In This Section: |
The Home > System page shows an overview of the Check Point Appliance.
The Check Point Appliance requires only minimal user input of basic configuration elements, such as IP addresses, routing information, and blade configuration. The initial configuration of the Check Point Appliance can be done through a First Time Configuration Wizard. When initial configuration is completed, every entry that uses http://my.firewall shows the WebUI Home > System page.
The Home > Security Dashboard page shows you the active blades.
The software blades are shown in these groups:
Note - The Threat Emulation Software Blade is only supported in R80.10 management and higher. This blade is not supported for 1100 appliances.
The software blades are enabled through SmartDashboard. For more information, see the Threat Prevention Administration Guide.
To view blade and license information:
Click the information icon.
To view statistics:
The blade statistics window opens.
Click View demo to see an example of the statistics shown and then click Close.
The Home > Security Management page shows information for the management mode of the Check Point Appliance. You can also test Internet Connectivity from this page.
To set the management type:
Select one of the options:
When centrally managed, it shows the trust status between the Check Point Appliance and the Security Management Server. When a policy is prepared in SmartDashboard, you can fetch the policy from this window.
Security Management Server
In this section you can view the status of the management connection, last policy installation, adjust trust settings, and initialize a connection.
Important - This password must be identical to the Secure Communication authentication one-time password configured for the Check Point Appliance object in the SmartDashboard of the Security Management Server. |
If the Security Management Server is deployed behind a 3rd party NAT device, select Always use this IP address and manually enter the IP address the appliance used to to reach the Security Management Server. This IP address overrides, from this point on, the automatic calculating mechanism that determines the routeable IP address of the Security Management Server for each appliance.
If trust was established but the gateway could not fetch the policy, you can investigate the issue with the Security Management Server administrator. When the issue is resolved, click the Fetch Policy button that shows instead of the Connect button.
To reinitialize trusted communication with the Security Management Server:
A Warning message shows.
Note - You need to coordinate this operation with the Security Management Server administrator, as reinitialization is necessary on both sides.
Security Policy
To obtain the security policy from the Security Management Server, click Fetch Policy. This option is available only if trust is established with the Security Management Server.
Internet
To test connectivity, click Test Connection Status. A status message shows the results of the test. You can click Settings to configure Internet connections.
The Home > License page shows the license state for the software blades. From this page, the appliance can connect to the Check Point User Center with its credentials to pull the license information and activate the appliance.
In most cases, you must first register the appliance in your Check Point User Center account or create one if you don't already have one. A User Center account is necessary to receive support and updates.
If you have Internet connectivity configured:
You are notified that you successfully activated the appliance. After initial activation, the Activate License button shows Reactivate. If changes are made to your license, click Reactivate to get the updated license information.
If you work offline while configuring the appliance:
The Import Activation File window opens.
If there is a proxy between your appliance and the Internet, you must configure the proxy details before you can activate your license.
To configure the proxy details:
The Home > Site Map page shows a site map of the WebUI. It shows all of the tabs and the pages they contain.
Click the link to any page directly from the Site Map page.
The Active Computers page shows a list of the devices identified in internal networks. The information includes:
Note - 1100 appliances only support IPv4 addresses. 1200R and 1400 appliances support both IPv4 and IPv6 addresses. If a host has both IPv4 and IPv6 addresses, there will be a single entry in the table.
Note - Traffic monitoring does not differentiate between IPv4 and IPv6 addresses.
Manage the display:
When you select this option, the New Network Object window or New Server Wizard opens. Enter the information in the fields and click Apply. Use these objects to reserve IP addresses to MAC addresses in the DHCP server and also add this object name as a host in the local DNS service. Network objects and server objects can be used in the security configurations, for example in the Access Policy and IPS exceptions.
A server object also allows you to configure access and NAT if applicable as part of the object. If access and/or NAT are configured, automatic access rules are created in the Access Policy Rule Base.
This operation may affect performance.
To stop, click Stop Traffic Monitoring.
