup/schemes/dtps.cpba Desktop
k Policy Server
and
SecureClient
Software Managemen
Security
Filer Blade / t Server, Log
Gateway
Feature Server
/var/CPbackup/schemes/fg1.cpbak QoS
/var/CPbackup/schemes/fw1.cpbak Firewall
/var/CPbackup/schemes/mgmts.cpb Network
ak Management
/var/CPbackup/schemes/ppak.cpba SecureXL
k
/var/CPbackup/schemes/rt.cpbak SmartReporte
r
/var/CPbackup/schemes/rtm.cpbak Monitoring
/var/CPbackup/schemes/snapshot. Snapshot
cpbak Utility
/var/CPbackup/schemes/svn.cpbak Common
Infrastructure
($CPDIR)
/var/CPbackup/schemes/system_ Gaia
configuration.cpbak Operating
System
/var/CPbackup/schemes/te.cpbak Threat
Emulation
/var/CPbackup/schemes/uepm.cpba Endpoint
k Policy
Management
/var/CPbackup/schemes/vsx.cpbak VSX
Procedure
Step Instruction
Step Instructions
2 Click Backup.
Note - Gaia Portal does not support the change of backup file names. You can
change a backup file name in the Expert mode. Make sure not to use special
characters.
Step Instructions
3 Click Restore.
Step Instructions
5 Click Restore.
Step Instructions
3 Click Export.
4 Click OK to confirm.
Make sure you have enough free disk space on your computer.
To import a backup
Step Instructions
3 Click Import.
5 Click Import.
To delete a backup
Step Instructions
3 Click Delete.
4 Click OK to confirm.
Syntax
To collect a backup and store it locally
add backup scp ip <IPv4 Address of SCP Server> path <Path on SCP
Server> username <User Name on SCP Server> [password <Password
in Plain Text>] [interactive]
add backup ftp ip <IPv4 Address of FTP Server> path <Path on FTP
Server> username <User Name on FTP Server> [password <Password
in Plain Text>] [interactive]
show backups
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Note - Gaia Clish does not support change of file names. You can change a file name
in the Expert mode. Make sure not to use special characters.
Example
Syntax
To restore a backup from a local hard disk
Important:
n When you create a backup on a Security Management Server, make sure to
close all SmartConsole clients. Otherwise, scheduled backup does not start.
n You can configure only one schedule for one location. For example, you can
configure only one schedule for an SCP server, and only one schedule for an
FTP server.
n For regular backups, see "Backing Up and Restoring the System" on page 467.
Note - Gaia Operating System uses these templates for the name of a scheduled
backup output file:
Gaia Date Example for 20 November
Template
Format 2022, 18:04:43
Step Instructions
4 In the Backup Type section, configure the location of the backup file:
n This appliance
To store the collected backup locally
n Management
To send the collected backup to the Security Management Server that
manages this Security Gateway.
n SCP server
To send the collected backup to an SCP server.
Enter the IP address, User name, Password and Upload path.
n FTP server
To send the collected backup to an FTP server.
Enter the IP address, User name, Password and Upload path.
n TFTP server
To send the collected backup to a TFTP server. Enter the IP address.
6 Click Add.
The scheduled backup appears in the Scheduled Backups table.
Step Instructions
3 Click Delete.
Syntax
To add a backup schedule that stores the backup file locally
To add a backup schedule that uploads the backup file to an FTP server
To add a backup schedule that uploads the backup file to an SCP server
To add a backup schedule that uploads the backup file to a TFTP server
To configure the backup schedule to run each month on specified date and time
To configure the backup schedule to run each week on specified day of week and time
show backup-scheduled<SPACE><TAB>
show backup-scheduled <Name of Schedule>
delete backup-scheduled<SPACE><TAB>
delete backup-scheduled <Name of Schedule>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
ftp ip <IPv4 Address Specifies the IPv4 address of the remote FTP server.
of FTP Server>
scp ip <IPv4 Address Specifies the IPv4 address of the remote SCP server.
of SCP Server>
tftp ip <IPv4 Address Specifies the IPv4 address of the remote TFTP server.
of TFTP Server>
path <Path on FTP Specifies the path on the FTP remote server where to
Server> upload the backup file.
path <Path on SCP Specifies the path on the SCP remote server where to
Server> upload the backup file.
username <User Name Specifies the user name required to log in to the remote
on FTP Server> FTP server.
username <User Name Specifies the user name required to log in to the remote
on SCP Server> SCP server.
password <Password in Specifies the password (in plain text) required to log in to
Plain Text> the remote server.
