Difference between revisions of "KHIKA App for Checkpoint Firewall"

From khika
Jump to navigation Jump to search
(How to get your Checkpoint Firewall into KHIKA ?)
(Alerts Description)
 
(58 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
== Introduction ==
 
== Introduction ==
Firewall form an important part of organisations’ networks and hence by monitoring your firewall is imperative.
+
 
Checkpoint Firewall send the traffic and user activity related information in the form of logs over syslog protocol. KHIKA Data Aggregator is pre-configured with syslog services on port 514.
+
Firewalls are used to control the peripheral traffic and communication in organisations and hence its essential and critical to monitor them.
 +
Checkpoint Firewall sends the traffic and user activity related information in the form of logs over syslog protocol. KHIKA Data Aggregator is pre-configured with syslog services on port 514.
 +
 
 
The key parts to get here are :  
 
The key parts to get here are :  
#Enabling Syslog forwarding on the device
+
#Enabling Syslog forwarding on the firewall device
 
#Install the KHIKA App for Checkpoint Firewall
 
#Install the KHIKA App for Checkpoint Firewall
#Get data from your Checkpoint Firewall into KHIKA Aggregator
+
#Get data from your Checkpoint Firewall into the KHIKA Aggregator
  
 
== Enabling Syslog forwarding on the device ==
 
== Enabling Syslog forwarding on the device ==
[[Getting Data into KHIKA#Monitoring in KHIKA using Syslog forwarding|Enabling syslog forwarding on the device]]
+
Please refer [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk122323 here] for enabling syslogs on your Checkpoint firewall device.
 +
 
 +
Example of a command to be fired on Firewall Device to enable syslogs:
 +
    cp_log_export add name <name> [domain-server <domain-server>] target-server <target-server IP address> target-port <target-port> protocol <(udp|tcp)> format <(syslog)|(cef)|(splunk)(generic)>
 +
 
 +
    name          :Unique name of the exporter configuration.
 +
    domain-server :The relevant domain-server name or IP
 +
    target-server :Exporting the logs to this ip address
 +
    target-port  :The port on which the target is listening to.Here use port 514
 +
    protocol      :Transport protocol to use.Here use protocol udp
 +
    format        :The format in which the logs will be exported .Here use format cef
 +
 
 +
== Verifying SYSLOG data collection ==
 +
 
 +
After you enable the syslog forwarding on the end device, you must verify if the logs are being really received by KHIKA Data Aggregator. Please refer [[Getting Data into KHIKA#Verifying syslog data collection|here]] to understand how to verify syslogs on KHIKA Data Aggregator.
  
 
== How to Install the KHIKA App for Checkpoint Firewall ? ==
 
== How to Install the KHIKA App for Checkpoint Firewall ? ==
Line 14: Line 30:
 
It is assumed, that you have already configured KHIKA Data Aggregator in your environment. If not, please read [[Getting Started with KHIKA SaaS#Installing and configuring KHIKA Data Aggregator|how to configure KHIKA Data Aggregator]] and perform the pre-requisite steps.
 
It is assumed, that you have already configured KHIKA Data Aggregator in your environment. If not, please read [[Getting Started with KHIKA SaaS#Installing and configuring KHIKA Data Aggregator|how to configure KHIKA Data Aggregator]] and perform the pre-requisite steps.
  
This section explains how to pick and install the KHIKA application for Checkpoint Firewall - Checkpoint Firewall. Installing the application shall put together and activate the adapter (parser) that can handle Checkpoint Firewall data format, the dashboards and the alert rules preconfigured.
+
This section explains how to pick and install the KHIKA application for Checkpoint Firewall. Installing the application shall put together and activate the adapter (parser) that can handle Checkpoint Firewall data format, the dashboards and the alert rules preconfigured.
 +
 
 +
Go to “Applications” tab in the “Configure” menu.
 +
 
 +
[[File:checkpoint_applicationtab.JPG|700px]]
 +
 
 +
Check whether the appropriate Workspace is selected.
 +
Note: Application is always loaded in a Workspace. Read the section on [[Accessing the KHIKA Gui#Creating a Workspace|Workspaces]] to know more about KHIKA Workspaces.
 +
Also select your KHIKA aggregator name in the Node dropdown.
 +
This is to ensure that we are collecting data from the desired source and into the correct workspace which is ready with the configured application and components.
 +
 
 +
[[File:checkpoint_fwapp_name.jpg|700px]]
 +
 
 +
Click on the “+” button next to the Checkpoint Firewall App. A pop up appears.
 +
 
 +
[[File:checkpoint_app_install.JPG|700px]]
  
[[Load KHIKA App#How to load an App|How to load an App]]
+
User can now select the contents of the application required. For example, on the dropdown for “Reports”, click to expand it. List of all reports can be seen. User can individually select the reports required by checking on the checkbox next to each. Alternatively, check on “Select All” option to get all of them.
 +
Similarly you can select contents from Alerts and Dashboards.
  
== How to get your Checkpoint Firewall into KHIKA ? ==
+
Visit the sections on [[KHIKA Reports| KHIKA Reports]], [[KHIKA Dashboards| KHIKA Dashboards]], [[KHIKA Alerts & Correlations| KHIKA Alerts & Correlations]] to know more about these topics.
  
KHIKA recommends, popular syslog forwarding to monitor the Checkpoint Firewall.
+
Click “OK” to proceed with the installation of the selected Application.  
You must configure the network device (or the end node) to send its logs to KHIKA Data Aggregator by providing IP address of Data Aggregator and port 514 so that the device can send its logs to KHIKA syslog service. (Please refer the documentation of individual device/vendor/OEM to understand how to configure remote syslogging for the device. Many vendors support web based configuration these days and some vendors support command based configurations)
+
After successful installation, following status should be displayed :
  
Pointer:- You may refer to link [[https://qostechnology.in/blog/syslog-integration-with-checkpoint/]] explaining syslog forwarding in checkpoint firewall.<br>
+
[[File:checkpoint_app_installation_status.JPG|700px]]
Note:- We recommend referring to OEM manual for enabling syslogs on your version of checkpoint firewall
 
  
NOTE: You will have to repeat these steps on each of the Checkpoint Firewall that you wish to monitor using KHIKA.
+
This simple procedure to install a KHIKA App, automatically configures the Adapter (required for parsing the data from raw syslogs), calculated KHIKA reports on raw data, Visualizations, Dashboards and Alerts – all in one click.
  
