CP R81 Gaia AdminGuide
CP R81 Gaia AdminGuide
CP R81 Gaia AdminGuide
GAIA
R81
Administration Guide
[Classification: Protected]
Check Point Copyright Notice
© 2020 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed
under licensing restricting their use, copying, distribution, and decompilation. No part of this product or
related documentation may be reproduced in any form or by any means without prior written authorization
of Check Point. While every precaution has been taken in the preparation of this book, Check Point
assumes no responsibility for errors or omissions. This publication and features described herein are
subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
Gaia R81 Administration Guide
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the
latest functional improvements, stability fixes, security enhancements and protection
against new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
Table of Contents
Glossary 14
Gaia Overview 23
Introduction to the Gaia Portal 24
Gaia Portal Overview 24
Working with the Configuration Lock 30
Using the Gaia Portal Interface Elements 31
Toolbar Accessories 31
Search Tool 31
Navigation Tree 31
Status Bar 31
Configuration Tab 32
Monitoring Tab 32
Unsupported Characters and Words 32
System Information Overview 33
Showing System Overview Information in Gaia Portal 33
Showing System Overview Information in Gaia Clish 35
Introduction to the Command Line Interface 37
Command Completion 38
Commands and Features 40
Command History 42
Command Line Movement and Editing 44
Configuration Locks 45
Environment Commands 47
Client Environment Output Format 49
Expert Mode 51
User Defined (Extended) Commands 53
Summary of Gaia Clish Commands 55
Configuring Gaia for the First Time 57
Running the First Time Configuration Wizard in Gaia Portal 58
Running the First Time Configuration Wizard in CLI Expert mode 68
Glossary
A
Administrator
A user with permissions to manage Check Point security products and the network
environment.
API
In computer programming, an application programming interface (API) is a set of
subroutine definitions, protocols, and tools for building application software. In general
terms, it is a set of clearly defined methods of communication between various software
components.
Appliance
A physical computer manufactured and distributed by Check Point.
Bond
A virtual interface that contains (enslaves) two or more physical interfaces for
redundancy and load sharing. The physical interfaces share one IP address and one
MAC address. See "Link Aggregation".
Bonding
See "Link Aggregation".
Bridge Mode
A Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
CA
Certificate Authority. Issues certificates to gateways, users, or computers, to identify
itself to connecting entities with Distinguished Name, public key, and sometimes IP
address. After certificate validation, entities can send encrypted data using the public
keys in the certificates.
Certificate
An electronic document that uses a digital signature to bind a cryptographic public key
to a specific identity. The identity can be an individual, organization, or software entity.
The certificate is used to authenticate one identity to another.
CGNAT
Carrier Grade NAT. Extending the traditional Hide NAT solution, CGNAT uses
improved port allocation techniques and a more efficient method for logging. A CGNAT
rule defines a range of original source IP addresses and a range of translated IP
addresses. Each IP address in the original range is automatically allocated a range of
translated source ports, based on the number of original IP addresses and the size of
the translated range. CGNAT port allocation is Stateless and is performed during policy
installation. See sk120296.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
A Security Gateway that is part of a cluster.
CoreXL
A performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to
stick to a particular FWK daemon is done at the first packet of connection on a very high
level, before anything else. Depending on the SecureXL settings, and in most of the
cases, the SecureXL can be offloading decryption calculations. However, in some other
cases, such as with Route-Based VPN, it is done by FWK daemon.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you
can automatically update Check Point products for the Gaia OS, and the Gaia OS itself.
For details, see sk92449.
DAIP Gateway
A Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway where the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
A classification of data. The Firewall classifies incoming and outgoing traffic according
to Data Types, and enforces the Policy accordingly.
Database
The Check Point database includes all objects, including network objects, users,
services, servers, and protection profiles.
Distributed Deployment
The Check Point Security Gateway and Security Management Server products are
deployed on different computers.
Domain
A network or a collection of networks related to an entity, such as a company, business
unit or geographical location.
Expert Mode
The name of the full command line shell that gives full system root permissions in the
Check Point Gaia operating system.
External Network
Computers and networks that are outside of the protected network.
External Users
Users defined on external servers. External users are not defined in the Security
Management Server database or on an LDAP server. External user profiles tell the
system how to identify and authenticate externally defined users.
Firewall
The software and hardware that protects a computer network by analyzing the incoming
and outgoing network traffic (packets).
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restrictive shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for Check Point Gaia operating system.
Hotfix
A piece of software installed on top of the current software in order to fix some wrong or
undesired behavior.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPv4
Internet Protocol Version 4 (see RFC 791). A 32-bit number - 4 sets of numbers, each
set can be from 0 - 255. For example, 192.168.2.1.
IPv6
Internet Protocol Version 6 (see RFC 2460 and RFC 3513). 128-bit number - 8 sets of
hexadecimal numbers, each set can be from 0 - ffff. For example,
FEDC:BA98:7654:3210:FEDC:BA98:7654:3210.
Link Aggregation
Technology that joins (aggregates) multiple physical interfaces together into one virtual
interface, known as a bond interface. Also known as Interface Bonding, or Interface
Teaming. This increases throughput beyond what a single connection could sustain,
and to provides redundancy in case one of the links should fail.
Log
A record of an action that is done by a Software Blade.
Log Server
A dedicated Check Point computer that runs Check Point software to store and process
logs in Security Management Server or Multi-Domain Security Management
environment.
Management Interface
Interface on Gaia computer, through which users connect to Portal or CLI. Interface on a
Gaia Security Gateway or Cluster member, through which Management Server
connects to the Security Gateway or Cluster member.
Management Server
A Check Point Security Management Server or a Multi-Domain Server.
Multi-Domain Server
A computer that runs Check Point software to host virtual Security Management Servers
called Domain Management Servers. Acronym: MDS.
Network Object
Logical representation of every part of corporate topology (physical machine, software
component, IP Address range, service, and so on).
Open Server
A physical computer manufactured and distributed by a company, other than Check
Point.
Rule
A set of traffic parameters and other conditions in a Rule Base that cause specified
actions to be taken for a communication session.
Rule Base
Also Rulebase. All rules configured in a given Security Policy.
SecureXL
Check Point product that accelerates IPv4 and IPv6 traffic. Installed on Security
Gateways for significant performance improvements.
Security Gateway
A computer that runs Check Point software to inspect traffic and enforces Security
Policies for connected network resources.
Security Policy
A collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over
SSL, for secure communication. This authentication is based on the certificates issued
by the ICA on a Check Point Management Server.
Single Sign-On
A property of access control of multiple related, yet independent, software systems. With
this property, a user logs in with a single ID and password to gain access to a
connected system or systems without using different usernames or passwords, or in
some configurations seamlessly sign on at each system. This is typically accomplished
using the Lightweight Directory Access Protocol (LDAP) and stored LDAP databases
on (directory) servers. Acronym: SSO.
SmartConsole
A Check Point GUI application used to manage Security Policies, monitor products and
events, install updates, provision new devices and appliances, and manage a multi-
domain environment and each domain.
SmartDashboard
A legacy Check Point GUI client used to create and manage the security settings in
R77.30 and lower versions.
SmartUpdate
A legacy Check Point GUI client used to manage licenses and contracts.
Software Blade
A software blade is a security solution based on specific business needs. Each blade is
independent, modular and centrally managed. To extend security, additional blades can
be quickly added.
SSO
See "Single Sign-On".
Standalone
A Check Point computer, on which both the Security Gateway and Security
Management Server products are installed and configured.
Traffic
Flow of data between network devices.
Users
Personnel authorized to use network resources and applications.
VLAN
Virtual Local Area Network. Open servers or appliances connected to a virtual network,
which are not physically connected to the same network.
VLAN Trunk
A connection between two switches that contains multiple VLANs.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a
computer or cluster with virtual abstractions of Check Point Security Gateways and
other network devices. These Virtual Devices provide the same functionality as their
physical counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that
provide the functionality of physical network devices. It holds at least one Virtual
System, which is called VS0.
Gaia Overview
Gaia is the Check Point next generation operating system for security applications. In Greek mythology,
Gaia is the mother of all, which represents closely integrated parts to form one efficient system. The Gaia
Operating System supports the full portfolio of Check Point Software Blades, Gateway and Security
Management products.
Gaia is a unified security Operating System that combines the best of Check Point original operating
systems, and IPSO, the operating system from appliance security products. Gaia is available for all Check
Point Security Appliances and Open Servers.
Designed from the ground up for modern high-end deployments, Gaia includes support for:
n IPv4 and IPv6 - fully integrated into the Operating System.
n High Connection and Virtual Systems Capacity - 64-bit Linux kernel support.
n Load Sharing - ClusterXL and Interface bonding.
n High Availability - ClusterXL, VRRP, Interface bonding.
n Dynamic and Multicast Routing - BGP, OSPF, RIP, and PIM-SM, PIM-DM, IGMP.
n Easy to use Command Line Interface - Commands are structured with the same syntactic rules.
An enhanced help system and auto-completion simplifies user operation.
n Role-Based Administration - Lets Gaia administrators create different roles. Administrators can let
users define access to features in the users' role definitions. Each role can include a combination of
administrative (read/write) access to some features, monitoring (read-only) access to other
features, and no access to other features.
Gaia CPUSE:
n Get updates for licensed Check Point products directly through the operating system.
n Download and install the updates more quickly. Download automatically, manually, or periodically.
Install manually or periodically.
n Get email notifications for newly available updates and for downloads and installations.
n Easy rollback from new update.
Gaia API:
See sk143612 and Gaia API Reference.
n Browser Support - Microsoft Edge, Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, and
Apple Safari.
n Powerful Search Engine - Makes it easy to find features or functionality to configure.
n Easy Operation - Two operating modes:
l Simplified mode, which shows only basic configuration options.
l Advanced mode, which shows all configuration options.
You can easily change these modes.
n Web-Based Access to Command Line - Clientless access to the Gaia Clish directly from your web
browser.
Item Description
1 Navigation tree
2 Toolbar
3 Status bar
5 Search tool
Note - The browser Back button is not supported. Do not use it.
Step Description
Important:
Important:
n When you enable the Endpoint Policy Management Software Blade on a Security
Management Server, the SSL connection port to these services automatically changes from
the default TCP port 443 to the TCP port 4434:
l Gaia Portal
l Management API Web Services (see Check Point Management API Reference)
n When you disable the Endpoint Policy Management Software Blade on a Security
Management Server, the SSL connection port automatically changes back to the default TCP
port 443.
n A Security Management Server listens to SSL traffic for all services on the TCP port 443 in
these cases:
l If you performed a clean installation of a Security Management Server R81 and
enabled the Endpoint Policy Management Software Blade.
l If you upgraded a Security Management Server with disabled Endpoint Policy
Management Software Blade to R81 and enabled this Software Blade after the
upgrade.
In these cases, when Endpoint Security SSL traffic arrives at the TCP port 443, the Security
Management Server automatically redirects it (internally) to the TCP port 4434.
n If you upgraded a Security Management Server with enabled Endpoint Policy Management
Software Blade to R81, then the SSL port configuration remains as it was in the previous
version, from which you upgraded:
l A Security Management Server listens to Endpoint Security SSL traffic on the TCP port
443
l A Security Management Server listens to SSL traffic for all other services on the TCP
port 4434:
In R81 and higher, an administrator can manually configure different TCP ports for the Gaia
Portal (and other services) and Endpoint Security - 443 or 4434. For the applicable
procedures, see the R81 Endpoint Security Server Administration Guide > Chapter Endpoint
Security Architecture > Section Connection Port to Services on an Endpoint Security
Management Server.
Make sure that you always log out from the Gaia Portal (in the top right corner) before you close the web
browser. This is because the configuration lock stays in effect even when you close the web browser or
terminal window. The lock remains in effect until a different user removes the lock, or the defined
inactivity time-out period expires (default is 10 minutes).
n Click the Configuration lock (above the toolbar). The pencil icon (Read/Write enabled)
replaces the lock.
n If you use a configuration settings page, click the Click here to obtain lock link. You can see this
link if a different user overrides your configuration lock.
Note - Only users with Read/Write access privileges can override a configuration lock.
Toolbar Accessories
You can use these toolbar icons to do these tasks
Item Description
Opens the Scratch Pad accessory for writing notes or for quick copy and paste operations.
Available in the Read/Write mode only.
Search Tool
You can use the search bar to find an applicable configuration page by entering a keyword. The keyword
can be a feature, a configuration parameter or a word that is related to a configuration page.
The search shows a list of pages related to the entered keyword. To go to a page, click a link in the list.
Navigation Tree
The navigation three lets you select a page. Pages are arranged in logical feature groups. You can show
the navigation tree in one of these view modes:
Mode Description
To change the navigation tree mode, click View Mode and select a mode from the list.
Status Bar
The status bar, located at the bottom of the window, shows the result of the last configuration operation.
To see a history of the configuration operations during the current session, click the Expand icon.
Configuration Tab
The Configuration tab lets you see and configure parameters for Gaia features and settings groups. The
parameters are organized into functional settings groups in the navigation tree. You must have Read/Write
permissions for a settings group to configure its parameters.
Monitoring Tab
The Monitoring tab lets you see status and detailed operational statistics, in real time, for some routing
and high availability settings groups. This information is useful for monitoring dynamic routing and VRRP
cluster performance.
To see the Monitoring tab, select a routing or high availability feature settings group and then click the
Monitoring tab. For some settings groups, you can select different types of information from a menu.
Unsupported Characters
Character Description
& Ampersand
; Semi-colon
Unsupported Words
n after
n apply
n catch
n eval
n subset
This chapter shows you how to see system information in the Gaia Portal and Gaia Clish.
Widgets
Widget Description
Step Description
Step Description
Description
Shows how long the Gaia system is up and running.
Syntax
show uptime
Description
Shows the name and versions of the Gaia OS components.
Syntax
n To show the full system version information:
show version os
build
edition
kernel
Parameters
Parameter Description
Step Description
save config
Command Completion
You can automatically complete a command.
This saves time, and can help if you are not sure what to type next.
<SPACE><TAB> Show the arguments that the command for that feature accepts.
Example:
HostName> set interface<SPACE><TAB>
eth0 eth1 lo
HostName> set interface
Other
Description
operations
save Saves the configuration changes made since the last save operation.
start Starts a transaction. Puts the Gaia Clish into transaction mode. All changes made using
commands in transaction mode are either applied at once, or none of the changes is
applied, based on the way transaction mode is terminated.
expert Enters the Expert shell. Allows low-level access to the system, including the file system.
help Shows help on navigating the Gaia Clish and some useful commands.
show commands
Command History
You can recall commands you have used before, even in previous sessions.
Command Description
!nn Run a specific previous command: the nn command in the commands history
list.
!str Run the most recent command that starts with str.
Command Reuse
You can combine word designators with history commands to refer to specific words used in previous
commands.
Words are numbered from the beginning of the line with the first word being denoted by 0 (digit zero).
Use a colon (:) to separate a history command from a word designator.
For example, you could enter !!:1 to refer to the first argument in the previous command.
In the command "show interfaces", the interfaces is word 1.
Immediately after word designators, you can add a sequence of one or more of these modifiers, each
preceded by a colon:
Modifier Meaning
s/str1/str2 Replace str1 with str2 in the first occurrence of the word, to which you refer.
Ctrl Alt H Delete the previous word (to the left of the cursor).
Ctrl Shift - Repeat the previous word (from the left of the cursor).
Ctrl B Move to the previous character (to the right of the cursor).
Ctrl F Move to the next character (to the right of the cursor).
Ctrl H Delete the previous character (to the left of the cursor).
Ctrl L Clear the screen and show the current line at the top of the screen.
Configuration Locks
Only one user can have Read/Write access to Gaia configuration database at a time. All other users can
log in with Read-Only access to see configuration settings, as specified by their assigned roles (see
"Roles" on page 314).
When you log in and no other user has Read/Write access, you get an exclusive configuration lock with
Read/Write access. If a different user already has the configuration lock, you have the option to override
their lock. If you:
n Override the lock. The other user stays logged in with Read-Only access.
n Do not override the lock. You cannot modify the settings.
Description
Use the "lock database override" and "unlock database" commands to get exclusive
read-write access to the Gaia database by taking write privileges away from other administrators
logged into the system.
Syntax
unlock database
Comments
n Use these commands with caution.
The administrator, whose write access is revoked, does not receive a notification.
n The "lock database override" command is identical to the "set config-lock on
override" command.
n The "unlock database" command is identical to the "set config-lock off" command.
Description
Configures and shows the state of the configuration lock on Gaia configuration database.
Syntax
set config-lock
off
on [timeout <5-900>] override
show
config-lock
config-state
Parameters
Parameter Description
Comments
n The "set config-lock on override" command is identical to the "lock database
override" command.
n The "set config-lock off" command is identical to the "unlock database" command.
Environment Commands
Description
Use these commands to set the Gaia Clish environment for a user for a particular session, or permanently.
Syntax
Parameters
Parameter Description
Parameter Description
echo-cmd {on | If set to on, echoes all commands before executing them, when the
off} command execution is done through the "load configuration"
command.
The default is off.
Pretty
Structured
XML
Expert Mode
The default Gaia shell is called clish.
Gaia Clish is a restrictive shell (role-based administration controls the number of commands available in
the shell).
While the use of Gaia Clish is encouraged for security reasons, Gaia Clish does not give access to low level
system functions.
For low-level configuration, use the more permissive Expert mode shell. In addition, see sk144112.
n To enter the Expert shell, run: expert
n To exit from the Expert shell and return to Gaia Clish, run: exit
Description
The Expert mode password protects the Expert shell against authorized access.
Use these commands to set the Expert password by plain text or MD5 salted hash.
Use the MD5 salted hash option when upgrading or restoring using backup scripts.
Syntax
set expert-password
Important - You must run the "save config" command to set the new Expert mode
password permanently.
Parameters
Parameter Description
hash <Hash String> The password as an MD5 salted hash instead of plain text.
Use this option when you upgrade or restore using backup scripts.
Example
gaia> set expert-password
Enter current expert password: *******
Enter new expert password: *****
Enter new expert password (again): *****
Password is only 5 characters long; it must be at least 6 characters
in length.
Enter new expert password: ******
Enter new expert password (again): ******
Password is not complex enough; try mixing more different kinds of
characters (upper case, lower case, digits, and punctuation).
Enter new expert password: *******
Enter new expert password (again): *******
Syntax
Parameters
Parameter Description
Example
To add the free command to the systemDiagnosis role and assign that role to the user john:
Step Description
Step Description
Step Description
3 Type:
show
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Description
3 Type:
add
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Description
3 Type:
set
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Description
3 Type:
delete
4 Press the <SPACE> key and then the <TAB> key on the keyboard.
Step Instructions
2 On your connected computer, configure a static IPv4 address in the same subnet as the IPv4
address you configured during the Gaia installation.
3 On your connected computer, in a web browser, connect to the IPv4 address you configured
during the Gaia installation:
https://<IP address of Gaia Management Interface>
5 Click Login.
The Check Point First Time Configuration Wizard opens.
Below you can find the description of the First Time Configuration Wizard windows and their fields.
Setup Continue with R81 Use this option to configure the installed Gaia and Check
configuration Point products.
Install Install from Check Point Use these options to install a Gaia version.
Cloud
Install from USB device
Recovery Import existing snapshot Use this option to import an existing Gaia snapshot.
If in the Deployment Options window, you selected Install from Check Point Cloud, the First Time
Configuration Wizard asks you to configure the connection to Check Point Cloud. These options appear
(applies only to Check Point appliances that you configured as a Security Gateway):
n Install major version - This option let you choose and install major versions available on Check
Point Cloud. The Gaia CPUSE performs the installation.
n Pull appliance configuration - This option lets you to apply initial deployment configuration
including different OS version on the appliance. You must prepare the initial deployment
configuration with the Zero Touch Cloud Service. For more information, see sk116375.
In this window, you select and configure the main Gaia Management Interface. You connect to this IP
address to open the Gaia Portal or CLI session.
Field Description
Interface By default, First Time Configuration Wizard selects the interface you configured during
the Gaia installation (for example, eth0).
Note - After you complete the First Time Configuration Wizard and reboot,
you can select another interface as the main Gaia Management Interface
and configure its IP settings.
Configure Select how the Gaia Management Interface gets its IPv4 address:
IPv4
n Manually - You configure the IPv4 settings in the next fields.
n Off - None.
Configure Select how the Gaia Management Interface gets its IPv6 address:
IPv6
n Manually - You configure the IPv6 settings in the next fields.
n Off - None.
Optional: In this window, you configure the interface that connects the Gaia computer to the Internet.
Configure IPv4 Select how the applicable interface gets its IPv4 address:
n Manually - You configure the IPv4 settings in the next fields.
n Off - None.
Configure IPv6 Optional. Select how the applicable interface gets its IPv6 address:
n Manually - You configure the IPv6 settings in the next fields.
n Off - None.
In this window, you configure the Host name, the DNS servers and the Proxy server on the Gaia
computer.
Field Description
Primary DNS Server Enter the applicable IPv4 address of the primary DNS server.
Secondary DNS Optional: Enter the applicable IPv4 address of the secondary DNS server.
Server
Tertiary DNS Server Optional: Enter the applicable IPv4 address of the tertiary DNS server.
Use a Proxy server Optional: Select this option to configure the applicable Proxy server.
Address Enter the applicable IPv4 address or resolvable hostname of the Proxy
server.
In this window, you configure the date and time settings on the Gaia computer.
Field Description
Set the time manually Select this option to configure the date and time settings manually.
Use Network Time Select this option to configure the date and time settings automatically
Protocol (NTP) with NTP.
Primary NTP server Enter the applicable IPv4 address or resolvable hostname of the
primary NTP server.
Version Select the version of the NTP for the primary NTP server.
Secondary NTP server Optional: Enter the applicable IPv4 address or resolvable hostname of
the secondary NTP server.
Version Select the version of the NTP for the secondary NTP server.
In this window, you select which type of Check Point products you wish to install on the Gaia computer.
Field Description
Products window
In this window, you continue to select which type of Check Point products you wish to install on the Gaia
computer.
n If in the Installation Type window, you selected Security Gateway and/or Security
Management, these options appear:
Field Description
l A Cluster Member.
l A Standalone.
Availability.
l An Endpoint Security Management Server.
l CloudGuard Controller.
l A Standalone.
Unit is a part of a This option is available only if you selected Security Gateway .
cluster Select this option to install a cluster of dedicated Security Gateways,
or a Full High Availability Cluster.
Select the cluster type:
l ClusterXL - For a cluster of dedicated Security Gateways, or
l CloudGuard Controller.
Availability.
Select Log Server / SmartEvent only to install:
l A dedicated single Log Server.
n If in the Installation Type window, you selected Multi-Domain Server, these options appear:
Field Description
Field Description
Multi-Domain Log Select this option to install a dedicated single Multi-Domain Log
Server Server.
In this window, you select if this Security Gateway gets its IP address dynamically (DAIP gateway).
Field Description
Yes Select this option, if this Security Gateway gets its IP address dynamically (DAIP gateway).
No Select this option, if you wish to configure this Security Gateway with a static IP address.
In this window, you configure a one-time Activation Key. You must enter this key later in SmartConsole
when you create the corresponding object and initialize SIC.
Field Description
Activation Key Enter one-time activation key (between 4 and 127 characters long).
Confirm Activation Key Enter the same one-time activation key again.
In this window, you configure the main administrator for this Security Management Server.
Use Gaia Select this option, if you wish to use the default Gaia administrator
administrator: admin (admin).
Define a new Select this option, if you wish to configure an administrator username
administrator and password manually.
In this window, you configure which computers are allowed to connect with SmartConsole to this
Security Management Server.
Field Description
This machine Select this option to allow only a specific computer to connect.
By default, the First Time Configuration Wizard uses the IPv4 address of
your computer.
You can change it to another IP address.
Network Select this option to allow an entire IPv4 subnet of computers to connect.
Enter the applicable subnet IPv4 address and subnet mask.
Range of IPv4 Select this option to allow a specific range of IPv4 addresses to connect.
addresses Enter the applicable start and end IPv4 addresses.
In this window, you select the main Leading VIP Interface on this Multi-Domain Server.
Field Description
In this window, you configure which computers are allowed to connect with SmartConsole to this Multi-
Domain Server.
Field Description
In this window, you can see the installation options you selected.
The Improve product experience section:
n By default, the option Send data to Check Point is enabled. For information about this option,
see sk111080.
n By default, the option Send crash data to Check Point that might contain personal data is
disabled.
If you enable this option, Gaia operating system uploads the detected core dump files to Check
Point Cloud.
This lets Check Point R&D analyze the crashes and issue fixes for them.
Notes:
n At the end of the First Time Configuration Wizard, the Gaia computer reboots and the
initialization process is performed in the background for several minutes.
n If you installed the Gaia computer as a Security Management Server or Multi-Domain Server,
only read-only access is possible with SmartConsole during this initialization time.
n To make sure the configuration is finished:
1. Connect to the command line on the Gaia computer.
2. Log in to the Expert mode.
3. Check that the bottom section of the /var/log/ftw_install.log file contains one of
these sentences:
l installation succeeded
l FTW: Complete
Run:
Example outputs:
l From a Security Gateway or Cluster Member:
Notes:
n The config_system utility is not an interactive configuration tool. It helps
automate the first time configuration process.
n The config_system utility is only for the first time configuration, and not for
ongoing system configurations.
Syntax
n To list the command options, run one of these:
Form Command
n To run the First Time Configuration Wizard from a specified configuration file, run one of these:
Form Command
n To run the First Time Configuration Wizard from a specified configuration string, run one of these:
Form Command
n To create a First Time Configuration Wizard Configuration file template in a specified path, run one
of these:
Form Command
config_system --dry-run
Form Command
St
Description
ep
Step Description
If you do not have a configuration file, you can create a configuration template and fill in the parameter
values as necessary.
Before you run the First Time Configuration Wizard, you can validate the configuration file you created.
Step Description
Parameters
A configuration file contains the <parameter>=<value> pairs described in the table below.
