Procedure
- Configure your Check Point appliance.
- Check or configure the SAM communication mode ports on your Check Point
appliance.For details, see Preconfiguring a Security Gateway.
- Configure the OPSEC Application on your Check Point appliance.For details, see Configuring a Secured Connection.
- Enable purging of SAM file on your Check Point appliance.
-
Open the Check Point SmartDashboard.
-
Expand Other and go to SAM.
-
Enable Purge SAM file when it reaches:.
-
Specify the file size.
-
Click OK.
-
Save the
-
- Configure Security Policies on your Check Point appliance.
-
Open the Check Point SmartConsole.
-
On the SECURITY POLICIES tab, go to.
-
To add a rule, click the Add rule above
icon.
-
To configure the new policy, right-click the action.
-
Change the action to Accept.
-
Right-click the source.
-
Select Add new items....
-
Click the new icon (
).
-
Select.The New Address Range window appears.
-
n the Enter Object Name field, type DDI.
-
In First IP address, type the Deep Discovery Inspector IP address.
-
In Last IP address, type the Deep Discovery Inspector IP address.
-
Click OK.
-
Right-click the destination.
-
Select Add new items....
-
Click the new icon (
).
-
Select.The New Address Range window appears.
-
In the Enter Object Name field, type CheckPoint.
-
In First IP address, type the CheckPoint IP address.
-
In Last IP address, type the CheckPoint IP address.
-
Click OK.
-
Click Install Policy.The following window opens.
-
Click Publish & Install.
-
Click Install.The Check Point appliance is enabled to receive suspicious objects and C&C callback addresses from Deep Discovery Inspector.
-
- Check or configure the SAM communication mode ports on your Check Point
appliance.
- Configure Deep Discovery Inspector.
- On the Deep Discovery Inspector management console, go to .
- Select Check Point Open Platform for Security (OPSEC).
- Select a connection type.
Note
Ensure that your network configuration allows Deep Discovery Inspector to connect to the Check Point appliance.Deep Discovery Inspector may connect to the Check Point appliance through the secured connection port or clear connection port that is configured on the Check Point appliance. Deep Discovery Inspector also pulls the certificate from the Check Point appliance through port 18210.If you selected Secured connection, the OPSEC application name and SIC one-time password settings appear. - Type the server address.
Note
The server address must be the IPv4 address or FQDN of the inline product. - Type the port.
Note
This port must be the same port that is configured on the security gateway. For details, see Preconfiguring a Security Gateway. - If you selected Secured connection, type the
OPSEC application name and SIC
one-time password.For more details, see Configuring a Secured Connection.
Note
If the one-time password is reset on the Check Point appliance, the new one-time password must be different than the previous one-time password. - (Optional) Click Test Connection.
- Under Object Distribution, click
Enabled.The Legal Statement opens.
- Read and accept the Legal
Statement.
Note
To enable integration with this inline product/service, you must accept the Legal Statement. - (Optional) Select a new Frequency.
- Configure the following criteria to send suspicious object and C&C
callback address information from Deep Discovery Inspector to your
Check Point appliance:
-
Object type:
-
C&C Callback Address
-
IPv4 address
-
-
Suspicious Object
-
IPv4 address
-
-
-
Risk level:
-
High only
-
High and medium
-
High, medium, and low
-
-
- Under Advanced Settings, select one of
the following actions:
-
Reject: Packets will be rejected and a notification sent to the communicating peer that the packet has been rejected.
-
Drop: Packets will be dropped without sending the communicating peer a notification.
-
Notify: A notification about the defined activity will be sent but the activity will not be blocked.
-
- Click Save.
- (Optional) Click Distribute Now to distribute suspicious objects and C&C callback addresses to Check Point immediately.
- To view suspicious objects and C&C callback addresses distributed by Deep Discovery Inspector on Check Point
SmartView Monitor, do the following:
- On Check Point SmartConsole, go to Logs & Monitor.
- Add a new tab.
- Click Tunnels & User Monitoring to open SmartView Monitor.
- Click the Launch Menu icon and go to .The Enforced Suspicious Activity Rules window opens.
- At Show On, select the target Check Point appliance name.
- Click Refresh.
Suspicious objects and C&C callback addresses distributed by Deep Discovery Inspector are displayed.