 
== Adding the device in the Adaptor ==
 
== Adding the device in the Adaptor ==
 +
After syslogs are enabled on the device and the App is installed into KHIKA, it is the time to add the device to the this App (in Adapter section of KHIKA Web GUI). Please refer [[Getting Data into KHIKA#Adding device details in the Adaptor|here]] to know [[Getting Data into KHIKA#Adding device details in the Adaptor|how to add the device to an App]].
 +
 +
After making these configuration in KHIKA, you must apply these changes to the Workspace. Go to Configure, select the Workspace and in Workspace tab of configure menu press the Apply button as shown in the screenshot below.
 +
 +
[[File:checkpoint_apply_configuration.JPG|800px]]
  
[[Getting Data into KHIKA#Adding device details in the Adaptor|Adding device in the Adaptor]]
 
  
== Verifying SYSLOG data collection ==
+
Wait for a few minutes for changes to apply and data to arrive in kHIKA. With all these steps, we should now expect the data to arrive in KHIKA. Lets discover some live data in KHIKA.
[[Getting Data into KHIKA#Verifying syslog data collection|Verify syslog data collection]]
 
  
 
== How to check the output of KHIKA Checkpoint Firewall App ? ==
 
== How to check the output of KHIKA Checkpoint Firewall App ? ==
  
=== Chekpoint Firewall Malicious Communication Dashboard===
+
===Discovering the logs of Checkpoint Firewall===
 +
After doing all the steps given above, we should start receiving live data into KHIKA. Go to "Discover" section in KHIKA GUI and select the index with name "*raw-checkpoint_firewall*". Note that the index has a prefix of the customer name and workspace name. After selecting this index, you should see the live data coming in. Spend some time understanding this data and the fields of the data.
 +
 
 +
=== Checkpoint Firewall Malicious Communication Dashboard===
 +
 
 +
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.
 +
 
 +
This dashboard focuses on the Checkpoint Firewall communication with suspicious IP addresses and it's traffic status(which is added into KHIKA).Details like the malicious IP address,the source IP and destination IP at that time, actions, service, traffic direction etc. is shown in an analytical fashion.
 +
You can filter and search information and create new visualizations ones too.
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard focuses on the Checkpoint Firewall communication with suspicious ip and it's traffic status(which are added into KHIKA).Details like which is the malicious ip,which is the source ip and destination ip at that time,actions,service,traffic direction like inbound etc. is shown in the analytical fashion.
+
For help with Dashboards, click [[KHIKA Dashboards|here]]
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
  
 
==== Elements in the Dashboard are explained below : ====
 
==== Elements in the Dashboard are explained below : ====
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall Malicious Communication" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall Malicious Communication" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
Line 51: Line 92:
 
|-
 
|-
 
|Contribution of Action
 
|Contribution of Action
|Contribution of actions during communication with malicious ip
+
|Contribution of actions during communication with malicious IPs
 
|-
 
|-
 
|Contribution of Malicious IP
 
|Contribution of Malicious IP
|Contribution of Malicious IP
+
|Contribution of Malicious IP addresses, according to no. of events occured in logs.
 
|-
 
|-
 
|Malicious IP wise Action
 
|Malicious IP wise Action
|X axis : All Malicious IP communicated through firwall<br/>
+
|X axis : All Malicious IPs communicated through the firewall<br/>
Y axis : Actions stacked in one bar(Malicious IP) and the count
+
Y axis : Actions stacked in one bar(Malicious IP) and their count
 
|-
 
|-
 
|Source IP wise Hits
 
|Source IP wise Hits
|X axis : All the Source IP during Malicious Communication<br/>
+
|X axis : Source IPs found in Malicious Communication<br/>
Y axis : The count of Source IP during Malicious Communication
+
Y axis : The count of Source IPs during Malicious Communication
 
|-
 
|-
 
|Destination IP wise Hits
 
|Destination IP wise Hits
|X axis : All the Destination IP during Malicious Communication<br/>
+
|X axis : Destination IPs found in Malicious Communication<br/>
 
Y axis : The count of Destination IP during Malicious Communication
 
Y axis : The count of Destination IP during Malicious Communication
 
|-
 
|-
Line 76: Line 117:
 
|}
 
|}
  
==== A suggestion for useful interaction with this dashboard could be : ====
+
==== Suggestions for useful interaction with this dashboard could be : ====
 +
 
 +
#Select a particular malicious IP from the Contribution of Malicious IP pie. Rest of the visualizations reflect all source IP, destination IP and actions with respect to this malicious IP.
 +
#Select an action from Contribution of Action pie. You can check what traffic gets accepted and wether it is from any particular source or unusually high at any time of the day and so on.
 +
 
 +
=== Checkpoint Firewall Triggered Signature Dashboard===
  
#Select a particular malicious ip in Contribution of Malicious IP pie. The rest of the visualizations reflects all source ip destination ip and actions with respect to this malicious ip.
+
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.  
#For more granular detection click on action from Contribution of Action pie .Now rest of the visualizations will reflect accordingly.
 
  
=== Chekpoint Firewall Triggered Signature Dashboard===
+
This dashboard gives attack information against predefined signatures of attacks. It includes information about source and destination IPs and also possible malicious IPs among them. What action has been taken by firewall on each is also present.
 +
You can filter and search information and create new visualizations too.
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard gives attack information against predefined signatures of attacks. It includes information about source and destination ip and also possible malicious ip among them. What action has been taken by firewall on each is also present.
+
For help with Dashboards, click [[KHIKA Dashboards|here]]
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
  
 
==== Elements in the Dashboard are explained below : ====
 
==== Elements in the Dashboard are explained below : ====
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall Triggered Signature" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall Triggered Signature" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
Line 95: Line 140:
 
|-
 
|-
 
|Contribution of Action
 
|Contribution of Action
|Contribution of Actions for signatures of attacks
+
|Contribution of Actions in signatures of attacks
 
|-
 
|-
 
|Contribution of Attack
 
|Contribution of Attack
|Contribution of Attacks
+
|Contribution of Attacks according to no. of events occured
 
|-
 
|-
 
|Source IP wise Attack Hits
 
|Source IP wise Attack Hits
|X axis : All the Source IP during  Attack<br/>
+
|X axis : Source IPs found during  Attack<br/>
 
Y axis : Stacked within each bar (ie. for each Attack) the Source IP and count of events
 
Y axis : Stacked within each bar (ie. for each Attack) the Source IP and count of events
 
|-
 
|-
 
|Destination IP wise Attack Hits
 
|Destination IP wise Attack Hits
|X axis : All the Source IP during Signature Attack<br/>
+
|X axis : All the Source IPs during Signature Attack<br/>
 
Y axis : Stacked within each bar (ie. for each Attack) the Destination IP and count of events
 
Y axis : Stacked within each bar (ie. for each Attack) the Destination IP and count of events
 
|-
 
|-
Line 116: Line 161:
 
|}
 
|}
  
==== A suggestion for useful interaction with this dashboard could be : ====
+
==== Suggestions for useful interaction with this dashboard could be : ====
  
#Click on or select a particular attack in the Contribution of Attack pie. The rest of the visualization reflects all source ip,destination ip and actions with respect to selected attack.
+
#Click on or select a particular attack in the Contribution of Attack pie. The rest of the dashboard reflects all source IPs,destination IPs and actions with respect to selected attack.
#For more granular detection select particular action from Contribution of Action pie chart, now rest of the visualization will reflect accordingly.
+
#For more granular detection select particular action from Contribution of Action pie chart, now rest of the dashboard will reflect accordingly.
  
 
=== Chekpoint Firewall VPN Activity Dashboard===
 
=== Chekpoint Firewall VPN Activity Dashboard===
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard gives Checkpoint Firewall VPN activity details. Details like which is the Source IP,Destination IP,VPN user,Interface Name,Policy Name,Interface Direction etc. is shown in the analytical fashion.
+
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.  
 +
 
 +
This dashboard gives Checkpoint Firewall VPN activity details like Source IP, Destination IP, VPN user, Interface Name, Policy Name, Interface Direction etc. in analytical fashion.
 
