cancel
Showing results for 
Search instead for 
Did you mean: 
Post a Question
PatrikSkoglund
PatrikSkoglund inside Access Control Products 7 hours ago
views 87 5

Deploy Identity Awareness Agent with Microsoft SCCM - Full Client with MAD and Packet Tagging

So I've got another issue with the Identity Awareness Agent. This time its the deployment from Microsoft SCCM. SCCM will run the installation as SYSTEM. Installation works, and all seems good. For some reason the MAD service doesn't work as expected. It doesn't provide the computer account to the gateway, and when you try to restart the Check Point Managed Asset Detection service, it crashes and completely stops working. Also the Packet Tagging driver doesn't work properly. It says its enabled, but the packet tagging never happens.Installing the same packet as Admin manually works perfectly. So is there any work-around for this? Or am I missing something? I would prefer not to have to manually install the agent on every computer. There are just to many to even think about going that way. Our SCCM guy says you can do a really ugly work around and have a admin account run the the installation from SCCM, but this is very much not recommended, and it won't work if you want it installed as a part of the task sequence, Any tips on how to do this?

LOM settings - Direct acces onto Remote Console

We have multiple 5000 Appliance and to have a more direct way to access "Remote Console". Currently we have to login per https on to the LOM - Management Interface. And start JViewer to access Remote Console.I am looking for alternative. I used on openserver to use vnc to access directly the Remote console Window!!How can i start the "Remote Console" using different Tool? I would prefer not to use a Webbrowser...

skype for business issues

Hi, I am facing an issue where VOIP calls from our Polycom device to Skype for business online are dropped after about 1 minute. The drops are one-way (incoming voice) which looks like the incoming SIP traffic is dropped. The topology is quite simple: Polycom --> CP GW --> Internet --> Skype for Business online some insights: 1. the problem doesn't occur when connecting the Polycom directly to the internet via a hotspot. so it is a Check point issue 2. issue still occurs when disabling SecureXL so it is not a SXL issue 3. Hide NAT changes source port for SIP over UDP IP is checked in inspection settings 4. No IPS drops on VOIP. The Polycom IP is excluded from IPS and all inspection settings 5. we see incoming connections from the Skype for business online IP range are blocked by the stealth rule the last point made me think that it might be a NAT issue with SIP ports range (outgoing connections are NATed but incoming connections are not recognized by the firewall as part of the same connection)I see the following drops coming from Skype for business online IP range to the GW external IP address My questions are:Are there any best practices to configure Skype for business with Check Point What is the recommendation for NAT with SIP?Any insights on how to solve this issue
Carlos_Arzate
Carlos_Arzate inside Access Control Products Thursday
views 32 1

VPN with Forcepoint Cloud

We need to establish a VPN between Check Point to Forcepoint Cloud. We review the configuration and the tunnel is not working. Could you share if it is possible? We need to re-direct all web traffic at Forcepoint.
chico
chico inside Access Control Products Thursday
views 54 3

Issue with identity agent R80.158.0.0.0.0

Hello everybody,We have migrated our appliance checkpoint on R80.20 version few weeks ago. We have terminal servers for users remote connexions on Windows server 2012R2. We have installed the identity agent version R80.102.1004 and we hadn't any problems but I tried the new version R80.158.0.0.0 and now we don't have all users authenticted on the servers it's very strange.Does someone had the same issue with this agent verion ? and found ans issue ? Regards,

R80.20 SecureXL - User Space?

