Check Point R80 /R81 MDS
Minimum supported version is R80.10 and R81
To add a Check Point MDS R80 or MDS R81, complete the following steps.
Step 1: Configure the Device
FireMon strives to provide up-to-date product information, however we are not always aware when vendors change their device UI. If any Configure the Device procedure differs from your device version (UI location of fields, not information needed), please consult your device's user guide.
- In the SmartConsole, click Manage & Settings.
- Under Permissions & Administrators, click Administrators.
- Click the New icon
on the toolbar.
- In the Administrator dialog box, in the Enter Object Name field, enter the user name of the administrator.
- Select Check Point Password as the Authentication Method, and set a new password.
- Select Read Only All as the Permission Profile.
- Select the password Expiration that best fits your business standards.
- Click OK.
- Create an OPSEC object for LEA to use for usage logging.
- From the toolbar, click Objects.
- Select More object types > Server > OPSEC Application > New Application. The OPSEC Application Properties dialog box opens.
- In the Name field, enter a name for the OPSEC object.
- Click New to add data collector information. Follow the on-screen instructions.
- In the Client Entities box, select LEA.
- Click the Communication button.
- Enter a one-time password and then confirm it. This password will be used again in the Administration module during setup for authentication.
- Click Initialize. The Trust State should be “Initialized but trust not established.” This status will change once SIP establishes communication with the log server.
- Click Close.
- Click the LEA Permissions tab, and select Hide all confidential log fields.
- Click OK.
- Set the API retrieval permissions.
- In the Multi-Domain menu, click Blades.
- In Management API, click Advanced Settings.
- Select either All IP Addresses or All IP addresses that can be used for GUI clients.Click Me!
- Click OK.
- Click OK on the SmartConsole message dialog box.
- On the toolbar, click Publish.
- Click Publish on the SmartConsole message dialog box to publish the changes.
- Restart the Management API server using the command api restart.
Step 2: Onboard the Device in the Administration Module
- On the toolbar, click Device > Management Stations.
- Click Create, and then click Check Point > MDS R80 or MDS R81.
- General Properties section.
- In the Name box, type the name of the device as you want to see it in SIP.
- In the Description box, type an optional description of the device being added.
- In the Management IP Address box, type the IP address of the device.
- In the Data Collector Group box, select the IP address of the data collector group that will collect data from this device.
- In the Central Syslog Server box, select the syslog server from the list (optional).
Syslog fields are optional if the device uses the same IP for syslog and management.
A central syslog server is required only if syslog messages come from a different IP. A central syslog server must be created before it can be assigned to a device. To track usage via syslog, the device must support Level 3+.
- In the Syslog Match Names box, type the syslog match name (optional). You can enter multiple comma-separated names.
- By default, the Automatically Retrieve Configuration check box is selected.
- In the External ID box, type a unique identifier to be used when the device identifier is different than what is displayed in SIP.
- Device Settings section.
Authentication
Enter the Username used for SmartDashboard.
- Enter the Password and then Re-enter Password for the user name.
- The Port used for authentication is 18190 by default.
- Select an authentication Method from the list. Select asym_sslca.
- The API Port used is 443 by default.
- Enter the Domain Name. For a CMA managed by MDS, it is necessary to specify a domain name or UUID to retrieve security policy information.
- Enter the OPSEC Application Name.
- Enter the One Time Password that you created earlier, and then re-enter it.
OPSEC Certificate for FireMon Data Collector
- The OPSEC Distinguished Name and OPSEC Certificate information fields will auto-populate after clicking save.
- Monitoring section.
- Select the Enable LEA Change Monitoring check box to enable this type of monitoring. Additional fields will appear with default settings entered.
- Port 18184 is used to establish a LEA connection between the data collector and Check Point management server. SIP uses log export API (LEA) to connect to a Check Point log server.
- Log Reconnect Timeout is set to a default value of 180 seconds.
- Log Update Interval is set to a default value of 10 minutes.
- The Authentication Method selected is SSL_OPSEC.
- Retrieval section.
Scheduled Retrieval
Select the Enable Scheduled Retrieval check box to perform a retrieval at a set time regardless of change detection. This will activate additional fields to complete.
Set the Scheduled Retrieval Time to fit your requirements.
Select the Scheduled Retrieval Time Zone from the list.
Check for Change Retrieval
Select the Enable Check for Change check box to check for configuration changes after the specified interval and perform a retrieval if changes are detected. This will activate an additional field to complete.
The default Check for Change Interval time is 1440 minutes (every 24 hours). You can change the check interval time to best fit your requirements. The minimum required interval is 60 minutes (1 hour).
- Advanced Settings section.
- Set the Device Charset Encoding type for retrievals.
- To store only the previously modified policy, select the Store only the previously modified policy check box.
Configuration Retrieval Timeout is set to a default value of 120 seconds.
Configuration Retrieval API Limit for Large Configs (number of records/ lines per call) is set to 500 by default . Adjust this only if you are seeing retrieval timeout .
- Click Save.
- Devices being managed will be listed in the Discovered Devices section.
Step 3: Install Database
The final step is to log back into the MDS and perform a database install. This will push the certificate generated via OPSEC to all log servers.
- From the MDS CLI, on the toolbar, click the Settings icon and then click Install database.