Parameter Description
recurrence daily time Specifies that the job should run once a day - every day,
<HH:MM> at specified time.
Enter the time of day in the 24-hour clock format -
<Hours>:<Minutes>.
Example: 14:35
recurrence monthly Specifies that the job should run once a month - on
month <1-12> days <1- specified months, on specified dates, and at specified
31> time <HH:MM> time.
Months are specified by numbers from 1 to 12: January =
1, February = 2, ..., December = 12.
Dates of month are specified by numbers from 1 to 31.
To specify several consequent months, enter their
numbers separate by commas.
Example: for January through March, enter 1,2,3
To specify several consequent dates, enter their
numbers separate by commas.
Example: for 1st, 2nd and 3rd day of month, enter 1,2,3
recurrence weekly Specifies that the job should run once a week - on
days <1-31> time specified days of week, and at specified time.
<HH:MM> Days of week are specified by numbers from 0 to 6:
Sunday = 0, Monday = 1, Tuesday = 2, Wednesday = 3,
Thursday = 4, Friday = 5, Saturday = 6.
To specify several consequent days of a week, enter
their numbers separate by commas.
Example: for Sunday, Monday, and Tuesday, enter 0,1,2
Note - You can only do a migration using the same Gaia version on the source and
target computers.
Important - In a Management Data Plane Separation (MDPS) environment (see
sk138672), you must run these commands in each plane. This applies to R80.40
Jumbo Hotfix Accumulator Take 114 and higher.
Syntax
To save the system configuration to a CLI script
show configuration
Example
This example shows part of the configuration settings as last saved to a CLI shell script:
set web
daemon-enable {on | off}
session-timeout <Timeout>
ssl-port <Port>
ssl3-enabled {on | off}
table-refresh-rate <Rate>
show web
daemon-enable
session-timeout
ssl-port
ssl3-enabled
table-refresh-rate
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
session- Configures the time (in minutes), after which the HTTPS session to the
timeout Gaia Portal terminates.
<Timeout>
n Range: 1 - 720
n Default: 15
ssl-port Configures the TCP port number, on which the Gaia Portal can be
<Port> accessed over HTTPS.
n Range: 1 - 65535
n Default: 443
Use this command for initial configuration only.
Changing the port number on the command line may cause
inconsistency with the setting defined in SmartConsole. Use
SmartConsole to set the SSL port for the Portal.
Note - This setting does not affect HTTP connections. Normally this
port should be left at the default 443. If you change the port number,
you must change the URL used to access the Gaia Portal from
https://<Hostname or IP Address>/ to
https://<Hostname or IP Address>:<PORTNUMBER>
table- Configures the refresh rate (in seconds), at which some tables in the
refresh- Gaia Portal are refreshed.
rate
<Rate>
n Range: 10 - 240
n Default: 10
You can configure different settings for the SSH daemon on the Gaia Operating System.
You can configure these SSH settings in Gaia Clish.
Procedure for the R80.40 Jumbo Hotfix Accumulator, Take 83 and higher
cp -v /etc/ssh/templates/sshd_config.templ{,BKP}
vi /etc/ssh/templates/sshd_config.templ
5. Configure the applicable SSH Ciphers, edit the line that starts with the word Ciphers:
Ciphers VALUE1,VALUE2,...,VALUEx
Notes:
n If this line does not exist, add it.
n By default, Gaia OS uses the first configured
Cipher.
n Values must be separated by commas without
spaces.
6. Configure the applicable SSH Message Authentication Codes (MACs), edit the line
that starts with the word Macs:
Macs VALUE1,VALUE2,...,VALUEx
Notes:
n If this line does not exist, add it.
n By default, Gaia OS uses the first configured
MAC.
n Values must be separated by commas without
spaces.
7. Configure the applicable SSH Key Exchange Algorithms, edit the line that starts with
the word KexAlgorithms:
KexAlgorithms VALUE1,VALUE2,...,VALUEx
Notes:
n If this line does not exist, add it.
n By default, Gaia OS uses the first configured
KexAlgorithm.
n Values must be separated by commas without
spaces.
