CP R80.10 LoggingAndMonitoring AdminGuide
CP R80.10 LoggingAndMonitoring AdminGuide
CP R80.10 LoggingAndMonitoring AdminGuide
LOGGING AND
MONITORING
R80.10
Administration Guide
Classification: [Protected]
© 2017 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Logging and
Monitoring R80.10 Administration Guide.
Revision History
Date Description
08 June 2017 Updated Views and Reports (on page 29)
Fixed:
• Connecting R80.10 SmartEvent Server and Correlation Unit to R77.xx
Security Management Server (on page 19)
• Connecting R80.10 SmartEvent Server and Correlation Unit to R77.xx
Multi-Domain Server (on page 22)
16 May 2017 First release of this document
Contents
Important Information................................................................................................... 3
Terms ............................................................................................................................ 9
Welcome ..................................................................................................................... 11
Getting Started ............................................................................................................ 12
Logging and Monitoring Clients .............................................................................. 12
Understanding Logging ........................................................................................... 13
Deploying Logging ................................................................................................... 14
Enabling Logging on the Security Management Server .................................................14
Deploying a Dedicated Log Server .................................................................................14
Configuring the Security Gateways for Logging .............................................................15
Enabling Log Indexing ...................................................................................................15
Disabling Log Indexing ..................................................................................................16
Deploying SmartEvent............................................................................................. 17
SmartEvent Licensing....................................................................................................17
System Requirements ...................................................................................................17
Enabling SmartEvent on the Security Management Server ...........................................17
Installing a Dedicated SmartEvent Server .....................................................................18
Configuring the SmartEvent components in the First Time Configuration Wizard .........18
Connecting R80.10 SmartEvent to R80.10 Security Management Server .......................18
Connecting R80.10 SmartEvent to R77.xx Security Management Server .......................19
Connecting R80.10 SmartEvent to R80.10 Multi-Domain Server....................................21
Connecting R80.10 SmartEvent to R77.xx Multi-Domain Server ....................................22
Configuring SmartEvent to use a Non-Standard LEA Port .............................................23
Configuring SmartEvent to read External Logs .............................................................24
Administrator Permission Profiles ......................................................................... 24
Creating an Administrator .............................................................................................24
Configuring Permissions for Monitoring, Logging, Events, and Reports........................25
Multi-Domain Security Management Permissions ........................................................26
Locally Managing the Administrator ..............................................................................26
SmartEvent Reports-Only Permission Profile ...............................................................26
Importing Offline Log Files ..................................................................................... 27
Offline Work For Correlated Events...............................................................................27
Importing Log Files from SmartEvent Servers ..............................................................27
Views and Reports ....................................................................................................... 29
Enabling Views and Reports .................................................................................... 29
Catalog of Views and Reports.................................................................................. 30
Views ....................................................................................................................... 32
Reports.................................................................................................................... 33
Automatic View and Report Updates ....................................................................... 33
Opening a View or Report ........................................................................................ 34
Exporting and Importing Views and Reports ........................................................... 34
Generating a Network Activity Report ...........................................................................35
Exporting and Importing Templates ....................................................................... 35
Scheduling a View or Report ................................................................................... 36
Customizing a View or Report ................................................................................. 37
View Settings .................................................................................................................38
Report Settings..............................................................................................................38
Configuring Email Settings for Views and Reports ........................................................39
Adding a Logo to Reports...............................................................................................40
Widgets ................................................................................................................... 40
Adding and Customizing Widgets...................................................................................40
Filters ............................................................................................................................42
Filtering for Active Directory User Groups ....................................................................42
Logging ....................................................................................................................... 44
Log Analysis ............................................................................................................ 44
Sample Log Analysis ............................................................................................... 44
Using the Log View .................................................................................................. 45
Working with Logs .................................................................................................. 46
Choosing Rules to Track ................................................................................................46
Tracking Options ...........................................................................................................46
Log Sessions .................................................................................................................47
Viewing Rule Logs .........................................................................................................48
Packet Capture ..............................................................................................................49
Searching the Logs ........................................................................................................49
Query Language Overview .............................................................................................52
Event Analysis ............................................................................................................. 56
Event Analysis with SmartEvent ............................................................................. 56
What is an Event? .................................................................................................... 56
How Are Logs Converted to Events? ..............................................................................56
Sample Application & URL Filtering Event Analysis ............................................... 57
The Event Analysis Architecture ............................................................................. 57
SmartEvent Correlation Unit................................................................................... 58
The SmartView Web Application ............................................................................. 58
Configuring SmartEvent Policy and Settings .......................................................... 59
Opening the SmartEvent GUI Client ...............................................................................59
Policy Tab ......................................................................................................................59
Modifying Event Definitions ...........................................................................................60
Event Definitions and General Settings .........................................................................60
Event Definition Parameters .........................................................................................61
Event Threshold ............................................................................................................61
Severity .........................................................................................................................61
Automatic Reactions ......................................................................................................61
Working Hours ..............................................................................................................65
Exceptions .....................................................................................................................66
Creating Event Definitions (User Defined Events) ..........................................................66
High Level Overview of Event Identification ...................................................................66
Creating a User-Defined Event ......................................................................................71
Eliminating False Positives ...........................................................................................73
System Administration ..................................................................................................80
SmartEvent with Management High Availability ..................................................... 82
How it works ..................................................................................................................82
Log Server High Availability...........................................................................................82
SmartEvent Correlation Unit High Availability ...............................................................82
Monitoring Traffic and Connections ............................................................................ 83
SmartView Monitor Features .................................................................................. 83
SmartView Monitor scenarios........................................................................................84
To Start the Monitoring Views ................................................................................. 84
Immediate Actions .................................................................................................. 84
Deploying Monitoring .............................................................................................. 85
Monitoring and Handling Alerts .............................................................................. 85
Viewing Alerts ...............................................................................................................85
System Alert Monitoring Mechanism .............................................................................86
Monitoring Suspicious Activity Rules ...................................................................... 86
The Need for Suspicious Activity Rules ..........................................................................86
Creating a Suspicious Activity Rule................................................................................86
Creating a Suspicious Activity Rule from Results ..........................................................87
Managing Suspicious Activity Rules ...............................................................................88
How SmartView Monitor Works .............................................................................. 88
AMON ............................................................................................................................89
Defining Status Fetch Frequency ...................................................................................89
Configuring SmartView Monitor .............................................................................. 89
System Alerts and Thresholds.......................................................................................89
Working with SNMP Monitoring Thresholds ..................................................................90
Customizing Results ......................................................................................................95
Setting Your Default View ..............................................................................................99
Refreshing Views ...........................................................................................................99
Monitoring Gateway Status ..................................................................................... 99
Gateway Status ..............................................................................................................99
Displaying Gateway Data .............................................................................................100
Starting and Stopping Cluster Members......................................................................104
Monitoring Tunnels ............................................................................................... 104
Tunnels Solution..........................................................................................................104
Tunnel View Updates ...................................................................................................105
Running Tunnel Views .................................................................................................105
Monitoring Traffic or System Counters ................................................................. 107
Traffic or System Counters Solution ............................................................................107
Select and Run a Traffic or System Counters View ......................................................108
Recording a Traffic or Counter View ............................................................................109
Monitoring Users .................................................................................................. 110
Users Solution .............................................................................................................110
Run a Users View .........................................................................................................110
Cooperative Enforcement Solution ....................................................................... 111
NAT Environments.......................................................................................................112
Configuring Cooperative Enforcement.........................................................................112
Non-Compliant Hosts by Gateway View .......................................................................113
Log and Index File Maintenance ................................................................................ 114
Managing the Log and Event Database ................................................................. 114
Minimum Disk Space ............................................................................................. 114
Third-Party Log Formats .......................................................................................... 115
Importing Syslog Messages .................................................................................. 115
Generating a Syslog Parser and Importing syslog Messages ...................................... 115
Configuring SmartEvent to Read Imported Syslog Messages ...................................... 115
Importing Windows Events.................................................................................... 116
How Windows Event Service Works .............................................................................116
Administrator Support for WinEventToCPLog .............................................................116
Sending Windows Events to the Log Server .................................................................117
Working with SNMP .............................................................................................. 119
SNMP Best Practices Guide .........................................................................................119
Appendix: Manual Syslog Parsing ............................................................................. 120
Planning and Considerations ................................................................................ 120
The Parsing Procedure ......................................................................................... 121
Manual Syslog Parsing .......................................................................................... 121
The Free Text Parsing Language .......................................................................... 122
The Commands............................................................................................................122
Try ...............................................................................................................................123
Group_try ....................................................................................................................124
Switch ..........................................................................................................................125
Unconditional _try .......................................................................................................126
Include.........................................................................................................................127
add_field .....................................................................................................................128
Dictionary ....................................................................................................................131
DLP
Terms
Data Loss Prevention. Detects and prevents
the unauthorized transmission of confidential
information.
Administrator
Event
A SmartConsole user with permissions to
A record of a security or network incident
manage Check Point security products and
that is based on one or more logs, and on a
the network environment.
customizable set of rules that are defined in
Audit Log the Event Policy.
Security Policy
A collection of rules that control network
traffic and enforce organization guidelines
for data protection and access to resources
with packet inspection.
SmartConsole
A Check Point GUI application used to
manage security policies, monitor products
and events, install updates, provision new
devices and appliances, and manage a
multi-domain environment and each domain.
Welcome
Welcome
With R80, logging, event management, reporting, and monitoring are more tightly integrated than
ever before. Security data and trends easy to understand at a glance, with Widgets and chart
templates that optimize visual display. Logs are now tightly integrated with the policy rules. To
access logs associated with a specific rule, click that rule. Free-text search lets you enter specific
search terms to retrieve results from millions of logs in seconds.