Note - The config_system parameters can change from Gaia version to Gaia
version. Run the "config_system --help" command to see the available
parameters.
Table: The 'config_system' parameters
Parameter Description Valid values
upload_ Uploads data that helps Check Point provide you n true
info with optimal services, if its value is set to "true". n false
For more information, see sk94509.
mgmt_gui_ Specifies the first address of the range, if the value Single IPv4 address of a host.
clients_ of the "mgmt_gui_clients_radio" parameter Example:
first_ip_ is set to "range". 192.168.0.10
field
mgmt_gui_ Specifies the last address of the range, if the value Single IPv4 address of a host.
clients_ of the "mgmt_gui_clients_radio" parameter Example:
last_ip_ is set to "range". 192.168.0.20
field
mgmt_gui_ Specifies the network address, if the value of the IPv4 address of a network.
clients_ "mgmt_gui_clients_radio" parameter is set Example:
ip_field to "network". 192.168.0.0
mgmt_gui_ Specifies the netmask, if the value of the "mgmt_ A number from 1 to 32.
clients_ gui_clients_radio" parameter is set to
subnet_ "network".
field
mgmt_gui_ Specifies the netmask, if value of the "mgmt_gui_ Single IPv4 address of a host.
clients_ clients_radio" parameter is set to "this". Example:
hostname 192.168.0.15
ipaddr_v4 Configures the IPv4 address of the management Single IPv4 address.
interface.
masklen_v4 Configures the IPv4 mask length for the A number from 0 to 32.
management interface.
default_ Specifies IPv4 address of the default gateway. Single IPv4 address.
gw_v4
ipstat_v6 Turns static IPv6 configuration on, if its value is set n manually
to "manually". n off
ipaddr_v6 Configures the IPv6 address of the management Single IPv6 address.
interface.
masklen_v6 Configures the IPv6 mask length for the A number from 0 to 128.
management interface.
default_ Specifies IPv6 address of the default gateway. Single IPv6 address.
gw_v6
hostname Configures the name of the local host (optional). A string of alphanumeric
characters.
domainname Configures the domain name (optional). Fully qualified domain name.
Example:
somedomain.com
proxy_ Configures the IP address of the proxy server IPv4 address, or Hostname.
address (optional).
proxy_port Configures the port number of the proxy server A number from 1 to 65535.
(optional).
Step Description
4 Click Run.
The output from the script shows in the Tasks tab > Results column.
Step Description
Note - The Select Script window does not support interactive or continuous
scripts. To run interactive or continuous scripts, open a command shell.
4 Click Run.
The output from the script shows in the Tasks tab > Results column.
n Placing the mouse in the Details column shows the output in a larger window.
n You can also right-click, and select View, or Copy to Clipboard.
To manage scripts
Step Description
Note - You can also run and manage scripts if you click Scripts in the Gateways view.
Step Description
1 In the Gateways & Servers view, right-click the Security Gateways or Security Management
Servers, on which you want to run scripts.
The output from the script shows in the Tasks tab at the bottom of the Gateways & Servers view.
Notes:
n The Scripts Repository window does not support interactive or continuous
scripts. To run interactive or continuous scripts, open a command shell.
n You can run the script on multiple Security Gateways or Security
Management Servers at the same time.
n For a cluster object, the script will run automatically on all cluster members.
Note - After you install the Security Gateway for the first time, you must publish the
SmartConsole session before you perform a system backup operation.
Step Description
1 In the Gateways & Servers view, right-click the Security Gateway object you want to back
up.
Note - The path to the backup directory must start and end with forward slash (/)
character. For example: /ftroot/backup/, or just / for the root directory of the
server.
The file name must be according to this convention:
backup_<Name of Security Gateway object>_<Date of Backup>.tgz
4 Click OK.
The status of the backup operation shows in Tasks .
5 When the task is complete, double-click the entry to see the file path and name of the backup
file.
Notes:
n This name is necessary to do a system restore.
n You can do backup on multiple Security Gateways at the same time.
n When you back up a cluster, the system does backup on all members.
Step Description
1 In the Gateways & Servers view, right-click the Security Gateway object you want to
restore.
4 Click OK.
a. Connectivity to the Security Gateway is lost.
b. The Security Gateway automatically reboots.
Step Description
Step Description
Note - For a cluster, select the cluster member, for which you want to
open the Gaia Portal.
Network Management
This chapter includes configuration procedures for:
n Interfaces (Physical, VLAN, Bond, Bridge, Loopback, VTI, Alias)
n ARP
n DHCP Server
n Hosts
n DNS
n Static Routes
n NetFlow Export
Network Interfaces
Gaia supports these network interface types:
n Ethernet physical interfaces
n Alias (Secondary IP addresses for different interface types. This is not supported in ClusterXL.)
n VLAN
n Bond
n Bridge
n Loopback
n 6in4 tunnel
n PPPoE
Note - When you add, delete or make changes to interface IP addresses, it is possible
that when you use the Get Topology option in SmartConsole in the Security Gateway
or Cluster object, the incorrect topology is shown. If this occurs, run the "cpstop" and
then the "cpstart" commands on the Security Gateway or Cluster Members.
Physical Interfaces
In This Section:
This section has configuration procedures and examples for defining different types of interfaces on a Gaia
platform.
Gaia automatically identifies physical interfaces (NICs) installed on the computer.
You cannot add or delete a physical interface in the Gaia Portal or Gaia Clish.
You cannot add, change or remove physical interface cards while the Gaia computer is running.
Step Description
Gaia automatically identifies the new or changed physical interfaces and assigns an interface name.
The physical interfaces show in the list in the Gaia Portal.
Note - There are settings that you can configure only in Gaia Clish.
Step Description
4 In the Comment field, enter the applicable comment text (up to 100 characters).
n Select Obtain IPv4 address automatically to get the IPv4 address from the DHCPv4
server.
n Enter the IPv4 address and subnet mask in the applicable fields.
n Select Obtain IPv6 address automatically to get the IPv6 address from the DHCPv6
server.
n Enter the IPv6 address and mask length in the applicable fields.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278). R81 does not support IPv6 Address on Gaia
Management Interface (Known Limitation 01622840).
n Select Auto Negotiation, or select a link speed and duplex setting from the list.
n In the Hardware Address field, enter the Hardware MAC address (if not automatically
received from the NIC).
Caution - Do not manually change the MAC address unless you are sure that it is
incorrect or has changed. An incorrect MAC address can lead to a communication
failure.
n In the MTU field, enter the applicable Maximum Transmission Unit (MTU) value
(minimal value is 68, maximal value is 16000, and default value is 1500).
n Select Monitor Mode, if needed.
For configuration procedure, see the R81 Installation and Upgrade Guide > Chapter
Special Scenarios for Security Gateways > Section Deploying a Security Gateway in
Monitor Mode.
8 Click OK.
Syntax
To configure an interface
set interface <Name of Physical Interface>
auto-negotiation {on | off}
comments "Text"
ipv4-address <IPv4 Address> {subnet-mask <Mask> | mask-length
<Mask Length>}
ipv6-address <IPv6 Address> mask-length <Mask Length>
ipv6-autoconfig {on | off}
link-speed {10M/half | 10M/full | 100M/half | 100M/full |
1000M/full | 10000M/full}
mac-addr <MAC Address>
monitor-mode {on | off}
mtu <68-16000 | 1280-16000>
rx-ringsize <0-4096>
state {on | off}
tx-ringsize <0-4096>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
subnet-mask <Mask> Configures the IPv4 subnet mask using dotted decimal
notation (X.X.X.X).
mask-length <Mask Length> Configures the IPv4 or IPv6 subnet mask length using the
CIDR notation (integer between 2 and 32).
ipv6-autoconfig {on | off} Configures if this interface gets an IPv6 address from a
DHCPv6 Server:
n on - Gets an IPv6 address from a DHCPv6 Server
n off - Does not get an IPv6 address from a DHCPv6
Server (you must assign it manually)
link-speed {10M/half | Configures the interface link speed and duplex status.
10M/full | 100M/half | Available speed and duplex combinations are:
100M/full | 1000M/full |
n 10M/half
1000M/full}
n 10M/full
n 100M/half
n 100M/full
n 1000M/full
n 10000M/full
Parameter Description
Default: off
For configuration procedure, see the R81 Installation and
Upgrade Guide > Chapter Special Scenarios for Security
Gateways > Section Deploying a Security Gateway in
Monitor Mode.
mtu <68-16000 | 1280- Configures the Maximum Transmission Unit size for an
16000> interface.
For IPv4:
n Range: 68 - 16000 bytes
n Default: 1500 bytes
For IPv6:
n Range: 1280 - 16000 bytes
n Default: 1500 bytes
Example
gaia> set interface eth2 ipv4-address 40.40.40.1 subnet-mask
255.255.255.0
gaia> set interface eth2 mtu 1400
gaia> set interface eth2 state on
gaia> set interface eth2 link-speed 100M/full
Aliases
In This Section:
This section shows you how to configure an alias in the Gaia Portal and Gaia Clish.
Interface aliases let you assign more than one IPv4 address to physical or virtual interfaces (Bonds,
Bridges, VLANs, and Loopbacks).
Notes:
n ClusterXL does not support aliases.
n You cannot change settings of an existing
interface alias.
Step Description
3 On the IPv4 tab, enter the IPv4 address and subnet mask.
4 On the Alias tab, select the applicable interface, to which this alias is assigned.
5 Click OK.
Note - The new alias interface name is automatically created by adding a sequence
number to the interface name. For example, the name of first alias added to eth1 is
eth1:1. The second alias added is eth1:2, and so on.
Step Description
Syntax
To add an alias
add interface <Name of Interface> alias <IPv4 Address>/<Mask Length>
To delete an alias
delete interface <Name of Interface> alias <Name of Alias Interface>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
<Name of Specifies the name of the interface, on which to create an alias IPv4
Interface> address
<Mask Length> Configures alias IPv4 subnet mask length using the CIDR notation (integer
between 2 and 32)
<Name of Alias Specifies the name of the alias interface in the format <IF>:XX, where XX
Interface> is the automatically assigned sequence number
Example
gaia> add interface eth1 alias 10.10.99.1/24
gaia> show interface eth1 aliases
gaia> delete interface eth1 alias eth1:2
VLAN Interfaces
In This Section:
This section shows you how to configure VLAN interfaces in the Gaia Portal and Gaia Clish.
You can configure virtual LAN (VLAN) interfaces on Ethernet interfaces.
VLAN interfaces let you configure subnets with a secure private link to Security Gateways and
Management Servers using your existing topology.
With VLAN interfaces, you can multiplex Ethernet traffic into many channels using one cable.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Notes:
n The name of a VLAN interface in Gaia is "<Name of Physical
Interface>.<VLAN ID>".
For example, the name of a VLAN interface with a VLAN ID of 5 on a physical
interface eth1 is "eth1.5".
n The VLAN tunnel is not secure, because it is not encrypted.
Step Description
2 Make sure that the physical interface, on which you add a VLAN interface, does not have an
IP address.
4 In the Add VLAN window, select the Enable option to set the VLAN interface to UP.
5 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 address automatically option.
6 Optional: On the IPv6 tab, enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 address automatically option.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278).
7 On the VLAN tab, enter or select a VLAN ID (VLAN tag) between 2 and 4094.
9 Click OK.
Step Description
4 Click OK.
Note - You cannot change the VLAN ID or physical interface for an existing VLAN
interface. To change these parameters, delete the VLAN interface and then create
a new VLAN interface.
Step Description
Important - Make sure that the physical interface, on which you wish to add a VLAN
interface, does not have an IP address.
Syntax
Note - You cannot change the VLAN ID or physical interface for an existing VLAN
interface. To change these parameters, delete the VLAN interface and then create
a new VLAN interface.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
<VLAN ID> Configures the ID of the VLAN interface (integer between 2 and 4094).
subnet-mask <Mask> Configures the IPv4 subnet mask using the dotted decimal notation
(X.X.X.X) - integer between 2 and 32..
mask-length <Mask Configures the IPv6 subnet mask length using CIDR notation (/xx) -
Length> integer between 1 and 128.
mtu <68-16000 | Configures the Maximum Transmission Unit size for an interface.
1280-16000> For IPv4:
n Range: 68 - 16000 bytes
n Default: 1500 bytes
For IPv6:
n Range: 1280 - 16000 bytes
n Default: 1500 bytes
Example
gaia> add interface vlan eth1
gaia> set interface eth1.99 ipv4-address 99.99.99.1 subnet-mask
255.255.255.0
gaia> set interface eth1.99 ipv6-address 209:99:1 mask-length 64
gaia> delete interface eth1 vlan 99
If you configure the switch ports in Access Mode, create the Bridge interface with two VLAN interfaces
as its slaves.
For VLAN translation, use different numbered VLAN interfaces to create the Bridge interface.
You can build multiple VLAN translation bridges on the same Security Gateway.
1. Configure two VLAN interfaces.
2. Create a Bridge interface and select the VLAN interfaces as its slaves (see "Bridge Interfaces" on
page 126).
Note - VLAN translation is not supported over bridged ports of a FONIC (Fail-Open
NIC, see sk85560).
Example topology:
Item Description
1 Security Gateway
2 Switch
Item Description
If you configure the switch ports as VLAN trunk, the Check Point Bridge interface should not interfere
with the VLANs.
To configure a Bridge interface with VLAN trunk, create the Bridge interface with two physical (non-
VLAN) interfaces as its slaves (see "Bridge Interfaces" on page 126).
The Security Gateway processes the tagged packet and does not remove VLAN tags from them.
The traffic passes with the original VLAN tag to its destination.
VXLAN Interfaces
In This Section:
This section shows you how to configure VXLAN interfaces in the Gaia Portal and Gaia Clish.
Virtual Extensible LAN (VXLAN) is a network virtualization technology that attempts to address the
scalability problems associated with large cloud computing deployments. VXLAN uses a VLAN-like
encapsulation technique to encapsulate OSI Layer 2 Ethernet frames within Layer 4 UDP datagrams. See
RFC 7348.
Notes:
n The name of a VXLAN interface in Gaia is "vxlan<VNI>".
For example, the name of a VXLAN interface with a VXLAN VNI of 5 is
"vxlan5".
n The VXLAN tunnel is not secure, because it is not encrypted.
Warning - By default, SecureXL does not accelerate traffic over a VXLAN tunnel.
n If you configure SecureXL to accelerate such traffic, the Firewall only inspects
the payload of VXLAN packets (it does not inspect the VXLAN data).
n To configure SecureXL to accelerate such traffic, set the value of the SecureXL
kernel parameter sim_enable_vxlan to 1 (one) in the
$PPKDIR/conf/simkern.conf file and reboot.
For more information, see the R81 Performance Tuning Administration Guide >
Chapter Working with Kernel Parameters on Security Gateway > Section
SecureXL Kernel Parameters.
Step Description
3 In the Add VXLAN window, select the Enable option to set the VXLAN interface to UP.
4 On the IPv4 tab, enter the local IPv4 address and subnet mask for the VXLAN interface.
You can optionally select the Obtain IPv4 Address automatically option.
Step Description
5 Optional: On the IPv6 tab, enter the local IPv6 address and mask length for the VXLAN
interface.
You can optionally select the Obtain IPv6 address automatically option.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278).
a. In the VXLAN VNI field, enter or select the VXLAN Network Identifier (or VXLAN
Segment ID) between 1 and 16,777,215.
b. In the Member Of field, select the physical interface related to this VXLAN.
c. In the Local Address field, enter the IPv4 address of the applicable local physical
interface.
d. In the Remote Address field, enter the IPv4 address of the applicable physical
interface on the remote VXLAN peer.
e. In the DST Port field, enter or select the destination UDP port number between 1 and
65535 (default is 4789 - see IANA Service Name and Port Number Registry).
7 Click OK.
Example
Local physical interface eth1 with IPv4 10.10.10.11 / 24 eth2 with IPv4 172.30.40.22 / 24
VXLAN VNI 33 33
Step Description
4 Click OK.
Note - You cannot change the VXLAN VNI, physical interface, local address, or
remote address for an existing VXLAN interface. To change these parameters,
delete the VXLAN interface and then create a new VXLAN interface.
Step Description
Important - Make sure that the physical interface, on which you wish to add a VLAN
interface, does not have an IP address.
Syntax
Note - You cannot change the VXLAN VNI, physical interface (dev), local address,
or remote address for an existing VXLAN interface. To change these parameters,
delete the VXLAN interface and then create a new VXLAN interface.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
CLI Parameters
Parameter Description
dstport <Destination UDP Specifies the destination UDP port number between 1 and
port> 65535 (default is 4789 - see IANA Service Name and Port
Number Registry).
local <IPv4 address of Specifies the IPv4 address of the applicable local physical
local physical interface> interface.
remote <IPv4 address of Specifies the IPv4 address of the applicable physical
physical interface on interface on the remote VXLAN peer.
remote peer>
Example
Local physical interface eth1 with IPv4 10.10.10.11 / 24 eth2 with IPv4 172.30.40.22 / 24
VXLAN VNI 33 33
Item Description
1 Security Gateway
1A Interface 1
1B Interface 2
2 Bond Interface
3 Router
A bond interface (also known as a bonding group or bond) is identified by its Bond ID (for example:
bond1) and is assigned an IP address. The physical interfaces included in the bond are called slaves and
do not have IP addresses.
You can configure a bond interface to use one of these functional strategies:
n High Availability (Active/Backup): Gives redundancy when there is an interface or a link failure.
This strategy also supports switch redundancy. Bond High Availability works in Active/Backup
mode - interface Active/Standby mode. When an Active slave interface is down, the connection
automatically fails over to the primary slave interface. If the primary slave interface is not available,
the connection fails over to a different slave interface.
n Load Sharing (Active/Active): All slave interfaces in the UP state are used simultaneously. Traffic is
distributed among the slave interfaces to maximize throughput. Bond Load Sharing does not
support switch redundancy.
You can configure Bond Load Sharing to use one of these modes:
l Round Robin - Selects the Active slave interfaces sequentially.
l 802.3ad (LACP) - Dynamically uses Active slave interfaces to share the traffic load. This
mode uses the LACP protocol, which fully monitors the interface link between the Check Point
Security Gateway and a switch.
l XOR - All slave interfaces in the UP state are Active for Load Sharing. Traffic is assigned to
Active slave interfaces based on the transmit hash policy: Layer 2 information (XOR of
hardware MAC addresses), or Layer 3+4 information (IP addresses and Ports).
For Bonding High Availability mode and for Bonding Load Sharing mode:
n The number of bond interfaces that can be defined is limited by the maximal number of interfaces
supported by each platform. See the R81 Release Notes.
n Up to 8 physical slave interfaces can be configured in a single bond interface.
Step Description
2 Make sure that the slave interfaces, which you wish to add to the Bond interface, do not have IP
addresses.
4 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 Address automatically option.
5 On the IPv6 tab (optional), enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 Address automatically option.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278).
a. Select or enter a Bond Group ID. This parameter is an integer between 0 and 1024.
b. Select the slave interfaces from the Available Interfaces list and then click Add.
Note - Make sure that the slave interfaces do not have any IP addresses or
aliases configured.
a. Configure the required MTU for your network (if not sure, leave the default value).
b. Configure the Monitor Interval - How much time to wait between checking each slave
interface for link-failure. The valid range is 1-5000 ms. The default is 100 ms.
c. Configure the Down Delay - How much time to wait, after sending a monitor request to a
slave interface, before bringing down the slave interface. The valid range is 1-5000 ms.
The default is 200 ms.
d. Configure the Up Delay - How much time to wait, after sending a monitor request to a
slave interface, before bringing up the slave interface. The valid range is 1-5000 ms. The
default is 200 ms.
Step Description
8 Additional configuration settings are available depending on the selected Bond Operation
Mode:
n If you selected the Round Robin bond operation mode, then there are no additional
configuration settings.
n If you selected the Active-Backup bond operation mode, then select the Primary
Interface.
By default, the first slave interface added to the bond group, becomes the primary.
Important - You must not configure the primary slave explicitly in ClusterXL
when you configure the Sync interface on a bonding group for redundancy. For
more information, see the R81 ClusterXL Administration Guide > Chapter
ClusterXL Requirements and Compatibility > Section Supported Topologies
for Synchronization Network.
n If you selected the XOR bond operation mode, then select the Transmit Hash Policy -
the algorithm for slave interface selection according to the specified TCP/IP Layer.
Select either Layer 2 (uses XOR of the physical interface MAC address), or Layer 3+4
(uses Layer 3 and Layer 4 protocol data).
n If you selected the 802.3ad bond operation mode, then perform these two steps:
a. Select the Transmit Hash Policy - the algorithm for slave interface selection
according to the specified TCP/IP Layer.
Select either Layer 2 (uses XOR of the physical interface MAC address), or Layer
3+4 (uses IP addresses and Ports).
b. Select the LACP Rate - how frequently the LACP partner should transmit
LACPDUs.
Select either Slow (every thirty seconds), or Fast (every one second).
9 Click OK.
Note - The name of a Bond interface in Gaia is "bond<Bond Group ID>". For
example, the name of a bond interface with a Bond Group ID of 5 is "bond5".
Step Description
1 Make sure that the physical slave interfaces do not have IP addresses.
6 Configure other bond parameters: primary interface, media monitoring, and delay rate.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Note - You configure an IP address on a Bonding Group in the same way as you do on
a physical interface (see "Physical Interfaces" on page 86).
Syntax
Syntax
Example
Note - Do not change the state of bond interface manually using the "set
interface <Bond ID> state" command. This is done automatically by the
bonding driver.
Syntax
Important - Make sure that the slave interfaces, which you wish to add to the
Bonding Group, do not have IP addresses.
Example
Syntax
Bond operating mode specifies how slave interfaces are used in a bond interface.
Syntax
Example
The Up-Delay specifies show much time in milliseconds to wait before enabling a slave after link
recovery was detected.
Syntax
Example
The Down-Delay specifies how much time in milliseconds to wait before disabling a slave after link
failure was detected
Syntax
Example
Syntax
Example
Note - You must delete all non-primary slave interfaces before you remove the
primary slave interface.
Syntax
Example
Syntax
Parameters
CLI Parameters
Parameter Description
<Name of Slave Specifies the name of the slave physical interface, which you
Interface> add to (or remove from) the bond group.
Make sure that the slave interfaces do not have any IP
addresses or aliases configured.
Parameter Description
mode <Mode> Configures the Bond operating mode (see "Bond Interfaces
(Link Aggregation)" on page 109):
n round-robin
Bond uses all slave interfaces sequentially (High
Availability + Load Sharing).
This is the default mode.
n active-backup
Bond uses one slave interface at a time (High Availability)
n xor
Bond uses slave interfaces based on a hash function
(High Availability + Load Sharing)
n 8023AD
Dynamic bonding according to IEEE 802.3ad - LACP
(Load Sharing)
primary <Name of Slave Specifies the name of the primary slave interface in the bond.
Interface> By default, the first slave interface added to the bond group,
becomes the primary.
Important - You must not configure the primary slave
explicitly in ClusterXL when you configure the Sync
interface on a bonding group for redundancy. For
more information, see the R81 ClusterXL
Administration Guide > Chapter ClusterXL
Requirements and Compatibility > Section Supported
Topologies for Synchronization Network.
up-delay <0-5000> Specifies the time in milliseconds to wait before enabling a slave
after link recovery was detected.
n Range: 0 - 5000 ms
n Default: 200 ms
down-delay <0-5000> Specifies the time in milliseconds to wait before disabling a slave
after link failure was detected.
n Range: 0 - 5000 ms
n Default: 200 ms
Parameter Description
lacp-rate {fast | Specifies the Link Aggregation Control Protocol (LACP) packet
slow} transmission rate:
n slow- LACPDU packets are sent every 30 seconds
n fast- LACPDU packets are sent every second
xmit-hash-policy Specifies the algorithm to use for assigning the traffic to Active
{layer2 | layer3+4} slave interfaces:
n layer2 - Based on the XOR of hardware MAC
addresses
n layer3+4 - Based on the IP addresses and Ports
Examples
Step Instructions
802.3ad info
LACP rate: slow
Step Description
4 Make sure the value of the kernel parameter fwha_bond_enhanced_enable was set to
1:
fw ctl get int fwha_bond_enhanced_enable
Step Description
5 Add this line to the file (spaces and comments are not allowed):
fwha_bond_enhanced_enable=1
8 Make sure the value of the kernel parameter fwha_bond_enhanced_enable was set to
1:
fw ctl get int fwha_bond_enhanced_enable
Important - If you change your cluster configuration from VRRP to ClusterXL, you must
remove the kernel parameter configuration from each Cluster Member.
Bridge Interfaces
Configure interfaces as a bridge to deploy security devices in a topology without reconfiguration of the IP
routing scheme. This is an important advantage for large-scale, complex environments.
Bridge interfaces connect two different interfaces (bridge ports). Bridging two interfaces causes every
Ethernet frame that is received on one bridge port to be transmitted to the other port. Thus, the two bridge
ports participate in the same Broadcast domain (different from router port behavior). The security policy
inspects every Ethernet frame that passes through the bridge.
Important - Only two interfaces can be connected by one Bridge interface, creating a
virtual two-port switch. Each port can be a physical, VLAN, or bond device.
You can configure bridge mode with one Security Gateway or with a Cluster. The bridge functions without
an assigned IP address. Bridged Ethernet interfaces (including aggregated interfaces) to work like ports on
a physical bridge. You can configure the topology for the bridge ports in SmartConsole. A separate
network or group object represents the networks or subnets that connect to each port.
Notes:
n Gaia OS supports bridge interfaces that implement native, Layer 2 bridging.
n Gaia OS does not support Spanning Tree Protocol (STP) bridges.
n A slave interface that is a part of a bond interface cannot be a part of a bridge
interface.
The bridge interfaces send traffic with Layer 2 addressing. On the same device, you can configure some
interfaces as bridge interfaces, while other interfaces work as Layer 3 interfaces. Traffic between bridge
interfaces is inspected at Layer 2. Traffic between two Layer 3 interfaces, or between a bridge interface
and a Layer 3 interface is inspected at Layer 3.
