Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under attack. This command forwards log messages generated by the alert daemon on your Check Point Security Gateway to an external Management Station. This external Management Station is usually located at the ISP site. The ISP can then analyze the alert and react accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The Management Station receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must be performed between the external Management Station running the ELA Proxy at the ISP site and the Check Point Security Gateway generating the alert.
Procedure
Step |
Description |
---|---|
1 |
Connect with SmartConsole to the applicable Security Management Server or Domain Management Server, which manages the applicable Security Gateway that should forward log messages to an external Management Station. |
2 |
From the top left Menu, click Global properties. |
3 |
Click on the [+] near the Log and Alert and click Alerts. |
4 |
Clear the Send user defined alert no. 1 to SmartView Monitor. |
5 |
Select the next option Run UserDefined script under the above. |
6 |
Enter the applicable inet_alert syntax (see the Syntax section below). |
7 |
Click OK. |
8 |
Install the Access Policy on the applicable Security Gateway. |
Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f <Token |
Parameters
Parameter |
Description |
---|---|
|
The IPv4 address of the ELA Proxy (usually located at the ISP site). |
|
Prints the alert log received to Use this option when |
|
Specifies the type of connection to the ELA Proxy. One of these values:
|
|
Specifies the port number on the ELA proxy. Default port is 18187. |
|
A field to be added to the log, represented by a
This option can be used multiple times to add multiple |
|
The alert to be triggered at the ISP site. This alert overrides the alert specified in the log message generated by the alert daemon. The response to the alert is handled according to the actions specified in the ISP Security Policy: These alerts execute the OS commands:
These NetQuota and ServerQuota alerts execute the OS commands specified in the
|
Exist Status
Exit Status |
Description |
---|---|
|
Execution was successful. |
|
Undetermined error. |
|
Unable to allocate memory. |
|
Unable to obtain log information from |
|
Invalid command line arguments. |
|
Failed to invoke the OPSEC API. |
Example
|
This command specifies to perform these actions in the event of an attack:
cads