One-click exploration makes it easy to move from high-level overview to specific event details
such as type of attack, timeline, application type and source. After you investigate an event, it is
easy to act on it. Depends on the severity of the event, you can ignore it, act on it later, block it
immediately, or toggle over to the rules associated with the event to refine your policy. Send
reports to your manager or auditors that show only the content that is related to each stakeholder.
In R80.10, SmartReporter and SmartEvent functionality is integrated into SmartConsole.
With rich and customizable views and reports, R80 introduces a new experience for log and event
monitoring.
The new views are available from two locations:
• SmartConsole > Logs & Monitor
• SmartView Web Application. Browse to: https://<Server IP>/smartview/ where Server IP is IP
address of the Security Management Server or SmartEvent server.
Getting Started
In This Section:
Logging and Monitoring Clients ...................................................................................12
Understanding Logging ................................................................................................13
Deploying Logging ........................................................................................................14
Deploying SmartEvent ..................................................................................................17
Administrator Permission Profiles ..............................................................................24
Importing Offline Log Files ..........................................................................................27
This section introduces the logging and monitoring clients, and explains how to install and
configure logging and monitoring products.
SmartConsole > Analyze events that occur in your environment with customizable views
Logs & Monitor and reports.
The Logs view replaces the SmartView Tracker and SmartLog
SmartConsole GUI clients.
SmartView Web A SmartEvent Web application. It has the same real-time event
Application monitoring and analysis views as SmartConsole, with the convenience of
not having to install a client.
Browse to: https://<Server IP>/smartview/ where Server IP is IP address
of the Security Management Server or SmartEvent server.
SmartEvent • For initial settings - configure the Correlation Unit, Log Servers,
Domains and Internal Network.
• To configure the SmartEvent Correlation Unit
• For the correlation policy (event definitions)
• For Automatic Reactions
SmartView Monitor • To monitor tunnels
• To monitor users
• For suspicious activity rules
• To monitor alerts - Thresholds configuration
For more about monitoring, see Monitoring Traffic and Connections (on
page 83).
Understanding Logging
Security Gateways generate logs, and the Security Management Server generates audit logs. The
Security Policy that is installed on each Security Gateway determines which rules generate logs.
Logs can be stored on a:
• Security Management Server that collects logs from the Security Gateways. This is the default.
• Log Server on a dedicated machine. This is recommended for organizations that generate a lot
of logs.
• Security Gateway. This is called local logging.
To find out how much storage is necessary for logging, see sk87263
http://supportcontent.checkpoint.com/solutions?id=sk87263.
In a Multi-Domain Security Management environment, the Security Gateways send logs to the
Domain Server or to dedicated Domain Log Servers. The Multi-Domain Server generates logs, and
they can be stored on the Multi-Domain Server or on a dedicated Multi-Domain Log Server. To
learn how to deploy logging in a Multi-Domain Security Management environment, see the R80.10
Multi-Domain Security Management Administration Guide
http://downloads.checkpoint.com/dc/download.htm?ID=54841.
To decrease the load on the Security Management Server, you can install a dedicated Log Server
and configure the gateways to send their logs to this Log Server. To see the logs from all the Log
Servers, connect to the Security Management Server with SmartConsole, and go to the Logs &
Monitor view Logs tab.
A Log Server handles log management activities:
• Automatically starts a new log file when the existing log file gets to the defined maximum size.
• Handles backup and restore for log files.
• Stores log files for export and import.
• Makes an index of the logs. Therefore, log queries work quickly.
Deploying Logging
You can enable logging on the Security Management Server, or deploy a dedicated Log Server.
After you deploy the Log Server, you must configure the Security Gateways for logging
In This Section
Enabling Logging on the Security Management Server .............................................14
Deploying a Dedicated Log Server ...............................................................................14
Configuring the Security Gateways for Logging .........................................................15
Enabling Log Indexing ..................................................................................................15
Disabling Log Indexing .................................................................................................16
Deploying SmartEvent
SmartEvent Server is integrated with the Security Management Server architecture. It
communicates with Log Servers to read and analyze logs. You can enable SmartEvent on the
Security Management Server or deploy it as a dedicated server.
You can deploy R80.10 SmartEvent on a dedicated server and connect it to Security Management
Servers or Multi Domain servers of version R77.xx (or earlier). This lets you extend an R77.xx
environment with the new capabilities of R80.10 SmartEvent.
Only a Security Management Server can also work as a SmartEvent Server. In a Multi-domain
environment, you must install SmartEvent on a dedicated server.
Note - For R77.30 Gateway and lower, the ability to generate reports on firewall and VPN activity is
integrated into SmartConsole. To enable this functionality, activate the firewall session event on
the SmartEvent Policy tab. Select and enable Consolidated Sessions > Firewall Session. For
more, see Connecting SmartEvent Server to a Security Management Server ("Connecting R80.10
SmartEvent to R80.10 Security Management Server" on page 18).
SmartEvent Licensing
You can deploy SmartEvent in these ways:
• As part of the SmartEvent – A renewable one year license is included with the SmartEvent
package.
• As a dedicated server – You can purchase a perpetual license for a SmartEvent Server.
System Requirements
To use SmartEvent, see the requirements in the R80.10 Release Notes
http://downloads.checkpoint.com/dc/download.htm?ID=54802.
6. In SmartConsole, create a Check Point Host object for the SmartEvent Server R80.10.
7. Open the R77.xx SmartDashboard.
8. Create an SIC trust between the Security Management Server and the new server for
SmartEvent R80.10.
9. Define it with the highest version available and ignore the Warning message.
10. For a dedicated SmartEvent Correlation Unit that is not a SmartEvent Server: In the Logs page,
click Enable Log Indexing.
11. In the Check Point Host > Management tab, enable these Software Blades:
• Logging & Status
• SmartEvent Server (if applicable)
• SmartEvent Correlation Unit
12. Click OK.
13. Click File > Policies > Install Database.
14. Wait until the server synchronizes and loads SmartEvent
15. Advanced Configuration for a dedicated SmartEvent Server that is also a Correlation Unit:
a) Open the R80.10 SmartConsole to the IP address of the SmartEvent Server:
(i) In SmartConsole > Logs & Monitor, click + to open a catalog (new tab).
(ii) Click SmartEvent Settings & Policy.
b) In Policy tab > Correlation Units, define a SmartEvent Correlation Unit object.
c) Select the production Log Servers and local Log Server on the SmartEvent Server that will
send logs to the SmartEvent Correlation Unit.
d) In Policy tab > Internal Network, define the internal Network.
e) Optional: For R77.30 Gateways and lower - Enable the Network Activity report.
The Network Activity report gives information about Firewall connections. For example,
top sources, destinations, and services. To create this report, SmartEvent must make an
index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
Note: This configuration increases the number of events a day by five. This can have a
performance effect.
f) Click Save.
g) Install the Event Policy on the SmartEvent Correlation Unit: SmartEvent menu > Actions >
Install Event Policy.
e) Select the production Log Servers and local Log Server on the SmartEvent Server to read
logs from.
f) In Policy tab > Internal Network, define the internal Network.
g) Optional: Enable the Network Activity report.
The Network Activity report gives information about Firewall connections. For example,
top sources, destinations, and services. To create this report, SmartEvent must make an
index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
Note: This configuration increases the number of events a day by five. This can have a
performance effect.
h) Click Save.
i) Install the Event Policy on the Correlation Unit: SmartEvent menu > Actions > Install Event
Policy.
12. Reassign the global Policy for the Domains that use SmartEvent. For new Domains, create a
new global assignment.
13. In each Multi-Domain Server, open SmartConsole.
14. Click Menu > Install Database, on each Multi-Domain Server and Domain Log Server.
15. Wait until the server synchronizes and loads SmartEvent.
16. Advanced Configuration for a dedicated SmartEvent Server that is also a Correlation Unit:
a) Open R80.10 SmartConsole.
b) Launch the SmartEvent GUI client.
(i) In the Logs & Monitor view, click on + to open a catalog (new tab).
(ii) Click the SmartEvent Settings & Policy link.
Note - The primary GUI application is the R80.10 SmartConsole. With R80.10, some
configurations can be done only in the SmartEvent GUI client.
c) If SmartEvent is connected to a Multi-Domain Server, in Policy tab > Domains, define the
required domains to connect to.
d) In Policy tab > Correlation Units, define a Correlation Unit object.
e) Select the production Log Servers and local log server on the SmartEvent Server to read
logs from.
f) In Policy tab > Internal Network, define the internal Network.
g) For R77.xx and lower Gateways: Optional - Enable the Network Activity report.
The Network Activity report gives information about Firewall connections. For example,
top sources, destinations, and services. To create this report, SmartEvent must make an
index of the Firewall logs.
To enable this report, on the SmartEvent GUI Policy tab, select and enable
Consolidated Sessions > Firewall Session.
Note: This configuration increases the number of events a day by five. This can have a
performance effect.
h) Click Save.
i) Install the Event Policy on the Correlation Unit: SmartEvent menu > Actions > Install Event
Policy.
4. In Policy tab > Correlation Units, configure the Correlation Unit to read logs from the local
Log Server (on the SmartEvent Server).
5. Configure the new port on the SmartEvent Server:
a) In Policy tab > Network Objects, double-click the SmartEvent Server object.
b) Change the LEA port No. parameter to <new_port_number>.
6. Install the Event Policy on the Correlation Unit: Actions > Install Event Policy
7. On the SmartEvent Server:
a) Run: cpstop
b) Open $FWDIR/conf/fwopsec.conf in a text editor.
c) Change these parameters:
lea_server auth_port <new_port_number>
lea_server port 0
d) Run: cpstart
Creating an Administrator
To Create an Administrator
1. In SmartConsole, open Manage & Settings.
2. Click Administrators.
3. Click New Administrator.
The New Administrator window opens.
