Check Point R80 /R81 CMA
Minimum supported version is R80.10 and R81
To add a Check Point R80 CMA or R81 CMA, complete the following steps.
Step 1: Configure the Device
FireMon strives to provide up-to-date product information, however we are not always aware when vendors change their device UI. If any Configure the Device procedure differs from your device version (UI location of fields, not information needed), please consult your device's user guide.
- In the SmartConsole, click Manage & Settings.
- Under Permissions & Administrators, click Administrators.
- Click the New icon
on the toolbar.
- In the Administrator dialog box, in the Enter Object Name field, enter the user name of the administrator.
- Select Check Point Password as the Authentication Method, and set a new password.
- Select Read Only All as the Permission Profile.
- Select the password Expiration that best fits your business standards.
- Click OK.
- Create an OPSEC object for LEA to use for usage logging.
- From the toolbar, click Objects.
- Select More object types > Server > OPSEC Application > New Application. The OPSEC Application Properties dialog box opens.
- In the Name field, enter a name for the OPSEC object.
- Click New to add data collector information. Follow the on-screen instructions.
- In the Client Entities box, select LEA.
- Click the Communication button.
- Enter a one-time password and then confirm it. This password will be used again in the Administration module during setup for authentication.
- Click Initialize. The Trust State should be “Initialized but trust not established.” This status will change once SIP establishes communication with the log server.
- Click Close.
- Click the LEA Permissions tab, and select Show all log fields.
- Click OK.
- Set the API retrieval permissions.
- For CMA, in the Manage & Settings menu, click Blades.
- In Management API, click Advanced Settings.
- Select either All IP Addresses or All IP addresses that can be used for GUI clients.Click Me!
- Click OK.
- Define a GUI Client.
- Click Manage & Settings > Permissions & Administrators > Administrators > New.
- Click Add.
- Define the GUI clients (trusted hosts) using the IP address of the data collector.
- Click OK.
- Add a GAIA user.
- Log into MDS GAIA console.
- Navigate to User Management > Users > Add.
- Enter a Login Name and Password.
- Select a role that is read only.
- Shell: select /etc/cli.sh.
- Access Mechanism: select Clish Access.
- Click OK.
- Click OK on the SmartConsole message dialog box.
- On the toolbar, click Publish on the SmartConsole message dialog box to publish the changes.
- From the SSH console, restart the Management API server using the command api restart.
Step 2: Onboard the Device in the Administration Module
- On the toolbar, click Device > Management Stations.
- Click Create, and then click Check Point > CMA R80 or CMA R81.
- General Properties section.
- In the Name box, type the name of the device as you want to see it in SIP.
- In the Description box, type an optional description of the device being added.
- In the Management IP Address box, type the IP address of the device.
- In the Data Collector Group box, select the IP address of the data collector group that will collect data from this device.
- In the Central Syslog Server box, select the syslog server from the list (optional).
Syslog fields are optional if the device uses the same IP for syslog and management.
A central syslog server is required only if syslog messages come from a different IP. A central syslog server must be created before it can be assigned to a device. To track usage via syslog, the device must support Level 3+.
- In the Syslog Match Name box, type the syslog match name (optional).
- By default, the Automatically Retrieve Configuration check box is selected.
- In the External ID box, type a unique identifier to be used when the device identifier is different than what is displayed in SIP.
- Device Settings section.
Authentication
- Enter the Username used for SmartConsole.
- Enter the Password and then Re-enter Password for the user name.
- The Port used for authentication is 18190 by default.
- Select an authentication Method from the list. Select asym_sslca.
- The API Port used is 443 by default.
- Enter the Domain Name. For CMA's managed by MDS, it is necessary to specify a domain name or UUID to retrieve security policy information.
- Enter the OPSEC Application Name.
- Enter the One Time Password that you created earlier, and then re-enter it.
OPSEC Certificate for FireMon Data Collector
- The OPSEC Distinguished Name and OPSEC Certificate information fields will auto-populate after clicking save.
GAIA Retrieval Configuration
-
Select Retrieve Routes Through GAIA API to enable this functionality.
- Monitoring section.
- Due to Check Point deprecating CPMI connectivity, Enable Change Monitoring is not enabled. If you enable change monitoring, the Change Monitoring Method will be set to LEA audit logs since using CPMI may be unpredictable.
- Retrieval section.
Scheduled Retrieval
Select the Enable Scheduled Retrieval check box to perform a retrieval at a set time regardless of change detection. Additional required fields will appear when enabled.
- Set the Scheduled Retrieval Time to fit your requirements.
- Select the Scheduled Retrieval Time Zone from the list.
Check for Change Retrieval
Select the Enable Check for Change check box to check for configuration changes after the specified interval and perform a retrieval if changes are detected. Additional required fields will appear when enabled.
- The default Check for Change Interval time is 1440 minutes (every 24 hours). You can change the check interval time to best fit your requirements. The minimum required interval is 60 minutes (1 hour).
Application / Site Retrieval
Object Request Limit: The maximum number of application site objects to return per request.
Retrieve without User Data: Select to help resolve a known Check Point API issue that results in an HTTP 500 error when attempting to retrieve user data. Enabling will trigger an Event Log message indicating that the user data could not be retrieved, but the retrieval will continue and normalize. If this option is not enabled, the retrieval will fail.
- Advanced Settings section.
- Set the Device Charset Encoding type for retrievals.
- The Policy Package Names to Ignore feature should only be set under the direction of a FireMon engineer. Please contact your SE or Support before using this feature.
- Select the Fail Retrieval on Package Failure check box to allow retrieval failure if some packages retrieve but any individual packages do not, which may indicate a problem with the object in the Check Point database.
- Select the Fail Retrieval on Policy Failure check box to allow retrieval failure is some policies retrieve but any individual policies do not, which may indicate a problem with the object in the Check Point database.
- If utilizing, complete the Advanced CLISH Retrieval Settings section.
- Select the Enable CLISH Retrieval check box.
- Enter the CLISH Username and CLISH Password that was created in the GAIA console.
- Select the Automatically Update SSH Keys check box to allow the data collector to automatically update the SSH key for a device when a conflict occurs
- Select the Suppress Route Change Notifications check box to treat all routes as dynamic.
- Automation section.
- For Policy Install, select the Install Changes on Gateways check box to install changes on gateways when the commit flag is set to true.
If not selected, policy changes will still commit to the CMA but not automatically be pushed to any connected (child) devices.
- Click Save.
- Devices being managed will be listed in the Discovered Devices section.
Step 3: Install Database
The final step is to log back into the CMA and perform a database install. This will push the certificate generated via OPSEC to all log servers.
- From the CMA CLI, on the toolbar, click the Settings icon and then click Install database.