<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic R80.30 - SecureXL CCP Encryption in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R80-30-SecureXL-CCP-Encryption/m-p/40901#M8640</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Under R80.30 it is possible to encrypt CCP traffic.&amp;nbsp; This is very useful to protect the cluster from manipulated CCP packets. &amp;nbsp;Therefore new commands have been implemented on the CLI for this purpose. The following description shows you how to enable CCP encryption. All settings you make on the CLI are permanently stored in the following file “/etc/fw.boot/ha_boot.conf”. &amp;nbsp;This means that all settings are preserved after the reboot. You have to set the settings on both gateways and they will take effect on the fly. The CCP encryption is disabled by default and must be enabled via CLI on both gateways.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="78337" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78337_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command also shows the current status “on" or "off” of the CCP encryption on the cluster:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaprob ccp_encrypt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;clish&amp;gt; &lt;SPAN style="color: red;"&gt;show cluster members ccpenc&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;IMG __jive_id="78344" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78344_pastedImage_2.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this command you set the 32 byte long encryption and decryption key (blue) on both gateways:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaconf ccp_encrypt_key&lt;/SPAN&gt; &lt;SPAN style="color: #558ed5;"&gt;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;With the following command the encryption can be permanently enabled on the fly:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaconf ccp_encrypt &lt;STRONG&gt;on&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In this way the encryption can be disabled on the fly&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaconf ccp_encrypt &lt;STRONG&gt;off&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As described above, all settings are saved in the file /etc/fw.boot/ha_boot.conf.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;&lt;STRONG&gt;&lt;IMG __jive_id="78345" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78345_pastedImage_5.png" /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this command you can test if the CCP encryption works. Here you should not see any cluster status information on the sync interface (blue). All packages should be visible under unknown when CCP encryption is enabled.&lt;/P&gt;&lt;P&gt;# &lt;SPAN style="color: red;"&gt;tcpdump -nepi &lt;SPAN style="color: #3366ff;"&gt;eth1&lt;/SPAN&gt; -x port -s 0 8116 2&amp;gt;/dev/null | ccp_analyzer -g –c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;&lt;IMG __jive_id="78346" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78346_pastedImage_6.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately it is no longer possible to analyze the CCP packets via "ccp_analyzer " when encryption is enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;More interesting articles:&lt;/SPAN&gt; &lt;A class="" href="http://cp.ankenbrand24.de" style="color: #6d6e71; border: 0px; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;cp.ankenbrand24.de&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Feb 2019 16:27:23 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2019-02-11T16:27:23Z</dc:date>
    <item>
      <title>R80.30 - SecureXL CCP Encryption</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-30-SecureXL-CCP-Encryption/m-p/40901#M8640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Under R80.30 it is possible to encrypt CCP traffic.&amp;nbsp; This is very useful to protect the cluster from manipulated CCP packets. &amp;nbsp;Therefore new commands have been implemented on the CLI for this purpose. The following description shows you how to enable CCP encryption. All settings you make on the CLI are permanently stored in the following file “/etc/fw.boot/ha_boot.conf”. &amp;nbsp;This means that all settings are preserved after the reboot. You have to set the settings on both gateways and they will take effect on the fly. The CCP encryption is disabled by default and must be enabled via CLI on both gateways.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="78337" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78337_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command also shows the current status “on" or "off” of the CCP encryption on the cluster:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaprob ccp_encrypt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;clish&amp;gt; &lt;SPAN style="color: red;"&gt;show cluster members ccpenc&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;IMG __jive_id="78344" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78344_pastedImage_2.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this command you set the 32 byte long encryption and decryption key (blue) on both gateways:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaconf ccp_encrypt_key&lt;/SPAN&gt; &lt;SPAN style="color: #558ed5;"&gt;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;With the following command the encryption can be permanently enabled on the fly:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaconf ccp_encrypt &lt;STRONG&gt;on&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In this way the encryption can be disabled on the fly&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#&lt;/STRONG&gt; &lt;SPAN style="color: red;"&gt;cphaconf ccp_encrypt &lt;STRONG&gt;off&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As described above, all settings are saved in the file /etc/fw.boot/ha_boot.conf.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;&lt;STRONG&gt;&lt;IMG __jive_id="78345" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78345_pastedImage_5.png" /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this command you can test if the CCP encryption works. Here you should not see any cluster status information on the sync interface (blue). All packages should be visible under unknown when CCP encryption is enabled.&lt;/P&gt;&lt;P&gt;# &lt;SPAN style="color: red;"&gt;tcpdump -nepi &lt;SPAN style="color: #3366ff;"&gt;eth1&lt;/SPAN&gt; -x port -s 0 8116 2&amp;gt;/dev/null | ccp_analyzer -g –c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;&lt;IMG __jive_id="78346" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78346_pastedImage_6.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately it is no longer possible to analyze the CCP packets via "ccp_analyzer " when encryption is enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;More interesting articles:&lt;/SPAN&gt; &lt;A class="" href="http://cp.ankenbrand24.de" style="color: #6d6e71; border: 0px; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;cp.ankenbrand24.de&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Feb 2019 16:27:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-30-SecureXL-CCP-Encryption/m-p/40901#M8640</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-02-11T16:27:23Z</dc:date>
    </item>
  </channel>
</rss>