I keep seeing in the excellent documents by @HeikoAnkenbrand and posts by @PhoneBoy that SecureXL runs in user space starting in R80.20. After a detailed look at an R80.20 security gateway I don't think this assertion is correct and I'm seeking clarification, I believe this is some kind of mixup with the new USFW function which is available in R80.20 but not enabled by default. What I see on a standard R80.20 gateway is that the SecureXL kernel driver code has ballooned from 5.2MB in R80.10 to about 18MB in R80.20 and is now named with an instance number (i.e. simmod_0) which would allow multiple instances of SecureXL to be running; useful in the case of Falcon cards. The size of the simmod code would certainly have grown since it is now capable of PSL and CPAS whereas those functions were handled in a Firewall Worker instance (fw_X) before. The firewall worker kernel instance code (fw_X) has also grown from about 40MB to 48MB between R80.10 and R80.20. There is a new SecureXL-related daemon called sxl_statd in R80.20 but its functions seem to be very simple and its small size (38K) makes it impossible that it is "SecureXL running in user space". I can't seem to find any other processes that would be "SecureXL running in User Space" unless it is somehow now part of the fw_worker_X processes which I find unlikely. So as a bit of an experiment I enabled USFW under R80.20 according to the instructions in sk149973: How to enable USFW (User-Space Firewall) on a 23900 appliance on my 8-core VMware firewall (2/6 split) and rebooted. In the kernel with lsmod I still see the 18MB simmod_0 but now there is only one firewall kernel driver called fwmod at 48MB. In process space I only see one firewall worker (fwk), but I also see "fwk_wd -i 6 -i6 0" and fwk_forker so I'm pretty sure more fwk firewall workers would get forked off if needed. It still looks like SecureXL is completely in kernel space. The whole justification for USFW is due to the 2GB kernel limitation that was being reached by trying to load up to 40 separate instances of the firewall workers into the kernel, in R80.20 if there are 40 workers * 48MB = 1.9 GB so it makes sense that Check Point couldn't just keep adding more and more workers in the kernel. However there is only one SecureXL simmod kernel driver and it takes up a "whopping" 18MB of kernel space, so it doesn't make sense to me to move that part into user space. So unless I'm really missing something here I don't think the assertion that "SecureXL is in user space" is correct, at least not in R80.20, regardless of whether USFW is enabled or not. Edit: Just looked over R80.30 and set USFW on it too, looks exactly the same as what I observed in R80.20 above.
Nischit
Nischit inside Access Control Products a week ago
views 73 1

Block URL in Checkpoint

Hi,I want to block this URL for eg. "abc.com/efg/mno" to a particular source but want to allow for eg. "abc.com/ijk/pqr" for the same source. How can we achieve this in Checkpoint? Thanks in advance!
Trey_Havener
Trey_Havener inside Access Control Products 2 weeks ago
views 277 16 2

UserCheck Block Page Times Out

We just cut over to our 5400 cluster, and during testing the Block Page displayed fine. Today during the cutover however, the block page seems to keep timing out. We aren't doing much on the block page but telling them why they were blocked and to contact us if they feel it's in error. If I do an incognito tab and then sometimes that will work but most of the time it times out as well. I have a ticket open but wanting to see if anyone else has had this problem. We aren't doing any https inspection...not ready for that nightmare. Just URL filtering.
Svante_Oskarsso
Svante_Oskarsso inside Access Control Products 2 weeks ago
views 62 3

PCoIP connectivity issues when installing policy, R80.20

Hi,We have a newly upgraded 15000 Appliance Cluster to R80.20 T47, only Firewall and IA blades are activated on this cluster.We did not have this issues before with r77.30, Now when we install policy, all VDI (PCoIP) connections are disrupted, some close totally and some reconnects but still gets disconnected. It seems to happen when it has been longer than about 1h after the latest install, if an installation is done in 20-30 minutes since the last one we don´t seem to get the issue.I've tested to increase the "end timeout R80" global setting from 5 to 20 as it was before but still the same issue is occurring. I cannot see anything unusual in the logs och anything with a zdebug drop. I'll troubleshoot with TAC on monday but wanted to see if anyone has any ideas on what this could be caused by and what more to check?RegardsSvante
Norbert_Papirny
Norbert_Papirny inside Access Control Products 2 weeks ago
views 48 1