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
  
Line 129: Line 176:
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall VPN Activity" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall VPN Activity" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
Line 135: Line 182:
 
|-
 
|-
 
|Contribution of VPN User pie chart
 
|Contribution of VPN User pie chart
|Contribution of VPN User
+
|Contribution of VPN User according to no. of events occured
 
|-
 
|-
 
|Contribution of Action pie chart
 
|Contribution of Action pie chart
|Contribution of Actions during VPN
+
|Contribution of Actions taken on VPN traffic
 
|-
 
|-
 
|Source IP wise Hits
 
|Source IP wise Hits
|X axis : All the Source IP during VPN Activity<br/>
+
|X axis : Source IPs found during VPN Activity<br/>
Y axis : The count of Source IP during VPN  
+
Y axis : The count of Source IPs during VPN  
 
|-
 
|-
 
|Destination IP wise Hits
 
|Destination IP wise Hits
|X axis : All the Source IP during VPN Activityk<br/>
+
|X axis : All the Source IPs during VPN Activityk<br/>
 
Y axis : The count of Destination IP during VPN
 
Y axis : The count of Destination IP during VPN
 
|-
 
|-
Line 164: Line 211:
 
==== A suggestion for useful interaction with this dashboard could be : ====
 
==== A suggestion for useful interaction with this dashboard could be : ====
  
#Click on and select a particular user in the Contribution of User pie. The rest of the visualization reflects all source ip,destination ip,policies,actions etc with respect to selected vpn user.
+
#Click on and select a particular user in the Contribution of User pie. The rest of the visualization reflects all source IPs,destination IPs,policies,actions etc. with respect to selected VPN user.
#For more granular detection click on and select particular action in the Contribution of Action pie. Now rest of the visualizations will reflect accordingly.
+
#Click on and select particular action in the Contribution of Action pie. Now rest of the visualizations will reflect accordingly.
 +
 
 +
=== Checkpoint Firewall Attack Dashboard===
 +
 
 +
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.  
  
=== Chekpoint Firewall Attack Dashboard===
+
This dashboard gives Checkpoint Firewall attack information. You can filter and search information and create new visualizations too.
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard gives Checkpoint Firewall attack information like attack name ,attack information etc.
+
For help with Dashboards, click [[KHIKA Dashboards|here]]
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
  
 
==== Elements in the Dashboard are explained below : ====
 
==== Elements in the Dashboard are explained below : ====
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall Attack" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall Attack" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
 
|'''Description'''
 
|'''Description'''
 
|-
 
|-
|Contribution of Attackt
 
 
|Contribution of Attack
 
|Contribution of Attack
 +
|Contribution of Attacks according to the occurence
 
|-
 
|-
 
|Contribution of Malicious IP
 
|Contribution of Malicious IP
|Contribution of Malicious IP in Attacks event
+
|Contribution of Malicious IPs in Attack events
 
|-
 
|-
 
|Attack wise Attack Info
 
|Attack wise Attack Info
|X axis : All the Attack in Firewall <br/>
+
|X axis : Attacks accross Firewall <br/>
 
Y axis : Stacked within each bar (ie. for each Attack info) the Attack Name and count of events  
 
Y axis : Stacked within each bar (ie. for each Attack info) the Attack Name and count of events  
 
|-
 
|-
 
|Source IP wise Attack
 
|Source IP wise Attack
|X axis : All the Source IP during Signature Attack<br/>
+
|X axis : Source IPs found during Signature Attack<br/>
 
Y axis : Stacked within each bar (ie. for each Attack) the Source IP and count of events
 
Y axis : Stacked within each bar (ie. for each Attack) the Source IP and count of events
 
|-
 
|-
Line 206: Line 256:
 
|}
 
|}
  
==== A suggestion for useful interaction with this dashboard could be : ====
+
==== Suggestions for useful interaction with this dashboard could be : ====
 +
 
 +
#Click on and select a particular attack from contribution of attack pie chart. The rest of the visualization reflects information like source IP,destination IP and attack info with respect to selected Attack.
 +
#Select particular source IP in the Source wise attack bar chart. Now rest of the visualizations will reflect accordingly.
  
#Click on and select a particular attack from contribution of attack pie chart. The rest of the visualization reflects all source ip,destination ip and attack info with respect to selected Attack.
+
=== Checkpoint Firewall Audit Admin login Dashboard===
#For further granular detection click on and select particular source IP in the Source wise attack bar chart, Now rest of the visualizations will reflect accordingly.
 
  
=== Chekpoint Firewall Audit Admin login Dashboard===
+
Go to "Dashboards" from the left menu. From the list of dashboards, select this one. It shall open the Dashboard. This shows Checkpoint Firewall login information. It shows status of logins, from where user has logged in, which product is used for login (product like smart dashboard,smart view tracker, smart view monitor etc). You can filter and search information and create new visualizations too.
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard gives Checkpoint Firewall login information. It shows status of logins, from where user has logged in, which product is used for login (product like smart dashboard,smart view tracker, smart view monitor etc)
+
For help with Dashboards, click [[KHIKA Dashboards|here]]
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
  
 
==== Elements in the Dashboard are explained below : ====
 
==== Elements in the Dashboard are explained below : ====
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall Audit Admin login" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall Audit Admin login" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
Line 231: Line 282:
 
|-
 
|-
 
|Admin user wise Status:
 
|Admin user wise Status:
|X axis : Admin users who has login into Firewall<br/>
+
|X axis : Admin users who have login into Firewall<br/>
 
Y axis : Admin users wise login failed and success status and its count
 
Y axis : Admin users wise login failed and success status and its count
 
|-
 
|-
Line 246: Line 297:
 
|}
 
|}
  
==== A suggestion for useful interaction with this dashboard could be : ====
+
==== Suggestions for useful interaction with this dashboard could be : ====
 +
 
 +
#Click on and select a particular status from contribution of Status pie. The rest of the visualization reflects for all Admin users the Machine Names and Client Names for selected status
 +
#Select particular Admin user in Admin wise status bar. Now rest of the visualizations will reflect accordingly.
 +
 
 +
=== Checkpoint Firewall Allowed External Source Dashboard===
  
#Click on and select a particular status from contribution of Status pie. The rest of the visualization reflects for all Admin user,Machine Name,Client Name for selected status
+
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard shows traffic which the Checkpoint Firewall allowed from external sources. Here traffic origin is external and is accepted by firewall. This dashboard gives you a control over all the external incoming traffic through your peripheral firewall.  
#For further granular detection click on and select particular Admin user in Admin wise status bar. Now rest of the visualizations will reflect accordingly.
 