4. Enter a name for the administrator.
1. Run: # evstop
2. Edit the log settings file log_indexer_custom_settings.conf
a) Make a backup. Run this command:
cp $INDEXERDIR/log_indexer_custom_settings.conf
$INDEXERDIR/log_indexer_custom_settings.conf_orig
b) Edit $INDEXERDIR/log_indexer_custom_settings.conf in a text editor.
c) Delete these lines, if they exist:
:time_restriction_for_fetch_all (<existing_data>)
:time_restriction_for_fetch_all_disp (<existing_data>)
d) Add this line:
:days_to_index (<days>)
<days> is the last number of days of logs to be indexed by the SmartEvent Server. For
example, to import and index logs from the last 30 days of logs, give a value of 30.
Note - To decrease the performance effect while you index the offline logs, import only the
necessary number of days of logs.
3. In the Logs > Storage page of the SmartEvent Server, Make sure that Delete Index files older
than is not selected, or is selected with an equal or larger number of days than configured in
days_to_index.
4. Run: # evstart
5. In the SmartEvent Server object properties, in the Logs > Storage page, configure Disk Space
Management.
You can create rich and customizable views and reports for log and event monitoring, that inform
key stakeholders about security activities.
Use these GUIs:
• SmartConsole > Logs & Monitor
• SmartView Web Application - for generating and editing views in a browser:
https://<Server IP>/smartview/
<Server IP> is IP address of the Security Management Server or SmartEvent server.
Item Description
1 Open Log View - See and search through the logs from all Log Servers. You can also
search the logs from a Log Server that you choose.
Open Audit Logs View - See and search records of actions done by SmartConsole
administrators.
These views come from the Log Servers. Other views come from the SmartEvent Server.
2 Compliance View - Optimize your security settings and ensure compliance with
regulatory requirements.
3 Views - The list of predefined and customized views. A view is an interactive dashboard
made up of widgets. The view tells administrators and other stakeholders about security
and network events. Each widget is the output of a query. Widgets can show the
information as a chart, table, or some other format. To find out more about the events,
double-click a widget to drill down to a more specific view or raw log files.
4 Reports - The list of predefined and customized reports. A report has multiple pages, and
applies to the time that the report is generated. There are several predefined reports, and
you can create new reports. A reports gives more details than a view. Reports can be
customized, filtered, generated and scheduled. You cannot drill down into a report.
5 Favorites - Use this view to collect the views and reports you use the most.
6 Switch to Table View or Thumbnails View - The Table view is the default for views and
reports. The Thumbnails view is the default for the Favorites and Recent views and
reports
Logging and Monitoring Administration Guide R80.10 | 30
Views and Reports
Item Description
7 Scheduled Tasks - See and edit scheduled tasks.
Archive - Completed and in-progress tasks for generating and exporting reports.
8 External Apps
• SmartEvent Settings & Policy - The SmartEvent GUI client. Use it for initial setup and
to define the SmartEvent Correlation Unit policy. The views in SmartConsole are a
replacement for those in the R77.x SmartEvent GUI client.
• Open Tunnel and User Monitoring - The SmartView Monitor GUI Client. The
monitoring views in SmartConsole are a replacement for those in the R77.x
SmartView Monitor GUI client, except for Tunnel and User Monitoring.
• SmartView Web Application - A SmartEvent Web application that you can use to
analyze events that occur in your environment. Use it to see an overview of the
security information for your environment. It has the same real-time event monitoring
and analysis views as SmartConsole, with the convenience of not having to install a
client.
Views
Views tells administrators and other stakeholders about security and network events. A view is an
interactive dashboard made up of widgets. Each widget is the output of a query. A Widget can
show information in different formats, for example, a chart or a table.
SmartConsole comes with several predefined views. You can create new views that match your
needs, or you can customize an existing view.
In the Logs & Monitor view, clicking the (+) tab opens a catalog of all views and reports, predefined
and customized. Double-click a view to open it.
Item Description
1 Widget- The output of a query. A Widget can show information in different formats, for
example, a chart or a table.
2 Drill Down - To find out more about the events, double-click a widget to drill down to a
more specific view or raw log files.
6 Query search bar - Define custom queries using the GUI tools, or manually entering
query criteria. Shows the query definition for the most recent query.
Reports
A report has multiple pages, and applies to the time that the report is generated. There are
several predefined reports, and you can create new reports. A reports gives more details than a
view. Reports can be customized, filtered, generated and scheduled. You cannot drill down into a
report.
In the Logs & Monitor view, clicking the (+) tab opens a catalog of all views and reports, predefined
and customized. Double-click a report to open it.
Item Description
1 Preview bar - A report is divided onto pages, usually, one view on one page. Editing a
report is done per page, in the same way as you edit a view.
4 Query Search bar - Define custom queries using the GUI tools, or manually entering
query criteria. Shows the query definition for the most recent query.
To enable the Network Activity Report for R80.10 and higher Gateways:
In SmartConsole, in the Access Control Policy rule, add per Session to the Track settings
("Tracking Options" on page 46).
To import the file from another server, or from another administrator, use the Import Template
option in the Catalog (new tab).
To schedule a report:
1. In SmartConsole, open the Logs & Monitor view.
2. Click the + tab to open a new tab.
3. Click Views or Reports.
4. Select a view or a report.
5. Select Actions > Schedule PDF or Schedule Excel.
The Schedule page of the Export settings window opens.
6. Define the recurrence pattern.
7. Define the Period and Filter.
8. Optional: Configure email settings to get the scheduled view or report automatically. Click
Send by Email ("Configuring Email Settings for Views and Reports" on page 39).
View Settings
Views can be configured according to these options:
1. Enter a title.
2. To show more results, this option allows a table to spread across multiple pages when saved
to PDF.
The No page limit option shows all the results for the selected table query, spread across as
many pages as required.
Report Settings
Reports can be configured according to these options:
Widgets
You can customize the widgets to optimize the visual display. To customize widgets, switch to edit
mode. Click Options > Edit.
• To save changes, click Done.
• To cancel changes, click on Discard.
• To restore the predefined view to the default values, click Options > Restore Defaults.
To customize a widget:
Filters
The search bar is used to apply on-demand filters, but you can also save filters with the view /
report definition.
3. Look at the Identity Awareness login logs, and copy the names of the relevant groups. They
usually have the prefix "ad_".
4. Add a filter for the field User Group and type or paste the name of the group that you want to
include in the filter. For multiple groups, use a comma-separated list.
Logging
In This Section:
Log Analysis ..................................................................................................................44
Sample Log Analysis ....................................................................................................44
Using the Log View .......................................................................................................45
Working with Logs ........................................................................................................46
Log Analysis
SmartConsole lets you transform log data into security intelligence. Search results are fast and
immediately show the log records you need. The Security Gateways send logs to the Log Servers
on the Security Management Server or on a dedicated server. Logs show on the SmartConsole
Logs & Monitor Logs tab. You can:
• Quickly search through logs with simple Google-like searches.
• Select from many predefined search queries to find the applicable logs.
• Create your own queries using a powerful query language.
• Monitor logs from administrator activity and connections in real-time.
Item Description
1 Queries - Predefined and favorite search queries.
3 Query search bar - Define custom queries in this field. You can use the GUI tools or
manually enter query criteria. Shows the query definition for the most recent query.
4 Log statistics pane - Shows top results of the most recent query.
5 Results pane - Shows log entries for the most recent query.
Tracking Options
Select these options in the Track column of a rule:
• None - Do not generate a log.
• Log - This is the default Track option. It shows all the information that the Security Gateway
used to match the connection. At a minimum, this is the Source, Destination, Source Port, and
Destination Port. If there is a match on a rule that specifies an application, a session log shows
the application name (for example, Dropbox). If there is a match on a rule that specifies a Data
Type, the session log shows information about the files, and the contents of the files.
• Accounting - Select this to update the log at 10 minute intervals, to show how much data has
passed in the connection: Upload bytes, Download bytes, and browse time.
Note - When upgrading from R77.xx or from R80 to R80.10, there are changes to the names of the
options in the Track column. To learn more see sk116580
http://supportcontent.checkpoint.com/solutions?id=sk116580.
Log Generation
• per Connection - Select this to show a different log for each connection in the session. This is
the default for rules in a Layer with only Firewall enabled. These are basic firewall logs.
• per Session - Select this to generate one log for all the connections in the same session ("Log
Sessions" on page 47). This is the default for rules in a Layer with Applications and URL
Filtering or Content Awareness enabled. These are basic Application Control logs.
Alert:
For each alert option, you can define a script in Menu > Global Properties > Log and Alert >
Alerts.
• None - Do not generate an alert.
• Alert - Generate a log and run a command, such as: Show a popup window, send an email
alert or an SNMP trap alert, or run a user-defined script as defined in the Global Properties.
• SNMP - Send an SNMP alert to the SNMP GUI, or run the script defined in the Global
Properties.
• Mail - Send an email to the administrator, or run the mail alert script defined in the Global
Properties.
• User Defined Alert - Send one of three possible customized alerts. The alerts are defined by
the scripts specified in the Global Properties.
Log Sessions
A session is a user's activity at a specified site or with a specified application. The session starts
when a user connects to an application or to a site. The Security Gateway includes all the activity
that the user does in the session in one session log.
• URLs - Shows all the URLs in the session. These show if Extended Log is selected in the Track
option of the rule.
• Files - Shows all the files uploaded or downloaded in the session. These show if Extended Log
is selected in the Track option of the rule, or if a Data Type was matched on the connection.
4. In the Logs & Monitor > Logs tab, search for the logs in one of these ways:
• Paste the Rule UID into the query search bar and press Enter.
