Enable data collection for Check Point devices

Relevant for: AFA Administrators

In order for AFA to collect data from a Check Point device, you must configure certain settings on the device itself. AFA collects data from Check Point devices using either SSH or OPSEC, and for Check Point versions R80 and above, AFA collects data via REST (along with either SSH or OPSEC). You must enable the data collection requirements for every method you use.

Note: In addition the requirements listed below, ensure that the user that AFA is using to access the device has the required permissions. The minimum permission required in Read Only All. When the device is using ActiveChange, the minimum permission is Read Write All. For more details, see Required device permissions.

For more details, see Add Check Point devices.

Enable data collection via SSH

This procedure describes how to enable AFA to process Check Point application control traffic logs.

AFA can be configured to collect logs from a Check Point device via SSH, but special configuration is required on the Check Point device. Application control traffic logs include the app_rule_id field, and this field is masked by default for the SSH log collection user that is specified when adding the device to AFA. As a result, AFA cannot process application control logs that are collected via SSH, nor use them to generate information for the Application Control Rules Cleanup area of the device report's Policy Optimization page.

In order to enable AFA to process application control traffic logs, you must modify permissions for the app_rule_id field on the Check Point device, as described in the following procedure.

Note: For R80 and above, AFA collects data via REST (along with either SSH or OPSEC). For more details, see Enable data collection via REST.

Do the following:

  1. Run GuiDBedit.exe, and connect to the Check Point device's management station.

    The management station is typically located at C:\Program Files (x86)\CheckPoint\SmartConsole\RXX\PROGRAM

    where RXX is the version number.

  2. In the left pane, navigate to Other > log_fields.

  3. In the right pane, click on app_rule_id.

    The bottom pane displays the fields that are displayed for app_rule_id.

  4. In the bottom pane, double-click on the permissions field.

    The Edit dialog box appears.

  5. In the Value field, change the value from 2 to 0.
  6. Click OK.
  7. Save your changes and exit the program.
  8. If the device sends its traffic logs to a log server other than the management station (for example, a CLM or external log server), do the following:

    1. Connect to the Check Point device's management station via SmartDashboard.

    2. Re-install the Check Point database on the log server, by selecting Policy and then Install Database from the main menu.

    3. Exit the program.

Back to top

Enable data collection via OPSEC

This procedure describes how to specify a certificate for OPSEC access to a Check Point device, which must be performed in the Check Point - Multi-Domain Security Management (Provider-1) - Step 1/3 or Check Point - SmartCenter or CMA - Step 1/2 page after selecting OPSEC as the connection method.

Do the following:

  1. Create a certificate for your device. For more details, see:

  2. In AFA, in the OPSEC Setup area, click Certificate.

    The Retrieve a new OPSEC certificate dialog box appears.

  3. Complete the fields as follows:

    OPSEC Application Name

    Type the OPSEC application name, as specified in the OPSEC certificate.

    The default value is "AlgoSec".

    One Time Password

    Type the one-time password, as specified in the OPSEC certificate.

    Advanced

    Click to display advanced fields.

    The CPMI Authorization Type, CPMI Port, LEA Authorization Type, and LEA Port fields appear.

    CPMI Authorization Type

    Select the CPMI authorization type.

    CPMI Port

    Type the CPMI port number.

    The default value is 18190.

    LEA Authorization Type

    Select the LEA authorization type.

    LEA Port

    Type the LEA port number.

    The default value is 18184.

  4. Click OK to retrieve the certificate from the Check Point SmartCenter, CMA or MDSM server.

    Once the certificate is installed, a confirmation window appears.

  5. Click OK.

    The OPSEC Setup area displays the certificate date and time of creation.

Back to top

Enable data collection via REST

This procedure describes how to enable REST calls to the Security Management Server.

Note: For versions R80 and above, AFA collects data via REST, along with either SSH or OPSEC. In addition to enabling REST, you must also enable SSH or OPSEC as needed.

For details, see Enable data collection via SSH and Enable data collection via OPSEC.

Do the following:

  1. Open a SmartConsole.

  2. In the left pane, navigate to Manage & Settings > Blades > Management API > Advanced Settings.

    The Management API Settings window appears.

  3. To automatically start the API server at Security Management Server startup, select the Automatic Start check box.
  4. Select which IP addresses from which the API server accepts requests:

    All IP addresses that can be used for GUI clients API server will accept scripts and web service requests from the same devices that are allowed access to the Security Management Server. Make sure the AFA server is in this list.
    All IP addresses The API server will accept scripts and web-service requests from any device
  5. Click OK.

    In the Management API restart message that appears, click OK.

  6. At the top, click Publish.
  7. In the Management Check Point Server CLI, run the api restart command, and then exit.

Back to top