fw monitor output

Hi All,I need some help with fw monitor output. (R80.20 gaia T47)Our GRE/SIP communication doesn't work, and as you can see below, the last captured packet was stopped in pre-outbound (o4) chain position. It is the tunnel-inside traffic.We have bidirectional rules between peers without NAT.Could you please somebody explain what caused this behavior? Here is also the relevant wireshark capture:There are many articles/ cheat sheets ,etc. about how fw monitor is working, but i cant find any information about the output interpretation... in chain (14):0: -7fffffff (0000000000000000) (00000000) SecureXL inbound (sxl_in)1: -7ffffffe (0000000000000000) (00000000) SecureXL inbound CT (sxl_ct)2: -7f800000 (ffffffff8a32eb80) (ffffffff) IP Options Strip (in) (ipopt_strip)3: - 1fffff8 (ffffffff8a32c9b0) (00000001) Stateless verifications (in) (asm)4: - 1fffff7 (ffffffff8a32c4d0) (00000001) fw multik misc proto forwarding5: - 1fffff5 (ffffffff8a3e2ec0) (00000001) fw early SIP NAT (sipnat)6: 0 (ffffffff8a48cc10) (00000001) fw VM inbound (fw)7: 2 (ffffffff8a32efd0) (00000001) fw SCV inbound (scv)8: 5 (ffffffff8a21a4d0) (00000003) fw offload inbound (offload_in)9: 10 (ffffffff8a47eca0) (00000001) fw post VM inbound (post_vm)10: 7f730000 (ffffffff89ffc520) (00000001) passive streaming (in) (pass_str)11: 7f750000 (ffffffff89c8c7d0) (00000001) TCP streaming (in) (cpas)12: 7f800000 (ffffffff8a32eb30) (ffffffff) IP Options Restore (in) (ipopt_res)13: 7fb00000 (ffffffff89628750) (00000001) Cluster Late Correction (ha_for)out chain (11):0: -7f800000 (ffffffff8a32eb80) (ffffffff) IP Options Strip (out) (ipopt_strip)1: - 1fffff0 (ffffffff89c76dd0) (00000001) TCP streaming (out) (cpas)2: - 1ffff50 (ffffffff89ffc520) (00000001) passive streaming (out) (pass_str)3: - 1f00000 (ffffffff8a32c9b0) (00000001) Stateless verifications (out) (asm)4: 0 (ffffffff8a48cc10) (00000001) fw VM outbound (fw)5: 10 (ffffffff8a47eca0) (00000001) fw post VM outbound (post_vm)6: 18000000 (ffffffff89f28210) (00000001) fw record data outbound7: 7f700000 (ffffffff89c8b2f0) (00000001) TCP streaming post VM (cpas)8: 7f800000 (ffffffff8a32eb30) (ffffffff) IP Options Restore (out) (ipopt_res)9: 7f900000 (0000000000000000) (00000000) SecureXL outbound (sxl_out)10: 7fa00000 (0000000000000000) (00000000) SecureXL deliver (sxl_deliver)monitor: monitoring (control-C to stop)********** outside traffic:[vs_0][fw_2] bond2.654:i2 (IP Options Strip (in))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:i3 (Stateless verifications (in))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:i4 (fw multik misc proto forwarding)[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:i5 (fw early SIP NAT)[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:i6 (fw VM inbound )[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I7 (fw SCV inbound)[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I8 (fw offload inbound)[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I9 (fw post VM inbound )[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I10 (passive streaming (in))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I11 (TCP streaming (in))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I12 (IP Options Restore (in))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I13 (Cluster Late Correction)[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond2.654:I14 (Chain End)[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond1.509:o0 (IP Options Strip (out))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond1.509:o1 (TCP streaming (out))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond1.509:o2 (passive streaming (out))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond1.509:o3 (Stateless verifications (out))[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203[vs_0][fw_2] bond1.509:o4 (fw VM outbound)[448]: 10.42.14.60 -> 10.7.8.4 (47) len=448 id=62203 *********************outside traffic was stopped in 04 position inside traffic:[vs_0][fw_2] bond1.509:i2 (IP Options Strip (in))[441]: 10.7.8.4 -> 10.42.14.60 (47) len=441 id=958[vs_0][fw_2] bond1.509:i3 (Stateless verifications (in))[441]: 10.7.8.4 -> 10.42.14.60 (47) len=441 id=958[vs_0][fw_2] bond1.509:i4 (fw multik misc proto forwarding)[441]: 10.7.8.4 -> 10.42.14.60 (47) len=441 id=958[vs_0][fw_2] bond1.509:i5 (fw early SIP NAT)[441]: 10.7.8.4 -> 10.42.14.60 (47) len=441 id=958[vs_0][fw_2] bond1.509:i6 (fw VM inbound )[441]: 10.7.8.4 -> 10.42.14.60 (47) len=441 id=958[vs_0][fw_2] bond2.654:i2 (IP Options Strip (in))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:i3 (Stateless verifications (in))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:i4 (fw multik misc proto forwarding)[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:i5 (fw early SIP NAT)[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:i6 (fw VM inbound )[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I7 (fw SCV inbound)[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I8 (fw offload inbound)[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I9 (fw post VM inbound )[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I10 (passive streaming (in))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I11 (TCP streaming (in))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I12 (IP Options Restore (in))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I13 (Cluster Late Correction)[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond2.654:I14 (Chain End)[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond1.509:o0 (IP Options Strip (out))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond1.509:o1 (TCP streaming (out))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond1.509:o2 (passive streaming (out))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond1.509:o3 (Stateless verifications (out))[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204[vs_0][fw_2] bond1.509:o4 (fw VM outbound)[444]: 10.42.14.60 -> 10.7.8.4 (47) len=444 id=62204 Many thanks,Norbert
geccles
geccles inside Access Control Products 2 weeks ago
views 306 4

