Event Forwarding - Push to SIEM
Infinity Portal can forward logs to SIEM in three formats: Syslog, LEEF, or CEF.
Prerequisites:
-
The SIEM server must support TLS 1.2.
-
The OpenSSL CLI must be installed on your computer.
-
Make sure your network and SIEM server allow inbound connections using Fully Qualified Domain Names (FQDNs) listed below:
File
FQDN
Europe (EU)
whitelist-cidr.eu.datatube.checkpoint.com/
United States (US)
whitelist-cidr.us.datatube.checkpoint.com/
Asia-Pacific (AP, Australia)
whitelist-cidr.ap.datatube.checkpoint.com/
United Arab Emirates (AE)
whitelist-cidr.ae.datatube.checkpoint.com/
Important - The FQDN configuration is mandatory for new users. If you previously configured a static IP address, we recommend replacing it with the FQDN address shown in the table above.
Allow IP addresses if FQDN filtering is not supported
If your firewall does not support FQDN‑based filtering, configure it to allow inbound traffic from the IP addresses returned by DNS lookups of the required domains.
Be aware that these IP addresses may change over time. To ensure continued connectivity, review and update the resolved addresses periodically.
File
Source IP Address
Source Port
EU
20.73.193.110
No specific port required
US
20.85.1.184
No specific port required
UAE
20.233.160.96/29
514
AUS
20.92.158.64
20.92.158.102
No specific port required
File Extensions
|
File |
Description |
|---|---|
|
|
Private key |
|
|
Public key |
|
|
Certificate Sign Request |
|
|
File you create when you sign the |
|
|
If you use an existing domain certificate, this file contains the |
If you already have a <CA>.key file and a <CA>.pem file, then skip this step.
Skip this step if any of these is correct:
-
You use TLS, not mutual TLS encryption.
-
You already have a
<CA>.keyfile and a<CA>.pemfile.
If you do not have a <CA>.key file and a <CA>.pem file, follow one of these procedures to prepare your organization's domain certificate:
-
On your computer, in OpenSSL CLI, generate a Client CA:
-
Create the
<CA>.keyfile:openssl genrsa -out <CA>.key 2048 -
Create
<CA>.pemfile:openssl req -x509 -new -nodes -key <CA>.key -sha256 -days 825 -out <CA>.pem
-
-
On your computer, in the OpenSSL CLI, create a certificate for the SIEM server:
-
Create a key for the SIEM server:
openssl genrsa -out <SERVER>.key 2048 -
Generate a
.csrfile for the SIEM server:openssl req -new -key <SERVER>.key -out <SERVER>.csr -
Generate a Client Certificate (
.crt) file for the SIEM server. To do this, sign the.csrfile using your organization's CA:openssl x509 -req -in <SERVER>.csr -CA <CA>.pem -CAkey <CA>.key -CAcreateserial -out <SERVER>.crt -days 825 -sha256
-
-
Install your SIEM server certificate, SIEM server key, and the CA on your SIEM server (for example, Splunk, Syslog, or QRadar).
-
In the configuration of the SIEM server, define the
<CA>.pemfile as a trusted certificate.
If you already have a .pfx file, then use this method.
Prerequisites:
-
The
.pfxfile that contains the<CA>.keyfile and the<CA>.pemfile. -
The passphrase of the
.pfxfile.
Procedure
Do these steps in OpenSSL CLI on your computer:
-
Extract the
<CA>.pemfile from the.pfxfile:openssl pkcs12 -in <CERTIFICATE>.pfx -out <CA>.pem –noenc -
Extract the
<CA>.keyfile from the.pfxfile:openssl pkcs12 -in <CERTIFICATE>.pfx -nocerts -out <CA>.key
-
Remove the passphrase from the
<CA>.keyfile:openssl rsa -in <CA>.key -out <my-key-nopass>.key
On your SIEM server, open a dedicated port to receive logs from Infinity Portal.
|
File |
FQDN |
|---|---|
|
Europe (EU) |
whitelist-cidr.eu.datatube.checkpoint.com/ |
|
United States (US) |
whitelist-cidr.us.datatube.checkpoint.com/ |
|
Asia-Pacific (AP, Australia) |
whitelist-cidr.ap.datatube.checkpoint.com/ |
|
United Arab Emirates (AE) |
whitelist-cidr.ae.datatube.checkpoint.com/ |
A Destination object in the Infinity Portal defines a connection between the Infinity Portal and a SIEM server.
After you configure a Destination for your SIEM server, you can review, edit, search, and delete the destination(s) in the Manage Destinations window. For more information, see Managing Destinations.
-
In the Infinity Portal, click
> Event Forwarding. -
Click Create Destination or Manage Destinations.
The New Destination window opens.
-
From the Forwarding method list, select Push to SIEM.
-
Enter a name for the destination.
-
From the list, select a SIEM server.
-
In the Host field, enter the address of the SIEM server as an IP address or FQDN.
-
In the Port field, enter the port to use for the SIEM server.
Note - Below the Port field, default configurations appear. You cannot change these configurations:
-
Protocol - The communication protocol. Currently, only TCP is supported.
-
Encryption - The encryption protocol. You can select TLS or mutual TLS.
-
-
Click Next.
The Certificates tab opens.
For this step, keep the Certificates tab of the Infinity Portal open and the SIEM server active. Then, follow the workflow:
-
For mutual TLS encryption, follow the numbered workflow in the Certificates tab.
-
For TLS encryption, skip to Step 3 to upload your CA certificate.
-
Client Certification Sign Request (
.csrfile)-
In the Infinity Portal, click Certificate Sign Request.
Your web browser downloads the Infinity Portal's
.csrfile to your computer. -
On your computer, use the OpenSSL command line to open the
.csrfile. -
On your computer, use the
openssl x509command to sign the downloaded Client Certificate. To do this, it is necessary to enter your private and public keys.
Note - Make sure you are in the same working folder as the
<CA>.keyand<CA>.pemfiles.openssl x509 -req -in <CERTIFICATE>.csr -CA <CA>.pem -CAkey <CA>.key -CAcreateserial -out <YOUR-CERTIFICATE>.crt -days 825 -sha256
-
-
Client Certificate (
.crtfile) - In the Infinity Portal, click Browse and upload the signed Client Certificate (.crtfile).
Best Practice - For a more secure connection, Check Point recommends to also upload the signed Client Certificate (
.crtfile) to your SIEM server. -
Certificate Authority (CA) certificate (
.pemfile) - Click Browse and upload the CA certificate (<CA>.pem). -
Test Connectivity - Click Test Connectivity.
This test allows you to confirm that the server communicates with Event Forwarding and that Event Forwarding is not impersonated by an attacker.
Important - In a first-time configuration, you must do a successful test before you can continue configuring Event Forwarding.
-
Click Finish.
If the connection is successful, then Connect successfully appears.
If the connection is not successful, refer to sk182879 - Infinity Portal Event Forwarding - Troubleshooting.
After configuring the destination, add a forwarding rule with this destination. For more information, see Managing Forwarding Rules.