Mirror and Decrypt Requirements

Item

Description

1

Designated network interface for Mirror and Decrypt:

  1. Select a designated physical interface on your Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / each Cluster MemberClosed Security Gateway that is part of a cluster. / Scalable Platform Security GroupClosed A logical group of Security Appliances (in Maestro) / Security Gateway Modules (on Scalable Chassis) that provides Active/Active cluster functionality. A Security Group can contain one or more Security Appliances / Security Gateway Modules. Security Groups work separately and independently from each other. To the production networks, a Security Group appears a single Security Gateway. In Maestro, each Security Group contains: (A) Applicable Uplink ports, to which your production networks are connected; (B) Security Appliances (the Quantum Maestro Orchestrator determines the applicable Downlink ports automatically); (C) Applicable management port, to which the Check Point Management Server is connected..

    Important:

  2. Assign a dummy IP address to the designated interface.

    Important - This IP address cannot collide with other IP addresses used in your environment. This IP address cannot belong to subnets used in your environment. Make sure to configure the correct subnet mask. After you enable traffic mirroring on this interface in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., all other traffic that is routed to this interface is dropped.

  3. On cluster members, you must configure this designated physical interface in the $FWDIR/conf/discntd.if file.

    Note - This prevents the interfaces that are not used from sending Cluster Control Protocol (CCP) packets that can overwhelm the Mirror and Decrypt recorders.

2

Maximum Transmission Unit (MTU) on the Mirror and Decrypt designated physical interface:

  • MTU value has to be 1500 (default), or at least the maximum MTU value from other interfaces on the Security Gateway / Cluster Member / Security Group.

3

HTTPS InspectionClosed Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. for decrypting the HTTPS traffic:

4

Access Rules for traffic you wish to Mirror and Decrypt:

  • You must create special rules in the Access Control Policy for the traffic you wish to mirror and decrypt.