  
=== Chekpoint Firewall Allowed External Source Dashboard===
+
You can filter and search information and create new visualizations too.
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard gives Checkpoint Firewall allowed external source traffic. Here inzone traffic origin is external and these traffic accept by firewall.
+
For help with Dashboards, click [[KHIKA Dashboards|here]]
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
  
 
==== Elements in the Dashboard are explained below : ====
 
==== Elements in the Dashboard are explained below : ====
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall Allowed External Source Dashboard" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall Allowed External Source Dashboard" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
Line 265: Line 319:
 
|-
 
|-
 
|Contribution of Protocol
 
|Contribution of Protocol
|Contribution Protocol in allowed external source traffic
+
|Contribution Protocol in allowed traffic from external sources
 
|-
 
|-
 
|Contribution of Services
 
|Contribution of Services
|Contribution of Services in allowed external source traffic
+
|Contribution of Services in allowed traffic from external sources
 
|-
 
|-
 
|Source IP wise Hits
 
|Source IP wise Hits
|X axis : All Source IP in allowed external source traffic <br/>
+
|X axis : All Source IP found in allowed traffic from external sources <br/>
Y axis : Source IP wise allowed external source traffic events count
+
Y axis : Source IP wise events count
 
|-
 
|-
 
|Destination IP wise Hits
 
|Destination IP wise Hits
|X axis : All Source IP in allowed external source traffic <br/>
+
|X axis : All Source IP in allowed traffic from external sources <br/>
Y axis : Destination IP wise allowed external source traffic events count
+
Y axis : Destination IP wise events count
 
|-
 
|-
 
|Daily trend
 
|Daily trend
Line 286: Line 340:
 
|}
 
|}
  
==== A suggestion for useful interaction with this dashboard could be : ====
+
==== Suggestions for useful interaction with this dashboard could be : ====
  
 
#Click on and select a particular service from Contribution of Services pie chart. The rest of the visualization reflects all Source IP,Destination IP,Protocol etc info with respect to selected service.
 
#Click on and select a particular service from Contribution of Services pie chart. The rest of the visualization reflects all Source IP,Destination IP,Protocol etc info with respect to selected service.
 
#For further granular detection click on and select particular Source IP or Destination IP from Source IP wise Hits and Destination IP wise Hits bar chart res.Now rest of the visualization will reflect accordingly.
 
#For further granular detection click on and select particular Source IP or Destination IP from Source IP wise Hits and Destination IP wise Hits bar chart res.Now rest of the visualization will reflect accordingly.
  
=== Chekpoint Firewall Blocked External Source Dashboard===
+
=== Checkpoint Firewall Blocked External Source Dashboard===
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard gives Checkpoint Firewall blocked external sources traffic ,Here inzone traffic origin is external and this traffic is blocked by the firewall.
+
Go to "Dashboards" from the left menu. From the list of dashboards, select this one. It shall open the Dashboard. This dashboard shows traffic blocked by the Checkpoint Firewall from external sources. Here traffic origin is external and this traffic is blocked by the firewall.
 
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
  
Line 299: Line 353:
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall Blocked External Source" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall Blocked External Source" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
Line 305: Line 359:
 
|-
 
|-
 
|Contribution of Protocol  
 
|Contribution of Protocol  
|Contribution Protocol in blocked external source traffic
+
|Contribution Protocol in blocked traffic from external sources
 
|-
 
|-
 
|Contribution of Services
 
|Contribution of Services
|Contribution of Services in blocked external source traffic
+
|Contribution of Services in blocked traffic from external sources
 
|-
 
|-
 
|Source IP wise Hits
 
|Source IP wise Hits
 
|X axis : All Source IP in blocked external source traffic <br/>
 
|X axis : All Source IP in blocked external source traffic <br/>
Y axis : Source IP wise blocked external source traffic events count
+
Y axis : Source IP wise traffic events count
 
|-
 
|-
 
|Destination IP wise Hits
 
|Destination IP wise Hits
 
|X axis : All Source IP in blocked external source traffic <br/>
 
|X axis : All Source IP in blocked external source traffic <br/>
Y axis : Destination IP wise blocked external source traffic events count
+
Y axis : Destination IP wise traffic events count
 
|-
 
|-
 
|Daily trend
 
|Daily trend
Line 326: Line 380:
 
|}
 
|}
  
==== A suggestion for useful interaction with this dashboard could be : ====
+
==== Suggestions for useful interaction with this dashboard could be : ====
  
 
#Click on and select a particular service from Contribution of Services pie chart. The rest of the visualization reflects all Source IP,Destination IP,Protocol etc info with respect to selected Service.
 
#Click on and select a particular service from Contribution of Services pie chart. The rest of the visualization reflects all Source IP,Destination IP,Protocol etc info with respect to selected Service.
#For further granular detection click on and select particular Source IP or Destination IP from Source IP wise Hits and Destination IP wise Hits bar res.Now rest of the visualization reflects accordingly.
+
#For further granular detection click on and select particular Source IP or Destination IP from Source IP wise Hits and Destination IP wise Hits bar res. Now rest of the dashboard reflects accordingly.
 +
 
 +
=== Checkpoint Firewall Object Manipulation Dashboard===
  
=== Chekpoint Firewall Object Manipulation Dashboard===
+
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard is an User activities audit. It shows the activities performed on the firewall, like creating, modifying and deleting objects. It shows the different types of objects and its table name.You can filter and search information and create new visualizations too.
  
Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard gives Checkpoint Firewall User activity audit report. It shows the activities perform on the firewall, like creating, modifying and deleting objects. It shows the different types of objects and its belonging table name.
+
For help with Dashboards, click [[KHIKA Dashboards|here]]
You can filter and search information and create new ones too. For help with Dashboards, click [[KHIKA Dashboards|here]]
 
  
 
==== Elements in the Dashboard are explained below : ====
 
==== Elements in the Dashboard are explained below : ====
  
 
{| class="wikitable"
 
{| class="wikitable"
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Chekpoint Firewall Object Manipulation" Dashboard''
+
|+ style="caption-side:bottom; color:#e76700;"|''Elements in "Checkpoint Firewall Object Manipulation" Dashboard''
 
|-
 
|-
 
|'''Visualization'''
 
|'''Visualization'''
 
|'''Description'''
 
|'''Description'''
 
|-
 
|-
|Contribution of Clinet IP
+
|Contribution of Client IP
|Contribution of Clinet IP in Object Manipulation Events
+
|Contribution of Client IP in Object Manipulation Events
 
|-
 
|-
 
|Contribution of Object Name
 
|Contribution of Object Name
Line 365: Line 420:
 
|}
 
|}
  
==== A suggestion for useful interaction with this dashboard could be : ====
+
==== Suggestions for useful interaction with this dashboard could be : ====
  
#Click on and select a particular object type from Contribution of Object Type pie chart. The rest of the visualizations reflects all Object Name,Client IP,Operation etc info with respect to selected object type.
+
#Click on and select a particular object type from Contribution of Object Type pie chart. The rest of the visualizations reflect Object Names,Client IPs,Operation etc info with respect to selected object type.
#For further drill down click on and select particular Administrator user from Operation wise bar chart .Now it will show operations like modify rule,create object,modify object for that Administrator user.
+
#For further drill down click on and select particular Administrator user from Operation wise bar chart. It shows operations like modify rule,create object,modify object for that Administrator user.
  
 
=== Chekpoint Firewall Alerts ===
 
=== Chekpoint Firewall Alerts ===
  
 
+
Alerts are generated when certain critical behavior is observed in the system. Alerts can be monitored in real-time on Alerts Dashboard in KHIKA. Relevant stakeholders can also receive the alerts via emails. The table below explains all the pre-canned alerts shipped with KHIKA App for Checkpoint Firewall.
Alerts are generated when certain critical behavior is observed in the system real time and notified on the Alerts Dashboard in KHIKA as well as can be received in email to relevant stakeholders. The details of KHIKA Alerts are mentioned here
 
Click on “Alert Dashboard” on left menu.
 