Procedure for R80.40 and the R80.40 Jumbo Hotfix Accumulator, Take lower than 83
cp -v /etc/ssh/ssh_config{,BKP}
cp -v /etc/ssh/sshd_config{,BKP}
vi /etc/ssh/ssh_config
vi /etc/ssh/sshd_config
5. Configure the applicable SSH Ciphers, edit the line that starts with the word Ciphers:
Ciphers VALUE1,VALUE2,...,VALUEx
Notes:
n If this line does not exist, add it.
n By default, Gaia OS uses the first configured
Cipher.
n Values must be separated by commas without
spaces.
6. Configure the applicable SSH Message Authentication Codes (MACs), edit the line
that starts with the word Macs:
Macs VALUE1,VALUE2,...,VALUEx
Notes:
n If this line does not exist, add it.
n By default, Gaia OS uses the first configured
MAC.
n Values must be separated by commas without
spaces.
7. Configure the applicable SSH Key Exchange Algorithms, edit the line that starts with
the word KexAlgorithms:
KexAlgorithms VALUE1,VALUE2,...,VALUEx
Notes:
n If this line does not exist, add it.
n By default, Gaia OS uses the first configured
KexAlgorithm.
n Values must be separated by commas without
spaces.
You can add a private package to the list of available packages. A private package is a Hotfix,
which is located on the Check Point Support Center, and is only available to limited audiences.
When you update Check Point software, make sure to:
n Define the CPUSE policy for downloads and installation.
Downloads can be:
l Manual
l Automatic
l Scheduled (daily, weekly, monthly, or once only).
Installations are:
l Hotfixes are downloaded and installed automatically by default
l Full installation and upgrade packages must be installed manually
n Define mail notifications for completed package actions and for the new package
updates.
n Run the software download and installation.
Note - You must configure a CPUSE policy before you download and run upgrades.
#!/bin/bash
source /etc/profile.d/CP.sh
#!/bin/bash
source /etc/profile.d/CP.sh
source $MDSDIR/scripts/MDSprofile.sh
source $MDS_SYSTEM/shared/mds_environment_utils.sh
source $MDS_SYSTEM/shared/sh_utilities.sh
#!/bin/bash
source /etc/profile.d/CP.sh
#!/bin/bash
source /etc/profile.d/CP.sh
source /etc/profile.d/vsenv.sh
Glossary
A
Anti-Bot
Check Point Software Blade on a Security Gateway that blocks botnet behavior and
communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.
Anti-Spam
Check Point Software Blade on a Security Gateway that provides comprehensive
protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS,
ASPAM.
Anti-Virus
Check Point Software Blade on a Security Gateway that uses real-time virus signatures
and anomaly-based protections from ThreatCloud to detect and block malware at the
Security Gateway before users are affected. Acronym: AV.
Application Control
Check Point Software Blade on a Security Gateway that allows granular control over
specific web-enabled applications by using deep packet inspection. Acronym: APPI.
Audit Log
Log that contains administrator actions on a Management Server (login and logout,
creation or modification of an object, installation of a policy, and so on).
Bridge Mode
Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
Security Gateway that is part of a cluster.
Compliance
Check Point Software Blade on a Management Server to view and apply the Security
Best Practices to the managed Security Gateways. This Software Blade includes a
library of Check Point-defined Security Best Practices to use as a baseline for good
Security Gateway and Policy configuration.
Content Awareness
Check Point Software Blade on a Security Gateway that provides data visibility and
enforcement. Acronym: CTNT.
CoreXL
Performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to stick
to a particular FWK daemon is done at the first packet of connection on a very high level,
before anything else. Depending on the SecureXL settings, and in most of the cases, the
SecureXL can be offloading decryption calculations. However, in some other cases,
such as with Route-Based VPN, it is done by FWK daemon.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can
automatically update Check Point products for the Gaia OS, and the Gaia OS itself.
DAIP Gateway
Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway, on which the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
Classification of data in a Check Point Security Policy for the Content Awareness
Software Blade.
Distributed Deployment
Configuration in which the Check Point Security Gateway and the Security Management
Server products are installed on different computers.
Dynamic Object
Special object type, whose IP address is not known in advance. The Security Gateway
resolves the IP address of this object in real time.
