Module 'CPSSH' (SSH Inspection)
R80.40 introduced SSH Deep Packet Inspection - decryption / encryption of SSH, extraction of files from SFTP/SCP, blocking of SSH port forwarding, and so on.
For more information, see the R81 Threat Prevention Administration Guide.
Syntax
-
On the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / each Cluster Member Security Gateway that is part of a cluster., run in the Expert mode:
fw ctl debug -m CPSSH + {all | <List of Debug Flags>}
-
On the Scalable Platform Security Group, run in the Expert mode:
g_fw ctl debug -m CPSSH + {all | <List of Debug Flags>}
|
Important - Also enable the debug flag " |
Flag |
Description |
||
---|---|---|---|
|
Detailed information about authentication |
||
|
Detailed information about packets |
||
|
Detailed information about connections |
||
|
Encryption and decryption
|
||
|
Dumps the connection buffer |
||
|
General errors |
||
|
General information |
||
|
Information about authentication
|
||
|
Information about connections
|
||
|
Information about decryption of connections
|
||
|
Information about encryption of connections
|
||
|
Internal flow
|
||
|
Internal flow
|
||
|
Information about connections |
||
|
Internal flow |
||
|
Parser of SFTP / SCP connections |
||
|
Information about the module State Machine |
||
|
Information about client and server communication |
||
|
General warnings |