 
 
Certain alerts for Checkpoint Firewall are pre-canned and shipped with KHIKA, keeping in mind the requirements of the users. They are mentioned in the table below :
 
  
 
==== Alerts Description ====
 
==== Alerts Description ====
Line 387: Line 438:
 
|'''Suggested Resolution'''
 
|'''Suggested Resolution'''
 
|-
 
|-
|Checkpoint firewall Possible data exfiltration
+
|Checkpoint firewall Possible data Exfiltration
|This alert is triggered when large amount of data (more than 5 MB ) being sent to an external network.
+
|This alert is triggered when large amount of data (more than 5 MB ) is being sent to an external network.
 
|This alert is detected when a large amount of data is uploaded on external sites. This may be an attempt of data ex-filtration from the organisation.  
 
|This alert is detected when a large amount of data is uploaded on external sites. This may be an attempt of data ex-filtration from the organisation.  
 
Please check the real user associated with the source IP and the workstation from which the data upload happened. Verify if sensitive data was ex-filtrated.
 
Please check the real user associated with the source IP and the workstation from which the data upload happened. Verify if sensitive data was ex-filtrated.
 
|-
 
|-
 
|Checkpoint firewall Checkpoint control log message
 
|Checkpoint firewall Checkpoint control log message
|This alert is triggered when action is ctl and internal message is generated by Checkpoint  
+
|This alert is triggered when action is ctl and an internal message is generated by Checkpoint Firewall
|Checkpoint internal message is generated. Please check the documentation of Checkpoint and do the suggested action.
+
|Checkpoint Firewall internal message is generated. Please check the documentation of Checkpoint and do the suggested action.
 
|-
 
|-
 
|Checkpoint firewall Possible icmp probe  
 
|Checkpoint firewall Possible icmp probe  
Line 428: Line 479:
 
It is critical to block this rogue communication.
 
It is critical to block this rogue communication.
 
|-
 
|-
|Checkpoint firewall host scan activity by malicious ip
+
|Checkpoint firewall host scan activity by malicious IP
 
|This alert is triggered when same malicious ip is trying to generate traffic for one destination ip on more than 10 different ports within 1 minute and the request is denied.
 
|This alert is triggered when same malicious ip is trying to generate traffic for one destination ip on more than 10 different ports within 1 minute and the request is denied.
 
|Bad ip address tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP address at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle.<br/><br/>
 
|Bad ip address tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP address at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle.<br/><br/>
Line 434: Line 485:
 
|-
 
|-
 
|Checkpoint firewall successful host scan activity
 
|Checkpoint firewall successful host scan activity
|This alert is triggered when same source ip is trying to generate traffic for one destination ip on more than 10 different ports but all the time request is denied .After that same source ip attempts to connect to same destination on one more port and this time it successfully connects on that port. All this happen within 1 minute.
+
|This alert is triggered when same source ip is trying to generate traffic for one destination ip on more than 10 different ports but all the time request is denied .After that same source IP attempts to connect to same destination on one more port and this time it successfully connects on that port. All this happen within 1 minute.
 
|Attacker tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP addresses at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on open ports<br/><br>  
 
|Attacker tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP addresses at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on open ports<br/><br>  
It is important to check the reputation of the suspected ip address.  
+
It is important to check the reputation of the suspected IP address.  
If the suspected ip address is external, you may consider blocking it.
+
If the suspected IP address is external, you may consider blocking it.
If the suspected ip address is internal, you may need to verify the sanity of the corresponding device
+
If the suspected IP address is internal, you may need to verify the sanity of the corresponding device
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.
 
This may be a false positive.  
 
This may be a false positive.  
 
|-
 
|-
|Checkpoint firewall successful host scan activity by malicious ip
+
|Checkpoint firewall successful host scan activity by malicious IP
|This alert is triggered when same malicious ip is trying to generate traffic for one destination ip on more than 10 different ports, but all the time request is denied .After that same malicious ip attempt to connect to same destination ip on one more port and this time it successfully connected on that port. All this happen within 1 minute.
+
|This alert is triggered when same malicious IP is trying to generate traffic for one destination IP on more than 10 different ports, but all the time request is denied .After that same malicious IP attempt to connect to same destination IP on one more port and this time it successfully connected on that port. All this happen within 1 minute.
|Bad ip address tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP addresses at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on open ports<br/></br>  
+
|Bad IP address tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP addresses at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on open ports<br/></br>  
It is important to check the reputation of the external ip address and block the same if necessary.
+
It is important to check the reputation of the external IP address and block the same if necessary.
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.
 
|-
 
|-
|Checkpoint firewall sweep scan attack by malicious ip
+
|Checkpoint firewall sweep scan attack by malicious IP
|This alert is triggered when same malicious ip is trying to generate traffic on more than 10 destination ip but all the time request is denied . All this happens within 1 minute.
+
|This alert is triggered when same malicious IP is trying to generate traffic on more than 10 destination ip but all the time request is denied . All this happens within 1 minute.
 
|Attacker tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection
 
|Attacker tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection
Bad ip addresses tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle.<br/><br/>
+
Bad IP addresses tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle.<br/><br/>
 
It is important to check the reputation of the external ip address and block the same if necessary.
 
It is important to check the reputation of the external ip address and block the same if necessary.
 
|-
 
|-
 
|Checkpoint firewall successful sweep scan activity
 
|Checkpoint firewall successful sweep scan activity
|This alert is triggered when same source ip is trying to generate traffic on more than 10 destination ip but all the time request is denied .After that same source ip attempts to connect one more destination ip and this time it successfully connects. All this happen within 1 minute.
+
|This alert is triggered when same source IP is trying to generate traffic on more than 10 destination ip but all the time request is denied .After that same source IP attempts to connect one more destination IP and this time it successfully connects. All this happen within 1 minute.
|Attacker tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on one of ip addresses
+
|Attacker tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on one of IP addresses
It is important to check the reputation of the suspected ip address.  
+
It is important to check the reputation of the suspected IP address.  
If the suspected ip address is external, you may consider blocking it.
+
If the suspected IP address is external, you may consider blocking it.
If the suspected ip address is internal, you may need to verify the sanity of the corresponding device
+
If the suspected IP address is internal, you may need to verify the sanity of the corresponding device
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.
 
This may be a false positive.
 
This may be a false positive.
 
|-
 
|-
|Checkpoint firewall successful sweep scan activity by malicious ip
+
|Checkpoint firewall successful sweep scan activity by malicious IP
|This alert is triggered when same malicious ip is trying to generate traffic on more than 10 destination ip but all the time request is denied .After that same source ip attempts to connect to one more destination ip and this time it successfully connects. All this happen within 1 minute.
+
|This alert is triggered when same malicious IP is trying to generate traffic on more than 10 destination IP but all the time request is denied .After that same source IP attempts to connect to one more destination IP and this time it successfully connects. All this happen within 1 minute.
|Bad ip address tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker finds open port on one of ip addresses and is able to establish a connection.
+
|Bad Ip address tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker finds open port on one of IP addresses and is able to establish a connection.
It is important to check the reputation of the external ip address and block the same if necessary.
+
It is important to check the reputation of the external IP address and block the same if necessary.
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.  
 
It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.  
 
|-
 
|-
|Checkpoint firewall communication with suspicious ip
+
|Checkpoint firewall communication with suspicious IP
|This alert is triggered when bytes are sent and received during communication with malicious ip within 1 minute.
+
|This alert is triggered when bytes are sent and received during communication with malicious IP within 1 minute.
 
|Communication with a bad IP is happening, it must be blocked immediately as it could be a possible attack or data ex-filtration.  
 
|Communication with a bad IP is happening, it must be blocked immediately as it could be a possible attack or data ex-filtration.  
 