The display shows the devices connected to the gateway through a Hotspot. You can revoke the Hotspot access for one or more devices. This disconnects the device from the gateway and requires the device to log in again through the Hotspot.
To revoke the Hotspot access:
The access for that device is revoked. You must log in again through the Hotspot to reconnect the device to the gateway.
Note - If there is no IPv6 activity in a dual stack host, the Active computers do not show the IPv6 address.
Note - This page is available from the Home and Logs & Monitoring tabs.
The Monitoring page shows network, security, and troubleshooting information. When you enter this page, the latest data shows. You can click Refresh to update information. To see a sample monitoring report, click Demo. To close the sample reports, click Back.
The number of current connections in the system is shown for VPN Tunnels, Active Computers, and Connections. You can click the links to open the corresponding WebUI pages.
The Monitoring page is divided into these sections:
To expand or collapse the sections, click the arrow icon in the section's title bar.
Network
By default, network statistics are shown for the last hour. You can also see statistics for the last day. Select the applicable option Last hour or Last day from the Network section's title bar.
The data is automatically refreshed for the time period:
Last hour - At one minute intervals. For example, if you generate a report at 10:15:45 AM, the report represents data from 9:15 to 10:15 AM.
Last day - At hourly intervals. For example, if you generate a report at 10:15 AM, the report represents data from the last 24 hours ending at 10:00 AM of the current day.
If you hover over a time interval, a popup box shows:
Security
You can click All Infected Hosts to open the Logs & Monitoring > Infected Hosts page.
You can click Applications Blade Control to open the Access Policy > Firewall Blade Control page to see Applications and URL Filtering settings.
You can click the links to open the Threat Prevention > Blade Control page.
Troubleshooting
Note - This page is available from the Home and Logs & Monitoring tabs.
The Reports page shows network analysis, security analysis, and infected hosts reports by a selected time frame (monthly, weekly, daily, and hourly).
These elements influence the times shown in reports:
Rounding Off of Time
The times shown in generated reports are rounded down:
System Reboot
In the first 24 hour cycle after an appliance starts up (after installation or an update), the system adds one more time interval to the delta of the next applicable report interval.
For example, for weekly reports that are generated at pair hour intervals, the appliance requires 1 more hours plus the delta for the first applicable pair hour.
After you start up an appliance, reports are generated:
Note - Only the last generated report for each report type is saved in the appliance. When you generate a new report, you override the last saved report for the specified type.
To generate a report:
Click the applicable time frame link at the top of the page (Monthly, Weekly, Daily or Hourly).
The line below the links shows the selected report and its time frame. To refresh the data shown, click Generate.
The report includes these sections:
Executive Summary
The first page of the report is the executive summary and shows:
Table of Contents
The table of contents contains links to the network analysis, security analysis, and infected hosts reports. Click a link to go directly to the selected section.
Report Pages
Each report page shows a detailed graph, table, and descriptions.
Note - This page is available from the Home and Logs & Monitoring tabs.
On the Tools page you can:
To monitor system resources:
To show the routing table:
To verify the appliance connectivity to Cloud Services:
Click Test Cloud Services Ports.
The Cloud Services Ports Test window opens and shows the available ports and their state.
To display DSL statistics:
Click DSL Statistics. A window opens and shows the statistic parameters.
To generate a CPInfo file:
To ping or trace an IP address:
To perform a DNS lookup:
To capture packets:
If a packet capture file exists, a note shows the date of the file and you can download it before you start a new packet capture that overwrites the existing file.
You can activate packet capture and go to other WebUI application pages while the packet capture runs in the background. However, the packet capture stops automatically if the WebUI session ends. Make sure you return to the packet capture page, stop and download the capture result before you end the WebUI session.
Note - The capture utility uses tcpdump. "fw monitor" is available through the command line interface.
When the mini-USB is used as a console connector in 1400 appliances, Windows does not automatically detect and download the driver needed for serial communication. You must manually install the driver. For more information, see sk111713.
To download the Windows driver for Mini-USB console socket (1400 appliances only):
Click the Download link.
Note - This page is available from the Home, Device, and Logs & Monitoring tabs.