Site to Site VPN packets getting dropped after PREIN, not logged in POSTIN

I have configured a Site to Site VPN, the tunnels come up fine and "fw monitor" shows the tunneled packets in teh PREIN (i) stage but they don't show in POSTIN (I) stage.I have added rules to accept and log packets from the host on the far end of the VPN. There are no logs at all about the packets being dropped but they clearly don't make it from PREIN to POSTIN.Sample output from "fw monitor"[vs_0][fw_0] WAN:i[1253]: 152.188.27.7 -> 4.15.65.121 (UDP) len=1253 id=26360UDP: 5060 -> 5060[vs_0][fw_0] WAN:i[1253]: 152.188.27.7 -> 4.15.65.121 (UDP) len=1253 id=54361UDP: 5060 -> 5060[vs_0][fw_0] WAN:i[1253]: 152.188.27.7 -> 4.15.65.121 (UDP) len=1253 id=39253UDP: 5060 -> 5060The following filter is being used:fw monitor -m iIoO -e 'accept host(4.15.65.121) or host(152.188.27.7);'
Networker_Netwo
Networker_Netwo inside Access Control Products 2 weeks ago
views 134 4

VoIP SIP call is established, but user hears audio only in one way(after upgraded R80.20)

Hello Guyswe upgraded gateway from 80.10 to 80.20. And we have some problems.one of them: - we were using voip software to call the colleague on mobile access vpn. but now user hears audio only in one way after upgraded. before everything was working properly.i attached some logs screen which i saw.Note: i tried client-to-server and server-to-client but not resolved. -another of them:when we activated securexl, Many users are waiting too much to access or can not access.when we deactivated securexl, everything is ok. Thanks
lucascaetano9
lucascaetano9 inside Access Control Products 3 weeks ago
views 1254 5 1

Checkpoint device does not establish VPN tunnel

Hello all, I am getting issues when trying to configure VPN tunnels in my R77.20. I have tried to connect to ASA, FORTINET and Pfsense as well. As I dont know to much regarding the log of this kind of feature, I would like your help on some advice about this. Are there some directory or folder that I can see evidences or issue of the connection? Obs: I dont have a blade license to check in monitor and another tools in smartcenter.
Sean_Van_Loon
Sean_Van_Loon inside Access Control Products 3 weeks ago
views 465 5

Identity Awareness Agent packaging

Hi all, I'm trying to create a custom MSI file for a client, where we can do a silent install without any interaction required from the user itself.However, when trying to run the MSI with silent installation, the package still gives a message that no server is configured. When I click "ok" - the IA agent directly connects and authenticates and status is OK.Does anybody know how to get rid of this message? (see below my configuration). ConfigurationFollowed the instructions of Identity Awareness R80.10 Administration Guide on Autodiscovery DNS.Nslookup for verification:C:\Users\sean>nslookup -type=SRV CHECKPOINT_NAC_SERVER._tcp.mycompany Server: dc13.mycompany Address: x.x.x.x CHECKPOINT_NAC_SERVER._tcp.mycompany SRV service location: priority = 0 weight = 0 port = 443 svr hostname = cpia.mycompany cpia.mycompany internet address = y.y.y.y The certificate on the gateway has been replaced my a certificate of the company itself. I've downloaded the most recent Identity Awareness Agent (Full - EXE + MSI) from: sk134312Installed the EXE as a Full client with the MAD service and auto-discovery.Trusted the gateway - status is authenticated (so OK). Next, ran the IAConfigTool.exe with the following settings: And used the created MSI to install on a fresh computer (with administrative privilege).Installation done with: CMD.exe (run as admin):msiexec.exe /i "Check_Point_Identity_Agent.msi" /quietBut I still get the message. Does anybody know a solution?Would the " remote registry option" be the solution? Thanks! Sean
BSBhatia
BSBhatia inside Access Control Products 3 weeks ago
views 87 4

Site-To-Site connectivity and application access

HiAfter migration to checkpoint firewall 5900 (R80.10) at two geographically separated sites, network access from one site to another does not work, when the tunnel terminating on the edge routers of the two sites is in place. But as soon as the tunnel is removed between the two edge routers network access is enabled and applications across the sites become accessible.Kindly help to fix the issue.ThanksBS Bhatia