You can check the log for this communication by simply searching the malicious IP in the logs. You can also check which internal IP addresses are communicating with this IP address and track the real users behind those internal IP addresses.<br/><br/>
 
You can check the log for this communication by simply searching the malicious IP in the logs. You can also check which internal IP addresses are communicating with this IP address and track the real users behind those internal IP addresses.<br/><br/>

Latest revision as of 07:47, 30 July 2019

Contents

Introduction

Firewalls are used to control the peripheral traffic and communication in organisations and hence its essential and critical to monitor them. Checkpoint Firewall sends the traffic and user activity related information in the form of logs over syslog protocol. KHIKA Data Aggregator is pre-configured with syslog services on port 514.

The key parts to get here are :

  1. Enabling Syslog forwarding on the firewall device
  2. Install the KHIKA App for Checkpoint Firewall
  3. Get data from your Checkpoint Firewall into the KHIKA Aggregator

Enabling Syslog forwarding on the device

Please refer here for enabling syslogs on your Checkpoint firewall device.

Example of a command to be fired on Firewall Device to enable syslogs:

   cp_log_export add name <name> [domain-server <domain-server>] target-server <target-server IP address> target-port <target-port> protocol <(udp|tcp)> format <(syslog)|(cef)|(splunk)(generic)>
   name          :Unique name of the exporter configuration.
   domain-server :The relevant domain-server name or IP
   target-server :Exporting the logs to this ip address 
   target-port   :The port on which the target is listening to.Here use port 514
   protocol      :Transport protocol to use.Here use protocol udp
   format        :The format in which the logs will be exported .Here use format cef

Verifying SYSLOG data collection

After you enable the syslog forwarding on the end device, you must verify if the logs are being really received by KHIKA Data Aggregator. Please refer here to understand how to verify syslogs on KHIKA Data Aggregator.

How to Install the KHIKA App for Checkpoint Firewall ?

It is assumed, that you have already configured KHIKA Data Aggregator in your environment. If not, please read how to configure KHIKA Data Aggregator and perform the pre-requisite steps.

This section explains how to pick and install the KHIKA application for Checkpoint Firewall. Installing the application shall put together and activate the adapter (parser) that can handle Checkpoint Firewall data format, the dashboards and the alert rules preconfigured.

Go to “Applications” tab in the “Configure” menu.

Checkpoint applicationtab.JPG

Check whether the appropriate Workspace is selected. Note: Application is always loaded in a Workspace. Read the section on Workspaces to know more about KHIKA Workspaces. Also select your KHIKA aggregator name in the Node dropdown. This is to ensure that we are collecting data from the desired source and into the correct workspace which is ready with the configured application and components.

Checkpoint fwapp name.jpg

Click on the “+” button next to the Checkpoint Firewall App. A pop up appears.

Checkpoint app install.JPG

User can now select the contents of the application required. For example, on the dropdown for “Reports”, click to expand it. List of all reports can be seen. User can individually select the reports required by checking on the checkbox next to each. Alternatively, check on “Select All” option to get all of them. Similarly you can select contents from Alerts and Dashboards.

Visit the sections on KHIKA Reports, KHIKA Dashboards, KHIKA Alerts & Correlations to know more about these topics.

Click “OK” to proceed with the installation of the selected Application. After successful installation, following status should be displayed :

Checkpoint app installation status.JPG

This simple procedure to install a KHIKA App, automatically configures the Adapter (required for parsing the data from raw syslogs), calculated KHIKA reports on raw data, Visualizations, Dashboards and Alerts – all in one click.

Adding the device in the Adaptor

After syslogs are enabled on the device and the App is installed into KHIKA, it is the time to add the device to the this App (in Adapter section of KHIKA Web GUI). Please refer here to know how to add the device to an App.

After making these configuration in KHIKA, you must apply these changes to the Workspace. Go to Configure, select the Workspace and in Workspace tab of configure menu press the Apply button as shown in the screenshot below.

Checkpoint apply configuration.JPG


Wait for a few minutes for changes to apply and data to arrive in kHIKA. With all these steps, we should now expect the data to arrive in KHIKA. Lets discover some live data in KHIKA.

How to check the output of KHIKA Checkpoint Firewall App ?

Discovering the logs of Checkpoint Firewall

After doing all the steps given above, we should start receiving live data into KHIKA. Go to "Discover" section in KHIKA GUI and select the index with name "*raw-checkpoint_firewall*". Note that the index has a prefix of the customer name and workspace name. After selecting this index, you should see the live data coming in. Spend some time understanding this data and the fields of the data.

Checkpoint Firewall Malicious Communication Dashboard

Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.

This dashboard focuses on the Checkpoint Firewall communication with suspicious IP addresses and it's traffic status(which is added into KHIKA).Details like the malicious IP address,the source IP and destination IP at that time, actions, service, traffic direction etc. is shown in an analytical fashion. You can filter and search information and create new visualizations ones too.

For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall Malicious Communication" Dashboard
Visualization Description
Contribution of Action Contribution of actions during communication with malicious IPs
Contribution of Malicious IP Contribution of Malicious IP addresses, according to no. of events occured in logs.
Malicious IP wise Action X axis : All Malicious IPs communicated through the firewall

Y axis : Actions stacked in one bar(Malicious IP) and their count

Source IP wise Hits X axis : Source IPs found in Malicious Communication

Y axis : The count of Source IPs during Malicious Communication

Destination IP wise Hits X axis : Destination IPs found in Malicious Communication

Y axis : The count of Destination IP during Malicious Communication

Daily trend Trend of malicious communication events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

Suggestions for useful interaction with this dashboard could be :

  1. Select a particular malicious IP from the Contribution of Malicious IP pie. Rest of the visualizations reflect all source IP, destination IP and actions with respect to this malicious IP.
  2. Select an action from Contribution of Action pie. You can check what traffic gets accepted and wether it is from any particular source or unusually high at any time of the day and so on.

Checkpoint Firewall Triggered Signature Dashboard

Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.

This dashboard gives attack information against predefined signatures of attacks. It includes information about source and destination IPs and also possible malicious IPs among them. What action has been taken by firewall on each is also present. You can filter and search information and create new visualizations too.

For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall Triggered Signature" Dashboard
Visualization Description
Contribution of Action Contribution of Actions in signatures of attacks
Contribution of Attack Contribution of Attacks according to no. of events occured
Source IP wise Attack Hits X axis : Source IPs found during Attack

Y axis : Stacked within each bar (ie. for each Attack) the Source IP and count of events

Destination IP wise Attack Hits X axis : All the Source IPs during Signature Attack

Y axis : Stacked within each bar (ie. for each Attack) the Destination IP and count of events

Daily trend Trend of attack events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

Suggestions for useful interaction with this dashboard could be :

  1. Click on or select a particular attack in the Contribution of Attack pie. The rest of the dashboard reflects all source IPs,destination IPs and actions with respect to selected attack.
  2. For more granular detection select particular action from Contribution of Action pie chart, now rest of the dashboard will reflect accordingly.

Chekpoint Firewall VPN Activity Dashboard

Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.