Step Description
1 In the left navigation tree, click Network Management > Network Interfaces .
2 Make sure that the slave interfaces, which you wish to add to the Bridge interface, do not have
IP addresses assigned.
4 On the Bridge tab, enter or select a Bridge Group ID (unique integer between 1 and 1024).
5 Select the interfaces from the Available Interfaces list and then click Add.
Notes:
n Make sure that the slave interfaces do not have any IP addresses or aliases
configured.
n Do not select the interface that you configured as Gaia Management Interface.
n A Bridge interface in Gaia can contain only two slave interfaces.
6 On the IPv4 tab, enter the IPv4 address and subnet mask.
You can optionally select the Obtain IPv4 Address automatically option.
7 On the IPv6 tab (optional), enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 Address automatically option.
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278).
8 Click OK.
Note - The name of a Bridge interface in Gaia is "br<Bridge Group ID>". For
example, the name of a bridge interface with a Bridge Group ID of 5 is "br5".
Note - You configure an IP address on a Bridging Group in the same way as you do on
a physical interface (see "Physical Interfaces" on page 86).
Procedure
Step Description
3 Make sure that the slave interfaces, which you wish to add to the Bridge interface, do not have
IP addresses assigned:
show interface <Name of Slave Interface> ipv4-address
show interface <Name of Slave Interface> ipv6-address
Note - Do not change the state of bond interface manually using the "set
interface <Bridge Group ID> state" command. This is done
automatically by the bridging driver.
Step Description
Note - You configure an IP address on a Bridging Group in the same way as you do on
a physical interface (see "Physical Interfaces" on page 86).
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278).
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Syntax
Syntax
Note - Do not change the state of bond interface manually using the "set
interface <Bridge Group ID> state" command. This is done
automatically by the bridging driver.
Syntax
Example
Note - Make sure that the slave interfaces do not have any IP addresses or aliases
configured.
Syntax
Syntax
Example
Syntax
Example
Syntax
Syntax
Example
Syntax
Syntax
Parameters
CLI Parameters
Parameter Description
subnet-mask <Mask> Configures the IPv4 subnet mask using dotted decimal notation
(X.X.X.X).
mask-length <Mask Configures the IPv4 or IPv6 subnet mask length using the CIDR
Length> notation (integer between 2 and 32).
Parameter Description
mtu <68-16000 | Configures the Maximum Transmission Unit size for an interface.
1280-16000> For IPv4:
n Range: 68 - 16000 bytes
n Default: 1500 bytes
For IPv6:
n Range: 1280 - 16000 bytes
n Default: 1500 bytes
Example
Important - In a Cluster, you must configure all the Cluster Members in the same way.
By default, Security Gateway and Cluster in Bridge mode allows Ethernet frames that carry protocols other
than IPv4 (0x0800), IPv6 (0x86DD), or ARP (0x0806) protocols.
Administrator can configure a Security Gateway and Cluster in Bridge Mode to either accept, or drop
Ethernet frames that carry specific protocols.
When Access Mode VLAN (VLAN translation) is configured, BPDU frames can arrive with the wrong VLAN
number to the switch ports through the Bridge interface. This mismatch can cause the switch ports to enter
blocking mode.
In Active/Standby Bridge Mode only, you can disable BPDU forwarding to avoid such blocking mode:
Step Description
1 Connect to the command line on the Security Gateway (each Cluster Member).
Loopback Interfaces
In This Section:
You can define a virtual loopback interface by assigning an IPv4 or IPv6 address to the lo (local) interface.
This can be useful for testing purposes or as a proxy interface for an unnumbered interface.
This section shows you how to configure a loopback interface in the Gaia Portal and Gaia Clish.
Step Description
1. The Enable option is selected by default to set the loopback interface status
to UP.
2. In the Comment field, enter the applicable comment text (up to 100
characters).
3. On the IPv4 tab, enter the IPv4 address and subnet mask.
These IPv4 addresses are not allowed:
n 0.x.x.x
n 127.x.x.x
n 224.x.x.x - 239.x.x.x (Class D)
n 240.x.x.x - 255.x.x.x (Class E)
n 255.255.255.255
4. On the IPv6 tab (optional), enter the IPv6 address and mask length.
Important - First, you must enable the IPv6 Support and reboot
(see "System Configuration" on page 278).
4 Click OK.
Note - When you add a new loopback interface, Gaia automatically assigns a name
in the format "loop<XX>", where XX is a sequence number that starts from 00. The
name of the first loopback interface is loop00. The name of the second loopback
interface is loop01. And so on.
Step Description
4 Click OK.
Step Description
Syntax
Note - You can only change IPv4 or IPv6 address on a loopback interface.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
<Mask Length> Configures the IPv4 subnet mask length using the CIDR notation
(integer between 2 and 32)
Example
Note - The name of a VPN Tunnel interface in Gaia is "vpnt<VPN Tunnel ID>".
For example, the name of a VPN Tunnel interface with a VPN Tunnel ID of 5 is "vpnt5".
Procedure:
1. Make sure that the IPsec VPN Software Blade is enabled on the applicable Security Gateways.
2. Create and configure the Security Gateways.
3. Define the VPN community in SmartConsole that includes the two peer Security Gateways.
Configuring VPN community
You must define the VPN Community and add the member Security Gateways to it before you
configure a VPN Tunnel Interface. This section includes the basic procedure for defining a Site-
to-Site VPN Community. To learn more about VPN communities and their definition procedures,
see the R81 Site to Site VPN Administration Guide.
Step Description
4 From the top toolbar, click the New ( ) > select Star Community or Meshed
Community ..
Step Description
When Domain Based VPN and Route Based VPN are defined for a Security Gateway, Domain
Based VPN is active by default. You must do two short procedures to make sure that Route
Based VPN is always active.
The first procedure defines an empty encryption domain group for your VPN peer Security
Gateways. You do this step one time for each Security Management Server. The second step is
to make Route Based VPN the default option for all Security Gateways.
Step Description
1 In the SmartConsole, click Objects menu > More object types > Network Object >
Group > New Network Group.
4 Click OK.
Step Description
3 From the left tree, click Network Management > VPN Domain.
4 Select Manually define and then select the empty Group object you created
earlier.
Step Description
connections.
l Unnumbered - Uses the interface and the remote peer name to get IPv4
addresses.
n Local Address - Defines the local peer IPv4 address. Applies to the Numbered
VTI only.
n Remote Address - Defines the remote peer IPv4 address. Applies to the
Numbered VTI only.
n Physical Device - Local peer interface name. Applies to the Unnumbered VTI
only.
Important - After you add, configure, or delete features, run the "save
config" command to save the settings permanently.
CLI Parameters
Parameter Description
type numbered Defines a numbered VTI that uses static IPv4 addresses for
local and remote connections.
type unnumbered Defines an unnumbered VTI that uses the interface and the
remote peer name to get IPv4 addresses.
local <Local IP Defines the VPN Tunnel IPv4 address in dotted decimal format
address> on this Security Gateway or Cluster Member.
Applies to the Numbered VTI only.
remote <Remote Defines the VPN Tunnel IPv4 address in dotted decimal format
IP address> on the VPN peer.
Applies to the Numbered VTI only.
peer <Peer Name Specifies the name of the remote peer object as defined in the
VPN community in SmartConsole.
dev <Name of Specifies the name of the local interface on this Security
Local Interface> Gateway or Cluster Member.
The new VTI is bound to this local interface.
Applies to the Unnumbered VTI only.
Example
gaia> add vpn tunnel 20 type numbered local 10.10.10.1 remote
20.20.20.1 peer MyPeer
gaia> add vpn tunnel 10 type unnumbered peer MyPeer dev eth1
gaia> show vpn tunnels
gaia> delete vpn tunnel 10
To make sure that your security rules work correctly with Route Based VPN traffic, you must add
directional matching conditions and allow OSPF traffic.
This section contains the procedure for defining directional matching rules.
Directional matching is necessary for Route Based VPN when a VPN community is included in
the VPN column in the rule.
This is because without bi-directional matching, the rule only applies to connections between a
community and an encryption domain (Domain Based Routing).
Notes:
n MyIntranet is the name of a VPN Community.
n Internal_Clear refers to all traffic from IP addresses to and from the
specified VPN community.
n It is not necessary to define bidirectional matching rules if the VPN
column contains the value Any .
To enable VPN directional matching
Step Description
1 In SmartConsole, click Menu > Global properties > expand VPN > click
Advanced.
2 Select the Enable VPN Directional Match in VPN Column option and click
OK.
Step Description
3 Right-click the VPN cell in the applicable rule and select Directional Match
Condition.
4 In the New Directional Match Condition window, select the source (Traffic
reaching from ) and destination (Traffic leaving to).
5 Click OK.
One advantage of Route Based VPN is the fact that you can use dynamic routing protocols to
distribute routing information between Security Gateways.
The OSPF (Open Shortest Path First) protocol is commonly used with VTIs.
To learn about configuring OSPF, see the R81 Gaia Advanced Routing Administration Guide.
Step Description
1 In the Gaia Portal or Gaia Clish, add the applicable VPN Tunnel Interfaces to the
OSPF configuration page.
2 In SmartConsole, add an Access Control rule that allows traffic to the VPN
community (or all communities) that uses the OSPF service:
Name Source Destination VPN Service Action
You must save your configuration to the database and install policies to the Security Gateways
before the VPN can be fully functional.
Step Description
This section shows you how to configure 6in4 Tunnel Interfaces in the Gaia Portal and Gaia Clish.
6in4 is a transparent mechanism that transmits IPv6 traffic on existing IPv4 networks.
To do this, 6in4 does these functions:
n Encapsulates IPv6 packets in IPv4 packets for transmission on the IPv4 network.
n Routes traffic between 6in4 and "native" IPv6 networks.
Important - Before you can configure 6in4 Tunnel interfaces, you must enable the IPv6
Support and reboot (see "System Configuration" on page 278).
Step Description
2 Make sure that the physical interface, on which you add a 6in4 Tunnel interface, has an IPv4
address.
4 In the Add 6in4 Tunnel window, select the Enable option to set the VLAN interface to UP.
5 Optional: On the IPv6 tab, enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 address automatically option.
7 Click OK.
Step Description
3 On the IPv6 tab, enter the IPv6 address and mask length.
You can optionally select the Obtain IPv6 address automatically option.
4 Click OK.
Note - You cannot change the settings on the 6in4 Tunnel tab. To change these
parameters, delete the 6in4 Tunnel interface and then create a new 6in4 Tunnel
interface.
Step Description
Important - Make sure that the physical interface, on which you wish to add a 6in4
Tunnel interface, have an IPv4 address.
Syntax
Note - You cannot change the 6in4 settings (Name of Physical Interface, 6in4
Tunnel ID, IPv4 Address on Remote Peer, or TTL). To change these parameters,
delete the 6in4 Tunnel interface and then create a new 6in4 Tunnel interface.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
<IPv4 Address on Specifies the IPv4 address at the remote end of the 6in4 tunnel.
Remote Peer>
ttl <0-255> Specifies the Time-to-Live for the 6in4 packets between 2 and 255.
Note - This value must be the same on the peers. Default value is 0.
mask-length <Mask Configures the IPv6 subnet mask length using CIDR notation (/xx) -
Length> integer between 1 and 128.
ipv6-autoconfig {on Configures if this interface gets an IPv6 address from a DHCPv6
| off} Server:
n on - Gets an IPv6 address from a DHCPv6 Server
n off - Does not get an IPv6 address from a DHCPv6 Server
(you must assign it manually)
mtu <1280-16000> Configures the Maximum Transmission Unit size for an interface.
n Range: 1280 - 16000 bytes
n Default: 1500 bytes
Example
gaia> add interface eth0 6in4 55 remote 192.168.20.30 ttl 200
gaia> set interface comments "6in4 ID 55 with peer 192.168.20.30"
gaia> delete interface sit_6in4_55 6in4 55
GRE Interfaces
In This Section:
This section shows you how to configure a GRE Interface in the Gaia Portal and the Gaia Clish.
Generic Routing Encapsulation (GRE) is an IP encapsulation protocol, which is used to transport IP
packets over a network.
GRE allows routing of IP packets between private IPv4 networks, which are separated over public IPv4
Internet.
Notes:
n The name of a GRE interface in Gaia is "gre<ID>".
For example, the name of a GRE interface with a GRE ID of 5 is
"gre5".
n The GRE tunnel is not secure, because it is not encrypted.
Warning - By default, SecureXL does not accelerate traffic over a GRE tunnel.
n If you configure SecureXL to accelerate such traffic, the Firewall only inspects
the payload of GRE packets (it does not inspect the GRE data).
n To configure SecureXL to accelerate such traffic, set the value of the SecureXL
kernel parameter sim_enable_gre to 1 (one) in the
$PPKDIR/conf/simkern.conf file and reboot.
For more information, see the R81 Performance Tuning Administration Guide >
Chapter Working with Kernel Parameters on Security Gateway > Section
SecureXL Kernel Parameters.
Step Description
3 On the IPv4 tab, enter the local IPv4 address and subnet mask for the GRE interface.
a. In the GRE Interface ID field, enter or select the GRE Tunnel ID between 1 and 1024.
Note - This value must be the same on the GRE peers.
b. In the Peer Address field, enter the IPv4 address for the GRE interface on the remote
GRE peer.
c. In the Local Address field, enter the IPv4 address of the applicable local physical
interface.
d. In the Remote Address field, enter the IPv4 address of the applicable physical
interface on the remote GRE peer.
e. Optional: In the TTL field, enter or select the Time-to-Live for the GRE packets
between 0 and 255.
Note - This value must be the same on the GRE peers.
5 Click OK.
Example
Security Gateway "GW1" and Security Gateway "GW2" create a GRE Tunnel over a network.
Local physical interface eth1 with IPv4 10.10.10.11 / 24 eth2 with IPv4 172.30.40.22 / 24
GRE Interface ID 33 33
Step Description
4 Click OK.
Step Description
Syntax
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
CLI Parameters
Parameter Description
local <IPv4 address of local Specifies the IPv4 address of the applicable local
physical interface> physical interface.
remote <IPv4 address of physical Specifies the IPv4 address of the applicable
interface on remote peer> physical interface on the remote GRE peer.
ip <IPv4 address of local GRE Specifies the local IPv4 address for the GRE
interface> interface.
mask <IPv4 subnet mask of local Specifies the local IPv4 subnet mask for the GRE
GRE interface> interface.
peer <IPv4 address of GRE Specifies the IPv4 address for the GRE interface
interface on remote peer> on the remote GRE peer.
Example
Security Gateway "GW1" and Security Gateway "GW2" create a GRE Tunnel over a network.
Local physical interface eth1 with IPv4 10.10.10.11 / 24 eth2 with IPv4 172.30.40.22 / 24
GRE Interface ID 33 33
PPPoE Interfaces
In This Section:
This section shows you how to configure PPPoE Interfaces in the Gaia Portal and Gaia Clish.
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames
inside Ethernet frames.
PPPoE is used mainly with DSL services, where individual users connect to the DSL modem over Ethernet
and in plain Ethernet networks.
Step Description
2 Make sure that the physical interface, on which you add a PPPoE interface, does not have an
IP address.
4 In the Add PPPoE window, select the Enable option to set the PPPoE interface to UP.
Important - If you select this option, Gaia does not use anymore the Default
Gateway configured in Network Management > IPv4 Static Routes .
9 Click OK.
Step Description
4 Click OK.
Note - You cannot change the PPPoE ID for an existing PPPoE interface. To change
this ID, delete the PPPoE interface and then create a new PPPoE interface.
Step Description
Important - Make sure that the physical interface, on which you wish to add a VLAN
interface, does not have an IP address.
Syntax
Note - You cannot change the PPPoE ID for an existing PPPoE interface. To change
this parameters, delete the PPPoE interface and then create a new PPPoE
interface.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
user-name Specifies the username needed to connect to the PPPoE server at the
<PPPoE Internet Service Provider (ISP). Get it from the ISP.
Username>
password <PPPoE Specifies the password needed to connect to the PPPoE server at the
Password> Internet Service Provider (ISP). Get it from the ISP.
password_hash Specifies the hash of the password needed to connect to the PPPoE server
<PPPoE Password at the Internet Service Provider (ISP). Get it from the ISP.
Hash>
use-peer-dns Optional: Specifies whether to allow the ISP to define the IPv4 DNS server
{on | off} for the Gaia. The ISP supplies either one IPv4 DNS server (the Primary) or
two (Primary and Secondary).
n on - Allow
n off - Do not allow
use-peer-as- Optional: Specifies whether to make the ISP server the Default Gateway
default-gateway for the Gaia
{on | off}
n on - Allow
n off - Do not allow
Important - If you enable this option, Gaia does not use anymore
the Default Gateway configured with the "set static-route
default" command.
fake-peer- Optional. Configures the fake unicast peer IPv4 address (the default value
address <IPv4 is 0.0.0.0).
Address>
Parameter Description
use-fake-peer- Optional. Configures whether to use the configured fake peer IPv4
address {on | address:
off}
n on - Enabled
n off - Disabled
Example
gaia> add pppoe client id 1 interface eth0 user-name JohnDoe
password 123456 use-peer-dns on
Note - You selected this interfaces during the Gaia First Time Configuration Wizard.
Step Description
4 Click OK.
Syntax
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
<Name of Specifies the name of the interface, on which to create an alias IPv4
Interface> address
Example
gaia> show management interface
gaia> set management interface eth2
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
To configure settings
set ip-conflicts-monitor
interface {all | <Name of Interface>}
state {off | on}
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Command Description
set ip-conflicts-monitor state {off Enables (on) and disables (off) the
| on} feature.
show ip-conflicts-monitor state Shows the current state of the feature (off
or on).
Example
gaia> show ip-conflicts-monitor state
IP conflict monitoring Disabled
gaia> set ip-conflicts-monitor interface eth2
gaia> set ip-conflicts-monitor on
gaia> show ip-conflicts-monitor state
IP conflict monitoring Enabled
gaia> show ip-conflicts-monitor interfaces
Monitored Interfaces: eth2
Log Messages
After you enable and configure this feature, it generates one of these messages in the
/var/log/messages file:
new station Gaia detected a new MAC address on a directly connected network and a new
IP address is assigned to that MAC address.
changed Gaia detected that an IP address stored in the binding database is assigned to
ethernet a new MAC address on a directly connected network.
address
flip flop The second recent binding of a MAC address to an IP address is currently the
most recent binding in the binding database.
This potentially indicates an IP address conflict on the network.
reused old The third (or older) recent binding of a MAC address to an IP address is
ethernet currently the most recent binding in the binding database.
address This very likely indicates a 3-way (or greater) IP address conflict.
Step Instructions
3 Run:
grep "arpwatch:" /var/log/messages*
Example:
Additional Information
n The detection of IP address conflicts is based on the Linux arpwatch tool.
n When you enable this feature, Gaia runs the /bin/arpwatch_launcher deamon. This daemon
is responsible to run the /etc/rc.d/init.d/arpwatch service.
n Gaia saves the applicable configuration in the Gaia database and in the
/etc/sysconfig/arpwatch file.
Gaia generates the /etc/sysconfig/arpwatch file automatically.
n Gaia saves the MAC-to-IP address binding information in the
/var/lib/arpwatch/arp.dat.<Name of Interface> file.
The information includes:
l The detected MAC address
l The IP address assigned to that MAC address
l The time of detection (in Unix epoch format)
It can take several minutes for Gaia to populate this database.
Note - There are some command options and parameters that you cannot configure in
the Gaia Portal.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Description
Add, configure, and delete interfaces and interface properties.
Syntax
To add an interface
add interface<ESC><ESC>
To configure an interface
set interface<ESC><ESC>
To show an interface
show interface<SPACE><TAB>
set ip-collisions-monitor
delete ip-collisions-monitor
ARP
The Address Resolution Protocol (ARP) allows a host to find the physical address of a target host on the
same physical network using only the target's IP address.
ARP is a low-level protocol that hides the underlying network physical addressing and permits assignment
of an arbitrary IP address to every machine.
ARP is considered part of the physical network system and not as part of the Internet protocols.
Step Description
Step Description
Step Description
Step Description
4 Enter the IP Address of the static ARP entry and the MAC Address used when forwarding
packets to the IP address.
5 Click OK.
Step Description
4 Click Remove.
Step Description
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
table validity- Configures the time, in seconds, to keep resolved dynamic ARP entries
timeout <Seconds> in the ARP cache table.
If the entry is not referred to and is not used by traffic before this time
elapses, the dynamic ARP entry is deleted from the ARP cache table.
Otherwise, an ARP Request will be sent to verify the MAC address.
n Range: 60 - 86400 seconds (24 hours)
n Default: 60 seconds
table cache-size Configures the maximal number of entries in the ARP cache table.
<Number of
Entries> n Range: 1024 - 16384
n Default: 4096
DHCP Server
You can configure the Gaia device to be a Dynamic Host Configuration Protocol (DHCP) server.
The DHCP server gives IP addresses and other network parameters to network hosts.
DHCP makes it unnecessary to configure each host manually, and therefore reduces configuration errors.
You configure DHCP server subnets on the Gaia device interfaces.
A DHCP subnet allocates these network parameters to hosts behind the Gaia interface:
n IPv4 address
n Default Gateway (optional)
n DNS parameters (optional):
l Domain name
l Primary, secondary and tertiary DNS servers
Allocating DHCP parameters to hosts (for the details, see the next section)
Workflow
Step Description
Step Description
3 Select Enable DHCP to enable DHCP for the subnet you will configure.
In the Network IP Address field, enter the IPv4 address of the applicable interface's subnet.
In the Subnet mask field, enter the subnet mask.
Note - To do this automatically, click Get from interface and select the applicable
interface. Click OK.
In the Address Pool section, click Add to define the range of IPv4 addresses that the server
assigns to hosts.
Optional: In the Lease Configuration section, configure the DHCP lease settings:
a. In the Default lease field, enter the default lease time (in seconds), for host IPv4
addresses. This applies only if DHCP clients do not request a unique lease time. The
default is 43,200 seconds.
b. In the Maximum Lease field, enter the maximal lease time (in seconds), for host IPv4
addresses. The default is 86,400 seconds.
Step Description
5 Optional: On the Routing & DNS tab, define routing and DNS parameters for DHCP clients:
n In the Default Gateway field, enter the IPv4 address of the default gateway for the
DHCP clients.
n In the Domain Name field, enter the domain name for the DHCP clients (for example,
example.com).
n In the Primary DNS Server field, enter the IPv4 address of the Primary DNS server
for the DHCP clients.
n In the Secondary DNS Server field, enter the IPv4 address of the Secondary DNS
server for the DHCP clients (to use if the primary DNS server does not respond).
n In the Tertiary DNS Server field, enter the IPv4 address of the Tertiary DNS server
for the DHCP clients (to use if the primary and secondary DNS servers do not
respond).
6 Click OK.
8 In the DHCP Server Configuration section, select Enable DHCP Server and click Apply .
Step Description
2 In the DHCP Server Subnet Configuration section, select the Subnet and click Edit.
4 Click OK.
Step Description
2 In the DHCP Server Configuration section, clear the Enable DHCP Server.
3 Click Apply .
Step Description
2 In the DHCP Server Subnet Configuration section, select the Subnet and click Delete.
3 Click OK to confirm.
Note - Before you delete the last DHCP subnet, you must disable DHCP server on
all interfaces.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
subnet <Subnet Entry> Specifies the IPv4 address of the DHCP subnet on an Ethernet
interface of the Gaia device. Hosts behind the Gaia interface get
IPv4 addresses from address pools in the subnet.
For example: 192.0.2.0
include-ip-pool start Specifies the IPv4 address that starts and the IPv4 address that
<First IPv4 Address> ends the included allocated IP Pool range.
end <Last IPv4 For example: 192.0.2.20 and 192.0.2.90
Address>
exclude-ip-pool start Specifies the IPv4 address that starts and the IPv4 address that
<First IPv4 Address> ends the excluded allocated IP Pool range.
end <Last IPv4 For example: 192.0.2.155 and 192.0.2.254
Address>
include-ip-pool <First Specifies the range of IPv4 addresses to include in the IP pool.
IPv4 Address-Last IPv4 For example: 192.0.2.20-192.0.2.90
Address>
exclude-ip-pool <First Specifies the range of IPv4 addresses to exclude from the IP
IPv4 Address-Last IPv4 pool.
Address> For example: 192.0.2.155-192.0.2.254
enable Enables the DHCP Server subnet, or the DHCP Server process
(depending on the context).
disable Disables the DHCP Server subnet, or the DHCP Server process
(depending on the context).
default-lease <Lease Specifies the default DHCP lease in seconds, for host IPv4
in Seconds> addresses. Applies only if DHCP clients do not request a unique
lease time. If you do not enter a value, the default is 43,200
seconds.
max-lease <Maximal Specifies the maximal DHCP lease in seconds, for host IPv4
Lease in Seconds> addresses. This is the longest lease available. If you do not enter
a value, the configuration default is 86,400 seconds.
default-gateway Optional. Specifies the IPv4 address of the default gateway for
<Default Gateway IPv4 the network hosts
Address>
Parameter Description
domain <Domain Name Optional. Specifies the domain name of the network hosts.
for the DHCP Clients> For example: example.com
dns <DNS Server IPv4 Optional. Specifies the DNS servers that the network hosts will
Address> use to resolve hostnames. Optionally, specify a primary,
secondary and tertiary server in the order of precedence.
For example: 192.0.2.101, 192.0.2.102,
192.0.2.103
subnet <Subnet Entry> The IP addresses pools in the DHCP Server subnet, and their
ip-pools status: Enabled or Disabled.
Example
System Name
You set the host name (system name) during initial configuration. You can change the name.
Step Description
1 In the navigation tree, click Network Management > Host and DNS.
Description
Configure the host name of your platform.
Syntax
n To configure a hostname:
show hostname
show domainname
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Hosts
You should add host addresses for systems that communicate frequently with the Gaia system.
