Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
| SmartView Status, also known as the Status Manager in FireWall-1 NG FP2 and earlier, allows you to see the current state of all your Check Point modules. In FireWall-1 4.1, this application was called the System Status Manager and only told you about the firewall. Now the application tells you about any Check Point product running on the platform and gives a great deal more information about what is running. Figure 5.1 shows an example of Status Manager on one of my boxes. Though it is from a FireWall-1 NG FP2 installation, it shows the same information and looks the same as SmartView Status in NG FP3 and above. Figure 5.1. System Status for Craig
You can click on individual installed components and get detailed information about that component. For instance, if you click on FireWall-1, you see something like Figure 5.2. Figure 5.2. System Status, FireWall-1 Details screen
NOTE!
The Management status tells you whether or not the management software is up, the status of High Availability (if applicable ), and which clients are connected. This is shown in Figure 5.3. Figure 5.3. System Status, Management Details screen
Figure 5.4 shows the status and counters related to the VPN module. Figure 5.4. System Status, VPN Details screen
Figure 5.5 shows the status of the SVN Foundation, which includes information about the operating system, memory, and disk utilization. Figure 5.5. System Status, SVN Foundation Details screen
NOTE!
A module can have four different states (see Table 5.1). An application on a module can have seven different states (see Table 5.2). Specific details regarding failure alerts can be seen in the Critical Notifications portion of the SmartView Status/Status Manager screen. Table 5.1. States for Check Point modules in the SmartView Status/Status Manager
Table 5.2. States for Check Point applications in the SmartView Status/Status Manager
Alerts can be defined for the different applications on your module. After clicking on the System Alert tab, you can set alerts for the different applications. These alerts refer to conditions that might occur on a specific module (e.g., a change in application state, a potential failure condition on the module). Alerts can be defined on a per-module basis or they can be defined globally. If you select your module name on the left of the window, on the right you will see three choices for how System Alerts are defined.
Figure 5.6 shows the global alerts you can set for the SVN Foundation application, which are the same as those available on individual modules. The type of alert that will occur, which you can set for each alert condition, is explained later in this chapter. Figure 5.6. Global System Alert Definition, SVN Foundation tab
The alerts you can set on the SVN Foundation tab are listed below. No connection: This refers to losing connectivity to the module. CPU usage more than: If the CPU utilization on the module goes above the specified percentage, issue the specified alert type. Free disk space less than: If the available disk space becomes less than the specified percentage, issue the specified alert. Remember that this is only for the drive/partition on which FireWall-1 is installed. Figure 5.7 shows the global system alerts for VPN-1 and FireWall-1, which also happen to be the same alerts as for FloodGate-1. The alerts are listed below. No Policy Installed: If the policy becomes uninstalled for any reason, issue the specified alert type. Policy Name has been changed: If the policy that was previously installed has a different name than the policy just installed, issue the specified alert type. Policy has been installed: When a policy is installed, issue the specified alert type. Figure 5.7. Global System Alert Definition, VPN-1 & FireWall-1 tab
The global system alerts for the management module specify an alert only for synchronization. If you are using High Availability for Management Modules and you lose synchronization for any reason, display the appropriate alert. System Status from the Command Line
If you have command-line access to your management module, you can also get System Status information from the command line. If you are working with remote firewalls, these commands will work only if you have established an authenticated control connection with the remote firewall as described in Chapter 7. To check the status of the local firewall, use the following command: # fw stat HOST POLICY DATE localhost template 21Dec2000 12:59:23 : [>eth-s1p1c0] [<eth-s1p1c0] Here's how to look at the status of a remote firewall: # fw stat mrhat mrtwig HOST POLICY DATE mrhat av 21Nov1999 15:23:59 : [>eth-s1p4c0] [<eth-s1p4c0] [>eth-s1p1c0] [<eth-s1p1c0] [>eth-s1p3c0] mrtwig av 21Nov1999 15:28:17 : [>eth-s1p4c0] [<eth-s1p4c0] [>eth-s1p1c0] [<eth-s1p1c0] [>eth-s1p3c0] This output [1] tells you which policy is loaded ( av is loaded on both mrhat and mrtwig ), the date the policy was loaded on each box, and which interfaces have seen traffic inbound and outbound. In this example, both firewalls have seen traffic on eth-s1p4c0 and eth-s1p1c0 in both directions. The eth-s1p3c0 interface has seen traffic only in the outbound direction. [1] Yes, I know this output looks dated, given when this book was written. However, I can assure you the format of the output of these commands hasn't changed in a very long time. To get more detailed statistics, run fw stat -long: # fw stat -long mrhat HOST IF POLICY DATE TOTAL REJECT DROP ACCEPT LOG mrhat >eth-s1p4c0 av 21Nov1999 15:23:59 72 0 0 72 1 mrhat <eth-s1p4c0 av 21Nov1999 15:23:59 57 0 0 57 0 mrhat >eth-s1p1c0 av 21Nov1999 15:23:59 180 0 14 166 1 mrhat <eth-s1p1c0 av 21Nov1999 15:23:59 170 0 0 170 0 mrhat >eth-s1p3c0 av 21Nov1999 15:23:59 90 0 90 0 1 The eth-s1p2c0 interface is missing from this list because it has not seen any traffic. To show this interface, use the -inactive parameter: # fw stat -long -inactive mrhat HOST IF POLICY DATE TOTAL REJECT DROP ACCEPT LOG mrhat >eth-s1p4c0 av 21Nov1999 15:23:59 72 0 0 72 1 mrhat <eth-s1p4c0 av 21Nov1999 15:23:59 57 0 0 57 0 mrhat >eth-s1p1c0 av 21Nov1999 15:23:59 184 0 17 167 1 mrhat <eth-s1p1c0 av 21Nov1999 15:23:59 171 0 0 171 0 mrhat >eth-s1p2c0 av 21Nov1999 15:23:59 0 0 0 0 0 mrhat <eth-s1p2c0 av 21Nov1999 15:23:59 0 0 0 0 0 mrhat >eth-s1p3c0 av 21Nov1999 15:23:59 90 0 90 0 1 mrhat <eth-s1p3c0 av 21Nov1999 15:23:59 0 0 0 0 0 The preceding examples of monitoring have been present in FireWall-1 since at least version 2.1. cpstat allows you to check on the status of various modules within the Check Point suite and also gives you the ability to monitor various parts of the operating system, giving you far more details than in previous versions. The usage for cpstat is: cpstat [-h host][-p port][-f flavour][-o polling [-c count] [-e period]] [-d] application_flag The flags for cpstat are described in more detail in Table 5.3. The applications you can query with cpstat are listed in Table 5.4. The flavors for os , fw , and vpn are specified in Tables 5.5, 5.6, and 5.7, respectively. Table 5.3. Flags for cpstat
[a] In English-speaking countries , it's -f flavour . In American-speaking countries, it's -f flavor . Israel is an English-speaking country, despite strong ties to the United States. Table 5.4. Applications that can be queried with cpstat
Table 5.5. Application flavors for os
Table 5.6. Application flavors for fw
[a] Note that a cookie in this context is how FireWall-1 represents a packet in a platform-independent manner, not a cookie that you might experience on a Web site or a cookie that a certain blue monster on Sesame Street might like to eat. Table 5.7. Application flavors for vpn
|