• For faster results, use this syntax in the query search bar:
layer_uuid_rule_uuid:*_<UID>
For example, paste this into the query search bar and press Enter:
layer_uuid_rule_uuid:*_46f0ee3b-026d-45b0-b7f0-5d71f6d8eb10
Packet Capture
You can capture network traffic. The content of the packet capture provides a greater insight into
the traffic which generated the log. With this feature activated, the Security Gateway sends a
packet capture file with the log to the log server. You can open the file, or save it to a file location
to retrieve the information a later time.
The packet capture option is activated by default.
Running Queries
To create and run a query:
1. In the query search bar, click Enter Search Query (Ctrl+F).
2. Enter or select query criteria.
The query continues to update every five seconds while Auto-Refresh is enabled. If the number of
logs exceeds 100 in a five-second period, the logs are aggregated, and the summary view shows.
To see all logs that have been aggregated in a specific time interval, click View.
9. Double-click the Width column to change the default column width for the selected field.
10. To change the column width, drag the right column border in the Results Pane.
11. To save the column width, right-click and select Save Profile.
The column is applicable to future sessions.
Criteria Values
Criteria values are written as one or more text strings. You can enter one text string, such as a
word, IP address, or URL, without delimiters. Phrases or text strings that contain more than one
word must be surrounded by quotation marks.
Phrase examples
• "John Doe"
• "Log Out"
• "VPN-1 Embedded Connector"
IP Addresses
IPv4 and IPv6 addresses used in log queries are counted as one word. Enter IPv4 address with
dotted decimal notation and IPv6 addresses with colons. You can also use the '*' wildcard
character with IP addresses.
Example:
• 192.0.2.1
• 2001:db8::f00:d
NOT Values
You can use NOT <field> values with field keywords (on page 53) in log queries to find logs for
which the value of the field is not the value in the query.
Syntax
NOT <field>:<value>
Example
NOT src:10.0.4.10
Wildcards
You can use the standard wildcard characters (* and ?) in queries to match variable characters or
strings in log records. You can use more than the wildcard character.
Wildcard syntax
• The ? (question mark) matches one character.
• The * (asterisk) matches a character string.
Examples:
• Jo? shows Joe and Jon, but not Joseph.
• Jo* shows Jon, Joseph, and John Paul.
If your criteria value contains more than one word, you can use the wildcard in each word. For
example, 'Jo* N*' shows Joe North, John Natt, Joshua Named, and so on.
Examples:
• 192.168.2.* shows all records for 192.168.2.0 to 192.168.2.255 inclusive
• 192.168.* shows all records for 192.168.0.0 to 192.168.255.255 inclusive
Field Keywords
You can use predefined field names as keywords in filter criteria. The query result only shows log
records that match the criteria in the specified field. If you do not use field names, the query result
shows records that match the criteria in all fields.
This table shows the predefined field keywords. Some fields also support keyword aliases that you
can type as alternatives to the primary keyword.
source src Traffic source IP address, DNS name or Check Point network
object name
Examples:
• source:192.168.2.1
• action:(Reject OR Block)
You can use the OR Boolean operator in parentheses to include multiple criteria values.
Important - When you use fields with multiple values, you must:
• Write the Boolean operator, for example AND.
• Use parentheses.
Boolean Operators
You can use the Boolean operators AND, OR, and NOT to create filters with many different criteria.
You can put multiple Boolean expressions in parentheses.
If you enter more than one criteria without a Boolean operator, the AND operator is implied. When
you use multiple criteria without parentheses, the OR operator is applied before the AND operator.
Examples:
• blade:"application control" AND action:block
Shows log records from the Application & URL Filtering Software Blade where traffic was
blocked.
• 192.168.2.133 10.19.136.101
Shows log entries that match the two IP addresses. The AND operator is presumed.
• 192.168.2.133 OR 10.19.136.101
Shows log entries that match one of the IP addresses.
• (blade:Firewall OR blade:IPS OR blade:VPN) AND NOT action:drop
Shows all log entries from the Firewall, IPS or VPN blades that are not dropped. The criteria in
the parentheses are applied before the AND NOT criterion.
• source:(192.168.2.1 OR 192.168.2.2) AND destination:17.168.8.2
Shows log entries from the two source IP addresses if the destination IP address is
17.168.8.2. This example also shows how you can use Boolean operators with field criteria.
Event Analysis
In This Section:
Event Analysis with SmartEvent ..................................................................................56
What is an Event?..........................................................................................................56
Sample Application & URL Filtering Event Analysis ..................................................57
The Event Analysis Architecture ..................................................................................57
SmartEvent Correlation Unit .......................................................................................58
The SmartView Web Application ..................................................................................58
Configuring SmartEvent Policy and Settings ..............................................................59
SmartEvent with Management High Availability .........................................................82
What is an Event?
An event is a record of a security incident. It is based on one or more logs, and on rules that are
defined in the Event Policy.
An example of an event that is based on one log: A High Severity Anti-Bot event. One Anti-Bot log
with a Severity of High causes the event to be recorded.
An example of an event that is based on more than one log: A Certificate Sharing event. Two login
logs with the same certificate and a different user cause the event to be recorded.
3 SmartEvent Identifies events: Analyzes each log entry from a Log Server, and
Correlation Unit looks for patterns according to the installed Event Policy. The logs
contain data from Check Point products and certain third-party
devices. When a threat pattern is identified, the SmartEvent
Correlation Unit forwards the event to the SmartEvent Server.
6 SmartEvent client Shows the received events. Uses the clients to manage events (for
example: to filter and close events), fine-tunes, and installs the
Event Policy. The clients are:
• SmartConsole
• SmartView Web Application
• SmartEvent GUI
The SmartEvent components can be installed on one computer (that is, a standalone deployment)
or multiple computers and sites (a distributed deployment). To handle higher volumes of logging
activity, we recommend a distributed deployment. You can install more than one SmartEvent
Correlation Unit. Each SmartEvent Correlation Unit can analyze logs from more than one Log
Server or Domain Log Server.
Policy Tab
Define the Event Policy in the Event Policy tab. Most configuration steps occur in the Policy tab.
You define system components, such as SmartEvent Correlation Unit, lists of blocked IP
addresses and other general settings.
The types of events that SmartEvent can detect are listed here, and sorted into a number of
categories. To change each event, change the default thresholds and set Automated Responses.
You can also disable events.
The Policy tab has these sections:
• Selector Tree - The navigation pane.
• Detail pane - The settings of each item in the Selector Tree.
• Description pane - A description of the selected item.
After the SmartEvent client starts to show events, do these procedures:
• Fine-tune the Event Policy
• Change the existing Event Definition to see the events that interest you (see "Modifying Event
Definitions" on page 60)
• Create new Event Definitions to see the events that are not included in the existing definitions
(see "Creating Event Definitions (User Defined Events)" on page 66)
Revert Changes
You can undo changes to the Event Policy, if they were not saved.
To undo changes: click File > Revert Changes.
Event Threshold
The Event Threshold allows you to modify the limits that, when exceeded, indicates that an event
has occurred. The limits typically are the number of connections, logs, or failures, and the period
of time in which they occurred. It appears thus:
Detect the event when more than x connections/logs/failures (etc.) were detected over a period
of y seconds.
To decreasing the number of false alarms based on a particular event, increase the number of
connections, logs or failures and/or the period of time for them to occur.
Severity
An event severity affects in which queries (among those that filter for severity) this type of event
will appear.
To modify the severity of an event, select a severity level from the drop-down list.
Automatic Reactions
When detected, an event can activate an Automatic Reaction. The SmartEvent administrator can
create and configure one Automatic Reaction, or many, according to the needs of the system.
For example: A Mail Reaction can be defined to tell the administrator of events to which it is
applied. Multiple Automatic Mail Reactions can be created to tell a different responsible party for
each type of event.
TotalNumOfConnections varchar(20)
User varchar(1024)
Uuid varchar(48)
aba_customer varchar(1024)
jobID varchar(48)
policyRuleID varchar(48)
These sections tell how to add an Automatic Reaction to an event:
where name is a string and value is either free text until a semicolon, or a nested name-value
set.
The following is a sample event:
(Name: Check Point administrator credential guessing; RuleID:
{F182D6BC-A0AA-444a-9F31-C0C22ACA2114}; Uuid:
<42135c9c,00000000,2e1510ac,131c07b6>; NumOfUpdates: 0; IsLast: 0;
StartTime: 16Feb2015 16:45:45; EndTime: Not Completed; DetectionTime:
16Feb2015 16:45:48; LastUpdateTime: 0; TimeInterval: 600;
MaxNumOfConnections: 3; TotalNumOfConnections: 3; DetectedBy:
2886735150;
Origin: (IP: 192.0.2.4; repetitions: 3; countryname: United States;
hostname: theHost) ; ProductName: SmartDashboard; User: XYZ; Source:
(hostname: theHost; repetitions: 3; IP: 192.0.2.4; countryname: United
States) ; Severity: Critical; EventNumber: EN00000184; State: 0;
NumOfRejectedConnections: 0; NumOfAcceptedConnections: 0) ;
--------------------------------------------------------------------------------------------------
If you need to refer to more fields, you can add them to the event:
a) In the SmartEvent GUI client, in the Policy tab, right click the event, and select Properties >
Event Format tab
b) In the Display column, select the Event fields to have in the Event.
c) Install the Event Policy on the SmartEvent Correlation Unit.
Working Hours
Working Hours are used to detect unauthorized attempts to access protected systems and other
forbidden operations after-hours. To set the Regular Working Hours for an event, select a Time
Object that you have configured from the drop-down list.
2. Select the Time Object you created from the drop-down list.
3. Select File > Save.
Exceptions
Exceptions allow an event to be independently configured for the sources or destinations that
appear. For example, if the event Port Scan from Internal Network is set to detect an event when
30 port scans have occurred within 60 seconds, you can also define that two port scans detected
from host A in 10 seconds of each other is also an event.