You can:
n View the entries in the hosts table.
n Add an entry to the list of hosts.
n Modify the IP address of a host.
n Delete a host entry.
Step Description
1 In the navigation tree, click Network Management > Hosts and DNS.
3 Enter:
n Host Name - Must include only alphanumeric characters, dashes ('-'), and periods
('.'). Periods must be followed by a letter or a digit. The name may not end with a dash
or a period. There is no default value.
n IPv4 address
n IPv6 address
Step Description
1 In the navigation tree, click Network Management > Hosts and DNS.
3 Edit:
n Host Name
n IPv4 address
n IPv6 address
Step Description
1 In the navigation tree, click Network Management > Hosts and DNS.
Description
Add, edit, delete and show the name and IP addresses for hosts that communicate frequently with the Gaia
system.
Syntax
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
name <Name The name of a static host. Must include only alphanumeric characters, dashes
of Host> ('-'), and periods ('.'). Periods must be followed by a letter or a digit. The name
must not end in a dash or a period. There is no default value.
DNS
Gaia uses the Domain Name Service (DNS) to translate host names into IP addresses.
To enable DNS lookups, you must enter the primary DNS server for your system. You can also enter
secondary and tertiary DNS servers.
When the system resolves host names, it consults the primary name server. If a failure or time-out occurs,
the system consults the secondary name server, and if necessary, the tertiary.
You can also define a DNS Suffix, which is a search for host-name lookup.
Important - From R81, you can configure specific DNS settings in each Virtual System.
See the R81 VSX Administration Guide.
Step Description
1 In the navigation tree, click Network Management > Hosts and DNS.
Note - Domain names that are also valid numeric IP addresses (for
example: 10.19.76.100), although syntactically correct, are not permitted.
Example:
You configured the DNS Suffix "example.com" and you try to ping the host "foo"
(with the command "ping foo"). If Gaia cannot resolve "foo", then Gaia tries to
resolve "foo.example.com".
b. In the Primary DNS Server field, enter the IPv4 or IPv6 address of the Primary DNS
server.
c. Optional: In the Secondary DNS Server field, enter the IPv4 or IPv6 address of the
Secondary DNS server (to use if the primary DNS server does not respond).
d. Optional: In the Tertiary DNS Server field, enter the IPv4 or IPv6 address of the
Tertiary DNS server (to use if the primary and secondary DNS servers do not
respond).
e. Click Apply .
Description
Configure, show and delete the DNS servers and the DNS suffix for the Gaia computer.
Syntax
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
primary Specifies the IPv4 or IPv6 address of the primary DNS server, which resolve
<IPv4 or host names.
IPv6 This must be a host that runs a DNS server.
Address>
secondary Specifies the IPv4 or IPv6 address of the secondary DNS server, which resolves
<IPv4 or host names if the primary server does not respond.
IPv6 This must be a host that runs a DNS server.
Address>
Parameter Description
tertiary Specifies the IPv4 or IPv6 address of the tertiary DNS server, which resolves
<IPv4 or host names if the primary and secondary servers do not respond.
IPv6 This must be a host that runs a DNS server.
Address>
suffix <Name Specifies the name that is put at the end of all DNS searches if they fail.
for Local By default, it must be the local domain name.
Domain> A valid domain name suffix is made up of subdomain strings separated by
periods.
Subdomain strings must begin with an alphabetic letter and can consist only of
alphanumeric characters and hyphens.
The domain name syntax is described in RFC 1035 (modified slightly in RFC
1223).
Note - Domain names that are also valid numeric IP addresses (for
example: 10.19.76.100), although syntactically correct, are not
permitted.
Example:
You configured the DNS Suffix "example.com" and you try to ping the host
"foo" (with the command "ping foo"). If Gaia cannot resolve "foo", then
Gaia tries to resolve "foo.example.com".
Step Description
1 In the navigation tree, click Network Management > IPv4 Static Routes .
3 In the Destination field, enter the IPv4 address of destination host, or network.
6 In the Rank field, leave the default value (60), or enter the relative rank of the IPv4 static
route (an integer from 1 to 255).
This value specifies the rank for the configured route when there are overlapping routes from
different protocols.
8 In the Comment field, enter the applicable comment text (up to 100 characters).
Step Description
n Option 1:
a. Select IP Address to specify the next hop by its IPv4 address.
b. In the IPv4 Address field, enter the IPv4 address of the next hop gateway.
c. In the Priority field, either do not enter anything, or select an integer between 1
and 8.
d. Add Monitored IPs .
e. Click OK.
n Option 2:
a. Select Network Interface to specify the next hop by the name of the local
interface name that connects to it.
b. In the Local Interface field, select an interface that connects to the next hop
gateway.
c. In the Priority field, either do not enter anything, or select an integer between 1
and 8.
d. Add Monitored IPs .
e. Click OK.
Notes:
n Priority defines which next hop gateway to select when multiple next hop
gateways are configured. The lower the priority, the higher the preference -
priority 1 means the highest preference, and priority 8 means the lowest
preference. You can define two or more paths with the same priority to
specify a backup path with equal priority. A next hop gateway with no priority
configured is preferred over a next hop gateway with priority configured.
n Multihop ping in Static Routes uses ICMP Echo Request to monitor
reachability of an IP address multiple hops away. Multihop ping in Static
Routes updates the status of an associated next hop in accordance to the
reachability status. The next hop status becomes "down", if that IP address
is unreachable.
10 If you defined a next hop gateway by IP Address , you can select the Ping option, if you need
to monitor next hops for the IPv4 static route with the ping.
The Ping feature sends ICMP Echo Requests to make sure the next hop gateway for a static
route is working.
Gaia includes in the kernel forwarding table only next hop gateways, which are verified as
working.
When Ping is enabled, Gaia adds an IPv4 static route to the kernel forwarding table only after
at least one next hop gateway is reachable.
11 Click Save.
12 In the Advanced Options section, you can configure the Ping behavior.
If you changed the default settings, click Apply .
You can use the batch mode to configure multiple static routes in one step.
Note - This mode does not allow the configuration of static routes that use a logical
interface as the next hop.
Step Description
1 In the navigation tree, click Network Management > IPv4 Static Routes .
3 In the Add Multiple Routes window, select the Next Hop Type:
5 Click Apply .
The newly configured static routes show in the IPv4 Static Routes section.
Note - The text box shows entries that contain errors with messages at the top of
the page.
7 In the top right corner, click the Monitoring tab to make sure that the routes are configured
correctly.
Syntax
Note - There are no "add" commands for the static route feature.
To remove a specific path only, when multiple next hop gateways are configured
set static-route <Destination IPv4 Address> nexthop gateway <IPv4 Address of Next Hop Gateway> off
set static-route <Destination IPv4 Address> nexthop gateway <Name of Local Interface> off
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
<Destination IPv4 Address> Specifies the IPv4 address of destination host or network
using the CIDR notation (IPv4 Address / Mask Length).
Example: 192.168.2.0/24
You can use the default keyword instead of an IPv4
address when referring to the default route.
comment {"Text" | off} Defines of removes the optional comment for the static
route.
n Write the text in double-quotes.
n Text must be up to 100 characters.
n This comment appears in the Gaia Portal and in
the output of the "show configuration"
command.
gateway Specifies that this next hop accepts and sends packets to
the specified destination.
blackhole Specifies that this next hop drops packets, but does not
send ICMP unreachable packet to the traffic source.
reject Specifies that this next hop drops packets and sends
ICMP unreachable packet to the traffic source.
address <IPv4 Address of Specifies the IPv4 address of the next hop gateway.
Next Hop Gateway>
logical <Name of Local Identifies the next hop gateway by the name of the local
Interface> interface that connects to it.
Use this option only if the next hop gateway has an
unnumbered interface.
Parameter Description
monitored-ip <Monitored IP Remote IPv4 address to monitor for the next hop
Address> {on | off} gateway.
Monitors IP address(es) configured with the "ip-
reachability-detection".
The next hop gateway becomes usable with respect to
reachability of IP address(es) reported from the "ip-
reachability-detection".
monitored-ip-option {fail- Set failure condition and flavor for the configured
all | fail-any | force-if- monitored IP address(es).
symmetry {on | off}}
n fail-all
Fails the next hop gateway when all monitored IP
addresses become unreachable.
Restores the next hop gateway when one of the
monitored IP addresses becomes reachable.
Default: off
n fail-any
Fails the next hop gateway when one of the
monitored IP addresses becomes unreachable.
Restores the next hop gateway when all monitored
IP addresses become reachable.
Default: on
n force-if-symmetry
Ignores IP reachability reports from IP addresses
with asymmetric traffic.
Default: off
priority <Priority> Defines which gateway to select as the next hop when
multiple gateways are configured.
The lower the priority, the higher the preference - priority
1 means the highest preference, and priority 8 means
the lowest preference.
You can define two or more paths with the same priority
to specify a backup path with equal priority.
A next hop gateway with no priority configured is
preferred over a next hop gateway with priority
configured
Parameter Description
ping {on | off} Enables (on) or disables (off) the ping of specified next
hop gateways for IPv4 static routes.
The Ping feature sends ICMP Echo Requests to make
sure the next hop gateway for a static route is working.
Gaia includes in the kernel forwarding table only next hop
gateways, which are verified as working.
When Ping is enabled, Gaia adds an IPv4 static route to
the kernel forwarding table only after at least one next
hop gateway is reachable.
To configure the ping behavior, run:
set ping count <value>
set ping interval <value>
Example
gaia> set static-route 192.0.2.0/24 nexthop gateway address 192.0.2.155 on
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278).
Procedure
Step Description
1 In the navigation tree, click Network Management > IPv6 Static Routes .
3 In the Destination / Mask Length field, enter the IPv6 address and prefix (default prefix is
64).
5 In the Rank field, leave the default value (60), or enter the relative rank of the IPv6 static
route (an integer from 1 to 255).
This value specifies the rank for the configured route when there are overlapping routes from
different protocols.
6 In the Comment field, enter the applicable comment text (up to 100 characters).
8 In the Gateway Address field, enter the IPv6 address of the next hop gateway.
Step Description
9 In the Priority field, either do not enter anything, or select an integer between 1 and 8.
Priority defines the order for selecting the next hop gateway when multiple next hop
gateways are configured.
The lower the priority, the higher the preference - priority 1 means the highest preference,
and priority 8 means the lowest preference.
A next hop gateway with no priority configured is preferred over a next hop gateway with
priority configured.
You cannot configure two next hop gateways with the same priority, because IPv6 Equal
Cost Multipath Routes are not supported.
10 Click OK.
11 Select the Ping6 option, if you need to monitor next hops for the IPv6 static route using
ping6.
The Ping6 feature sends ICMPv6 Echo Requests to make sure the next hop gateway for a
static route is working.
12 Click Save.
13 In the Advanced Options section, you can configure the Ping6 behavior.
If you changed the default settings, you must click Apply .
Note - There are no "add" commands for the static route feature.
To remove the specific path only, when multiple next hop gateways are configured
set ipv6 static-route <Destination IPv6 Address> nexthop gateway <IPv6 Address of Next Hop Gateway> off
set ipv6 static-route <Destination IPv6 Address> nexthop gateway <Name of Local Interface> off
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
<Destination IPv6 Defines the IPv6 address of destination host or network using the
Address> CIDR notation (IPv6 Address / Mask Length).
Example: fc00::/64
Mask length must be in the range 8-128.
comment {"Text" | Defines of removes the optional comment for the static route.
off}
n Write the text in double-quotes.
n Text must be up to 100 characters.
n This comment appears in the Gaia Portal and in the output of
the "show configuration" command.
nexthop Defines the next hop path, which can be a gateway, blackhole,
or reject.
gateway Specifies that this next hop accepts and sends packets to the
specified destination.
blackhole Specifies that this next hop drops packets, but does not send ICMP
unreachable packet to the traffic source.
reject Specifies that this next hop drops packets and sends ICMP
unreachable packet to the traffic source.
address <IPv6 Defines the IPv6 address of the next hop gateway.
Address of Next Hop
Gateway>
interface <Name of Identifies the next hop gateway by the local interface that connects
Local Interface> to it.
Use this option only if the next hop gateway has an unnumbered
interface.
priority <Priority> Defines the order for selecting the next hop gateway when multiple
next hop gateways are configured.
The lower the priority, the higher the preference - priority 1 means
the highest preference, and priority 8 means the lowest preference.
A next hop gateway with no priority configured is preferred over a
next hop gateway with priority configured.
You cannot configure two next hop gateways with the same priority,
because IPv6 Equal Cost Multipath Routes are not supported.
Parameter Description
ping6 {on | off} Enables (on) or disables (off) the ping of specified next hop
gateways for IPv6 static routes.
The Ping6 feature sends ICMPv6 Echo Requests to make sure the
next hop gateway for a static route is working.
Gaia includes in the kernel forwarding table only next hop gateways,
which are verified as working.
When Ping6 is enabled, Gaia adds an IPv6 static route to the kernel
forwarding table only after at least one next hop gateway is
reachable.
To configure the ping6 behavior, run:
set ping count <value>
set ping interval <value>
rank <Rank> Selects a route, if there are many routes to a destination that use
different routing protocols.
The route with the lowest rank value is selected.
Use the rank keyword in place of the nexthop keyword with no
other parameters.
Accepted values are: default (60), integer numbers from 0 to
255.
In addition, see this command: set protocol-rank
protocol <Rank>
Example
gaia> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 on
gaia> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 interface eth3 on
gaia> set ipv6 static-route 3100:192::0/64 nexthop gateway 3900:172::1 interface eth3 off
Troubleshooting
Scenario - SmartConsole does not let you enable the VPN Software Blade in the Security
Gateway object
Symptoms
You cannot enable the VPN Software Blade. SmartConsole shows this message:
Cause
IPv6 feature is active on the Security Gateway, but the main IPv6 address is not configured in the
Security Gateway object in SmartConsole.
Next Steps
1. From the left navigation panel, click Gateways & Servers .
2. Double-click the Security Gateway object.
3. From the left tree, click General Properties .
4. Configure the main IPv6 address.
5. Click OK.
6. Install the Access Control Policy on the Security Gateway object.
Note - You can add or delete Neighbor entries only from the Gaia Clish
Important - First, you must enable the IPv6 Support and reboot (see "System
Configuration" on page 278).
Syntax
n To add an IPv6 neighbor entry:
show neighbor<SPACE><TAB>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
<IPv6 Address of Specifies the IPv6 address of a new static Neighbor Discovery
Neighbor> entry
<MAC Address of Specifies the MAC address for respective IPv6 address
Neighbor>
<Name of Local Name of the local interface that connects to the Neighbor
Interface>
NetFlow Export
In This Section:
Introduction 212
Configuration Options in Gaia Portal 214
Configuration Options in Gaia Clish 214
Configuration Procedure 217
Introduction
NetFlow is an industry standard for traffic monitoring. Cisco developed this network protocol to collect
network traffic patterns and volume.
One host (the NetFlow Exporter) sends information about its network flows to a different host (the NetFlow
Collector).
A network flow is a unidirectional stream of packets that contain the same set of characteristics.
You can configure Security Gateways and Cluster Members as an Exporter of NetFlow records for all the
traffic that passes through.
Note - The state of the SecureXL on a Security Gateway is irrelevant for NetFlow export.
The NetFlow Collector is a different external server, and you configure it separately.
NetFlow Export configuration is a list of collectors, to which the service sends records:
n To enable NetFlow, configure at minimum one NetFlow Collector.
n To disable NetFlow, remove all NetFlow Collectors from the Gaia configuration.
You can configure a maxumum of three NetFlow Collectors. Gaia sends the NetFlow records go to all
configured NetFlow Collectors. If you configure three NetFlow Collectors, Gaia sends each NetFlow record
three times.
Regardless of which NetFlow export format you configure, Gaia exports values as set of fields.
The fields
n Source IP address.
n Destination IP address.
n Source port.
n Destination port.
n Ingress physical interface index (defined by SNMP).
n Egress physical interface index (defined by SNMP).
n Packet count for this flow.
n Byte count for this flow.
n Start of flow timestamp (FIRST_SWITCHED).
n End of flow timestamp (LAST_SWITCHED).
n IP protocol number.
n TCP flags from the flow (TCP only).
n VSX VSID.
Notes:
n The IP addresses and TCP/UDP ports the NetFlow reports are the ones, on
which the NetFlow expects to receive traffic.
Therefore, for NAT connections, the NetFlow reports one of the two
directions of the flow with the NATed address.
n NetFlow sends the connection records after the connections terminated.
If the connections are open for a long time, it can take time for the NetFlow to
sends the records.
show netflow
all
collector
enable
export-format
ip
port
srcaddr
for-ip <IPv4 Address of Collector>
enable
export-format
port
srcaddr
for-port <Destination Port on Collector>
enable
export-format
srcaddr
CLI Parameters
Parameter Description
ip <IPv4 Address Specifies the destination IPv4 address of the NetFlow Collector, to
of Collector> which Gaia sends the NetFlow packets.
This parameter is mandatory.
port <Destination Specifies the destination UDP port number on the NetFlow Collector,
Port on Collector> on which the collector listens.
This parameter is mandatory.
There is no default or standard port number for NetFlow.
srcaddr <Source Optional: Specifies the source IPv4 address of the NetFlow packets.
IPv4 Address> This must be an IPv4 address of the local host.
The default is an IPv4 address of the network interface, from which
Gaia sends the NetFlow packets.
We recommend the default.
Parameter Description
set netflow fwrule Specifies for which traffic the NetFlow exports its records:
{1 | 0}
n By default (value 1) the NetFlow export is enabled for traffic
accepted by all Access Control rules.
Note - If you upgraded to R81, and use this default
configuration, then delete the Access Control rules
with the Track option Log and Accounting you
configured in SmartConsole for this Security Gateway
(Cluster).
n Set the value 0 to enable the NetFlow export only for traffic
accepted by Access Control rules with the Track option Log
and Accounting you configured in SmartConsole.
show netflow Shows for which traffic the NetFlow exports its records:
fwrule
n Yes - The NetFlow export is enabled for traffic accepted by all
Access Control rules.
n No - The NetFlow export is enabled only for traffic accepted by
Access Control rules with the Track option Log and Accounting
you configured in SmartConsole.
Configuration Procedure
Important - In a Cluster, you must configure all the Cluster Members in the same way.
a. In the left navigation tree, click Network Management > NetFlow Export.
b. In the Collectors section, click Add.
c. Enter the required data for each collector:
Parameter Description
IP Address The destination IPv4 address, to which Gaia sends the NetFlow
packets.
This parameter is mandatory.
UDP Port The destination UDP port number, on which the collector listens.
Number This parameter is mandatory.
There is no default or standard port number for NetFlow.
d. Click OK.
e. In the Advanced Options section, the NetFlow Fw rule option controls for which traffic
the NetFlow exports its records:
n By default (this option is cleared) the NetFlow export is enabled for traffic
accepted by all Access Control rules.
Important - After you add, configure, or delete features, run the "save
config" command to save the settings permanently.
d. Add an explicit rule for the traffic that you wish to export with NetFlow:
Important - In the Track column, you must select Log and Accounting.
Services &
Source Destination VPN Content Action Track
Applications
System Management
This chapter includes procedures and reference information for:
n Time and Date
n Cloning Groups
n SNMP
n Job Scheduler
n Mail Notification
n Login Messages
n Session in Gaia Portal and Gaia Clish
n Core Dump Files
n System Logging
n Network Access over Telnet
n GUI Clients for Security Management Server
n LLDP
Time
All Security Management Servers, Security Gateways, and Cluster Members must synchronize their
system clocks.
This is important for these reasons:
n SIC trust can fail if devices are not synchronized correctly.
n Cluster synchronization requires precise clock synchronization between members.
n SmartEvent Correlation uses time stamps that must be synchronized to approximately one a
second.
n To make sure that cron jobs run at the correct time.
n To do certificate validation for applications based on the correct time.
You can use these methods to set the system date and time:
n Network Time Protocol (NTP).
n Manually, in the Gaia Portal, or Gaia Clish.
Best Practice - Configure more than one NTP server for redundancy.
Step Description
4 Click OK.
Step Description
3 In the Time and Date Settings window, select Set Time and Date automatically using
Network Time Protocol (NTP).
4 Enter the Hostname or IP address of the primary and (optionally) secondary NTP servers.
Best Practice - Configure more than one NTP server for redundancy.
6 Click OK.
Step Description
2 Click Set Time Zone and select the time zone from the list.
3 Click OK.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Syntax
show clock
Example
Syntax
n To configure the time:
show time
Parameters
Parameter Description
Syntax
n To configure a date:
show date
Parameters
Parameter Description
Example
To configure the 20th of January 2020, run:
Syntax
n To configure the time zone:
Important - The spaces before and after the slash character (/) are mandatory.
show timezone
Parameters
Parameter Description
Examples
Syntax
n To add a new NTP server:
set ntp
active {on | off}
server
primary <IPv4 address or Hostname of NTP Server>
version {1|2|3|4}
secondary <IPv4 address or Hostname of NTP Server>
version {1|2|3|4}
show ntp
active
current
servers
Parameters
Parameter Description
current Shows the IP address or Host name of the NTP server Gaia uses right now.
server Keyword that identifies the NTP server - time server, from which Gaia
synchronizes its clock.
The specified time server does not synchronize to the local clock of Gaia.
primary Configures the IP address or Host name of the primary NTP server.
secondary Configures the IP address or Host name of the secondary NTP server.
Parameter Description
Example
Cloning Group
A Cloning Group is a collection of Gaia Security Gateways that synchronize their OS configurations and
settings for a number of shared features, for example DNS or ARP.
Step Description
a. In the Cloning Group Name field, enter a name for the Cloning Group.
b. In the IP for cloning field, select an IPv4 address (interface) for synchronizing settings
between member Security Gateways.
Select an interface on a secure internal network.
c. In the Password field, enter a password for the administration account (cadmin).
This password is necessary to:
n Manage the Cloning Group
n Add other Security Gateways to the Cloning Group
n Create encrypted traffic between members of the Cloning Group
d. In the Confirm Password field, enter the password again.
5 In the Shared Features screen, select features to clone to other members of the Cloning
Group.
Pay attention to the features you want to clone.
For example, you might not want to clone static routes to Security Gateways that are
members of a cluster.
7 Click Finish.
The features are listed in the same order, in which they are shown in Gaia Portal.
Table: Shared Features in Gaia Portal
Shared Feature Description
Job Scheduler Schedule automated tasks that perform actions at a specific time.
ARP Configure static ARP entries and proxy ARP entries, control dynamic ARP
entries.
Host Access Configure which hosts are allowed to connect to the cluster devices.
Control
NTP Configure Network Time Protocol for synchronizing the system's clock over
a network.
Display Format Configure how the system displays time, date and netmask.
Mail Notification Configure email address, to which Gaia sends mail notifications.
DHCP Relay Configure relay of DHCP and BOOTP messages between clients and
servers on different IPv4 Networks.
IPv6 DHCP Relay Configure relay of DHCPv6 messages between clients and servers on
different IPv6 Networks.
IGMP Establish multicast group memberships via the Internet Group Management
Protocol.
RIP Configure IPv4 dynamic routing via the Routing Information Protocol.
RIPng Configure IPv6 dynamic routing via the Routing Information Protocol.
OSPF Configure IPv4 dynamic routing via the Open Shortest-Path First v2
protocol.
IPv6 OSPF Configure IPv6 dynamic routing via the Open Shortest-Path First v3
protocol.
Inbound Route Configure Inbound Route Filters for RIP, OSPFv2, BGP, and OSPFv3
Filters (supports IPv4 and IPv6).
Prefix Lists and Configure dynamic routing prefix lists and trees.
Trees
Policy Based Configure policy based routing (PBR) priority rules and action tables.
Routing
Step Description
2 Sign in to the same Gaia Portal using the cadmin account and password.
(Alternatively, log in to the Gaia Portal on the Security Gateway using the cadmin
credentials.)
3 In System Management > Cloning Group, select features from the Shared Features .
Note - A user that gets cloning group administration privileges (the RBA role
CloningGroupManagement), can manage specific Cloning Groups features
granted by the administrator and grant Cloning Group capabilities to other users,
including remote users. When these privileges are assigned, the Group Mode
button shows in Gaia Portal.
To manage a Cloning Group as an assigned administrator
Step Description
Step Description
2 In System Management > Cloning Group, click Start Cloning Group Creation Wizard.
The Cloning Group Wizard opens.
n In the Remote Member Address field, enter the IPv4 address of a remote member of
the Cloning Group.
n In the IP for cloning field, select an IP address (interface) for synchronizing the
settings between Security Gateways.
Select an interface on a secure internal network. Make sure there is a physical
connectivity to the Gaia computer that runs the Cloning Group, to which you wish to
join.
n In the Password field, enter a password for the Cloning Group administration account
(cadmin).
(The same password you entered when you created the Cloning Group, to which you
wish to join.)
The cadmin password:
l Lets you log in to the cadmin account
synchronization
5 Click Finish.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Step Description
2 In System Management > Cloning Group, click Start Cloning Group Creation Wizard.
The Cloning Group Creation Wizard opens.
5 Click Finish.
Note - When run from the cadmin account, these commands apply to all members of
the Gaia group.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Step Description
Step Description
4 Run the "join cloning group" command to join the Cloning Group.
Step Description
CLI Syntax
To Create and configure a Cloning Group
Syntax
set cloning-group
local-ip <IPv4 address>
mode {manual | cluster-xl}
name <Name of Cloning Group>
password <Password>
state {on | off}
Parameters
Parameter Description
local-ip <IPv4 The IPv4 address used to synchronize shared features between members
address> of the Cloning Group.
mode {manual | The mode determines whether the Cloning Group is defined manually, or
cluster-xl} through ClusterXL.
password Password for the administrator's (cadmin) account, used to access the
<Password> Cloning Group configuration in the Gaia Portal, or Gaia Clish.
When prompted, enter and confirm the password.
Syntax
Parameters
Parameter Description
< The name of the feature to be synchronized between the members of the Cloning
Feature> Group.
The features are listed in the same order, in which they are shown in Gaia Clish when you run the
"show cloning-group shared-feature" command.
