Deploying a Security Gateway in Monitor Mode

Introduction to Monitor Mode

You can configure Monitor Mode on a single Check Point Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.'s interface.

The Check Point Security Gateway listens to traffic from a Mirror Port or Span Port on a connected switch.

Use the Monitor Mode to analyze network traffic without changing the production environment.

The mirror port on a switch duplicates the network traffic and sends it to the Security Gateway with an interface configured in Monitor Mode to record the activity logs.

You can use the Monitor Mode:

Benefits of the Monitor Mode include:

  • There is no risk to your production environment.

  • It requires minimal set-up configuration.

  • It does not require TAP equipment, which is expensive.

Example Topology for Monitor Mode

Item

Description

1

Switch with a mirror or SPAN port that duplicates all incoming and outgoing packets.

The Security Gateway connects to a mirror or SPAN port on the switch.

2

Servers.

3

Clients.

4

Security Gateway with an interface in Monitor Mode.

5

Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. that manages the Security Gateway.

Supported Software Blades in Monitor Mode

This table lists Software Blades and their support for the Monitor Mode in a single Security Gateway deployment.

Important - Check Point ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. does not support the Monitor Mode.

Software Blade

Support for the Monitor Mode

Firewall

Fully supports the Monitor Mode.

IPSClosed Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System).

These protections and features do not work:

  • The SYN Attack protection (SYNDefender).

  • The Initial Sequence Number (ISN) Spoofing protection.

  • The Send error page action in Web Intelligence protections.

  • Client and Server notifications about connection termination.

Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI.

Does not support UserCheck.

URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF.

Does not support UserCheck.

Data Loss PreventionClosed Check Point Software Blade on a Security Gateway that detects and prevents the unauthorized transmission of confidential information outside the organization. Acronym: DLP.

Does not support these:

  • UserCheck.

  • The "Prevent" and "Ask User" actions - these are automatically demoted to the "Inform User" action.

  • FTP inspection.

Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA.

Does not support these:

  • Captive Portal.

  • Identity Agent.

Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE.

Does not support these:

  • The Emulation Connection Prevent Handling Modes "Background" and "Hold". See sk106119.

  • FTP inspection.

Content AwarenessClosed Check Point Software Blade on a Security Gateway that provides data visibility and enforcement. See sk119715. Acronym: CTNT.

Does not support the FTP inspection.

Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.

Fully supports the Monitor Mode.

Anti-VirusClosed Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV.

Does not support the FTP inspection.

IPsec VPNClosed Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access.

Does not support the Monitor Mode.

Mobile AccessClosed Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. Acronym: MAB.

Does not support the Monitor Mode.

Anti-SpamClosed Check Point Software Blade on a Security Gateway that provides comprehensive protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS, ASPAM. & Email Security

Does not support the Monitor Mode.

QoSClosed Check Point Software Blade on a Security Gateway that provides policy-based traffic bandwidth management to prioritize business-critical traffic and guarantee bandwidth and control latency.

Does not support the Monitor Mode.

Limitations in Monitor Mode

These features and deployments are not supported in Monitor Mode:

For more information, see sk101670: Monitor Mode on Gaia OS and SecurePlatform OS.