To manually add an exception, under the heading Apply the following exceptions, click Add and
select the Source and/or Destination of the object to apply different criteria for this event.
Note - If you do not see the host object listed, you may need to create it in
SmartEvent (see "Adding Network and Host Objects" on page 80).
To match the Event Definition "A", a log from Endpoint Security must match the Action, Event
Type, Port, and Protocol values listed in the Endpoint Security column. A log from a Security
Gateway must match the values listed in its column.
SmartEvent divides this procedure into two steps. The SmartEvent Correlation Unit first checks if
the Product value in the log matches one of the permitted Product values of an Event Definition.
If Log 1 did not contain a permitted Product value, the SmartEvent Correlation Unit compares the
log against Event Definition "B", and so on. If the log fails to match against an Event Definition, it
is discarded.
The SmartEvent Correlation Unit checks if the log contains the Product-specific criteria to match
the Event Definition. For example: The product Endpoint Security generates logs that involve the
Firewall, Spyware, Malicious Code Protection, and others. The log contains this information in the
field Event Type. If an event is defined to match on Endpoint Security logs with the event type
Firewall, an Endpoint Security log with Event Type "Spyware" fails against the Event Definition
filter. Other criteria can be specified to the Product.
In our example, Log 1 matched Event Definition "A" with a permitted product value. The
SmartEvent Correlation Unit examines if the log contains the necessary criteria for an Endpoint
Security log to match.
If the criteria do not match, the SmartEvent Correlation Unit continues to compare the log criteria
to other event definitions.
Notes -
• The Event Candidate can track logs from multiple products
• The logs must be from the same source
• The Event Candidate tracks logs before all of the criteria were matched
Each Event Definition can have multiple event candidates, each of which keeps track of logs
grouped by equivalent properties. In the figure above the logs that create the event candidate have
a common source value. They were dropped, blocked or rejected by a Firewall. They are grouped
together because the Event Definition is designed to detect this type of activity, that originates
from one source.
When a log matches the event definition, but has properties different than those of the existing
event candidates, a new event candidate is created. This event candidate is added to what can be
thought of as the Event Candidate Pool.
Note - SmartEvent creates a new event candidate for a log with a different source.
To illustrate more, an event defined detects a high rate of blocked connections. SmartEvent tracks
the number of blocked connections for each Firewall, and the logs of the blocked traffic at each
Firewall forms an event candidate. When the threshold of blocked connection logs from a Firewall
is surpassed, that Firewall event candidate becomes an event. While this Event Definition creates
one event candidate for each Firewall monitored, other Event Definitions can create many more.
The Event Candidate Pool is a dynamic environment, with new logs added and older logs discarded
when they have exceeded an Event Definition time threshold.
Save As Save Event As Creates an Event Definition based on the properties of the
highlighted Event Definition. When you select Save As, the system
prompts you to save the selected Event Definition with a new name
for later editing. Save As can also be accessed from the Properties
window.
All User Defined Events are saved at Policy tab > Event Policy > User Defined Events. When an
Event Definition exists it can be modified through the Properties window, available by right-click
and from the Actions menu.
11. Edit or add product filters for each log necessary in the Event Definition filter:
a) Select the Log field from the available Log Field list.
b) Click Add to edit the filter.
c) Make sure that the filter matches on All Conditions or Any Conditions.
d) Double-click the Log field and select the values to use in the filter.
Click Next.
12. When you defined the filters for each product, select values for these options to define how to
process logs:
• Detect the event when at least __ logs occurred over a period of __ seconds contains the
event thresholds that define the event. You can modify the event thresholds by altering the
number of logs and/or the period of time that define the event.
• Each event definition may have multiple Event Candidates existing simultaneously allows
you to set whether SmartEvent creates distinct Event Candidates based on a field (or set of
fields) that you select below.
Select the field(s) by which distinct Event Candidates will be created allows you to set the
field (or set of fields) that are used to differentiate between Event Candidates.
• Use unique values of the __ field when counting logs directs SmartEvent to count unique
values of the specified field when determining whether the Event Threshold has been
surpassed. When this property is not selected, SmartEvent counts the total number of logs
received.
13. Click Finish.
For example: Multiple logs that report a virus detected on the same source with the
same virus name are combined into the same event.
Multiple logs — Required for events that identify an activity level, such as a High
Connection Rate.
When the event is triggered by multiple logs, set the behavior of Event Candidates:
Detect the event when at least... — Set the Event Threshold that, when exceeded,
indicates that an event has occurred.
Select the field(s) by which distinct event candidates will be created — An event is
generated by logs with the same values in the fields specified here. To define how logs
are grouped into Event Candidates, select the related fields here.
Use unique values of the ...— Only logs with unique values for the fields specified here
are counted in the event candidate. For example: A port scan event counts logs that
include unique ports scanned. Also, the logs do not increment the log count for logs
that contain ports already encountered in the event candidate.
Advanced — Define the keep=alive time for the event, and how often the SmartEvent
Correlation Unit updates the SmartEvent server with new logs for the created event.
• Event Format
When an event is generated, information about the event is presented in the Event Detail
pane.
This screen lets you specify if the information will be added to the detailed pane and from
which Log Field the information is taken.
You can clear it in the Display column. The Event Field will not be populated.
• GUI representation
All events can be configured. This screen lets you select the configuration parameters that
show.
The Threshold section shows the number of logs that must matched to create the
event. This is usually not shown for one log events and shown for multiple log events.
The Exclude section lets you specify the log fields that show when you add an event
exclusion.
The Exception section lets you specify the log fields that show when you add an event
exception.
3. Click OK to save your changes.
NIS Scans Port scan from NIS servers Any - Multiple NIS
Servers internal queries
network
HTTP Scans IP sweep from Proxy servers Any HTTP/ Proxy servers
Proxy internal HTTPS connections out
Servers - network to various sites
Out to the
Web
System Administration
To maintain your SmartEvent system, you can do these tasks from the General Settings section of
the Policy tab:
• Adding a SmartEvent Correlation Unit and Log Servers
• Create offline jobs analyze historical log files ("Importing Offline Log Files" on page 27)
• Adding objects to the Internal Network (see "Defining the Internal Network" on page 81)
• Creating scripts to run as Automatic Reactions for certain events ("Creating an External Script
Automatic Reaction" on page 64)
• Creating objects for use in filters (see "Adding Network and Host Objects" on page 80)
Revert Changes
You can undo changes to the Event Policy, if they were not saved.
To undo changes: click File > Revert Changes.
How it works
Dbsync initially connects to the management server with which SIC is established. It retrieves all
the objects. After the initial synchronization it gets updates when an object is saved. Dbsync
registers all the High Availability management machines and periodically tests the connectivity
with the newest management server. If connectivity is lost, it attempts to connect to the other High
Availability management servers until it finds an active one and connects to it.
If two management servers are active concurrently, dbsync stays connected to one management
server. Dbsync does not get changes made on the other management server until a
synchronization operation is done.
SmartView Monitor gives you a complete picture of network and security performance. Use it to
respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow
patterns or security activities.
SmartView Monitor is a high-performance network and security analysis system. This system
helps you to establish work habits based on learned system resource patterns. Based on Check
Point Security Management Architecture, SmartView Monitor provides a single, central interface,
to monitor network activity and performance of Check Point Software Blades.
• System Counters
• VPN tunnel monitoring (SmartView Monitor only)
• Cooperative Enforcement, for Endpoint Security Servers
• Traffic
In SmartView Monitor you can create customized monitoring view.
Immediate Actions
If the status shows an issue, you can act on that network object.
For example:
• Disconnect client - Disconnect one or more of the connected SmartConsole clients.
• Start/Stop cluster member - You can see all Cluster Members of a Gateway Cluster in
SmartView Monitor. You can start or stop a selected Cluster Member.
• Suspicious Action Rules - You can block suspicious network activity while you investigate the
real risk or to quickly block an obvious intruder.
Logging and Monitoring Administration Guide R80.10 | 84
Monitoring Traffic and Connections
Deploying Monitoring
To monitor a Gateway in the Logs & Monitor view of SmartConsole, or in SmartView Monitor:
• You need a Security Management Server and one or more Security Gateways.
• Enable the Monitoring blade on the Security Management Server and Security Gateways.
No other deployment steps are necessary.
Viewing Alerts
Alert commands are set in SmartConsole > Global Properties > Log and Alert > Alerts page. The
Alerts in this window apply only to Security Gateways.
To see alerts:
1. Click the Alerts icon in the toolbar.
The Alerts window opens.
To block an activity:
1. In the SmartView Monitor toolbar, click the Suspicious Activity Rules button.
The Enforced Suspicious Activity Rules window opens.
2. Click Add.
The Block Suspicious Activity window opens.
3. In Source and in Destination, select IP or Network:
• To block all sources or destinations that match the other parameters, enter Any.
Logging and Monitoring Administration Guide R80.10 | 86
Monitoring Traffic and Connections
• To block one suspicious source or destination, enter an IP Address and Network Mask.
4. In Service:
• To block all connections that fit the other parameters, enter Any.
• To block one suspicious service or protocol, click the button and select a service from the
window that opens.
5. In Expiration, set your examining time limit.
6. Click Enforce.
You can create a Suspicious Activity rule based on TCP or UDP use.
6. Click Enforce.
For example:
Your corporate policy does not allow to share peer2peer file, and you see it in the Traffic > Top
P2P Users results.
1. Right-click the result bar and select Block Source.
The SAM rule is set up automatically with the user IP address and the
P2P_File_Sharing_Applications service.
