SSH DPI
You can use the SSH Deep Packet Inspection ("SSH DPI") feature to decrypt and encrypt SSH traffic and let the Threat Prevention solution protect against advanced threats, bots, and other malware.
The SSH Deep Packet Inspection (DPI) was integrated as part of the Quantum Spark alignment to R81.10, starting in R81.10.05.
With SSH DPI you can:
-
Block SSH attacks
-
Block the transmission of viruses through SFTP protocols.
-
Prevent
UserCheck rule action that blocks traffic and files and can show a UserCheck message. brute force password cracking of SSH/SFTP servers.
-
Prevent the dangerous use of SSH Port forwarding
-
Prevent the use of simple passwords such as "password" when connecting to SSG/SFTP
-
Prevent the use of vulnerable cryptography
-
Prevent the use of vulnerable SSH clients and servers
-
Prevent the use of port 22 for protocols other than SSH
|
Important - SSH DPI is disabled by default. |
To see the current SSH DPI status:
-
Connect to the command line on the Security Gateway
A dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources..
-
Log in to the Expert mode:
expert
-
Examine the current SSH DPI status:
cpssh_config istatus
To enable SSH DPI:
|
Note - The SSH DPI is disabled by default. |
-
In SmartConsole > Security Gateway, enable the Anti-Virus and IPS Software Blades and click OK.
-
Copy the public key from your SSH server (on a Linux-based server, usually it is located in /etc/ssh/ssh_host_rsa_key.pub or /pfrm2.0/etc/ssh_rsa_host_key.pub) to the Security Gateway to some directory (for example: /home/admin).
-
Connect to the command line on the Security Gateway.
-
Log in to the Expert mode:
expert
-
Run on the Security Gateway:
cpssh_config -s -g <IP_Address_or_FQDN_of_SSH_Server> -e </Path/To/Public_Key_File_of_SSH_Server>
Where:
-
<IP_Address_or_FQDN_of_SSH_Server> is the IP address or the FQDN (for example: my_ssh_server.com) of the SSH server.
-
</Path/To/Public_Key_File_of_SSH_Server> is the path on the Security Gateway to the public key file from the SSH server (for example: /home/admin/ssh_host_rsa_key.pub)
-
-
Enable SSH DPI on the Security Gateway:
cpssh_config ion
-
In SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., install the Threat Prevention policy on the Security Gateway object
Alternatively, on the Security Gateway CLI, run: fw fetch local
|
Internal Note - In the Locally Managed mode, run: |
Restart the SFWD daemon:
sfwd_restart
To disable SSH DPI:
-
Connect to the command line on the Security Gateway.
-
Log in to the Expert mode:
expert
-
Disable SSH DPI:
cpssh_config ioff
To show the SSH public keys:
-
Connect to the command line on the Security Gateway.
-
Log in to the Expert mode:
expert
-
Examine the SSH public keys:
cpssh_config -v -s
To collect the kernel debug:
-
Connect to the command line on the Security Gateway.
-
Log in to the Expert mode:
expert
-
Configure the kernel debug options:
-
fw ctl debug 0
-
fw ctl debug -buf 8200
-
fw ctl debug -m fw + cpsshi
-
fw ctl debug -m CPSSH all
-
-
Examine the kernel debug options:
-
fw ctl debug -m fw
-
fw ctl debug -m CPSSH
-
-
Replicate the issue.
-
Start the kernel debug:
fw ctl debug -T -f &>/storage/debug.log
-
Stop the kernel debug:
Press CTRL+C
-
Disable the kernel debug options:
fw ctl debug 0
-
Get the debug output:
/storage/debug.log