This dashboard gives Checkpoint Firewall VPN activity details like Source IP, Destination IP, VPN user, Interface Name, Policy Name, Interface Direction etc. in analytical fashion. You can filter and search information and create new ones too. For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall VPN Activity" Dashboard
Visualization Description
Contribution of VPN User pie chart Contribution of VPN User according to no. of events occured
Contribution of Action pie chart Contribution of Actions taken on VPN traffic
Source IP wise Hits X axis : Source IPs found during VPN Activity

Y axis : The count of Source IPs during VPN

Destination IP wise Hits X axis : All the Source IPs during VPN Activityk

Y axis : The count of Destination IP during VPN

Contribution of Protocol pie chart Contribution of Protocol during VPN
Contribution of Policies Contribution of Policies during VPN
Daily trend Trend of VPN activity events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

A suggestion for useful interaction with this dashboard could be :

  1. Click on and select a particular user in the Contribution of User pie. The rest of the visualization reflects all source IPs,destination IPs,policies,actions etc. with respect to selected VPN user.
  2. Click on and select particular action in the Contribution of Action pie. Now rest of the visualizations will reflect accordingly.

Checkpoint Firewall Attack Dashboard

Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard.

This dashboard gives Checkpoint Firewall attack information. You can filter and search information and create new visualizations too.

For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall Attack" Dashboard
Visualization Description
Contribution of Attack Contribution of Attacks according to the occurence
Contribution of Malicious IP Contribution of Malicious IPs in Attack events
Attack wise Attack Info X axis : Attacks accross Firewall

Y axis : Stacked within each bar (ie. for each Attack info) the Attack Name and count of events

Source IP wise Attack X axis : Source IPs found during Signature Attack

Y axis : Stacked within each bar (ie. for each Attack) the Source IP and count of events

Destination IP wise Attack X axis : All the Source IP during Signature Attack

Y axis : Stacked within each bar (ie. for each Attack) the Destination IP and count of events

Daily trend Trend of Attack events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

Suggestions for useful interaction with this dashboard could be :

  1. Click on and select a particular attack from contribution of attack pie chart. The rest of the visualization reflects information like source IP,destination IP and attack info with respect to selected Attack.
  2. Select particular source IP in the Source wise attack bar chart. Now rest of the visualizations will reflect accordingly.

Checkpoint Firewall Audit Admin login Dashboard

Go to "Dashboards" from the left menu. From the list of dashboards, select this one. It shall open the Dashboard. This shows Checkpoint Firewall login information. It shows status of logins, from where user has logged in, which product is used for login (product like smart dashboard,smart view tracker, smart view monitor etc). You can filter and search information and create new visualizations too.

For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall Audit Admin login" Dashboard
Visualization Description
Contribution of Status Contribution of status like success,failure etc in admin user login events
Contribution of Machine Machine Name from where admin user was trying to login
Admin user wise Status: X axis : Admin users who have login into Firewall

Y axis : Admin users wise login failed and success status and its count

Client IP wise Operation X axis : All client IP in login activity

Y axis : Stacked within each bar (ie. for each operation like log in etc) the Client IP and count of events

Daily trend Trend of Admin login events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

Suggestions for useful interaction with this dashboard could be :

  1. Click on and select a particular status from contribution of Status pie. The rest of the visualization reflects for all Admin users the Machine Names and Client Names for selected status
  2. Select particular Admin user in Admin wise status bar. Now rest of the visualizations will reflect accordingly.

Checkpoint Firewall Allowed External Source Dashboard

Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard shows traffic which the Checkpoint Firewall allowed from external sources. Here traffic origin is external and is accepted by firewall. This dashboard gives you a control over all the external incoming traffic through your peripheral firewall.

You can filter and search information and create new visualizations too.

For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall Allowed External Source Dashboard" Dashboard
Visualization Description
Contribution of Protocol Contribution Protocol in allowed traffic from external sources
Contribution of Services Contribution of Services in allowed traffic from external sources
Source IP wise Hits X axis : All Source IP found in allowed traffic from external sources

Y axis : Source IP wise events count

Destination IP wise Hits X axis : All Source IP in allowed traffic from external sources

Y axis : Destination IP wise events count

Daily trend Trend of allowed external traffic events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

Suggestions for useful interaction with this dashboard could be :

  1. Click on and select a particular service from Contribution of Services pie chart. The rest of the visualization reflects all Source IP,Destination IP,Protocol etc info with respect to selected service.
  2. For further granular detection click on and select particular Source IP or Destination IP from Source IP wise Hits and Destination IP wise Hits bar chart res.Now rest of the visualization will reflect accordingly.

Checkpoint Firewall Blocked External Source Dashboard

Go to "Dashboards" from the left menu. From the list of dashboards, select this one. It shall open the Dashboard. This dashboard shows traffic blocked by the Checkpoint Firewall from external sources. Here traffic origin is external and this traffic is blocked by the firewall. You can filter and search information and create new ones too. For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall Blocked External Source" Dashboard
Visualization Description
Contribution of Protocol Contribution Protocol in blocked traffic from external sources
Contribution of Services Contribution of Services in blocked traffic from external sources
Source IP wise Hits X axis : All Source IP in blocked external source traffic

Y axis : Source IP wise traffic events count

Destination IP wise Hits X axis : All Source IP in blocked external source traffic

Y axis : Destination IP wise traffic events count

Daily trend Trend of blocked external traffic events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

Suggestions for useful interaction with this dashboard could be :

  1. Click on and select a particular service from Contribution of Services pie chart. The rest of the visualization reflects all Source IP,Destination IP,Protocol etc info with respect to selected Service.
  2. For further granular detection click on and select particular Source IP or Destination IP from Source IP wise Hits and Destination IP wise Hits bar res. Now rest of the dashboard reflects accordingly.

Checkpoint Firewall Object Manipulation Dashboard

Go to "Dashboards" from the left menu. From the list of in-built dashboards, select this one. It shall open the Dashboard. This dashboard is an User activities audit. It shows the activities performed on the firewall, like creating, modifying and deleting objects. It shows the different types of objects and its table name.You can filter and search information and create new visualizations too.

For help with Dashboards, click here

Elements in the Dashboard are explained below :

Elements in "Checkpoint Firewall Object Manipulation" Dashboard
Visualization Description
Contribution of Client IP Contribution of Client IP in Object Manipulation Events
Contribution of Object Name Contribution of Object Name in Object Manipulation Events
Contribution of Object Type Contribution of Object Type in Object Manipulation Events
Administrator wise Operation X axis : All Administrator user in Object Manipulation

Y axis : Stacked within each bar (ie. for each operation) the Administrator and count of events

Daily trend Trend of object manipulation events over time. Useful to identify unusual spikes at a glance.

X axis : date & time
Y axis : count of events
Summary Table Detailed data with timestamp and count

Suggestions for useful interaction with this dashboard could be :

  1. Click on and select a particular object type from Contribution of Object Type pie chart. The rest of the visualizations reflect Object Names,Client IPs,Operation etc info with respect to selected object type.
  2. For further drill down click on and select particular Administrator user from Operation wise bar chart. It shows operations like modify rule,create object,modify object for that Administrator user.

Chekpoint Firewall Alerts

Alerts are generated when certain critical behavior is observed in the system. Alerts can be monitored in real-time on Alerts Dashboard in KHIKA. Relevant stakeholders can also receive the alerts via emails. The table below explains all the pre-canned alerts shipped with KHIKA App for Checkpoint Firewall.