Table: Shared Features in Gaia Clish
Name of Shared
Description
Feature
bootp Configure IPv4 DHCP Relay - relay of DHCP and BOOTP messages
between clients and servers on different IPv4 Networks.
cron Configure job scheduler - schedule automated tasks that perform actions
at a specific time.
dhcp6relay Configure IPv6 DHCP Relay - relay of DHCPv6 messages between clients
and servers on different IPv6 Networks.
inboundfilters Configure Inbound Route Filters for RIP, OSPFv2, BGP, and OSPFv3
(supports IPv4 and IPv6).
ntp Configure Network Time Protocol (NTP) for synchronizing the system's
clock over a network.
ospf Configure IPv4 dynamic routing via the Open Shortest-Path First v2
protocol.
ospf3 Configure IPv6 dynamic routing via the Open Shortest-Path First v3
protocol.
display-format Configure how the system displays time, date and netmask.
arp Configure static ARP entries and proxy ARP entries, control dynamic ARP
entries.
host-access Configure which hosts are allowed to connect to the cluster devices.
pbr Configure policy based routing (PBR) priority rules and action tables.
rip Configure IPv4 dynamic routing via the Routing Information Protocol.
ripng Configure IPv6 dynamic routing via the Routing Information Protocol.
Syntax
Parameters
Parameter Description
<Feature> The name of the feature to be deleted from the list of shared features.
To see the list of the enabled Shared Features:
a. Enter:
delete cloning-group shared-feature
b. Press <SPACE> and <TAB>.
Syntax
Parameters
Parameter Description
<IPv4 address of Cloning The IPv4 address of the Cloning Group member, to which
Group> you join.
Syntax
Parameters
Parameter Description
<IPv4 address of The IPv4 address of the Cloning Group member that became
Member> inaccessible.
Important - Use this command only for troubleshooting purposes, when the remote
Cloning Group member is not accessible. A normal way to remove a member from a
Cloning Group is to run the "leave cloning-group" command on that
member.
Notes:
n The Cloning Group configuration on the remote member itself does not
change, and as soon as the device regains connectivity, it joins the Cloning
Group again.
n This command can only be run if the Cloning Group is in Manual mode.
Syntax
show cloning-group
local-ip
members
mode
name
shared-feature
state
status
Parameters
Parameter Description
local-ip The IPv4 address used to synchronize shared features between the members of
the Cloning Group.
shared- Lists the shared features that are enabled to be used by all members of the
feature Cloning Group.
Note - This option is not available, if you are logged into the cadmin
account.
When a user (local or remote) receives Cloning Group management privileges, the user can enable (or
disable) the Cloning Group management mode, to create, delete, and edit Cloning Groups.
Syntax
Parameters
Parameter Description
SNMP
In This Section:
Introduction 242
SNMP v3 - User-Based Security Model (USM) 243
Enabling SNMP 244
SNMP Agent Address 244
SNMP Traps 244
Introduction
Simple Network Management Protocol (SNMP) is an Internet standard protocol. SNMP is used to send and
receive management information to other network devices. SNMP sends messages, called protocol data
units (PDUs), to different network parts. SNMP-compliant devices, called agents, keep data about
themselves in Management Information Bases (MIBs) and resend this data to the SNMP requesters.
Through the SNMP protocol, network management applications can query a management agent using a
supported MIB. The Check Point SNMP implementation lets an SNMP manager monitor the system and
modify selected objects only. You can define and change one read-only community string and one
read-write community string. You can set, add, and delete trap receivers and enable or disable various
traps. You can also enter the location and contact strings for the system.
Check Point Gaia supports SNMP v1, v2, and v3.
To view detailed information about each MIB that the Check Point implementation supports (also, see
sk90470):
MIB Location
Notes:
n The Check Point implementation also supports the User-based Security model
(USM) portion of SNMPv3.
n The Gaia implementation of SNMP is built on NET-SNMP. Changes were made
to the first version to address security and other fixes. For more information, see
Net-SNMP.
Warning - If you use SNMP, we recommend that you change the community strings for
security purposes. If you do not use SNMP, disable SNMP or the community strings.
SNMP, as implemented on Check Point platforms, enables an SNMP manager to monitor the device using
GetRequest, GetNextRequest, GetBulkRequest, and a select number of traps.
The Check Point implementation also supports using SetRequest to change these attributes:
sysContact, sysLocation, and sysName. You must configure read-write permissions for set
operations to work.
Use Gaia to run these tasks:
n Define and change one read-only community string.
n Define and change one read-write community string.
n Enable and disable the SNMP daemon.
n Create SNMP users.
n Change SNMP user accounts.
n Add or delete trap receivers.
n Enable or disable the various traps.
n Enter the location and contact strings for the device.
Best Practice - Use authentication and encryption. You can use them independently
by specifying one or the other with your SNMP manager requests. The Gaia responds
accordingly.
SNMP users are maintained separately from system users. You can create SNMP user accounts with the
same names as existing user accounts or different. You can create SNMP user accounts that have no
corresponding system account. When you delete a system user account, you must separately delete the
SNMP user account.
Enabling SNMP
The SNMP daemon is disabled by default.
If you choose to use SNMP, enable and configure it according to your security requirements.
At minimum, you must change the default community string to something other than public.
You can choose to use all versions of SNMP (v1, v2, and v3) on your system, or to grant SNMPv3 access
only.
Best Practice - If your SNMP management station supports SNMP v3, select only
SNMP v3 on Gaia. SNMPv3 limits community access. Only requests from users with
enabled SNMPv3 access are allowed, and all other requests are rejected.
Note - If you do not plan to use SNMP to manage the network, disable it. Enabling
SNMP opens potential attack vectors for surveillance activity. It lets an attacker learn
about the configuration of the device and the network.
SNMP Traps
Managed devices use trap messages to report events to the Network Management Station (NMS).
When some types of events occur, the platform sends a trap to the management station.
The Gaia proprietary traps are defined in the /etc/snmp/GaiaTrapsMIB.mib file.
Gaia supports these types of SNMP traps:
Table: SNMP Traps in Gaia
Type of Trap Description
highVoltage Notifies if one of the voltage sensors exceeds its maximum value.
lowVoltage Notifies if one of the voltage sensors falls below its minimum value.
vrrpv2AuthFailure Notifies when the VRRP Cluster Member has packet an authentication
failure in VRRPv2 (IPv4) and VRRPv3 (IPv6).
Sent each polling interval.
vrrpv3NewMaster Notifies when the VRRP Cluster Member transitioned to VRRP Master
state in VRRPv3 (IPv6).
Sent each polling interval.
vrrpv3ProtoError Notifies when the VRRP Cluster Member has a protocol error in VRRPv2
(IPv4) and VRRPv3 (IPv6).
Sent each polling interval.
To enable SNMP
Step Description
3 In the Version drop down list, select the version of SNMP to run:
n 1/v2/v3 (any)
Select this option if your SNMP management station does not support SNMPv3.
n v3-Only
Select this option if your SNMP management station supports v3.
SNMPv3 provides a higher level of security than v1 or v2.
4 In SNMP Location String, enter a string that contains the location for the system.
The maximum length for the string is 128 characters.
That includes letters, numbers, spaces, special characters
For example: Bldg 1, Floor 3, WAN Lab, Fast Networks, Speedy, CA
5 In SNMP Contact String, enter a string that contains the contact information for the device.
The maximum length for the string is 128 characters.
That includes letters, numbers, spaces, special characters.
For example: John Doe, Network Administrator, (111) 222-3333
6 Click Apply .
Step Description
2 By default, all interfaces are selected. You can select the individual interfaces.
Note - If you do not specify agent addresses, the SNMP protocol responds to
requests from all interfaces.
Step Description
1 In the V1/V2 Settings section, in Read Only Community String, set a string other than
public .
You must always use this is a basic security precaution.
2 Optional.
Set a Read-Write Community String.
Warning - Set a read-write community string only if you have reason to enable set
operations, and if your network is secure.
Step Description
3 In the User Name, enter the applicable user name that is between 1 and 31 alphanumeric
characters with no spaces, backslash, or colon characters.
This can be the same as a user name for system access.
4 In the Security Level , select one of these options from the drop-down list:
n authPriv - The user has authentication and privacy pass phrases and can connect
with privacy encryption.
n authNoPriv - The user has only an authentication pass phrase and can connect only
without privacy encryption.
5 In the User Permissions , select one of these options from the drop-down list:
n read-only
n read-write
6 In the Authentication Protocol , select one of these options from the drop-down list:
n MD5
n SHA1
The default is MD5.
7 In the Authentication Pass Phrase, enter a password for the user that is between 8 and 128
characters in length.
n DES
n AES
The default is DES.
9 In the Privacy Pass Phrase, enter a pass phrase that is between 8 and 128 characters in
length.
Used for protection against disclosure of SNMP message payloads.
10 Click Save.
The new user shows in the table.
Step Description
2 In the V3 - User-Based Security Model (USM) section, select the user and click Remove.
The Deleting USM User Entry window opens.
Step Description
2 In the V3 - User-Based Security Model (USM) section, select the user and click Edit.
The Edit USM User window opens.
3 You can change the Security Level , User Permissions , the Authentication Protocol , the
Authentication Passphrase, or the Privacy Protocol .
4 Click Save.
Step Description
n To enable a trap:
Select from the Disabled Traps list, and click Add>
n To disable a trap:
Select from the Enabled Traps list, and click Remove>
3 Click Save.
6 Click Apply .
Step Description
4 In the Version, select the SNMP Version for the specified receiver.
5 In the Community String, enter the SNMP community string for the specified receiver.
6 Click Save.
Step Description
2 In the Trap Receivers Settings section, select the SNMP receiver and click Edit.
The Edit Trap Receiver window opens.
3 You can change the SNMP version or the SNMP community string.
4 Click Save.
Step Description
2 In the Trap Receivers Settings section, select the SNMP trap receiver and click Remove.
The Deleting Trap Receiver Entry window opens.
3 The window shows this message: Are you sure you want to delete "IPv4 address" entry?
Click Yes .
Best Practice:
For commands that include "auth-pass-phrase", "privacy-pass-phrase", or
both, use the hashed commands.
To get the hashed password, run the "show configuration snmp" command.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Syntax
Description of commands
Command Description
set snmp agent {on | Enables (on) or disables (off) the SNMP Agent.
off}
set snmp clear-trap Configures the indication of a custom SNMP trap termination.
...
set snmp community Configures the SNMP community password and if this password
<String> {read-only lets you only read the values of SNMP objects (read-only), or set
| read-write} the values as well (read-write).
set snmp contact ... Configures the contact name for the SNMP community.
set snmp location Configures the contact location for the SNMP community.
...
Command Description
context of VS0.
n vs
l For VSX Gateway only.
set snmp traps Configures the threshold for the SNMP coldStart trap.
coldStart-threshold
<Seconds>
set snmp traps Configures the polling interval for the SNMP traps.
polling-frequency
<Seconds>
set snmp traps Configures the IPv4 address of the SNMP Trap Sink.
receiver ...
set snmp traps trap- Configures the user, which will generate the SNMP traps.
user <UserName>
set snmp traps trap Configures the Gaia built-in SNMP traps.
...
set snmp vs-direct- Enables (on) and disables (off) the SNMP direct queries on the IP
access {on | off} address of a Virtual System (not only VS0), or Virtual Router.
This mode works only when SNMP vs mode is enabled.
See the R81 VSX Administration Guide.
Syntax
Description of commands
Command Description
add snmp interface Adds a local interface to the list of local interfaces, on which the
... SNMP daemon listens.
Syntax
Description of commands
Command Description
delete snmp clear-trap Removes the indication of a custom SNMP trap termination.
delete snmp contact ... Removes the contact name for the SNMP community.
delete snmp interface Removes the local interface from the list of local interfaces,
<Name of Interface> on which the SNMP daemon listens.
delete snmp location ... Removes the contact location for the SNMP community.
delete snmp traps Removes the threshold for the SNMP coldStart trap.
coldStart-threshold
delete snmp traps polling- Removes the polling interval for the SNMP traps.
frequency
delete snmp traps receiver Removes the IPv4 address of the SNMP Trap Sink.
<IPv4 address>
delete snmp traps trap- Removes the user, which will generate the SNMP traps.
user <UserName>
SNMP PDU
Within the SNMP PDU, the third field can include an error-status integer that refers to a specific problem.
The integer zero (0) means that no errors were detected.
When the error field is anything other than 0, the next field includes an error-index value that identifies the
variable, or object, in the variable-bindings list that caused the error.
This table lists the error status codes and their meanings:
0 noError 10 wrongValue
1 tooBig 11 noCreation
2 NoSuchName 12 inconsistentValue
3 BadValue 13 resourceUnavailable
4 ReadOnly 14 commitFailed
5 genError 15 undoFailed
6 noAccess 16 authorizationError
7 wrongType 17 notWritable
8 wrongLength 18 inconsistentName
9 wrongEncoding
Note - You might not see the codes. The SNMP manager or utility interprets the codes
and then logs the appropriate message.
Within the SNMP PDU, the fourth field, contains the error index when the error-status field is nonzero.
That is, when the error-status field returns a value other than zero, which indicates that an error occurred.
The error-index value identifies the variable, or object, in the variable-bindings list that caused the error.
The first variable in the list has index 1, the second has index 2, and so on.
Variable-bindings
Description
element
value Value that is associated with each object instance. This value is specified in a
PDU request.
noSuchObject Indicates that the agent does not implement the object, to which it refers by this
object identifier.
noSuchInstance Indicates that this object does not exist for this operation.
endOfMIBView Indicates an attempt to reference an object identifier that is beyond the end of
the MIB at the agent.
GetRequest
This table lists possible value field sets in the response PDU or error-status messages when performing an
SNMP GetRequest.
noSuchObject If a variable does not have an OBJECT IDENTIFIER prefix that exactly matches
the prefix of any variable accessible by this request, its value field is set to
noSuchObject.
noSuch If the variable's name does not exactly match the name of a variable, its value field
Instance is set to noSuchInstance.
genErr If the processing of a variable fails for any other reason, the responding entity
returns genErr and a value in the error-index field that is the index of the problem
object in the variable-bindings field.
tooBig If the size of the message that encapsulates the generated response PDU exceeds
a local limitation or the maximum message size of the request's source party, then
the response PDU is discarded and a new response PDU is constructed. The new
response PDU has an error-status of tooBig, an error-index of zero, and an
empty variable-bindings field.
GetNextRequest
The only values that can be returned as the second element in the variable-bindings field to a
GetNextRequest when an error-status code occurs are unSpecified or endOfMibView.
GetBulkRequest
The GetBulkRequest minimizes the number of protocol exchanges and lets the SNMPv2 manager
request that the response is large as possible.
The GetBulkRequest PDU has two fields that do not appear in the other PDUs: non-repeaters and
max-repetitions. The non-repeaters field specifies the number of variables in the variable-bindings list, for
which a single-lexicographic successor is to be returned. The max-repetitions field specifies the number of
lexicographic successors to be returned for the remaining variables in the variable-bindings list.
If at any point in the process, a lexicographic successor does not exist, the endofMibView value is
returned with the name of the last lexicographic successor, or, if there were no successors, the name of
the variable in the request.
If the processing of a variable name fails for any reason other than endofMibView, no values are
returned. Instead, the responding entity returns a response PDU with an error-status of genErr and a
value in the error-index field that is the index of the problem object in the variable-bindings field.
Job Scheduler
You can schedule regular jobs.
You can configure the jobs to run at the dates and times that you specify, or at startup.
Step Description
2 Click Add.
The Add A New Scheduled Job window opens.
5 Below the Schedule, select the frequency (Daily , Weekly , Monthly , At startup) for this job.
Where applicable, enter the Time of day for the job, in the 24-hour clock format (HH:MM).
6 Click OK.
The job shows in the Scheduled Jobs table.
7 In the E-mail Notification, enter the e-mail address, to which Gaia should send the
notifications.
Note - You must also configure a Mail Server (see "Mail Notification" on page 265).
8 Click Apply .
Step Description
3 Click Delete.
4 Click OK to confirm.
(Click Cancel to abort.)
Step Description
2 In the scheduled Jobs table, select the job that you want to edit.
3 Click Edit.
The Edit Scheduled Job opens.
5 Click OK.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Syntax
Parameters
CLI Parameters
Parameter Description
recurrence daily time Specifies that the job should run once a day - every day, at
<HH:MM> specified time.
Enter the time of day in the 24-hour clock format -
<Hours>:<Minutes>.
Example: 14:35
recurrence monthly month Specifies that the job should run once a month - on
<1-12> days <1-31> time specified months, on specified dates, and at specified
<HH:MM> time.
Months are specified by numbers from 1 to 12:
n January = 1
n February = 2
n ...
n December = 12
Dates of month are specified by numbers from 1 to 31.
To specify several consequent months, enter their
numbers separate by commas.
Example: For January, February, and March, enter
1,2,3
To specify several consequent dates, enter their numbers
separate by commas.
Example: For 1st, 2nd and 3rd day of the month, enter
1,2,3
recurrence weekly days <1- Specifies that the job should run once a week - on
31> time <HH:MM> specified days of week, and at specified time.
Days of week are specified by numbers from 0 to 6:
n Sunday = 0
n Monday = 1
n Tuesday = 2
n Wednesday = 3
n Thursday = 4
n Friday = 5
n Saturday = 6
recurrence system-startup Specifies that the job should at every system startup.
Parameter Description
mailto <Email Address> Specifies the email address, to which Gaia sends the jobs'
results.
Enter one email address for each command. You must
also configure a mail server (see "Mail Notification" on
page 265).
Mail Notification
In This Section:
Introduction 265
Configuring Mail Notification in Gaia Portal 265
Configuring Mail Notification in Gaia Clish 266
Introduction
Mail notifications (also known as Mail Relay) allow you to send email from the Security Gateway.
You can send email interactively or from a script. The email is relayed to a mail hub that sends the email to
the final recipient.
Mail notifications are used as an alerting mechanism when a Firewall rule is triggered. It is also used to
email the results of cron jobs to the system administrator.
Gaia supports these mail notification features:
n Presence of a mail client or Mail User Agent (MUA) that can be used interactively or from a script.
n Presence of a Sendmail-like replacement that relays mail to a mail hub by using SMTP.
n Ability to specify the default recipient on the mail hub.
Gaia does not support these mail notification features:
n Incoming e-mail.
n Mail transfer protocols other than outbound SMTP.
n Telnet to port 25.
n E-mail accounts other than admin or monitor.
2 In the Mail Server field, enter the IPv4 Address or Hostname of the mail server.
For example: mail.example.com
4 Click Apply .
Syntax
n To configure the mail server that receives the mail notifications:
n To configure the user on the mail server that receives the mail notifications:
show mail-notification
server
username
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
server <IPv4 Address or The IPv4 address or Hostname of the mail server, to which Gaia
Hostname> sends mail notifications.
Example: mail.company.com
username <User Name> The username on the mail server that receives the admin or
monitor mail notifications.
Example: johndoe
Example
Messages
In This Section:
Comparison 267
Configuring Messages in Gaia Portal 267
Configuring Messages in Gaia Clish 268
Limits 270
You can configure Gaia to show a Banner Message and a Message of the Day to users when they log in.
Comparison
Banner Message Message of the Day
Default Message This system is for authorized You have logged into
use only the system
When shown in Browser login page, before logging in After logging in to the system
Gaia Portal
When shown in When logging in, before entering the After logging in to the system
Gaia Clish password
5 Click Apply .
set message banner on line msgvalue <Banner Text for Line #1>
set message banner on line msgvalue <Banner Text for Line #2>
set message motd on line msgvalue <Message Text for Line #1>
set message motd on line msgvalue <Message Text for Line #2>
n To delete the configured message of the day, perform these two steps:
1. Delete the user-defined message of the day:
Note - This deletes the configured message of the day, and replaces it
with the default message of the day "You have logged into
the system."
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Limits
Maximal supported Maximal supported Maximal supported
total number total number number of
Message type
of characters of lines characters
in the message in the message in each line
Banner 1600 20 80
Display Format
In This Section:
You configure format for the Time, Date, and IPv4 netmask on Gaia.
n 12-hour
n 24-hour
n dd/mm/yyyy
n mm/dd/yyyy
n yyyy/mm/dd
n dd-mmm-yyyy
n Dotted-decimal notation
n CIDR notation
5 Click Apply .
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Session
You can manage inactivity timeout for Gaia Portal and Gaia Clish.
2 In the Command Line Shell section, configure the inactivity timeout for the Gaia Clish.
3 In the Web UI section, configure the inactivity timeout for the Gaia Portal.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Syntax
n To configure the timeout:
show inactivity-timeout
Parameters
Parameter Description
<Timeout> The inactivity timeout (in minutes) for the Gaia Clish.
n Range: 1 - 720 minutes
n Default: 10 minutes
Crash Data
In This Section:
Introduction 274
Configuring Core Dumps in Gaia Portal 274
Configuring Core Dumps in Gaia Clish 276
Introduction
A process core dump file consists of the recorded status of the working memory of the Gaia computer at
the time that a Gaia process terminated abnormally.
When a process terminates abnormally, it produces a core dump file in the
/var/log/dump/usermode/ directory.
If the /log partition has less than 200 MB, no core dumps are created, and all core dumps are deleted to
create space. This prevents the core dump files from filling the /log partition.
Procedure
Step Description
2 Optional: Select Send crash data which might contain personal data to Check Point.
If you enable this option, Gaia operating system uploads the detected core dump files to
Check Point Cloud.
This lets Check Point R&D analyze the crashes and issue fixes for them.
3 Click Apply .
Parameters
Parameter Description
Total space limit The maximum amount of disk space in MB that is used for storing core dumps.
If disk space is required for a core dump, the oldest core dump is deleted.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999 MB
n Default: 1000 MB
Dumps per The maximum number of dumps that are stored for each process executable
process (program) file.
A new core dump overwrites the oldest core dump.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999
n Default: 2
Example
There are two programs "A" and "B", and the per-process limit is limit is 2.
Program "A" terminates 1 time and program "B" terminates 3 times.
The core dumps that remain are:
n 1 core dump for program "A"
n 2 core dumps for program "B"
n Core dump 3 for program "B" is deleted because of the per-process limit.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
total <0- The maximum amount of space that is used for core dumps. If space is
99999> required for a dump, the oldest dump is deleted.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999 MB
n Default: 1000 MB
per_process The maximum number of core dumps that are stored for each process
<0-99999> executable (program) file.
A new core dump overwrites the oldest core dump.
The per-process limit is enforced before the space limit.
n Range: 1 - 99999
n Default: 2
Example
There are two programs "A" and "B", and the per-process limit is limit is 2.
Program "A" terminates 1 time and program "B" terminates 3 times.
The core dumps that remain are:
n 1 core dump for program "A"
n 2 core dumps for program "B"
n Core dump 3 for program "B" is deleted because of the per-process
limit.
System Configuration
In This Section:
Important:
n Security Management Server R81 does not support IPv6 Address on Gaia
Management Interface (Known Limitation 01622840).
n Multi-Domain Server R81 does not support IPv6 at all (Known Limitation PMTR-
14989).
Before you can configure IPv6 addresses and IPv6 static routes, you must:
Step Description
2 Reboot.
Step Description
1 Enable the IPv6 support in Gaia OS on both the Security Management Server and the Security
Gateway (each Cluster Member).
5 Install the Access Control Policy on the Security Gateway (the Cluster) object.
2 From the navigation tree, click System Management > System Configuration.
4 Click Apply .
show ipv6-state
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Procedure
Step Instructions
Step Instructions
5 Reboot:
reboot
System Logging
You can configure the settings for the system logs, including sending them to a remote server.
Make sure to configure the remote server to receive the system logs.
Note - There are settings that you can configure only in Gaia Clish.
Step Description
3 Click Apply .
Step Description
3 In the IP Address field, enter the IPv4 address of the remote syslog server.
4 In the Priority field, select the severity level of the logs that are sent to the remote server.
These are the accepted values (as defined by the RFC 5424 - Section-6.2.1):
n All - All messages
n Debug - Debug-level messages
n Info - Informational messages
n Notice - Normal but significant condition
n Warning - Warning conditions
n Error - Error conditions
n Critical - Critical conditions
n Alert - Action must be taken immediately
n Emergency - System is unusable
5 Click OK.
Important - Do not to configure two Gaia computers to send system logs to each
other - directly, or indirectly. Such configuration creates a syslog forwarding loop,
which causes all syslog message to repeat indefinitely on both Gaia computer.
Step Description
3 Click Edit.
4 In the IP Address field, enter the IPv4 address of the remote syslog server.
5 In the Priority field, select the severity level of the logs that are sent to the remote server.
6 Click OK.
Step Description
2 In the Remote System Logging section, select the remote syslog server.
3 Click Delete.
Note - There are some command options and parameters, which you cannot configure
in the Gaia Portal.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
n To send the Gaia configuration audit logs to a Check Point Management Server:
show syslog
all
auditlog
cplogs
filename
mgmtauditlogs
show syslog
all
log-remote-address <IPv4 Address>
log-remote-addresses
CLI Parameters
Parameter Description
cplogs {on | Specifies if the Gaia sends the Gaia system logs to a Check Point
off} Management Server:
n on - Send Gaia system syslogs
n off - Do not send Gaia syslogs
Default: off
Note - This command corresponds to the Send Syslog messages
to management server option in the Gaia Portal > System
Management > System Logging.
mgmtauditlogs Specifies if the Gaia sends the Gaia audit logs (for configuration changes that
{on | off} authorized users make) to a Check Point Management Server:
n on - Send Gaia audit logs
n off - Do not send Gaia audit logs
Default: on
Note - This command corresponds to the Send audit logs to
management server upon successful configuration option in the
Gaia Portal > System Management > System Logging.
Parameter Description
auditlog Specifies if the Gaia saves the logs for configuration changes that authorized
{disable | users make:
permanent}
n disable - Disables the Gaia audit log facility
n permanent - Enables the Gaia audit log facility to save information
about all successful changes in the Gaia configuration. To specify a
destination file, run the set syslog filename </Path/File>
command (otherwise, Gaia uses the default /var/log/messages
file).