Expert Mode
The name of the elevated command line shell that gives full system root permissions in
the Check Point Gaia operating system.
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restricted shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for the Check Point Gaia operating system.
Hotfix
Software package installed on top of the current software version to fix a wrong or
undesired behavior, and to add a new behavior.
HTTPS Inspection
Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets
Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection.
Acronyms: HTTPSI, HTTPSi.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and
audits data based on network location, the identity of the user, and the identity of the
computer. Acronym: IDA.
Identity Logging
Check Point Software Blade on a Management Server to view Identity Logs from the
managed Security Gateways with enabled Identity Awareness Software Blade.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets
and data for numerous types of risks (Intrusion Prevention System).
IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and
Remote Access VPN access.
Kerberos
An authentication server for Microsoft Windows Active Directory Federation Services
(ADFS).
Log Server
Dedicated Check Point server that runs Check Point software to store and process logs.
Management Interface
(1) Interface on a Gaia Security Gateway or Cluster member, through which
Management Server connects to the Security Gateway or Cluster member. (2) Interface
on Gaia computer, through which users connect to Gaia Portal or CLI.
Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security
Management Server.
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN
access for managed and unmanaged clients. Acronym: MAB.
Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security
Management Servers called Domain Management Servers. Synonym: Multi-Domain
Security Management Server. Acronym: MDS.
Network Object
Logical object that represents different parts of corporate topology - computers, IP
addresses, traffic protocols, and so on. Administrators use these objects in Security
Policies.
Open Server
Physical computer manufactured and distributed by a company, other than Check Point.
Provisioning
Check Point Software Blade on a Management Server that manages large-scale
deployments of Check Point Security Gateways using configuration profiles. Synonyms:
SmartProvisioning, SmartLSM, Large-Scale Management, LSM.
QoS
Check Point Software Blade on a Security Gateway that provides policy-based traffic
bandwidth management to prioritize business-critical traffic and guarantee bandwidth
and control latency.
Rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause
specified actions to be taken for a communication session.
Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase.
SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that
passes through a Security Gateway.
Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and
enforce Security Policies for connected network resources.
Security Policy
Collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over SSL,
for secure communication. This authentication is based on the certificates issued by the
ICA on a Check Point Management Server.
SmartConsole
Check Point GUI application used to manage a Check Point environment - configure
Security Policies, configure devices, monitor products and events, install updates, and
so on.
SmartDashboard
Legacy Check Point GUI client used to create and manage the security settings in
versions R77.30 and lower. In versions R80.X and higher is still used to configure
specific legacy settings.
SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is
"Provisioning") that manages large-scale deployments of Check Point Security
Gateways using configuration profiles. Synonyms: Large-Scale Management,
SmartLSM, LSM.
SmartUpdate
Legacy Check Point GUI client used to manage licenses and contracts in a Check Point
environment.
Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade
inspects specific characteristics of the traffic (2) On a Management Server, each
Software Blade enables different management capabilities.
Standalone
Configuration in which the Security Gateway and the Security Management Server
products are installed and configured on the same server.
Threat Emulation
Check Point Software Blade on a Security Gateway that monitors the behavior of files in
a sandbox to determine whether or not they are malicious. Acronym: TE.
Threat Extraction
Check Point Software Blade on a Security Gateway that removes malicious content from
files. Acronym: TEX.
Updatable Object
Network object that represents an external service, such as Microsoft 365, AWS, Geo
locations, and more.
URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over
which web sites can be accessed by a given group of users, computers or networks.
Acronym: URLF.
User Directory
Check Point Software Blade on a Management Server that integrates LDAP and other
external user management servers with Check Point products and security solutions.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer
or cluster with virtual abstractions of Check Point Security Gateways and other network
devices. These Virtual Devices provide the same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide
the functionality of physical network devices. It holds at least one Virtual System, which
is called VS0.
Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides
real-time phishing prevention based on URLs. Acronym: ZPH.
Appendix
This section contains various notes about the Gaia Operating System.
n The default value of the Linux kernel parameter /proc/sys/net/ipv6/conf/all/accept_dad is
set to '0'. The IPv6 Duplicate Address Detection (DAD) feature continues to be enabled
by default ('set neighbor duplicate-detection state on').