Alerts Description

Alert Details Table
Alert Name Description Suggested Resolution
Checkpoint firewall Possible data Exfiltration This alert is triggered when large amount of data (more than 5 MB ) is being sent to an external network. This alert is detected when a large amount of data is uploaded on external sites. This may be an attempt of data ex-filtration from the organisation.

Please check the real user associated with the source IP and the workstation from which the data upload happened. Verify if sensitive data was ex-filtrated.

Checkpoint firewall Checkpoint control log message This alert is triggered when action is ctl and an internal message is generated by Checkpoint Firewall Checkpoint Firewall internal message is generated. Please check the documentation of Checkpoint and do the suggested action.
Checkpoint firewall Possible icmp probe This alert is triggered when high inbound icmp requests are made and are accepted ICMP probe is an old and established technique used by attackers as the first step that involves reconnaissance. This is used to check what IPs/Hosts are responding to the ping request so that further targeted can be launched on the responding IPs/Hots.

The probing IP, if not a legitimate IP, ,it should be blocked at the periphery. Check the reputation of the probing IP in external reputation databases, such as VirtusTotal.com or IPVoid.com etc. If the reputation is found to be dubious or bad, you must block such IPs.

Checkpoint firewall IPS bypassing This alert is triggered when IPS is bypassed. The firewall IPS mode is enabled by default in NextGen firewalls. However, sometimes the firewall runs out of its resources, such as CPU or Memory due sudden heavy load. In such cases, the firewall disables the IPS mode so that it can service the traffic traffic. Disabled IPS mode on the peripheral firewall is a compromised operating mode as an attacker can invade into your network by exploiting the lack of IPS service on your firewall.
Checkpoint firewall Worm detected This alert is triggered when traffic is generated on port 445,137,138,139 and communication direction is inbound Log messages indicative of a worm are detected. Check the attacking IPs in question. Verify the reputation these IPs in reputation databased such as virustotal.com, ipvoid.com etc.
Checkpoint firewall Backdoor activity detected This alert is triggered when traffic is generated from internal machine on vulnerable ports(3127,3198,6129,7080). This event indicates that a traffic is generated from internal machine on vulnerable ports(3127,3198,6129,7080). Typically, these ports are used by attacker to exploit vulnerable programs listening on these ports.

Check is these ports are open and on what servers. Do you really need these ports opened? Check what programs are running on these ports. Check vulnerability reports of the applications Block these ports for external traffic, unless mandatory to keep them opened. If you have to keep any of these ports opened, try to restrict the access to legitimate IPs. If you get a suspicious IP repetitively trying to access these port, block the IP. Check the reputation of the IP on popular website such as ipvoid.com, virustotal.com etc.

Checkpoint firewall Communication with possible IOC or bad IP This alert is triggered when any one of the Source or Destination IP is found malicious with accepted action KHIKA shares community based threat intelligence (TI) every 24 hours. TI has list of IP addresses with bad reputation. Every bad IP is marked with number of communities reporting it, name of each community and confidence indicating how confident are we about the reputation. This alert is generated when communication with a bad IP is let through.

If communication with a bad IP is happening, it must be blocked immediately as it could be a possible attack or data ex-filtration. You can check how log this communication is happening by simply searching the malicious IP in the logs. You can also check what internal IP addresses are communicating with this IP addresses and track the real users behind those internal IP addresses. Cross-check the reputation of the IP with popular websites such as ipvoid.com, virustotal.com If you see an internal IP constantly getting involved in malicious communication (with same or multiple external IP addresses), you may install agents on the internal nodes involved and check the real user and process responsible for this communication. It is critical to block this rogue communication.

Checkpoint firewall host scan activity by malicious IP This alert is triggered when same malicious ip is trying to generate traffic for one destination ip on more than 10 different ports within 1 minute and the request is denied. Bad ip address tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP address at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle.

It is important to check the reputation of the external ip address and block the same if necessary.

Checkpoint firewall successful host scan activity This alert is triggered when same source ip is trying to generate traffic for one destination ip on more than 10 different ports but all the time request is denied .After that same source IP attempts to connect to same destination on one more port and this time it successfully connects on that port. All this happen within 1 minute. Attacker tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP addresses at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on open ports

It is important to check the reputation of the suspected IP address. If the suspected IP address is external, you may consider blocking it. If the suspected IP address is internal, you may need to verify the sanity of the corresponding device It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved. This may be a false positive.

Checkpoint firewall successful host scan activity by malicious IP This alert is triggered when same malicious IP is trying to generate traffic for one destination IP on more than 10 different ports, but all the time request is denied .After that same malicious IP attempt to connect to same destination IP on one more port and this time it successfully connected on that port. All this happen within 1 minute. Bad IP address tries to spray connection requests on multiple popular ports (21,22,53,80,443 etc) targeting one single IP addresses at a time with an intention to find the open ports on the target IP address. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on open ports

It is important to check the reputation of the external IP address and block the same if necessary. It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.

Checkpoint firewall sweep scan attack by malicious IP This alert is triggered when same malicious IP is trying to generate traffic on more than 10 destination ip but all the time request is denied . All this happens within 1 minute. Attacker tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection

Bad IP addresses tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle.

It is important to check the reputation of the external ip address and block the same if necessary.

Checkpoint firewall successful sweep scan activity This alert is triggered when same source IP is trying to generate traffic on more than 10 destination ip but all the time request is denied .After that same source IP attempts to connect one more destination IP and this time it successfully connects. All this happen within 1 minute. Attacker tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker done successful connection on one of IP addresses

It is important to check the reputation of the suspected IP address. If the suspected IP address is external, you may consider blocking it. If the suspected IP address is internal, you may need to verify the sanity of the corresponding device It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved. This may be a false positive.

Checkpoint firewall successful sweep scan activity by malicious IP This alert is triggered when same malicious IP is trying to generate traffic on more than 10 destination IP but all the time request is denied .After that same source IP attempts to connect to one more destination IP and this time it successfully connects. All this happen within 1 minute. Bad Ip address tries to spray connection requests on one of the popular ports (21,22,53,80,443 etc) on multiple IP addresses with an intention to find which ports are opened on what IP addresses. Typically, scan attempt is the first stage of reconnaissance in the attack life cycle and attacker finds open port on one of IP addresses and is able to establish a connection.

It is important to check the reputation of the external IP address and block the same if necessary. It is also important to verify the sanity of affected internal nodes by checking if any unwarranted system policy change or software configuration/updates have occurred during the affected time period. If required, quarantine the affected servers till the time the issues are resolved.

Checkpoint firewall communication with suspicious IP This alert is triggered when bytes are sent and received during communication with malicious IP within 1 minute. Communication with a bad IP is happening, it must be blocked immediately as it could be a possible attack or data ex-filtration.

You can check the log for this communication by simply searching the malicious IP in the logs. You can also check which internal IP addresses are communicating with this IP address and track the real users behind those internal IP addresses.

If you see an internal IP constantly getting involved in malicious communication (with same or multiple external IP addresses), you may install agents on the internal nodes involved and check the real user and process responsible for this communication. If required, quarantine the affected internal servers till the time the issues are resolved.

Checkpoint firewall large data sent outside This alert is triggered when large amount of data (more than 1 GB) being sent to an external network Large amount of data being sent to an external network could be an indication of data ex-filtration.

Check with the user or process which is responsible for the data being sent out and whether it was done for legitimate business reasons. This could be a false positive.