Default: permanent
Note - This command corresponds to the Send audit logs to syslog
upon successful configuration option in the Gaia Portal > System
Management > System Logging.
/< Configures the full path and file name of the system log.
Path>/<File> Default: /var/log/messages
Note in Gaia Portal does not let you configure this setting.
<IPv4 IPv4 address of the remote syslog server, to which Gaia sends its system logs.
Address>
n Range: Dotted-quad ([0-255].[0-255].[0-255].[0-255])
n Default: No default value
Parameter Description
Notes:
n Until you configure at least one severity level for a given
remote server, Gaia does not send syslog messages.
n If you specify multiple severities, the most general least
severe severity always takes precedence.
Example
gaia> set syslog auditlog permanent
/var/log/routed_ Dedicated file that contains only the RouteD log messages.
messages In Gaia versions R80 and higher, the RouteD writes to this file by
default.
/var/log/messages This file contains log messages from different daemons and from the
operating system.
In Gaia versions R77.30 and lower, the RouteD writes to this file by
default.
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n When you change this configuration, it is not necessary to restart the RouteD
daemon, or reboot.
Step Description
1 From the left navigation tree, click Advanced Routing > Routing Options .
2 In the Routing Process Message Logging Options section, select Log Routed Separately .
3 In the Maximum File Size field, enter the size (in megabytes) for each log file.
The default size is 1 MB.
When the active log file /var/log/routed_messages reaches the maximal configured
size, the Gaia OS rotates it and creates
the new /var/log/routed_messages file.
4 In the Maximum Number of Files field, enter the maximal number of log files to keep.
The default is to keep 10 log files:
n /var/log/routed_messages
n /var/log/routed_messages.0
n /var/log/routed_messages.1
n ...
n /var/log/routed_messages.9
If the number of all log files reaches the maximal configured number, the Gaia OS deletes
the oldest file, and rotates the existing files.
The file names end with a number suffix. The greater the suffix number, the older the file.
5 Click Apply .
Step Description
When the number of log files reaches the maximal configured number, the Gaia OS deletes
the oldest log file and rotates the existing log files.
The file names end with a number suffix. The greater the suffix number, the older the log file.
She
Command Expected output
ll
Gai show n If default values were used for "maxnum" and "size":
a configurat
set routedsyslog on
Clis ion
h routedsysl n If custom values were configured for "maxnum" and "size":
og set routedsyslog on
set routedsyslog maxnum <Configured_Value>
set routedsyslog size <Configured_Value>
Exp grep n If default values were used for "maxnum" and "size":
ert routedsysl
routed:instance:default:routedsyslog t
mo og
de /config/ac n If custom values were configured for "maxnum" and "size":
tive routed:instance:default:routedsyslog t
routed:instance:default:routedsyslog:size
<Configured_Value>
routed:instance:default:routedsyslog:files
<Configured_Value>
Note - Disk space is added to the log volume by subtracting it from the disk space used
to store Gaia backup images.
Step Description
2 Reboot:
reboot
7 Reboot:
reboot
Related information
See "LVM Overview" on page 458.
Network Access
Introduction
Telnet is not recommended for remote login, because it is not secure.
SSH, for example, provides much of the functionality of Telnet with good security.
Network access to Gaia using Telnet is disabled by default. You can allow Telnet access.
3 Click Apply .
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Host Access
You can configure hosts or networks that are allowed to connect to the Gaia Portal or Gaia Clish on the
Gaia device.
2 Click Add.
The Add a New Allowed Client window opens.
4 Click OK.
add allowed-client
host
any-host
ipv4-address <Host IPv4 Address>
network ipv4-address <Network IPv4 Address> mask-length <1-
31>
delete allowed-client
host
any-host
host ipv4-address <Host IPv4 Address>
network ipv4-address <Network IPv4 Address>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
<Host IPv4 Address> The IPv4 address of the allowed host in dotted decimal format
(X.X.X.X)
<Network IPv4 The IPv4 address of the allowed network in dotted decimal format
Address> (X.X.X.X)
Example
LLDP
You can configure Gaia to advertise and receive information from other network devices over the Link
Layer Discovery Protocol (LLDP) protocol.
The LLDP is a vendor-neutral link layer protocol that network devices use to advertise their identity,
capabilities (and so on) and to receive information about their neighbors on a local area network based on
IEEE 802 standard.
The gathered information may include:
n System Name
n System Description
n System Capabilities (switching, routing, etc.)
n Port Description
n Management Address
2 In the Type Length Value (TLV) section, select which information to send in the LLDP packets,
and click Apply :
n System Name
To send the Gaia hostname.
n System Description
To send the formatted output of the "uname -msr" command
(which contains kernel name, kernel release, and kernel machine hardware name).
n System Capabilities
To send the string "station" (regardless of the Check Point configuration).
n Port Description
To send the name of the interface.
n Management Address
To send the IP address of the interface.
Step Description
3 In the Timers section, configure the applicable values, and click Apply :
n Transmit Interval
This interval controls how frequently Gaia To send LLDP packets on the selected
interfaces.
Enter a value between 8 and 32768 (default is 30) seconds.
n Hold Time Multiplier
This multiplier controls the Time-to Live (TTL) of the LLDP packets:
TTL = (Transmit Interval) x (Hold Time Multiplier).
This TTL is the duration, for which the receiving neighbor stores the LLDP information in
its database.
Enter a value between 2 and 10 (default is 4).
Note - These values are global and apply to all selected interfaces.
5 In the LLDP Configuration section, select Enable LLDP, and click Apply .
set lldp
hold-time-multiplier <2-10>
interface <Name of Interface>
receive {on | off}
transmit {on | off}
transmit-and-receive {on | off}
state {on | off}
tlv
port-description {on | off}
system-name {on | off}
system-description {on | off}
system-capabilities {on | off}
management-address {on | off}
transmit-interval <8-32768>
Important - After you add, configure, or delete features, run the "save
config" command to save the settings permanently.
Parameters
Parameter Description
hold-time-multiplier This multiplier controls the Time-to Live (TTL) of the LLDP
packets:
TTL = (Transmit Interval) x (Hold Time Multiplier).
This TTL is the duration, for which the receiving neighbor
stores the LLDP information in its database.
Enter a value between 2 and 10 (default is 4).
interface <Name of Enables (on) and disables (off) the LLDP mode on the
Interface> receive {on | interface as "receive only".
off} The interface only receives the LLDP packets, but does not
transmit the LLDP packets.
interface <Name of Enables (on) and disables (off) the LLDP mode on the
Interface> transmit {on | interface as "transmit only".
off} The interface only transmits the LLDP packets, but does not
receive the LLDP packets.
interface <Name of Enables (on) and disables (off) the LLDP mode on the
Interface> transmit-and- interface as "transmit and receive".
receive {on | off} The interface transmits and receives the LLDP packets.
state {on | off} Enables (on) and disables (off) the LLDP on the specified
interface.
tlv port-description {on | Enables (on) and disables (off) the LLDP-enabled
off} interface to send the Port Description information in the
LLDP packets.
Sends the name of the interface.
tlv system-name {on | off} Enables (on) and disables (off) the LLDP-enabled
interface to send the System Name information in the LLDP
packets.
Sends the Gaia hostname.
tlv system-description {on | Enables (on) and disables (off) the LLDP-enabled
off} interface to send the System Description information in the
LLDP packets.
Sends the formatted output of the "uname -msr"
command
(which contains kernel name, kernel release, and kernel
machine hardware name).
Parameter Description
tlv system-capabilities {on Enables (on) and disables (off) the LLDP-enabled
| off} interface to send the System Capabilities information in the
LLDP packets.
Sends the string "station" (regardless of the Check Point
configuration).
tlv management-address {on | Enables (on) and disables (off) the LLDP-enabled
off} interface to send the Management Address information in
the LLDP packets.
Send the IP address of the interface.
lldpneighbors
Example output
[Expert@MyGaia:0]# lldpneighbors
Read 512 bytes. Total size is now: 512
Buffer is: 0xFFADB704 and Temporary Buffer is 0xFFADB700.
Read 282 bytes. Total size is now: 794
Buffer is: 0xFFADB704 and Temporary Buffer is 0xFFADB700.
Neighbor 1:
Chassis ID: MA
Port ID: Interface Name - eth0
Time To Live: 120 seconds
End Of LLDPDU:
Neighbor 2:
Chassis ID: MA
Port ID: Locally Assigned - Eth1/37
Time To Live: 120 seconds
Port Description: Ethernet1/37
System Name: SecureOsLabFL6ApplianceSwitch.SecreOS_LAB6
System Description: Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2002-20XX, Cisco Systems, Inc. All rights reserved.
System Capabiltiies:
Bridge/Switch (disabled)
Router (enabled)
Management Address: IPv4 - 172.23.95.1 (ifIndex - 83886080) (OID: Standard LLDP MIB)
Organizationally Specific:
End Of LLDPDU:
[Expert@MyGaia:0]#
Advanced Routing
Dynamic Routing is fully integrated into the Gaia Portal and Gaia Clish.
BGP, OSPF and RIP are supported.
Dynamic Multicast Routing is supported, with PIM (Sparse Mode (SM), Dense Mode (DM), Source-Specific
Multicast (SSM), and IGMP.
To learn about dynamic routing, see the R81 Gaia Advanced Routing Administration Guide.
User Management
This chapter describes how to manage passwords, user accounts, roles, authentication servers, system
groups, and Gaia Portal clients.
Note - When a user logs in to Gaia, the Gaia Portal navigation tree displayed and Gaia
Clish commands that are available depend on the role or roles assigned to the user. If
the user's roles do not provide access to a feature, the user does not see the feature in
the Gaia Portal navigation tree or in the list of commands. If the user has read-only
access to a feature, they can see the Gaia Portal page, but the controls are disabled.
Similarly, the user can run "show commands, but not "set", "add" or "delete"
commands.
Change My Password
A Gaia user can change their Gaia password.
4 In the Confirm New Password field, enter the new password again.
5 Click Apply .
Syntax
set selfpasswd
Warning - We do not recommend to use this command:
set selfpasswd oldpass <Old Password> passwd <New
Password>
This is because the passwords are stored as plain text in the command history.
Instead, use the "set selfpasswd" command.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Users
Use the Gaia Portal and Gaia Clish to manage user accounts.
You can:
n Add users to your Gaia system.
n Edit the home directory of the user.
n Edit the default shell for a user.
n Give a password to a user.
n Give privileges to users.
These users are created by default and cannot be deleted:
User Description
admin Has full read/write capabilities for all Gaia features, from the Gaia Portal and the Gaia Clish.
This user has a User ID of 0, and therefore has all of the privileges of a root user.
monitor Has read-only capabilities for all features in the Gaia Portal and the Gaia Clish, and can
change its own password.
You must give a password for this user before the account can be used.
New users have read-only privileges to the Gaia Portal and the Gaia Clish by default.
You must assign one or more roles before the new users can log in.
Notes:
n You can assign permissions to all Gaia features or a subset of the features
without assigning a user ID of 0.
If you assign a user ID of 0 to a user account (you can do this only in the Gaia
Clish), the user is equivalent to the Admin user and the roles assigned to that
account cannot be modified.
n Do not define a new user for external users.
An external user is one that is defined on an authentication server (such as
RADIUS or TACACS), and not on the local Gaia system.
When you create a user, you can add pre-defined roles (privileges) to the user. For more information, see
"Roles" on page 314.
Warning - A user with read and write permission to the Users feature can change the
password of another user, or an admin user. Therefore, write permission to the Users
feature should be assigned with caution.
Step Description
2 Click Add.
Important - Do not use the asterisk (*) character in the password. User with such
password will not be able to log in.
6 In the Real Name field, enter the user's real name or other informative text.
This is an alphanumeric string that can contain spaces.
The default is the user's Login Name with capitalized first letter.
9 Select User must change password at next logon, if you wish to force the user to change
the configured password during the next login.
Note - If the user does not log in within the time limit configured in the Gaia Portal >
User Management > Password Policy page > Mandatory Password Change
section > Lockout users after password expiration > Lockout user after X days ,
the user may not be able to log in at all.
10 Optional: In the UID field, enter or select the applicable User ID:
n 0 for administrator users (this is the default option)
n An integer between 103 and 65533 for non-administrator users
Step Description
13 Click OK.
Login Shells
Shell Description
Shell Description
Step Description
3 Click Edit.
4 In the Real Name field, enter the user's real name or other informative text.
7 Select User must change password at next logon, if you wish to force the user to change
the configured password during the next login.
8 In the Available Roles list, select the roles you wish to assign to this user and click Add > .
9 In the Assigned Roles list, select the roles you wish to remove from this user and click
Remove > .
10 Click OK.
Note - For the default users admin and monitor, you can only change the Shell and Roles.
To delete a user
Step Description
3 Click Delete.
4 Click OK to confirm.
Note - You cannot delete the default users admin and monitor.
Syntax
Note - For the default users admin and monitor, you can only change the Shell and Roles.
Note - You cannot delete the default users admin and monitor.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
uid <User ID> Optional. Configures unique User ID to identify permissions of the user:
n 0 for administrator users and RADIUS user account (this is the
default option)
n An integer between 103 and 65533 for non-administrator user
force-password- If you wish to force the user to change the configured password during the
change {yes | next login, set the value to yes.
no} Note - If the user does not log in within the time limit configured by
the "set password-controls expiration-lockout-
days" command, the user may not be able to log in at all.
gid <System Configures System Group ID (0-65535) for the primary group, to which a
Group ID> user belongs.
The default is 100.
You can add the user to several groups.
Use the "add group" and "set group" commands to manage the
groups.
Parameter Description
realname <Name> Configures user's description - most commonly user's real name.
This is an alphanumeric string that can contain spaces.
The default is the username with capitalized first letter.
Login Shells
Shell Description
Shell Description
Roles
Role-based administration (RBA) lets you create administrative roles for users. With RBA, an administrator
can allow Gaia users to access specified features by including those features in a role and assigning that
role to users. Each role can include a combination of administrative (read/write) access to some features,
monitoring (read-only) access to other features, and no access to other features.
You can also specify, which access mechanisms (Gaia Portal, or Gaia Clish) are available to the user.
Note - When users log in to the Gaia Portal, they see only those features, to which they
have read-only or read/write access. If they have read-only access to a feature, they
can see the settings pages, but cannot change the settings.
Role Description
Notes:
n You cannot delete or change the predefined roles.
n Do not define a new user for external users.
An external user is one that is defined on an authentication server (such as
RADIUS or TACACS), and not on the local Gaia system.
Step Description
2 Click Add.
6 Click OK.
Step Description
3 Click Edit.
6 Click OK.
To delete a role
Step Description
3 Click Delete.
4 Click OK to confirm.
Step Description
4 In the Available Users list, left-click the user you wish to add to the role.
To select several users:
6 Click OK.
Step Description
4 In the Users with Role list, left-click the user you wish to remove from the role.
To select several users:
6 Click OK.
Note - You can assign a user to many roles on the Users page (see "Users" on page 306).
Syntax
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Notes:
n There are no "set" commands for configured roles.
n You cannot delete the default roles adminRole or
monitorRole.
Parameters
CLI Parameters
Parameter Description
role <Role Name> Role name as a character string that contains letters, numbers or
the underscore (_) character.
The role name must start with a letter.
virtual-system-access Specifies which VSX Virtual Systems this role can access:
{0 | all | VSID1,
VSID2, ..., VSIDn} n 0 - Access only to VSX Gateway (VSX Cluster Member)
itself (context of VS0).
n all - Access to all Virtual Systems.
n VSID1,VSID2,...,VSIDn - Access only to specified
Virtual Systems. This is a comma-separated list of Virtual
Systems IDs (spaces are not allowed in this syntax).
Parameter Description
Notes:
n Press <SPACE><TAB> to see the list of available
features.
n You can add read-only and read-write feature
lists in the same "add rba role <Role
Name> domain-type System ..."
command.
Notes:
n Press <SPACE><TAB> to see the list of available
features.
n You can add read-only and read-write feature
lists in the same "add rba role <Role
Name> domain-type System ..."
command.
user <User Name> User, to which access mechanism permissions and roles are
assigned.
Parameter Description
access-mechanisms Defines the access mechanisms that users can work with to
{Web-UI | CLI | Web- manage Gaia:
UI,CLI}
n Web-UI - Access only to Gaia Portal
n CLI - Access only to Gaia Clish
n Web-UI,CLI - Access to both Gaia Portal and Gaia Clish
(spaces are not allowed in this syntax)
Example
gaia> add rba role NewRole domain-type System readonly-features vpn,ospf,rba readwrite-features snmp
config_system ext_config_ Run Gaia First Time Configuration tool in Expert mode.
system
cp_conf ext_cp_conf Check Point configuration utility for some local settings.
mdsstat ext_mdsstat Show the status of Multi-Domain Server and all Domain
Management Servers.
Password Policy
This section explains how to configure your platform:
n To enforce creation of strong passwords.
n To monitor and prevent use of already used passwords.
n To force users to change passwords at regular intervals.
One of the important elements of securing your Check Point cyber security platform is to set user
passwords and create a good password policy.
Note - The password policy does not apply to nonlocal users that authentication
servers such as RADIUS manage their login information and passwords. In addition, it
does not apply to non-password authentication, such as the public key authentication
supported by SSH.
To set and change user passwords, see "Users" on page 306 and "User Management" on page 304.
Password Strength
Strong, unique passwords that use a variety of character types and require password changes, are key
factors in your overall cyber security.
Procedure 345
Password Strength 345
Password History 346
Mandatory Password Change 346
Deny Access to Unused Accounts 347
Deny Access After Failed Login Attempts 348
Procedure
Step Description
3 Click Apply .
Password Strength
Parameter Description
Parameter Description
Password History
Parameter Description
History Length The number of former passwords to keep and check against when a new
password is configured for a user.
n Range: 1 - 1000
n Default: 10
Parameter Description
Password Expiration The number of days, for which a password is valid. After that time, the
password expires.
The count starts when the user changes the password.
Users are required to change an expired password the next time they
log in.
Does not apply to SNMP users.
n Range: 1 - 1827, or Passwords never expires
n Default: Passwords never expires
Parameter Description
Warn users before password How many days before the user's password expires to start
expiration generating warnings to the user that user must change the password.
A user that does not log in, does not see this warning.
n Range: 1 - 366
n Default: 7
Force users to change Forces a user to change password at first login, after the user's
password at first login after password was changed using the command "set user
password was changed from <UserName> password", or from the Gaia Portal User
Users page Management > Users page.
n Default: Not selected
Parameter Description
Days of non-use before Configures the number of days of non-use before locking out the unused
lock-out account.
This only takes effect, if Deny access to unused accounts is enabled.
n Range: 30 - 1827
n Default: 365
Parameter Description
Deny access after If the configured limit is reached, the user is locked out (unable to log in) for a
failed login attempts configured time.
Warning - Enabling this leaves you open to a "denial of service" - if
an attacker makes unsuccessful login attempts often enough, the
affected user account is locked out. Consider the advantages and
disadvantages of this option, in light of your security policy, before
enabling it.
Block admin user This option is available only if Deny access after failed login attempts is
enabled.
If the configured limit of failed login attempts for the admin user is reached,
the admin user is locked out (unable to log in) for a configured time.
Maximum number of This only takes effect if Deny access after failed attempts is enabled.
failed attempts The number of failed login attempts that a user is allowed before being
allowed locked out.
After making that many successive failed attempts, future attempts fail.
When one login attempt succeeds, counting of failed attempts stops, and the
count is reset to zero.
n Range: 2 - 1000
n Default: 10
Allow access again This only takes effect, if Deny access after failed login attempts is
after time enabled.
Allow access again after a user was locked out (due to failed login attempts).
The user is allowed access after the configured time, if there were no login
attempts during that time.
n Range: 60 - 604800 seconds
n Default: 1200 seconds (20 minutes)
Examples:
n 60 = 1 minute
n 300 = 5 minutes
n 3600 = 1 hour
n 86400 = 1 day
n 604800 = 1 week
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Password Strength
Syntax
set password-controls
complexity <1-4>
min-password-length <6-128>
palindrome-check {on |off}
show password-controls
complexity
min-password-length
palindrome-check
Parameters
Parameter Description
Password History
Syntax
set password-controls
history-checking {on | off}
history-length <1-1000>
show password-controls
history-checking
history-length
Parameters
Parameter Description
history- The number of former passwords to keep and check against when a new password
length is configured for a user.
<1-1000>
n Range: 1 - 1000
n Default: 10
set password-controls
expiration-lockout-days <1-1827 | never>
expiration-warning-days <1-366>
force-change-when {no | password}
password-expiration <1-1827 | never>
show password-controls
expiration-lockout-days
expiration-warning-days
force-change-when
password-expiration
Parameters
Parameter Description
expiration- How many days before the user's password expires to start generating
warning-days warnings to the user that user must change the password.
<1-366> A user that does not log in, does not see this warning.
n Range: 1 - 366
n Default: 7
force-change- Forces a user to change password at first login, after the user's password
when {no | was changed using the command "set user <UserName> password",
password} or from the Gaia Portal User Management > Users page.
n Range:
l no - Disables this functionality.
password- The number of days, for which a password is valid. After that time, the
expiration password expires.
<1-1827 | The count starts when the user changes the password.
never> Users are required to change an expired password the next time they log in.
Does not apply to SNMP users.
n Range: 1-1827, or never
n Default: never
n To configure the denial of access to unused accounts based on the number of days:
Parameters
Parameter Description
deny-on-nonuse Configures the number of days of non-use before locking out the
allowed-days <30- unused account.
1827> This only takes effect, if the "set password-controls deny-
on-nonuse enable" is set to "on".
n Range: 30 - 1827
n Default: 365
n To configure the denial of access to unused accounts based on the number of failed login
attempts:
Parameters
Parameter Description
allow-after Allow access again after a user was locked out (due to failed login attempts).
<60-604800> The user is allowed access after the configured time, if there were no login
attempts during that time.
n Range: 60 - 604800 seconds
n Default: 1200 seconds (20 minutes)
Examples:
n 60 = 1 minute
n 300 = 5 minutes
n 3600 = 1 hour
n 86400 = 1 day
n 604800 = 1 week
Parameter Description
enable {on | If the configured limit is reached, the user is locked out (unable to log in) for a
off} configured time.
Warning - Enabling this leaves you open to a "denial of service" - if
an attacker makes unsuccessful login attempts often enough, the
affected user account is locked out. Consider the advantages and
disadvantages of this option, in light of your security policy, before
enabling it.
show password-controls
all
complexity
deny-on-fail
allow-after
block-admin
enable
failures-allowed
deny-on-nonuse
allowed-days
enable
expiration-lockout-days
expiration-warning-days
force-change-when
history-checking
history-length
min-password-length
palindrome-check
password-expiration
Example
Password Strength
Minimum Password Length 6
Password Complexity 2
Password Palindrome Check on
Password History
Password History Checking off
Password History Length 10
Authentication Servers
You can configure Gaia to authenticate Gaia users even when they are not defined locally.
This is a good way of centrally managing the credentials of multiple Security Gateways.
To define non-local Gaia users, you define Gaia as a client of an authentication server.
Gaia supports these types of authentication servers:
Server Description
TACACS+ The TACACS+ (Terminal Access Controller Access Control System) authentication
protocol users a remote server to authenticate users for Gaia. All information sent to the
TACACS+ server is encrypted.
Gaia supports TACACS+ for authentication only. Challenge-response authentication,
such as S/Key, is not supported.
You can configure TACACS+ support separately for different services. The Gaia Portal
service is one of those, for which TACACS+ is supported and is configured as the
HTTP service. When TACACS+ is configured for use with a service, Gaia contacts the
TACACS+ server each time it needs to examine a user password. If the server fails or is
unreachable, the user is authenticated via local password mechanism. If the user fails to
authenticate via the local mechanism, the user is not allowed access.
Note - For TACACS authentication to work on a Virtual System, see the R81 VSX
Administration Guide.
Step Description
n Priority
The RADIUS server priority is an integer between -999 and 999 (default is 0).
When there two or more configured RADIUS servers, Gaia connects to the RADIUS server with the
highest priority.
Low numbers have the higher priority.
n Host
Host name or IP address (IPv4 or IPv6) of RADIUS server.
n UDP Port
UDP port used on RADIUS server.
The default port is 1812 as specified by the RADIUS standard.
The range of valid port numbers is from 1 to 65535.
Port 1645 is non-standard, but is commonly used as alternative to port 1812.
Warning - Firewall software frequently blocks traffic on port 1812. Make sure that you
define a Firewall rule to allow traffic on UDP port 1812 between the RADIUS server and
Gaia.
n Shared Secret
Shared secret used for authentication between the RADIUS server and the Gaia client.
Enter the shared secret text string up to 256 characters, without any whitespace characters and
without a backslash.
Make sure that the shared string defined on the Gaia matches the shared string defined on the
RADIUS server.
RFC 2865 recommends that the secret be at least 16 characters in length.
Some RADIUS servers have a maximum string length for shared secret of 15 or 16 characters.
See the documentation for your RADIUS server.
n Timeout in
Optional: Enter the timeout in seconds (from 1 to 5), during which Gaia waits for the RADIUS server
to respond. The default value is 3.
If there is no response after the configured timeout, Gaia tries to connect to a different configured
RADIUS server.
Set this timeout, so that the sum of all RADIUS server timeouts is less than 50.
4 Click OK.
Step Description
6 Optional: Select RADIUS Users Default Shell (for details about the shells, see "Users" on page 306).
This setting applies to all configured RADIUS servers.
8 Click Apply .
Step Description
3 Click Edit.
4 You can edit only the Host, UDP Port, Shared secret, and Timeout.
5 Click OK.
Step Description
3 Click Delete.
4 Click OK to confirm.
Description
Use the "aaa radius-servers" commands to add, configure, and delete Radius authentication
servers.