2. Click Enforce.
3. For the next hour, while this traffic is dropped and logged, contact the user.
SIC is initialized between Security Gateways (3) (local and remote), and the Security Management
Server (2). The Security Management Server then gets status data from the Software Blades with
the AMON (Application Monitoring) protocol. SmartView Monitor (1) gets the data from the Security
Management Server.
AMON
The Security Management Server acts as an AMON client. It collects data about installed Software
Blades. Each Security Gateway, or any other OPSEC gateway which runs an AMON server, acts as
the AMON server itself. The gateway requests status updates from other components, such as the
Firewall kernel and network servers. Requests are fetched at a defined interval.
An alternate source for status collection can be any AMON client, such as an OPSEC partner,
which uses the AMON protocol.
The AMON protocol is SIC- based. It can collect data only after SIC is initialized.
2. Select thresholds.
3. In Action, select:
• none - No alert.
• log - Sends a log entry to the database.
• alert - Opens a pop-up window to your desktop.
• mail - Sends a mail alert to your Inbox.
• snmptrap - Sends an SNMP alert.
• useralert - Runs a script. Make sure a user-defined action is available. Go to
SmartConsole > Global Properties > Log and Alert > Alert Commands.
• Networking
• Resources
• Domain Log Server Connectivity
Some categories apply only to some machines or deployments.
Note - SNMP monitoring thresholds are supported from R75.20, R71.30, and higher.
In each category there are many individual thresholds that you can set. For example, the hardware
category includes alerts for the state of the RAID disk, the state of the temperature sensor, the
state of the fan speed sensor, and others. For each individual threshold, you can configure:
• If it is enabled or disabled
• How frequently alerts are sent
• The severity of the alert
• The threshold point (if necessary)
• Where the alerts are sent to
You can also configure some settings globally, such as how often alerts are send and where they
are sent to.
Types of Alerts
• Active alerts are sent when a threshold point is passed or the status of a monitored component
is problematic.
• Clear alerts are sent when the problem is resolved and the component has returned to its
normal value. Clear alerts look like active alerts but the severity is set to 0.
• If the Multi-Domain Security Management level for a threshold is Multi-Domain Server and
Domain Server: Alerts are generated for the Multi-Domain Server and Domain Servers
separately when the threshold point is passed.
Configuration Procedures
There is one primary command to configure the thresholds in the command line,
threshold_config. You must be in the Expert mode to run it. After you run
threshold_config, follow the on-screen instructions to make selections and configure the
global settings and each threshold.
When you run threshold_config, you get these options:
• Show policy name - Shows you the name configured for the threshold policy.
• Set policy name - Lets you set a name for the threshold policy.
• Save policy- Lets you save the policy.
• Save policy to file - Lets you export the policy to a file.
• Load policy from file - Lets you import a threshold policy from a file.
• Configure global alert settings - Lets you configure global settings for how frequently alerts
are sent and how many alerts are sent.
• Configure alert destinations - Lets you configure a location or locations where the SNMP
alerts are sent.
• View thresholds overview - Shows a list of all thresholds that you can set including: the
category of the threshold, if it is active or disabled, the threshold point (if relevant), and a short
description of what it monitors.
• Configure thresholds - Opens the list of threshold categories to let you select thresholds to
configure.
Configure Global Alert Settings
If you select Configure global alert settings, you can configure global settings for how frequently
alerts are sent and how many alerts are sent. You can configure these settings for each threshold.
If a threshold does not have its own alert settings, it uses the global settings by default.
You can configure these options:
• Enter Alert Repetitions - How many alerts are sent when an active alert is triggered. If you
enter 0, alerts are sent until the problem is fixed.
• Enter Alert Repetitions Delay - How long the system waits between it sends active alerts.
• Enter Clear Alert Repetitions - How many clear alerts are sent after a threshold returns to a
regular value.
• Enter Clear Alert Repetitions Delay - How long the system waits between it sends clear
alerts.
Configure Alert Destinations
If you select Configure Alert Destinations, you can add and remove destinations for where the
alerts are sent. You can see a list of the configured destinations. A destination is usually an NMS
(Network Management System) or a Check Point Domain Log Server.
After you enter the details for a destination, the CLI asks if the destination applies to all
thresholds.
• If you enter yes, alerts for all thresholds are sent to that destination, unless you remove the
destination from an individual threshold.
• If you enter no, no alerts are sent to that destination by default. But for each individual
threshold, you can configure the destinations and you can add destinations that were not
applied to all thresholds.
For each threshold, you can choose to which of the alert destinations its alerts are sent. If you do
not define alert destination settings for a threshold, it sends alerts to all of the destinations that
you applied to all thresholds.
For each alert destination enter:
• Name - An identifying name.
• IP - The IP address of the destination.
• Port - Through which port it is accessed
• Ver - The version on SNMP that it uses
• Other data- Some versions of SNMP require more data. Enter the data that is supplied for that
SNMP version.
Configure Thresholds
If you select Configure thresholds, you see a list of the categories of thresholds, including:
• Hardware
• High Availability
• Networking
• Resources
• Domain Log Server Connectivity
Some categories apply only to some machines or deployments. For example, Hardware applies
only to Check Point appliances and High Availability applies only to clusters or High Availability
deployments.
Select a category to see the thresholds in it. Each threshold can have these options:
• Enable/Disable Threshold - If the threshold is enabled, the system sends alerts when there is
a problem. If it is disabled it does not generate alerts.
• Set Severity - You can give each threshold a severity setting. The options are: Low, Medium,
High, and Critical. The severity level shows in the alerts and in SmartView Monitor. It lets you
know quickly how important the alert is.
• Set Repetitions - Set how frequently and how many alerts will be sent when the threshold is
passed. If you do not configure this, it uses the global alert settings.
• Set Threshold Point - Enter the value that will cause active alerts when it is passed. Enter the
number only, without a unit of measurement.
• Configure Alert Destinations - See all of the configured alert destinations. By default, active
alerts and clear alerts are sent to the destinations. You can change this for each destination.
When you select the destination you see these options:
• Remove from destinations - If you select this, alerts for this threshold are not sent to the
selected destination.
• Add a destination - If you configured a destination in the global alert destinations but did
not apply it to all thresholds, you can add it to the threshold.
• Disable clear alerts - Cleared alerts for this threshold are not sent to the selected
destination. Active alerts are sent.
MIB object - The name of the object as recorded in the MIB file.
MIB object value - The value of the object when the threshold became active, as
recorded in the MIB file.
State - The status of the object: active or clearing (passed the threshold but returns to
usual value).
Severity - The severity of that threshold, as you configured for it in the CLI.
Activation time - When was the alert first sent.
• Alert Destinations - A list of the destinations that alerts are sent to.
Name - The name of the location.
Type - The type of location. For example, a Domain Log Server or NMS.
State - If logs are sent from the gateway or Security Management Server to the
destination machine.
Alert Count - How many alerts were sent to the destination from when the policy
started.
• Errors - Shows thresholds that cannot be monitored. For example, the Security Gateway
cannot monitor RAID sensors on a machine that does not have RAID sensors. Therefore it
shows an error for the RAID Sensor Threshold.
Threshold Name - The name of the threshold with an error.
Error - A description of the error.
Time of Error - When the error first occurred.
Customizing Results
You can create Custom Views, to change the fields that show in the results.
Important - Do not select Prompt on if your view is not about one of these two.
3. In the Show column, select the filter to be related with this view.
4. In the Filter column, click the corresponding Any(*) link.
5. Select the related objects to edit the selected filters.
6. Click the Advanced button to set a limit (in the Records limitation window) to the number of
lines that show in the report.
7. Enter a record limitation.
8. Click OK.
A Users view shows in the Custom branch of the Tree View.
9. Enter a name for the new Users view.
10. Click Enter.
Refreshing Views
Results are automatically refreshed every 60 seconds.
To refresh the view earlier, right-click the view name in the Tree and select Run.
To refresh data about an object in the current view, right-click the object in the results and select
Refresh.
Attention At least one Software Blade has a minor issue, but the gateway works.
Waiting SmartView Monitor waits for the Security Management Server to send
data from Security Gateways.
System Data
• Unified Package - The version number.
• OS Information - The name, the version name/number, the build number, the service pack,
and any additional information about the Operating System in use.
• CPU - The specific CPU parameters (for example, Idle, User, Kernel, and Total) for each CPU.
Note - In the Gateways Results view the Average CPU indicates the average total CPU usage
of all existing CPOS.
• Memory - The total amount of virtual memory, what percentage of this total is used. The total
amount of real memory, what percentage of this total is used, and the amount of real memory
available for use.
• Disk - Shows all the disk partitions and their specific details (for example, capacity, used, and
free).
Note - In the Gateways Results view the percentage/total of free space in the hard disk on
which the Firewall is installed. For example, if there are two hard drives C and D and the
Firewall is on C, the Disk Free percentage represents the free space in C and not D.
Firewall
• Policy information - The name of the Security Policy installed on the gateway, and the date and
time that this policy was installed.
• Packets - The number of packets accepted, dropped and logged by the gateway.
• UFP Cache performance - The hit ratio percentage and the total number of hits handled by the
cache, the number of connections inspected by the UFP Server.
• Hash Kernel Memory (the memory status) and System Kernel Memory (the OS memory) - The
total amount of memory allocated and used. The total amount of memory blocks used. The
number of memory allocations, and those allocation operations which failed. The number of
times that the memory allocation freed up, or failed to free up. The NAT Cache, including the
total amount of hits and misses.
• Remote Access - All types of Remote Access VPN users with which there is currently an open
IPsec tunnel. This is useful to track the activity level and load patterns of VPN gateways that
serve as a remote access server. High Watermark includes the maximum number of Remote
Access VPN users with which there was an open IPsec tunnel since the gateway was restarted.
