Checkpoint Notes

1. use SCP to transfer file

It is recommended to add a new user with "scponly" shell, instead of changing admin user to "bash" shell





















2. Reset SIC
In case SIC has issue or policy deployment causes connection loss to GW, reset SIC will load initial policy.
on GW:
cpconfig, choose 5, set one time activation key,  then choose 10. 
On SMS:
firewall properties > General Properties > [Communication] 

3. object used in Firewall Policy
If an object has private IP and static NAT. The firewall policy use the object for inbound and outbound rule, no need specify its private or public IP. 

4. Inline Policy
regular rule can only select service (port), after Action uses Inline Layer, the subrule can use application and URL.

5. Backup
 /var/log/CPbackup/backups/
system backup:
   GUI, backup Gaia config.
   CLI: add backup / set backup restore


6. Ping
Global Properties > Accept ICMP requests
implied rule "before last" literally means, before the last explicit rule, which is usually the cleanup policy rule. ICMP "Before Last" is disabled by default.


7. VPN peer ping CP public IP failed.
By default, Check Point gateways will include the public IP of the peer gateway in the encryption domain of the tunnel. This means that when you are behind your gateway, and ping to the public IP address of the gateway on the other end, CP will encrypt these pings and send them through the tunnel. Most likely this does not work because this behavior is not supported by the gateway on the other end. There is a way around this. You can exclude specific IP addresses from the encryption domain by adding them to the $FWDIR/lib/crypt.def file on your management server. Make sure you take a backup of the file before making any permanent changes (in case shit hits the fan). Log into your management server cli, open $FWDIR/lib/crypt.def in a text editor, find the following line "#define NON_VPN_TRAFFIC_RULES 0", replace this line with "#define NON_VPN_TRAFFIC_RULES (src=[IP_addr_of_vpn_peer])" Then save your changes, and install policy to push this file to the relevant gateways. The gateways should now no longer encrypt traffic destined for the public IP of the peer gateway, so your pings should start working again.






Comments

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.