Syntax
To show a list of all configured RADIUS servers associated with an authentication profile
show aaa radius-servers list
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
priority Configures the RADIUS server priority. Enter an integer between -999
<Priority> and 999 (default is 0).
When there two or more configured RADIUS servers, Gaia connects to
the RADIUS server with the highest priority.
Low numbers have the higher priority.
new-priority <New Configures the new priority for the RADIUS server.
Priority>
host <Hostname, or Configures the Host name or IP address (IPv4 or IPv6) of RADIUS
IP Address of server.
RADIUS Server>
prompt secret The system will prompt you to enter the Shared Secret.
secret <Shared Configures the shared secret used for authentication between the
Secret> RADIUS server and the Gaia.
Enter the shared secret text string up to 256 characters, without any
whitespace characters and without a backslash.
Make sure that the shared string defined on the Gaia matches the
shared string defined on the RADIUS server.
RFC 2865 recommends that the secret be at least 16 characters in
length.
Some RADIUS servers have a maximum string length for shared
secret of 15 or 16 characters.
See the documentation for your RADIUS server.
Parameter Description
timeout <1-50> Configures the timeout in seconds (from 1 to 5), during which Gaia
waits for the RADIUS server to respond.
The default value is 3.
If there is no response after the configured timeout, Gaia tries to
connect to a different configured RADIUS server.
Set this timeout, so that the sum of all RADIUS server timeouts is less
than 50.
default- Optional: Configures the default shell for RADIUS Users (for details
shell<SPACE><TAB> about the shells, see "Users" on page 306).
super-user-uid <0 Optional: Configures the UID for the RADIUS super user.
| 96> If the UID is 0, there is no need to run the sudo command to get super
user permissions (see "Configuring RADIUS Servers for Non-Local
Gaia Users" on page 364).
NAS-IP<SPACE><TAB> Optional: This parameter records the IP address, from which Gaia
sends the RADIUS packet.
This IP address is stored in the RADIUS packet, even when the packet
goes through NAT, or some other address translation that changes the
source IP address of the packet.
The "NAS-IP-Address" is defined in RFC2865.
If no NAS IP Address is chosen, the IPv4 address of the Gaia
Management Interface is used (run the "show management
interface" command).
Step Description
Note - Do not define a new user for external users. An external user is one that is
defined on an authentication server (such as RADIUS or TACACS), and not on the
local Gaia system.
Important - If you define a RADIUS user with a null password (on the RADIUS server),
Gaia cannot authenticate that user.
Step Instructions
a. Copy this file from the Gaia to the RADIUS server to the /etc/freeradius/
directory:
/etc/radius-dictionaries/dictionary.checkpoint
b. Add this line to the /etc/freeradius/dictionary file:
"$INCLUDE dictionary.checkpoint"
a. Copy this file from the Gaia to the RADIUS server to the
/etc/openradius/subdicts/ directory:
/etc/radius-dictionaries/dict.checkpoint
b. Add this line /etc/openradius/dictionaries file immediately after the
dict.ascend:
$include subdicts/dict.checkpoint
Step Instructions
3 Define the Check Point users that must have superuser access to the Gaia shell.
Add this Check Point Vendor-Specific Attribute to users in your RADIUS server user
configuration file:
n If this user should not receive superuser permissions:
CP-Gaia-SuperUser-Access = 0
n If this user can receive superuser permissions:
CP-Gaia-SuperUser-Access = 1
To log in as a superuser
A user with super user permissions can use the Gaia shell to do system-level operations, including
working with the file system.
Super user permissions are defined in the Check Point Vendor-Specific Attributes.
Users that have a UID of 0 have super user permissions.
They can run all the commands that the root user can run.
Users that have a UID of 96 must run the sudo command to get super user permissions.
The UIDs of all non-local users are defined in the /etc/passwd file.
To get super user permissions (for users that have a UID of 96)
Step Description
3 Run:
sudo /usr/bin/su -
The user now has superuser permissions.
Step Description
3 Click Apply .
Step Description
First, Gaia connects to the TACACS+ server with the lowest priority number.
For example: Three TACACS+ servers have a priority of 1, 5, and 10
respectively.
Gaia connects to these TACACS+ servers in that order, and uses the first
TACACS+ server that responds.
l To identify the TACACS+ server in commands. A command with priority 1
6 Click OK.
7 Optional: In the TACACS+ Servers Advanced Configuration section, select the User UID
- 0, or 96 and click Apply .
This setting applies to all configured TACACS+ servers.
Step Description
3 Click Apply .
Step Description
3 Click Delete.
4 Click OK to confirm.
Syntax
To show a list of all configured TACACS+ servers associated with an authentication profile
show aaa tacacs-servers list
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
key <Shared Secret> The Shared Secret used for authentication between the TACACS+
server and Gaia.
Enter the shared secret text string up to 256 characters, without any
whitespace characters and without a backslash.
Make sure that the shared string defined on the Gaia matches the
shared string defined on the TACACS+ server.
timeout <1-60> Enter the timeout in seconds, during which Gaia waits for the
TACACS+ server to respond.
If there is no response after the configured timeout, Gaia tries to
connect to a different configured TACACS+ server.
n Range: 1 - 60
n Default: 5
new-priority <New Configures the new priority for the TACACS+ server.
Priority>
Example
gaia> set aaa tacacs-servers priority 2 server 10.10.10.99 key
MySharedSecretKey timeout 10
Step Description
3 Run:
show tacacs_enable
Privilege Escalation
The Gaia admin user can define roles that make it possible for Gaia users to get temporarily higher
privileges, than their regular privileges.
For example, Gaia user Fred needs to configure the interfaces, but his role does not support interfaces
configuration. To configure the interfaces, Fred enters his user name together with a password given
him by the admin user. This password lets him change his default role to the role that allows him to
configure the interfaces.
There are sixteen different privilege levels (0 - 15) defined in TACACS+.
Each level can be mapped to a different Gaia role.
For example:
n Privilege level 0 - monitor-only
n Privilege level 1 - basic network configuration
n Privilege level 15 - admin user
By default, all non-local TACACS+ Gaia users are assigned the role TACP-0.
The Gaia admin can define for them roles with the name TACP-N that give them different privileges,
where N is a privilege level - a number from 1 to 15.
The TACACS+ users can changes their own privileges by moving to another TACP-N role.
To do this, the TACACS+ users need to get a password from the Gaia admin user.
Step Description
4 Optional: Define one or more roles with the name TACP-N where N is a privilege level - a
number from 1 to 15, and define the features for each role.
You can raise the "TACP" privileges in either Gaia Portal, or Gaia Clish.
Step Description
3 To raise the privileges to the TACP-N role (N is a number from 1 to 15), click Enable at the
top of the Overview page.
Step Description
2 Log in to the Gaia Clish using the username and password of the TACACS+ user.
3 After you are authenticated by the TACACS server, you get the Gaia Clish prompt.
At this point, you have the privileges of the TACP-0 role.
Run:
tacacs_enable TACP-<N>
Where N is the new TACP role (an integer from 1 to 15).
To go back to the TACP-0 role, press CTRL+D, or enter exit at the command prompt.
The user automatically exits the current shell and goes back to TACP-0.
Note - Do not define a new user for external users. An external user is one that is
defined on an authentication server (such as RADIUS, or TACACS), and not on the
local Gaia system.
Step Description
3 Run:
show tacacs_enable
Important - If you define a TACACS user with a null password (on the TACACS server),
Gaia cannot authenticate that user.
System Groups
In This Section:
Introduction 375
Configuring System Groups in Gaia Portal 376
Configuring System Groups in Gaia Clish 378
Introduction
You can define and configure groups with Gaia as you can with equivalent Linux-based systems.
This function is retained in Gaia for advanced applications and for retaining compatibility with Linux.
Use groups for these purposes:
n Specify Linux file permissions.
n Control who can log in through SSH.
For other functions that are related to groups, use the role-based administration feature, described in
"Roles" on page 314.
All users are assigned by default to the users group. You can edit a user's primary group ID (using Gaia
Clish) to be something other than the default. However, you can still add the user to the users group. The
list of members of the users group includes only users, who are explicitly added to the group. The list of
does not include users added by default.
Step Description
2 Click Add.
3 In the Group Name field, enter the applicable unique name - between 1 and 16
alphanumeric characters without spaces.
4 In the Group ID field, enter a unique Group ID number - between 101 and 65530:
n Group ID range 0-100 and range 65531-65535 are reserved for system use.
n Group ID 0 is reserved for users with root permissions.
n Group ID 10 is reserved for the predefined Users groups.
If you specify a value in the reserved ranges, an error message is displayed.
5 Click OK.
Step Description
3 Click Edit.
6 Click OK.
Step Description
3 Click Edit.
6 Click OK.
Step Description
3 Click Delete.
4 Click OK to confirm.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
Parameter Description
gid <Group ID> Unique Group ID number - between 101 and 65530:
n Group ID range 0-100 and range 65531-65535 are reserved for
system use.
n Group ID 0 is reserved for users with root permissions.
n Group ID 10 is reserved for the predefined Users groups.
If you specify a value in the reserved ranges, an error message is displayed.
GUI Clients
In This Section:
If this is a Security Management Server, you can configure which computers can connect to this Security
Management Server with SmartConsole.
2 Click Add.
The Add GUI Client window opens.
2 Run:
cpconfig
For more information, see the R81 CLI Reference Guide > Chapter Security Management
Server Commands > Section cpconfig.
High Availability
In This Section:
Understanding VRRP
Virtual Routing Redundancy Protocol (VRRP) is a high-availability solution, where two Gaia Security
Gateways can provide backup for each other. Gaia offers two ways to configure VRRP:
n Monitored Circuit/Simplified VRRP - All the VRRP interfaces automatically monitor other VRRP
interfaces.
n Advanced VRRP - Every VRRP interface must be explicitly configured to monitor every other VRRP
interface.
Important:
n You cannot have a Standalone deployment (Security Gateway and Security
Management Server on the same computer) in a Gaia VRRP cluster.
n You cannot use both the Monitored Circuit/Simplified VRRP and Advanced
VRRP together on the same Cluster Member.
Virtual Router Redundancy Protocol (VRRP) provides dynamic failover of IP addresses from one router to
another in the event of failure. This increases the availability and reliability of routing paths through
gateway selections on an IP network. Each VRRP router has a unique identifier known as the Virtual
Router Identifier (VRID), which is associated with at least one Virtual IP Address (VIP). Neighboring
network nodes connect to the VIP as a next hop in a route or as a final destination. Gaia supports VRRP as
defined in RFC 3768.
VRRP Terminology
The conceptual information and procedures in this chapter use standard VRRP terminology.
This glossary contains basic VRRP terminology and a reference to related Check Point ClusterXL terms.
VRRP ClusterXL
Definition
Term Term
VRRP Member A Security Gateway using the VRRP protocol that is a member of one or more
Router Virtual Router. In this guide, a VRRP Router is commonly called a Security
Gateway.
Master Active The Security Gateway (Security Gateway) that handles traffic to and from a
Virtual Router. The Master is the Security Gateway with the highest priority in
a group. The Master inspects traffic and enforces the security policy.
Backup Standby A redundant Security Gateway (Security Gateway) that is available to take
over for the Master in the event of a failure.
VRID Cluster Unique Virtual Router identifier The VRID is the also last byte of the MAC
name address.
VIP Cluster Virtual IP address assigned to a Virtual Router. VIPs are routable from
Virtual IP internal and/or external network resources.
address
The VIP is called Backup Address in the Gaia Portal.
VRRP Failover Automatic change over to a backup Security Gateway when the primary
Transition Security Gateway fails or is unavailable. The term 'failover' is used frequently
in this guide.
VRRP on Gaia OS
On Gaia, VRRP can be used with ClusterXL enabled or with ClusterXL disabled.
VRRP with
Description
ClusterXL
Advanced VRRP To configure this advanced VRRP method, in the Gaia Portal go to High
Availability > Advanced VRRP.
This method allows configuration of different VRIDs on different interfaces.
You configure a VRID on each interface individually. In addition, each VRRP-
enabled interface must be monitored by each VRID together with an appropriate
priority delta. This ensures that when one interface fails, all the other VRIDs can
transition to VRRP Backup state
n With ClusterXL enabled, you must configure each VRID to monitor every
other VRRP interface.
You must also configure priority deltas that allow complete node failover.
Advanced VRRP also makes it possible for a VRID to monitor interfaces that
do not run VRRP.
n With ClusterXL disabled, you can configure two VRIDs on each interface,
with one VIP for each VRID.
Notes:
n Gaia supports OSPF on VPN tunnels that terminate at a VRRP group.
n Active/Backup VRRP environments are supported with ClusterXL enabled.
If ClusterXL is disabled, Active/Active environments can be deployed.
n Active/Active VRRP environments support only static routes. In addition, you
must disable the monitoring of the Check Point Firewall by VRRP.
If the VRRP Master fails, or its VRRP-enabled interfaces fail, VRRP uses a priority algorithm to make the
decision if failover to a VRRP Backup is necessary. Initially, the VRRP Master is the Security Gateway that
has the highest defined priority value. You define a priority for each Security Gateway when you create a
Virtual Router or change its configuration. If two VRRP Security Gateways have same priority value, the
platform that comes online and broadcasts its VRRP advertisements first becomes the VRRP Master.
Gaia also uses priorities to select a VRRP Backup Security Gateway upon failover (when there is more
than one VRRP Backup available). In the event of failover, the Virtual Router priority value is decreased by
a predefined Priority Delta value to calculate an Effective Priority value. The Virtual Router with the highest
effective priority becomes the new VRRP Master. The Priority Delta value is a Check Point proprietary
parameter that you define when configuring a Virtual Router. If you configure your system correctly, the
effective priority will be lower than the VRRP Backup Security Gateway priority in the other Virtual Routers.
This causes the problematic VRRP Master to fail over for the other Virtual Routers as well.
Note - If the effective priority for the current VRRP Master and VRRP Backup are the
same, the Security Gateway with the highest IP address becomes the VRRP Master.
This is a simple VRRP use case, where Security Gateway 1 is the VRRP Master, and Security Gateway
2 is the VRRP Backup.
Virtual Router redundancy is available only for connections to and from the internal network.
There is no redundancy for external network traffic.
Item Description
This use case shows an example of an environment, where there is redundancy for internal and
external connections.
Here, you can use Virtual Routers for the two Security Gateways - for internal and for external
connections.
The internal and external interfaces must be on different subnets.
Define one Security Gateway as the VRRP Master and one Security Gateway as the VRRP Backup.
Item Description
This use case shows an example of an Active/Active Load Sharing environment for internal network
traffic.
This environment gives load balancing, as well as full redundancy.
This configuration is supported with ClusterXL disabled. Only Static Routes are supported.
The monitoring of the Check Point Firewall by VRRP must be disabled (it is enabled by default).
A maximum of two VRIDs is supported per interface.
Security Gateway 1 is the VRRP Master for VRID 5, and Security Gateway 2 is the VRRP Backup.
Security Gateway 2 is the VRRP Master for VRID 7, and Security Gateway 1 is the VRRP Backup.
The two Security Gateways are configured to back each other up. If one fails, the other takes over its
VRID and IP addresses.
Item Description
1 VRRP Master Security Gateway for VRID 5 and VRRP Backup for VRID 7
2 VRRP Backup Security Gateway for VRID 5 and VRRP Master for VRID7
Step Description
Best Practice - Enable NTP (Network Time Protocol) on all Security Gateways
(see "Time" on page 221).
You can also manually change the time and time zone on each Security Gateway to match
the other members.
In this case, you must synchronize member times to within a few seconds.
3 Optional: Add host names and IP address pairs to the host table on each Security Gateway
(see "Hosts" on page 189).
This lets you use host names as an alternative to IP addresses or DNS servers.
Step Description
Procedure
Step Description
n Cold Start Delay - Configures the delay period in seconds before a Security Gateway
joins a Virtual Router. Default = 0.
n Interface Delay - Configure this when the Preempt Mode of VRRP was turned off.
This is useful when the VRRP node with a higher priority is rebooted, but must not
preempt the existing VRRP Master that is handling the traffic, but is configured with a
lower priority. Sometimes interfaces that come up take longer than the VRRP timeout
to process incoming VRRP Hello packets. The Interface Delay extends the time that
VRRP waits to receive Hello packets from the existing VRRP Master.
n Disable All Virtual Routers - Select this option to disable all Virtual Routers defined
on this Gaia system. Clear this option to enable all Virtual Routers. By default, all
Virtual Routers are enabled.
n Monitor Firewall State - Select this option to let VRRP monitor the Security Gateway
and automatically take appropriate action. This is enabled by default, which is the
recommended setting when using VRRP with ClusterXL enabled. This must be
disabled when using VRRP with ClusterXL disabled.
Important - If you disable Monitor Firewall State, VRRP can assign VRRP
Master status to a Security Gateway before it completes the boot process.
This can cause more than one Security Gateway in a Virtual Router to have
VRRP Master status.
Step Description
Notes
Gaia starts to monitor the Firewall after the cold start delay completes.
This can cause some problems:
n If all the interfaces in a Virtual Router fail, all VRRP Cluster Members become VRRP Backups.
None of the VRRP Cluster Members can become the VRRP Master and no traffic is allowed.
n If you change the time on any of the VRRP Cluster Members, a VRRP failover occurs
automatically.
n In certain situations, installing a policy causes a failover.
This can happen if it takes a long time to install the policy.
This section includes the procedure for configuring Monitored Circuit/Simplified VRRP.
Step Description
Step Description
n Virtual Router ID - Enter a unique ID number for this virtual router. The range of valid
values is 1 to 255.
n Priority - Enter the priority value, which selects the Security Gateway that takes over in
the event of a failure. The Security Gateway with the highest available priority
becomes the new VRRP Master. The range of valid values 1 to 254. The default value
is 100.
n Hello Interval - Optional. Enter or select the number of seconds, after which the VRRP
Master sends its VRRP advertisements. The valid range is between 1 (default) and
255 seconds.
All VRRP routers on a Security Gateways must be configured with the same hello
interval. Otherwise, more than one Security Gateway can be in the VRRP Master
state.
The Hello interval also defines the failover interval (the time a VRRP Backup router
waits to hear from the existing VRRP Master before it takes on the VRRP Master role).
The value of the failover interval is three times the value of the Hello interval (default -
3 seconds).
n Authentication:
l None - To disable authentication of VRRP packets
You must use the same authentication method for all Security Gateways in a
Virtual Router.
n Priority Delta - Enter the value to subtract from the Priority to create an effective
priority when an interface fails. The range is 1-254.
If an interface fails on the VRRP Backup, the value of the priority delta is subtracted
from its priority. This gives a higher effective priority to another Security Gateway
member.
If the effective priority of the current VRRP Master is less than that of the VRRP
Backup, the VRRP Backup becomes the VRRP Master for this Virtual Router. If the
effective priority for the current VRRP Master and VRRP Backup are the same, the
gateway with the highest IP address becomes the VRRP Master.
n Auto-deactivation - When an interface is reported as DOWN, a cluster member's
Priority value is reduced by the configured Priority Delta amount. If another cluster
member exists with a higher Priority, it will then take over as VRRP Master to heal the
network.
By default, some Cluster Member is elected as VRRP Master, even if all Cluster
Members have issues and are reporting a Priority of zero.
The auto-deactivation option can be enabled to change this behavior and ensure that
no Cluster Member is elected as VRRP Master, if all Cluster Members have a Priority
of zero.
When this option is enabled, Priority Delta should be set equal to the Priority value, so
that Priority becomes zero, if an interface goes down.
Step Description
set to the same value on all Security Gateways in the Virtual Router. This is the
default setting.
l Interface - Sets the VMAC to the local interface MAC address. If you define this
mode for the VRRP Master and the VRRP Backup, the VMAC is different for
each. VRRP IP addresses are related to different VMACs. This is because they
are dependent on the physical interface MAC address of the currently defined
VRRP Master.
Note -If you configure different VMACs on the VRRP Master and VRRP Backup,
you must make sure that you select the correct proxy ARP setting for NAT.
l Static - Manually set the VMAC address. Enter the VMAC address in the
applicable field.
l Extended - Gaia dynamically calculates and adds three bytes to the interface
MAC address to generate VMAC address that is more random. If you select this
mode, Gaia constructs the same MAC address for VRRP Master and VRRP
Backups in the Virtual Router.
Note - If you set the VMAC mode to Interface or Static , syslog error
messages show when you restart the computer, or during VRRP
failover. This is caused by duplicate IP addresses for the VRRP
Master and VRRP Backup. This is expected behavior because the
VRRP Master and VRRP Backups temporarily use the same Virtual IP
address until they get to the VRRP Master and VRRP Backup
statuses.
Click OK.
The new VMAC mode shows in the in the Backup Address table.
7 Click Save.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
backup-address Configures the IPv4 address of the VRRP Backup Security Gateway.
VALUE You can define more than one address for a Virtual Router.
The backup address (Virtual IP Address) is the IP address that VRRP backs
up, in order to improve network reliability. The Virtual IP Address is typically
used as the default gateway for hosts on that network. VRRP ensures this IP
address remains reachable, as long as at least one physical machine in the
VRRP cluster is functioning and can be elected as the VRRP Master.
Parameter Description
vmac-mode Configures how the Virtual MAC (VMAC) address is calculated for the given
{default-vmac Virtual IP Address.
| extended- Each Virtual IP Address for a Virtual Router implies the existence of a virtual
vmac | network interface.
interface-vmac
n Range:
| static-vmac
l default-vmac - Generates the VMAC using the standard
VALUE}
method described in Section 7.3 of RFC 3768.
l extended-vmac - Generates the VMAC using an extended
hello-interval The interval in seconds, at which the VRRP Master sends VRRP
VALUE advertisements. For a given Virtual Router, all VRRP cluster members
should have the same value for Hello Interval.
Parameter Description
priority VALUE Configures the Priority to use in the VRRP Master election.
This is the maximum priority that can be achieved when all monitored
interfaces are up.
The VRRP cluster member with the highest Priority value will be elected as
the VRRP Master. Each cluster member should be given a different Priority
value, such that a specific member is the preferred VRRP Master. This will
ensure consistency in the outcome of the election process.
n Range: default, or 1 - 254
n Default: 100
Advanced VRRP lets you configure Virtual Routers at the interface level.
This section contains only those procedures that are directly related to Advanced VRRP configuration.
The general procedures for configuring VRRP clusters are described in "Configuring Monitored
Circuit/Simplified VRRP" on page 393.
With Advanced VRRP, you must configure every Virtual Router to monitor every configured VRRP
interface.
Step Description
You cannot move a Backup Address from one interface to another while a Security Gateway is a VRRP
Master.
Perform these steps to delete and add new interfaces with the necessary IP addresses:
Step Description
Step Description
2 Configure the VRRP Global Settings (see "Preparing a VRRP Cluster" on page 390).
n Hello Interval - Enter or select the number of seconds, at which the VRRP Master
sends VRRP advertisements.
The range is 1 to 255 seconds. The default value is 1.
All nodes of a given Virtual Router must have the same hello Interval. If not, VRRP
discards the packet and both platforms go to VRRP Master state.
The VRRP Hello interval also determines the failover interval - how long it takes a
VRRP Backup router to take over from a failed VRRP Master. If the VRRP Master
misses three VRRP Hello advertisements, it is considered to be down, because the
minimal VRRP Hello interval is 1 second. Therefore, the minimal failover time is 3
seconds (3 * Hello Interval).
n Preempt Mode - If you keep it selected (the default), when the original VRRP Master
fails, a VRRP Backup system becomes the acting VRRP Master. When the original
VRRP Master returns to service, it becomes VRRP Master again.
If you clear it, when the original VRRP Master fails, a VRRP Backup system becomes
the acting VRRP Master, and the original does not become VRRP Master again when
it returns to service.
n Auto-deactivation - If you clear it (the default), a Virtual Router with the lowest priority
available (1) can become VRRP Master, if no other Security Gateways exist on the
network.
If you selected it, the effective priority can become 0. With this priority, the Virtual
Router does not become the VRRP Master, even if there are no other Security
Gateways on the network.
If you selected it, you should also configure the Priority and Priority Delta values to
be equal, so that the effective priority becomes 0, if there is a VRRP failure.
Step Description
n VMAC Mode - For each Virtual Router, a Virtual MAC (VMAC) address is assigned to
the Virtual IP address. The VMAC address is included in all VRRP packets as the
source MAC address. The physical MAC address is not used.
Select the mode:
l VRRP - Sets the VMAC to use the standard VRRP protocol. It is automatically
set to the same value on all Security Gateways in the Virtual Router. This is the
default setting.
l Interface - Sets the VMAC to the local interface MAC address. If you define this
mode for the VRRP Master and the VRRP Backup, the VMAC is different for
each. VRRP IP addresses are related to different VMACs. This is because they
are dependent on the physical interface MAC address of the currently defined
VRRP Master.
Note - If you configure different VMACs on the VRRP Master and
VRRP Backup, you must make sure that you select the correct proxy
ARP setting for NAT.
l Static - Manually set the VMAC address. Enter the VMAC address in the
applicable field.
l Extended - Gaia dynamically calculates and adds three bytes to the interface
MAC address to generate VMAC address that is more random. If you select this
mode, Gaia constructs the same MAC address for VRRP Master and VRRP
Backups in the Virtual Router.
Note - If you set the VMAC mode to Interface or Static , syslog error
messages show when you restart the computer, or during VRRP failover.
This is caused by duplicate IP addresses for the VRRP Master and VRRP
Backup. This is expected behavior because the VRRP Master and VRRP
Backups temporarily use the same Virtual IP address until they get to the
VRRP Master and VRRP Backup statuses.
n Authentication:
l None - To disable authentication of VRRP packets.
You must use the same authentication method for all Security Gateways in a Virtual
Router.
a. Click Add.
b. In the IPv4 address field, enter the IPv4 address.
c. Click OK.
To change a Backup Address, select a Backup IP address and click Edit.
To remove a Backup Address, select a Backup IP address and click Delete.
Step Description
a. Click Add.