• Tunnels Establishment Negotiation - The current rate of successful Phase I IKE Negotiations
(measured in Negotiations per second). This is useful to track the activity level and load
patterns of a VPN gateway that serve as a remote access server. High Watermark includes the
highest rate of successful Phase I IKE Negotiations since the Policy was installed (measured in
Negotiations per second). Accumulative data includes the total number of successful Phase I
IKE negotiations since the Policy was installed.
• Failed - The current failure rate of Phase I IKE Negotiations can be used to troubleshoot (for
instance, denial of service) or for a heavy load of VPN remote access connections. High
Watermark includes the highest rate of failed Phase I IKE negotiations since the Policy was
installed. Accumulative is the total number of failed Phase I IKE negotiations since the Policy
was installed.
• Concurrent - The current number of concurrent IKE negotiations. This is useful to track the
behavior of VPN connection initiation, especially in large deployments of remote access VPN
scenarios. High Watermark includes the maximum number of concurrent IKE negotiations
since the Policy was installed.
• Encrypted and Decrypted throughput - The current rate of encrypted or decrypted traffic
(measured in Mbps). Encrypted or decrypted throughput is useful (in conjunction with
encrypted or decrypted packet rate) to track VPN usage and VPN performance of the gateway.
High Watermark includes the maximum rate of encrypted or decrypted traffic (measured in
Mbps) since the gateway was restarted. Accumulative includes the total encrypted or
decrypted traffic since the gateway was restarted (measured in Mbps).
• Encrypted and Decrypted packets - The current rate of encrypted or decrypted packets
(measured in packets per second). Encrypted or decrypted packet rate is useful (in conjunction
with encrypted/decrypted throughput) to track VPN usage and VPN performance of the
gateway. High Watermark includes the maximum rate of encrypted or decrypted packets since
the gateway was restarted, and Accumulative, the total number of encrypted packets since the
gateway was restarted.
• Encryption and Decryption errors - The current rate at which errors are encountered by the
gateway (measured in errors per second). This is useful to troubleshoot VPN connectivity
issues. High Watermark includes the maximum rate at which errors are encountered by the
gateway (measured in errors per second) since the gateway was restarted, and the total
number of errors encountered by the gateway since the gateway was restarted.
• Hardware - The name of the VPN Accelerator Vendor, and the status of the Accelerator.
General errors such as the current rate at which VPN Accelerator general errors are
encountered by the gateway (measured in errors per second). The High Watermark includes
the maximum rate at which VPN Accelerator general errors are encountered by the gateway
(measured in errors per second) since the gateway was restarted. The total number of VPN
Accelerator general errors encountered by the gateway since it was restarted.
• IP Compression - Compressed/Decompressed packets statistics and errors.
QoS
• Policy information - The name of the QoS Policy and the date and time that it was installed.
• Number of interfaces - The number of interfaces on the Check Point QoS gateway. Information
about the interfaces applies to both inbound and outbound traffic. This includes the maximum
and average amount of bytes that pass per second, and the total number of conversations,
where conversations are active connections and connections that are anticipated as a result of
prior inspection. Examples are data connections in FTP, and the "second half" of UDP
connections.
• Packet and Byte information - The number of packets and bytes in Check Point QoS queues.
ClusterXL
• gateway working mode - The gateway working mode as a cluster member, active or not, and
its place in the priority sequence. Working modes are: ClusterXL, Load Sharing, Sync only.
Running modes: active, standby, ready and down.
• Interfaces - Interfaces recognized by the gateway. The interface data includes the IP Address
and status of the specified interface, if the connection that passes through the interface is
verified, trusted or shared.
• Problem Notes - Descriptions of the problem notification device such as its status, priority and
when the status was last verified.
OPSEC
• The version name or number, and build number of the Check Point OPSEC SDK and OPSEC
product. The time it takes (in seconds) since the OPSEC gateway is up and running.
• The OPSEC vendor can add fields to their OPSEC Application gateway details.
SmartConsole Server
The number of users that are currently connected.
Monitoring Tunnels
Tunnels Solution
VPN Tunnels are secure links between Security Gateways. These Tunnels ensure secure
connections between gateways of an organization and remote access clients.
When Tunnels are created and put to use, you can keep track of their normal function, so that
possible malfunctions and connectivity problems can be accessed and solved as soon as possible.
To ensure this security level, SmartView Monitor constantly monitor and analyze the status of an
organization's Tunnels to recognize malfunctions and connectivity problems. With the use of
Tunnel views, you can generate fully detailed reports that include information about the Tunnels
that fulfill the specific Tunnel views conditions. With this information you can monitor Tunnel
status, the Community with which a Tunnel is associated, the gateways to which the Tunnel is
connected, and so on. These are the Tunnel types:
• A Regular tunnel refers to the ability to send encrypted data between two peers. The Regular
tunnel is considered up if both peers have Phase 1 and Phase 2 keys.
• Permanent tunnels are constantly kept active. As a result, it is easier to recognize
malfunctions and connectivity problems. With Permanent tunnels administrators can monitor
the two sides of a VPN tunnel and identify problems without delay.
Permanent tunnels are constantly monitored. Therefore, each VPN tunnel in the community
can be set as a Permanent tunnel. A log, alert or user defined action can be issued when the
VPN tunnel is down.
Permanent tunnels can only be established between Check Point gateways. The configuration
of Permanent tunnels takes place on the community level and:
• Can be specified for an entire community. This option sets every VPN tunnel in the
community as permanent.
• Can be specified for a specific gateway. Use this option to configure specific gateways to
have Permanent tunnels.
• Can be specified for a single VPN tunnel. This feature allows you to configure specific
tunnels between specific gateways as permanent.
This table shows the possible Tunnel states and their significance to a Permanent or Regular
Tunnel.
Gateway not Responding The gateway is not responding. The gateway is not responding.
2. In the Tunnels branch (Custom or Predefined), double-click the Down Permanent Tunnel
view.
A list of all the Down Tunnels associated with the selected view properties shows.
Traffic
Traffic Monitoring provides in-depth details on network traffic and activity. As a network
administrator you can generate traffic information to:
• Analyze network traffic patterns
Network traffic patterns help administrators determine which services demand the most
network resources.
• Audit and estimate costs of network use
Monitoring traffic can provide information on how the use of network resources is divided
among corporate users and departments. Reports that summarize customer use of services,
bandwidth and time can provide a basis to estimate costs for each user or department.
• Identify the departments and users that generate the most traffic and the times of peak
activity.
• Detect and monitor suspicious activity. Network administrators can produce graphs and charts
that document blocked traffic, alerts, rejected connections, or failed authentication attempts to
identify possible intrusion attempts.
A Traffic view can be created to monitor the Traffic types listed in the following table.
IPs/Network Shows the current status view about active IPs/Network Objects through the
Objects selected gateway.
Security Rules Shows the current status view about the most frequently used Firewall rules.
The Name column in the legend states the rule number as previously configured
in SmartConsole.
Connections Shows the current status view about current connections initiated through the
selected gateway.
Tunnels Shows the current status view about the Tunnels associated with the selected
gateway and their usage.
Virtual Link Shows the current traffic status view between two gateways (for example,
Bandwidth, Bandwidth Loss, and Round Trip Time).
Packet Size Shows the current status view about packets according to the size of the
Distribution packets.
QoS Shows the current traffic level for each QoS rule.
System Counters
Monitoring System Counters provides in-depth details about Check Point Software Blade usage
and activities. As a network administrator you can generate system status information about:
• Resource usage for the variety of components associated with the gateway. For example, the
average use of real physical memory, the average percent of CPU time used by user
applications, free disk space, and so on.
• Gateway performance statistics for a variety of Firewall components. For example, the average
number of concurrent CVP sessions handled by the HTTP security server, the number of
concurrent IKE negotiations, the number of new sessions handled by the SMTP security
server, and so on.
• Detect and monitor suspicious activity. Network administrators can produce graphs and charts
that document the number of alerts, rejected connections, or failed authentication attempts to
identify possible intrusion attempts.
Monitoring Users
Users Solution
The User Monitor is an administrative feature. This feature lets you to keep track of Endpoint
Security VPN users currently logged on to the specific Security Management Servers. The User
Monitor provides you with a comprehensive set of filters which makes the view definition process
user-friendly and highly efficient. It lets you to easily navigate through the obtained results.
With data on current open sessions, overlapping sessions, route traffic, connection time, and
more, the User Monitor gives detailed information about connectivity experience of remote users.
This SmartView Monitor feature lets you view real-time statistics about open remote access
sessions.
If specific data are irrelevant for a given User, the column shows N/A for the User.
Unauthorized
Authorized
1. The Endpoint Security client (A) in the internal network (B) opens a connection to the Internet
(C) through a Security Gateway (D).
2. Cooperative Enforcement starts to work on the first server's reply to the client.
3. The Security Gateway sees the client's compliance in its tables and queries the Endpoint
Security server (E).
4. When a reply is received, a connection from a compliant host to the Internet is allowed.
If the client is non-compliant and Cooperative Enforcement is not in Monitor-only mode, the
connection is closed.
NAT Environments
Cooperative Enforcement is not supported by all the NAT configurations.
For Cooperative Enforcement to work in a NAT environment, the gateway and the Endpoint
Security Server must recognize the same IP address of a client. If NAT causes the IP address
received by gateway to be different than the IP address received by the Endpoint Security Server,
Cooperative Enforcement will not work.
To change the minimum available disk space for Logs and indexes:
1. In SmartConsole, edit the Security Management Server or Log Server or SmartEvent network
object.
2. Open Logs > Storage.
3. Select When disk space is below <number> Mbytes, start deleting old files.
4. Change the disk space value.
Note - In a Multi-Domain Security Management environment, the disk space for logs and
indexes is controlled by the Multi-Domain Server, and applies to all Domain Servers. Configure
the disk space on the Multi-Domain Server object.
