Configuring Check Point Syslogs Over Encrypted TCP

SecureChange Requester This topic is intended for TOS Administrators.

Overview

The syslog mechanism is used to pass policy change and traffic information from your devices to SecureTrack. For Check Point devices, you can configure syslogs encrypted over TCP, as described here, or non-encrypted over UDP.

Encrypted syslog configuration for Check Point includes configuring:

To configure non-encrypted syslogs, see Check Point Syslogs over non-encrypted UDP. For general information about sending syslogs to TOS, see Sending Additional Information using Syslog.

Syslogs over TCP is not supported for TOS deployments on Azure, AWS, or GCP.

Syslog Processing Methods

TOS supports two methods of processing syslog information for Check Point devices:

  • Original method (default)

    • The Automatic Policy Generator (APG) and in the Rule and Object Usage reports display rule usage.

    • The SecureTrack Reporting Essentials (STRE) reports do not display objects.

    • The Rule Viewer displays last-hit information only for rules (not for objects in rules).
  • New method

    Tufin Support might advise switching to the new method if you have a large volume of syslog traffic and have experienced performance issues.

    On switching to the new method, all existing last-hit information is cleared and reinitialized.
    • The Rule Viewer displays last-hit information for both rules and objects in rules.

    • The STRE reports includes objects.

    • The following are not available:

      • Automatic Policy Generator

      • Rule and Object Usage report

Switching from the new method back to the original method does not restore the last-hit information cleared previously.

Configure Syslog Processing Method

  • Switch to the new method:

    tos config set -p opm.usage.support.legacy.types=checkpoint
    tos config set -p opm.usage.support.legacy.types=checkpoint
  • Switch to the default method:

    tos config reset -p opm.usage.support.legacy.types
    tos config reset -p opm.usage.support.legacy.types

Configure TOS for Encrypted Syslogs

Configure the TOS CLI, Check Point CLI, and TOS UI for encrypted syslogs. Import an encryption certificate to the TOS server, sign the certificate, and modify the log exporter on the Check Point server, and then configure the new syslog connection in SecureTrack.

You must configure the log exporter on all monitored MDSM CMA, SMC and CLM log server devices.

Prerequisites

On the TOS server:

Set up Encrypted Syslogs Over TCP in TOS

  1. Import the certificate to the TOS server:

    Run:

    [<ADMIN> ~]# tos certificate import --type syslog --ca <CA-PATH> --cert <CERT-PATH> --key <KEY-PATH>
    tos certificate import --type syslog --ca <CA-PATH> --cert <CERT-PATH> --key <KEY-PATH>

    where

    Parameter

    Description

    Required/Optional

    <CERT-PATH>

    Location of the CA.

    Required

    <CERT-PATH>

    Location of the certificate.

    Required

    <KEY-PATH>

    Location of the key.

    Required

    Sample output

    $ tos certificate import --type syslog --ca /tmp/ca.crt --cert /tmp/server.crt --key /tmp/server.key
  2. For on-premises deployments, define the syslog VIP. If you are deploying on the cloud, skip this step.

    sudo tos cluster syslog-vip add <SYSLOG_VIP> [--port <PORT>] --transport tcp [--debug]

    where

    Parameter

    Description

    Mandatory /Optional

    <SYSLOG_VIP>

    VIP of the cluster.

    Mandatory

    --port

    Allows you to specify a port; otherwise, the default port 6514 is used.

    Optional

    It can take up to 10 minutes for the device to be added. When the process is finished the message: "INFO VIP "<VIP-ADDRESS>" Added!" appears.

  3. Convert the certificate to .p12 format:

    openssl pkcs12 -inkey client.key -in client.pem -export -out client.p12

  4. Modify the log exporter on your Check Point device and take note of the log ID.
  5. When adding/configuring your device in TOS:

    1. Select Custom > Syslog Authentication.

    2. Enter the log ID from the Check Point log exporter.

    3. Select Protocol TCP