Gaia shows a warning that adding a Monitored Interface will lock the Interface for this
Virtual Router.
b. Click OK to confirm.
c. In the Interface field, select the interface.
d. In Priority Delta field, enter or select the number to subtract from the priority.
This creates an effective priority when an interface related to the VRRP Backup fails.
The range is 1-254.
e. Click OK.
To change a Monitored Interface, select a Monitored Interface and click Edit.
To remove a Monitored Interface, select a Monitored Interface and click Delete.
7 Click Save.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
coldstart-delay Specifies the number of seconds to wait after a system cold start
<VALUE> before VRRP becomes active, and this cluster member can be
elected as VRRP Master.
n Range: 0 - 3600
n Default: 0
interface-delay The Interface Delay controls how long to wait (in seconds) after
<VALUE> receiving an interface UP notification before VRRP assesses whether
or not the related VRRP cluster member should increase its priority,
and possibly become the new VRRP Master. The delay ensures that
VRRP does not attempt to respond to interfaces, which are only
momentarily active.
Note - Same value should be configured for both VRRPv2 and
VRRPv3 if both protocols are configured.
n Range: 0 - 3600
n Default: 0
interface VALUE The name of the interface, on which to enable the VRRP.
Parameter Description
monitored-circuit Configures the IPv4 address of the VRRP Backup Security Gateway.
vrid VALUE backup- You can define more than one address for a Virtual Router.
address VALUE {on | The backup address (Virtual IP Address) is the IP address that VRRP
off} backs up, in order to improve network reliability. The Virtual IP
Address is typically used as the default gateway for hosts on that
network. VRRP ensures this IP address remains reachable, as long
as at least one physical machine in the VRRP cluster is functioning
and can be elected as the VRRP Master.
monitored-circuit The interval in seconds, at which the VRRP Master sends VRRP
vrid VALUE hello- advertisements. For a given Virtual Router, all VRRP cluster members
interval VALUE should have the same value for Hello Interval.
Parameter Description
monitored-interface Configures the list of monitored interfaces names for the given Virtual
VALUE {on | off | Router.
priority-delta
n on - Creates a VRRP Virtual Router
<default | 1 -
254>} n off - Removes a VRRP Virtual Router
n priority-delta - Configures the Priority Delta value
When an interface fails, VRRP causes the backup cluster member to
take over for that interface. The VRRP interface should also fail over
when a different interface fails (if traffic is routed between the
interfaces).
Otherwise, network destinations will become unreachable, etc. This
coordinated failover is achieved by adding all dependent interfaces to
the list of monitored interfaces.
The relative importance of each monitored interface is expressed by
its Priority Delta value. More important interfaces should have higher
Priority Deltas. Priority Delta causes the correct failover decision, if
both cluster members are experiencing failures on different
interfaces.
Refer to the following commands for additional details:
n set vrrp interface <VALUE> monitored-
circuit vrid <VALUE> priority
n set vrrp interface <VALUE> monitored-
circuit vrid <VALUE> monitored-interface
<VALUE> priority-delta
Parameter Description
monitored-circuit Configures how the Virtual MAC (VMAC) address is calculated for the
vrid VALUE vmac- given Virtual IP Address.
mode {default-vmac Each Virtual IP Address for a Virtual Router implies the existence of a
| extended-vmac | virtual network interface.
interface-vmac |
n Range:
static-vmac VALUE}
l default-vmac - Generates the VMAC using the
set vrrp interface Deletes all Virtual Routers from the interface.
VALUE off
Troubleshooting VRRP
In This Section:
This section shows known issues with VRRP configurations and fixes.
Read this section before contacting Check Point Support.
Step Description
2 In the Trace Options section, in the Filter Visible Tables Below drop down list, select
VRRP.
4 Click Add.
The selected options show Enabled.
Step Description
Note - As an example, see sk84520 - How to debug OSPF and RouteD daemon
on Gaia.
Step Description
2 In the Trace Options section, in the Filter Visible Tables Below drop down list, select
VRRP.
In the VRRP table, select All .
3 Click Remove.
The options do not show Enabled anymore.
Firewall Policies
Configure the Access Control Policy to accept VRRP packets to and from the Gaia platform. The multicast
destination assigned by the IANA for VRRP is 224.0.0.18. If the Access Control Policy does not accept
packets sent to 224.0.0.18, Security Gateways in one Virtual Router take on VRRP Master state.
Maintenance
This chapter includes procedures and reference information for:
n Working with License
n Snapshot Management
n Download of SmartConsole
n Hardware Health Monitoring
n Monitoring RAID Synchronization
n Shut Down and Reboot
n System Backup
License Status
In This Section:
Note - While all the "cplic" commands are available in Gaia, they are not
grouped into a Gaia feature.
Step Description
1 If this Security Management Server, Domain Management Server, or Security Gateway (or
Cluster Members) connects to the Internet through a proxy server, then configure the
applicable proxy in SmartConsole:
Note - The prerequisite for Security Gateways and Cluster Members is to establish
a Secure Internal Communication (SIC Trust) with a Management Server.
Click Menu > Install database > select the Management Server object >
click Install .
l If this object is a Security Gateway or Cluster:
Step Description
4 Click New.
5 Enter the license data manually, or click Paste License to enter the data automatically.
The Paste License button only appears in Internet Explorer.
For other web browsers, paste the license strings into the empty text field.
6 Click OK.
Step Description
5 Click Delete.
6 Click OK.
Note - To delete a license in the command line, use the "cplic del" command
(see the R81 CLI Reference Guide).
Snapshot Management
A snapshot is a backup of the system settings and products. It includes:
n File system, with customized files
n System configuration (interfaces, routing, hostname, and similar)
n Software Blades configuration
n Management database (on a Security Management Server or a Multi-Domain Server)
A snapshot is very large. A snapshot includes the entire root partition, part of the /var/log partition, and
other important files.
For this reason, snapshots cannot be scheduled the same way that Backups can.
Backup and Restore is the preferred method of recovery.
Notes:
n When Gaia creates a snapshot, all system processes and services continue to
run.
Policy enforcement is not interrupted.
n You can import a snapshot created on a different software release or on this
software release.
You must import a snapshot on the appliance or open server of the same
hardware model, from which it was exported.
n After importing the snapshot, you must activate the device license from the Gaia
Portal or the User Center.
n We do not recommend to use snapshots as a way of regularly backing up your
system.
System Backup is the preferred method.
Schedule system backups on a regular basis, daily or weekly, to preserve the
Gaia OS configuration and Firewall database.
Snapshot Options
Option Description
Notes:
n You must not rename the exported image. If you rename a snapshot image, it is
not possible to revert to it.
n You can import a snapshot only on the machine of the same hardware type,
from which it was exported.
Snapshot Prerequisites
Before you create a snapshot image, make sure the appliance or storage destination meets these
prerequisites:
n To create the snapshot image requires free space on the disk.
The required free disk space is the size of the system root partition multiplied by 1.15.
3 Run:
show snapshots
The output shows the amount of space on the disk
available for snapshots.
The value in the output does not represent all of the
unallocated space on the disk.
n The free disk space required in the export file location is the size of the snapshot image multiplied by
2.
The minimal size of a snapshot image is 2.5GB.
Therefore, the minimal necessary free disk space in the export file location is 5GB.
Step Description
2 Click New.
The New Image window opens.
4 Click OK.
Step Description
2 Select a snapshot.
4 Make sure that there is enough free disk space in the /var/log/ partition:
6 Click Export.
The Export Image window opens.
Important - You must not rename the exported image. If you rename a snapshot
image, it is not possible to revert to it.
Importing a snapshot
To use the snapshot on another appliance, it has to be the same type of appliance you used to export
the image.
Step Description
2 Click Import.
The Import Image window opens.
4 Click Upload.
5 Click OK.
Step Description
2 Select a snapshot.
3 Click Revert.
The Revert window opens.
4 Click OK.
Deleting a snapshot
Step Description
2 Select a snapshot.
3 Click Delete.
The Delete Image window opens.
4 Click OK.
Troubleshooting
/var/log/messages*
n If a snapshot was created, but there were some issues, examine this file:
/var/log/CPsnapshot/<Snapshot Name>_<Timestamp>
Description
Manage system images (snapshots).
Syntax
Note - Gaia Snapshots are not files, but Logical Volume Management (LVM)
volumes. Gaia stores these snapshots as a disk partition. To show the list of
virtual drives, run the "lvs" command in the Expert mode.
These commands only export an existing snapshot image from a local LVM volume.
These commands only import an existing snapshot image file and store it on Gaia as a local LVM
volume.
These commands import an existing snapshot image, store it on Gaia as a local LVM volume, and then
revert to that imported snapshot image.
To import and revert an existing snapshot image from a local LVM volume
set snapshot-onetime revert target lvm name <External Name of
Snapshot>
Note - Gaia Snapshots are not files, but disk volumes. Gaia stores these
snapshots as a disk partition. To show the list of virtual drives, run the "lvs"
command in the Expert mode.
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
name <Name of Configures the name, under which the exported snapshot image
Exported Snapshot> file is stored.
You must enter a string that does not contain spaces.
You must not add an extension.
name <Name of Configures the name, under which the imported snapshot image
Imported Snapshot> is stored on this Gaia.
You must enter a string that does not contain spaces.
description Optional.
"<Description of Configures the description of the snapshot image.
Snapshot>" You must enclose the text in double quotes, or enter the string
that does not contain spaces.
Parameter Description
password <Password in Specifies the password (in plain text) required to log in to the
Plain Text> remote server.
Examples
Troubleshooting
n If a snapshot was not created, examine these files:
/var/log/messages*
n If a snapshot was created, but there were some issues, examine this file:
/var/log/CPsnapshot/<Snapshot Name>_<Timestamp>
Description
Manage system images (snapshots).
From R81, you can also configure scheduled system images (snapshots).
Notes:
n R81 supports only one scheduled snapshot task.
n It is not possible to change any of the settings in the scheduled snapshot task.
You must configure the task from scratch.
n In Gaia Portal, you can only:
l Enable or disable the snapshot schedule
Syntax
Note - Gaia Snapshots are not files, but Logical Volume Management
(LVM) volumes. Gaia stores these snapshots as a disk partition. To show
the list of virtual drives, run the "lvs" command in the Expert mode.
This command lets you configure how much of the disk space must remain free at all times:
Where:
show snapshot-scheduled<SPACE><TAB>
You can only disable the snapshot schedule to stop the scheduled task:
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
snapshot-name-prefix The final name of the snapshot consists of two parts - the prefix
<Prefix of Snapshot (configured by the user) and the time stamp (format is hard-
Name> coded):
<Prefix>_<YYYY_MM_DD__HH_mm>
description Optional.
"<Description of Configures the description of the snapshot image.
Snapshot>" You must enclose the text in double quotes, or enter the string
that does not contain spaces.
Default description : default_snapshot
Parameter Description
password <Password in Specifies the password (in plain text) required to log in to the
Plain Text> remote server.
recurrence daily time Specifies that the job should run once a day - every day, at
<HH:MM> specified time.
Enter the time of day in the 24-hour clock format -
<Hours>:<Minutes>.
Example: 14:35
recurrence monthly Specifies that the job should run once a month - on specified
month <1-12> days <1- months, on specified dates, and at specified time.
31> time <HH:MM> Months are specified by numbers from 1 to 12: January = 1,
February = 2, ..., December = 12.
Dates of month are specified by numbers from 1 to 31.
To specify several consequent months, enter their numbers
separate by commas.
Example: for January through March, enter 1,2,3
To specify several consequent dates, enter their numbers
separate by commas.
Example: for 1st, 2nd and 3rd day of month, enter 1,2,3
recurrence weekly days Specifies that the job should run once a week - on specified
<0-6> time <HH:MM> days of week, and at specified time.
Days of week are specified by numbers from 0 to 6: Sunday =
0, Monday = 1, Tuesday = 2, Wednesday = 3, Thursday = 4,
Friday = 5, Saturday = 6.
To specify several consequent days of a week, enter their
numbers separate by commas.
Example: for Sunday, Monday, and Tuesday, enter 0,1,2
The default recurrence: every Monday at 01:00.
Parameter Description
retention-policy Configures the retention policy when you save the new
snapshot image as a local LVM volume:
(when Gaia creates new snapshots, it deletes the oldest
snapshot that exceeds the configured policy parameters)
n max-snapshots-to-keep <1-9999>
Specifies the maximum number of snapshot images to
save. The default threshold is: 9999.
n min-snapshots-to-keep <1-9999>
Specifies the minimum number of snapshot images to
save. The default threshold is: 1.
n keep-disk-space-above-in-GB <1-Max>
Specifies the amount of free disk space to maintain
between 1 GB and the maximum available space.
Examples
Troubleshooting
If a scheduled snapshot task fails, there is no notification about it. You must manually check if a snapshot
was created.
n If a snapshot was not created, examine these files:
/var/log/messages*
n If a snapshot was created, but there were some issues, examine this file:
/var/log/CPsnapshot/<Snapshot Name>_<Timestamp>
Best Practice - We recommend that you create a snapshot image before you restore
a factory default image.
Step Description
5 Click Reboot.
Step Description
3 Run:
set fcd revert<SPACE><TAB>
set fcd revert <Name of
Default Image>
5 Reboot:
reboot
Download SmartConsole
You can download the SmartConsole application package from the Gaia Portal of your Security
Management Server or Multi-Domain Server.
After you download the SmartConsole package, you can install it and use it to connect to the Security
Management Server or Multi-Domain Server.
Step Description
You can see the status of the machine fans, system temperature, the voltages, and (for supported
hardware only) the power supply.
For each component sensor, the table shows the value of its operation, and the status: OK, Low, or High.
n To see the health history of a component, select the component sensor. A graph shows the values
over time.
n To change the time intervals that the graph shows, click the Minute arrows.
n To view different times, click the Forward/Backward arrows.
n To refresh, click Refresh.
Note - The command returns information only for installed hardware components and
only on supported hardware.
Syntax
show sysenv
all
bios
fans
ps
temp
volt
Parameters
Parameter Description
Example
Hardware Information
gaia>
Command Description
Description
Shows information about the hardware, on which Gaia is installed.
You can run this command in Gaia Clish only.
The information shown depends on the type of hardware.
Common types of information shown are:
n Serial number
n Amount of physical RAM
n CPU frequency
n Number of disks in the system
n Disk capacity
Syntax
show asset<SPACE><TAB>
Parameters
Parameter Description
<SPACE><TAB> Press these keys to show a list of asset categories, such as system and
disk.
The available categories depend on the type of hardware.
Example 1
gaia> show asset
system all
gaia> show asset
Example 2
gaia> show asset system
Platform: Check Point 5800
Serial Number: XXX
CPU Model: Intel(R) Xeon(R) E3-1285Lv4
CPU Frequency: 3400
Disk Size: 500GB
Number of Cores: 8
CPU Hyperthreading: Enabled
gaia>
Description
Shows information from supported hardware sensors.
You can run this command in Gaia Clish, or the Expert mode.
Syntax
cpstat os -f sensors
Example
Description
This command shows data about the RAID and hard disks, with the percent synchronization
done.
Syntax
raid_diagnostic
Description
This command shows almost the same information as the "raid_diagnostic" command, in
tabular format.
Syntax
cpstat os -f raidInfo
Example output
Shut Down
There are two ways to shut down:
n Reboot: Shuts down the system and then immediately restarts it.
n Halt: Shuts down the system. You start the system manually with the power switch.
Step Description
2 Click Reboot.
Step Description
2 Click Halt.
System Backup
n Back up the configuration of the Gaia operating system and of the Security Management Server
database.
You can restore a previously saved configuration.
You can run the backup manually, or on a schedule.
The configuration is saved to a *.tgz file.
You can store backups locally, or remotely to a TFTP, SCP or FTP server.
n Save your Gaia system configuration settings as a ready-to-run CLI shell script.
This lets you quickly restore your system configuration after a system failure or migration.
Note - You can only do a migration using the same Gaia version on the source and
target computers.
Important - When you create a backup on a Security Management Server, make sure
to close all SmartConsole clients. Otherwise, backup does not start.
Step Description
2 Click Backup.
Note - Gaia Portal does not support the change of backup file names. You can
change a backup file name in the Expert mode. Make sure not to use special
characters.
Step Description
3 Click Restore.
Step Description
5 Click Restore.
Step Description
3 Click Export.
4 Click OK to confirm.
Make sure you have enough free disk space on your computer.
To import a backup
Step Description
3 Click Import.
5 Click Import.
To delete a backup
Step Description
3 Click Delete.
4 Click OK to confirm.
Syntax
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Note - Gaia Clish does not support change of file names. You can change a file name
in the Expert mode. Make sure not to use special characters.
Example
gaia> add backup local
Creating backup package. Use the command 'show backups' to monitor
creation progress.
gaia>
gaia> show backup status
Performing local backup
gaia>
gaia> show backups
backup_gw-8b0891_22_7_2012_14_29.tgz Sun, Jul 22, 2012 109.73 MB
gaia>
Syntax
Note - To restore the Gaia OS configuration quickly after a system failure or migration,
use the Gaia Clish "configuration" feature (see "Working with System
Configuration in Gaia Clish" on page 457).
Important - When you create a backup on a Security Management Server, make sure
to close all SmartConsole clients. Otherwise, scheduled backup does not start.
Step Description
4 In the Backup Type section, configure the location of the backup file:
n This appliance
To store the collected backup locally
n Management
To send the collected backup to the Security Management Server that manages this
Security Gateway.
n SCP server
To send the collected backup to an SCP server.
Enter the IP address, User name, Password and Upload path.
n FTP server
To send the collected backup to an FTP server.
Enter the IP address, User name, Password and Upload path.
n TFTP server
To send the collected backup to a TFTP server.
Enter the IP address.
5 In the Backup Schedule section, configure the frequency (Daily , Weekly , Monthly ) for this
backup.
6 Click Add.
The scheduled backup appears in the Scheduled Backups table.
Step Description
3 Click Delete.
Syntax
To add a backup schedule that uploads the backup file to an FTP server
add backup-scheduled name <Name of Schedule> ftp ip <IPv4 Address of
FTP Server> path <Path on FTP Server> username <User Name on FTP
Server> password <Password in Plain Text>
To add a backup schedule that uploads the backup file to an SCP server
add backup-scheduled name <Name of Schedule> scp ip <IPv4 Address of
SCP Server> path <Path on SCP Server> username <User Name on SCP
Server> password <Password in Plain Text>
To add a backup schedule that uploads the backup file to a TFTP server
add backup-scheduled name <Name of Schedule> tftp ip <IPv4 Address
of TFTP Server>
To configure the backup schedule to run each month on specified date and time
set backup-scheduled name <Name of Schedule> recurrence monthly
month <1-12> days <1-31> time <HH:MM>
To configure the backup schedule to run each week on specified day of week and time
set backup-scheduled name <Name of Schedule> recurrence weekly days
<0-6> time <HH:MM>
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
CLI Parameters
Parameter Description
ftp ip <IPv4 Address of Specifies the IPv4 address of the remote FTP server.
FTP Server>
scp ip <IPv4 Address of Specifies the IPv4 address of the remote SCP server.
SCP Server>
tftp ip <IPv4 Address Specifies the IPv4 address of the remote TFTP server.
of TFTP Server>
path <Path on FTP Specifies the path on the remote FTP server where to upload
Server> the backup file.
path <Path on SCP Specifies the path on the remote SCP server where to upload
Server> the backup file.
username <User Name on Specifies the user name required to log in to the remote FTP
FTP Server> server.
username <User Name on Specifies the user name required to log in to the remote SCP
SCP Server> server.
password <Password in Specifies the password (in plain text) required to log in to the
Plain Text> remote server.
recurrence daily time Specifies that the job should run once a day - every day, at
<HH:MM> specified time.
Enter the time of day in the 24-hour clock format -
<Hours>:<Minutes>.
Example: 14:35
recurrence monthly Specifies that the job should run once a month - on specified
month <1-12> days <1- months, on specified dates, and at specified time.
31> time <HH:MM> Months are specified by numbers from 1 to 12: January = 1,
February = 2, ..., December = 12.
Dates of month are specified by numbers from 1 to 31.
To specify several consequent months, enter their numbers
separate by commas.
Example: for January through March, enter 1,2,3
To specify several consequent dates, enter their numbers
separate by commas.
Example: for 1st, 2nd and 3rd day of month, enter 1,2,3
Parameter Description
recurrence weekly days Specifies that the job should run once a week - on specified
<0-6> time <HH:MM> days of week, and at specified time.
Days of week are specified by numbers from 0 to 6: Sunday =
0, Monday = 1, Tuesday = 2, Wednesday = 3, Thursday = 4,
Friday = 5, Saturday = 6.
To specify several consequent days of a week, enter their
numbers separate by commas.
Example: for Sunday, Monday, and Tuesday, enter 0,1,2
Note - You can only do a migration using the same Gaia version on the source and
target computers.
Syntax
Example
This example shows part of the configuration settings as last saved to a CLI shell script:
LVM Overview
Description
The Gaia Clish command "show system lvm overview" shows information about system logical
volumes.
Syntax
Example
gaia>
Related information
See "Configuring Log Volume" on page 293.
Advanced Configuration
In This Section:
Syntax
set web
daemon-enable {on | off}
session-timeout <Timeout>
ssl-port <Port>
ssl3-enabled {on | off}
table-refresh-rate <Rate>
show web
daemon-enable
session-timeout
ssl-port
ssl3-enabled
table-refresh-rate
Important - After you add, configure, or delete features, run the "save config"
command to save the settings permanently.
Parameters
Parameter Description
Parameter Description
session- Configures the time (in minutes), after which the HTTPS session to the Gaia
timeout Portal terminates.
<Timeout>
n Range: 1 - 720
n Default: 15
ssl-port Configures the TCP port number, on which the Gaia Portal can be accessed over
<Port> HTTPS.
n Range: 1 - 65535
n Default: 443
Use this command for initial configuration only.
Changing the port number on the command line may cause inconsistency with
the setting defined in SmartConsole. Use SmartConsole to set the SSL port for
the Portal.
Note - This setting does not affect HTTP connections. Normally this
port should be left at the default 443. If you change the port number,
you must change the URL used to access the Gaia Portal from
https://<Hostname or IP Address>/ to
https://<Hostname or IP Address>:<PORTNUMBER>
table- Configures the refresh rate (in seconds), at which some tables in the Gaia Portal
refresh- are refreshed.
rate <Rate>
n Range: 10 - 240
n Default: 10
Note - You must have a CPUSE policy defined, before you download and run upgrades.
Example diagram
Item Description
1 An API Client
4 A managed ClusterXL
Workflow:
1. Run the Management API "login" command to log in to the Management Server
When you work with an API Client, run the Check Point API "login" command to log in to the
Management Server (see the Check Point Management API Reference).
Important - The administrator that logs in must have the Run One Time
Script permission enabled in the assigned permission profile:
a. Connect with SmartConsole to the Management Server.
b. From the left navigation panel, click Manage & Settings .
c. In the top section, click Permissions & Administrators > Permission
Profiles .
d. Open the applicable permission profile.
e. From the left tree, click Overview.
n If you selected Read/Write All , then click Cancel .
The required permission is already enabled.
n If you selected Customized, then:
i. From the left tree, click Gateways .
ii. In the Scripts section, select Run One Time Script.
iii. Click OK.
iv. Publish the SmartConsole session
2. Run the Gaia API commands on managed Security Gateways and Cluster Members
The Management API "login" command returns the Session Unique Identifier (SID) token.
In the same API Client, use this SID token in the "X-chkp-sid" field of the Gaia API commands
you run on managed Security Gateways and Cluster Members.
Gaia API Syntax:
3. The Gaia API Proxy logs in to the specified Security Gateway or Cluster Member
The Gaia API Proxy on the Management Server interprets the Gaia API command and logs in to
the specified Security Gateway or Cluster Member.
a. This login returns the SID for the Security Gateway or Cluster Member.
b. The Gaia API Proxy uses this SID to run the Gaia API commands.
4. The Gaia API Proxy forwards the response from the Security Gateway or Cluster
Member to the API client
n To increase performance, the Gaia API Proxy saves the response in the Gaia API Proxy
cache on the Management Server.
n If the Gaia API Proxy gets the same Gaia API request during the cache timeout, it returns
the Gaia API response from its cache and updates the cache.
n An administrator can configure these cache parameters in the
$FWDIR/api/conf/cache.conf file on the Management Server:
Accepted
Parameter Description
Values
timeout 0, or Specifies the time, after which the next Gaia API command
greater triggers a cache update for that Gaia API command:
l 0 - The Gaia API proxy does not use cache
maximum_ integer Specifies the number of unique Gaia API commands to save
entries for each Security Gateway and Cluster Member.
Important - The Gaia API Proxy sends Gaia API command over HTTPS. The Access
Control policy for the Security Gateway or ClusterXL must explicitly allow HTTPS traffic
from the Management Server to the Security Gateway or Cluster Members.
Examples
In this example, we identify the managed Security Gateway by the object primary IP address.
Request
Response
{
"command-name" : "show-hostname",
"response-message" : {
"name" : "gw-832546"
}
}
In this example, we identify the managed Security Gateway by the object name.
Request
Response
{
"command-name" : "v1.4/show-interfaces",
"response-message" : {
"ipv6-local-link-address": "Not Configured",
"type": "physical",
"name": "eth0",
"ipv6-mask-length": "Not-Configured",
"ipv6-address": "Not-Configured",
"ipv6-autoconfig": "Not configured",
"ipv4-address": "192.168.1.1",
"enabled": true,
"comments": "",
"ipv4-mask-length": "24"
}
}
In this example, we identify the managed Security Gateway by the object UID.
Request
Response
{
"command-name" : "v1.4/show-diagnostics",
"response-message" : {
"to": 3,
"total": 3,
"from": 1,
"objects": [
{
"total": "34342961152",
"partition": "/",
"used": "5718065152",
"free": "28624896000"
},
{
"total": "304624640",
"partition": "/boot",
"used": "26991616",
"free": "277633024"
},
{
"total": "34342961152",
"partition": "/var/log",
"used": "455684096",
"free": "33887277056"
}
]
}
}