You can import these third-party log formats to a Check Point Log Server:
• Syslog messages.
• Windows Events.
• SNMP Traps.
The Log Server converts the third-party log messages to a Check Point log. The log is then
available for further analysis by SmartEvent.
To configure the SmartEvent Server to read logs from this Log Server:
1. Configure SmartEvent to read logs from the Log Server.
2. In SmartEvent or in the SmartConsole event views, make a query to filter by the Product Name
field. This field uniquely identifies the events that are created from the syslog messages.
Note - Make sure that Access Control rules allow ELA traffic between the Windows computer and
the Log Server.
b) Enter the name of the corresponding OPSEC Application object that you created in
SmartConsole for the Windows events.
c) Enter the Activation Key of the OPSEC object.
5. Restart the Check Point Windows Event Service.
Establishing Trust
Establish trust between the Security Management Server and the windows host.
To establish trust:
1. Edit the OPSEC Application that you created in SmartConsole for the Windows events.
2. Select Communication.
3. Make sure that the trust status is Trust Established.
4. Click Publish to save the database.
In This Appendix
Planning and Considerations .....................................................................................120
The Parsing Procedure ..............................................................................................121
Manual Syslog Parsing ...............................................................................................121
The Free Text Parsing Language ...............................................................................122
IDS / IPS, application Firewall and other devices that attack name/ID
send attack logs
: (
:command (
:cmd_name (include)
:file_name ("snortPolicy.C")
)
)
4. Optional: If required:
a) Create a new dictionary file called <device product name>_dict.ini (see "Dictionary" on
page 131).
b) Put it in the directory $FWDIR/conf/syslog/UserDefined on the Log Server.
A dictionary translates values with the same meaning from logs from different devices into
a common value. This common value is used in the Event Definitions.
c) Edit the file $FWDIR/conf/syslog/UserDefined/UserDefinedSyslogDictionaries.C on the
Log Server.
:filename ("snort_dict.ini")
5. To examine the parsing, send syslog samples to a Check Point Log Server.
Troubleshooting:
If SmartConsole does not show the logs as expected, there can be problems with the parsing files:
• If there is a syntax error in the parsing files, an error message shows. To read a specified error
message, set the TDERROR_ALL_FTPARSER value to 5 before you run the procedure fwd -n.
• If the syslogs show in SmartConsole with 'Product syslog', the log was not parsed properly,
but as a general syslog.
• If the Product field contains another product (not the one you have just added) this means
there is a problem with the other product parsing file. Report this to the Check Point
SmartEvent team.
• If the product reports correctly in the log, look for all the fields you extracted. Some of them
are in the Information section. Some fields can be seen only when you select More Columns.
The Commands
Each command consists of these parts:
• cmd_name - the name of the command.
• command arguments - arguments that define the behavior of the command.
• on_success (optional) - the next command executed if the current command execution
succeeds.
• on_fail (optional) - the next command executed if the current command execution fails.
Logging and Monitoring Administration Guide R80.10 | 122
Appendix: Manual Syslog Parsing
Sample
:command (
:cmd_name (try)
:try_arguments
.
.
:on_success (
:command()
)
:on_fail (
:command()
)
)
Try
The try command matches a regular expression against the input string.
Argument Description
parse_from start_position - run the regular expression from the start of
the input string.
last_position - run the regular expression from the last
position of the previous successful command.
add_field One or more fields to add to the result (only if the regular
expression is successful).
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)")
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (1)
)
)
Group_try
The command group_try executes one or more commands in one of these modes:
• try_all tries all commands in the group, and ignores the return code of the commands.
• try_all_successively tries all the commands in the group, and ignores the return code of
the commands.
Each command tries to execute from the last position of the earlier successful command.
• try_until_success tries all the commands until one succeeds.
• try_until_fail tries all the commands until one fails.
The command group_try is commonly used when it parses a "free-text" piece of a log, which
contains a number of fields we want to extract. For example:
%PIX-6-605004: Login denied from 194.29.40.24/4813 to
outside:192.168.35.15/ssh for user 'root'
When you look at see this section of the log, you can use this structure:
:command (
:cmd_name (group_try)
:mode (try_all_successively)
:(
# A "try" command for the source.
:command ()
)
:(
# A "try" command for the destination.
:command ()
)
:(
# A "try" command for the user.
:command ()
)
.
.
.
)
In this example, the first try command in the group_try block (for the source) is executed.
If the source, destination and user are not in a specified sequence in the syslog, use the try_all
mode instead of try_all_successively.
:command (
:cmd_name (group_try)
:mode (try_until_success)
:(
:command (
.
.
.
:regexp ("(\(|)(login|su)(\)|).* session (opened|closed) for
user ([a-z,A-Z,0-9]*)")
)
)
:(
:command (
.
.
.
:regexp ("(\(|)su(\)|).* authentication failure;
logname=([a-zA-Z0-9]*).*
user=([a-zA-Z0-9]*)")
)
)
.
.
.
)
Note - When you add a new device, the first try command in the parsing file must use the try
until success parameter:
:cmd_name (group_try)
:mode (try_until_success)
: (
….
)
Switch
This command enables to compare the result of a specified field against a list of predefined
constant values.
Parameter Description
field_name The field name whose value is checked.
case One or more case attributes followed by the value with which to compare.
default Execute only if no relevant case is available. The default value is optional.
:command (
:cmd_name (switch)
:field_name (msgID)
:(
:case (302005)
:command ()
)
:(
:case (302001)
:case (302002)
:command ()
)
:default (
:command()
)
)
Unconditional _try
This command is an "empty" command that allows you to add fields to the result without any
conditions.
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (product)
:field_type (string)
:field_value ("Antivirus")
)
)
:command (
:cmd_name (switch)
:field_name (msgID)
(
:case (106017)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("LAND Attack")
)
)
)
:(
:case (106020)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("Teardrop Attack")
)
)
)
.
.
.
)
Include
This command enables the inclusion of a new parsing file.
file_name The full path plus the file name of the file to be included.
:command (
:cmd_name (include)
:file_name ("c:\freeTextParser\device\antivirusPolicy.C")
)
add_field
Each add_field has some parameters:
• Type - The type of the add_field command. This parameter has these possible values:
• Index - Part of the regular expression will be extracted as the field. The field_index
value denotes which part will be extracted (see field_index bullet).
• Const - Add a constant field whose value does not depend on information extracted from
the regular expression. See field_value bullet.
Field_name - the name of the new field. There are some fields, which have corresponding
columns in SmartConsole Logs & Monitor > Logs. This table shows the names to give these fields
to show in their Logs & Monitor > Logs column (and not in the Information field, where other
added fields appear):
Dst Destination
proto Protocol
product Product
Action Action
ifname Interface
User User
When you name the above fields accordingly, they are placed in their correct column in Logs &
Monitor > Logs. This enables them to participate in all filtering done on these columns. These
fields automatically take part in existing event definitions with these field names.
Field_type - the type of the field in the log. This table shows the possible field types.
uint
string
ipaddr For IP addresses used with the Src and Dst fields.
string_id For a more efficient usage of strings. Used when there is a finite number of
possible values for this field.
action Supports these actions: drop, reject, accept, encrypt, decrypt, vpnroute, keyinst,
authorize, deauthorize, authcrypt, and default.
ifdir 0 - inbound
1 - outbound
The field type of the field names in this table must be as mentioned:
Dst ipaddr
proto protocol
s_port port
service port
Action action
ifname ifname
• field_index or field_value - The parameter used depends on the value of the "type"
field. If it is index, field_index shows. If it is const, field_value shows.
field_index denotes which part of the regular expression is extracted, according to the
grouping of the patterns. To make this grouping, write a certain expression in brackets. In this
expression, the number in field_index denotes the bracket number whose pattern is taken
into account.
The pattern for the User, [a-zA-Z0-9]+, is located in the first pair of brackets. Therefore, the
field_index is one. The pattern for the Source address,
[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+, is located in the second pair of brackets. Therefore, the
index is two. The pattern for the port is in the third pair of brackets.
In each parsed regular expression the maximum number of brackets must be up to nine. To
extract more than nine elements from the regular expression, break the expression into two
pieces. The first regular expression contains the first nine brackets. The remaining of the regular
expression is in the on_success command.
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("access-list (.*) (permitted|denied|est-allowed)
([a-zA-Z0-9_\([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) -> ")
:add_field (
:type (index)
:field_name (listID)
:field_type (string)
:field_index (1)
)
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
)
:add_field (
:type (index)
:field_name (proto)
:field_type (protocol)
:field_index (3)
)
:add_field (
:type (index)
:field_name (ifname)
:field_type (ifname)
Logging and Monitoring Administration Guide R80.10 | 130
Appendix: Manual Syslog Parsing
:field_index (4)
)
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (5)
)
:on_success (
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp
("([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) hit-cnt ([0-9]+) ")
:add_field (
:type (index)
:field_name (destination_interface)
:field_type (string)
:field_index (1)
)
)
)
)
Dict_name is the name of the dictionary to use to convert the value. If the value is not found in
the dictionary, the value is the result. See Dictionary (on page 131).
Dictionary
The free text parser enables us to use dictionaries to convert values from the log. These
conversions are used to translate values from logs from different devices, with the same meaning,
into a common value, which is used in the event definitions.
Each dictionary file is defined as an .ini file. In the ini file the section name is the dictionary
name and the values are the dictionary values (each dictionary can include one or more sections).
[dictionary_name]
Name1 = val1
Name2 = val2
cisco_action] [3com_action]
permitted = accept Permit = accept
denied = reject Deny = reject
Dictionary Sample
The reference to a dictionary in the parsing file is shown in this table:
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("list (.*) (permitted|denied) (icmp)
([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+) -> ([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+).*
packet")
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
:dict_name (cisco_action)
)
)