The information you are about to copy is INTERNAL!
DO NOT share it with anyone outside Check Point.
Private ThreatCloud
Technical Level
Solution ID
sk149692
Technical Level
Product
Private ThreatCloud
Version
R80.20, R81.10
OS
Gaia
Platform / Model
Smart-1
Date Created
28-Mar-2019
Last Modified
06-Apr-2022
Solution
Table of Contents:
Introduction
Deployment
Managing the Private ThreatCloud
Installation and Configuration
Monitoring
Logging
Private ThreatCloud Diagnostics Tool
Documentation
Downloads
Known Limitations
Click Here to Show the Entire Article
Introduction
Note - Check Point's ThreatCloud is not vulnerable to the Apache (CVE-2021-44228). For more information, see sk176865.
Check Point Software Blades (for example, Anti-Bot, Anti-Virus, IPS, Threat Emulation, Application Control, and URL Filtering) leverage the power of the Cloud. The Private ThreatCloud provides a solution for customers whose Security Gateways or other Check Point devices do not connect directly to the Internet. With the Private ThreatCloud, customers receive continuous protection as cloud services are extended into offline or other compartmentalized environments.
The Private ThreatCloud is a copy of the Check Point public ThreatCloud. Check Point devices use the Private ThreatCloud to get updates instead of connecting directly to the Internet through their Gateways.
The Private ThreatCloud Download Agent downloads updates from the public ThreatCloud and pushes them to the Private ThreatCloud.
Deployment
You can deploy Private ThreatCloud in the following ways:
Single Box - Install the Private ThreatCloud and the Private ThreatCloud Download Agent on the same appliance.
Unidirectional - Install the Download Agent on a different appliance or VM (not the Private ThreatCloud appliance).
The Download Agent sends unidirectional updates to the Private ThreatCloud appliance.
Select this deployment if you do not want the Private ThreatCloud appliance to access the Internet directly.
Managing the Private ThreatCloud
Starting from R80.20, the Private ThreatCloud is installed on a dedicated Management Server and manages only the Private ThreatCloud (Standalone). The Security Gateways that connect to the Private ThreatCloud as clients must be managed by a different Management Server.
You can install the Download Agent on the Security Gateway or Management Server.
If you would like to install only the Download Agent on the Security Gateway, use this R80.20 image and the Jumbo Hotfix (instead of those mentioned in the section ' > Step 1 and Step 2):
Before you install the Private ThreatCloud, it is important to understand the different hosts you connect to as part of the installation.
The Private ThreatCloud: Replies to queries from Security Gateways or other Check Point devices for updates.
The Download Agent: Downloads updates from the public ThreatCloud and pushes them to the Private ThreatCloud. In a single box deployment, the Download Agent is on the same appliance as the Private ThreatCloud. In a unidirectional deployment, the Download Agent is on a separate appliance or VM.
The Security Management Server: A separate server that manages the Security Gateways in the Private ThreatCloud environment.
Security Gateways or other Check Point devices: Receive updates from the Private ThreatCloud. They must be configured as a client to the Private ThreatCloud.
The Download Agent must have HTTP or SSL access to these domains. Use Application Control rules to allow outgoing connections only to these domains:
Transfer the Private ThreatCloud package to the server (see the 'Downloads' section).
Connect to the command line on the server.
Log in to the Expert mode.
Go to the directory where you put the package:
cd /path_to/directory
Extract the package content:
tar -xvzf <package_name>
Run the installation script:
sh install_ptc.sh
Select the installation type:
Private ThreatCloud only
Download Agent only
Single Box (Private ThreatCloud and Download Agent)
Reboot the server after the installation is complete.
Single Box Configuration:
In a Single Box deployment, the Private ThreatCloud and the Download Agent are installed on the same appliance.
This section describes the procedure for this type of installation once the initial configuration is complete.
Add the Private ThreatCloud license on the server.
Restart the server.
Connect to the command line on the server.
Log in to the Expert mode.
Run the Private ThreatCloud Setup Wizard (one of these commands): ptc_cli mgmt or ptc_cli config
Select: Adding a new Private ThreatCloud
Follow the instructions in the wizard.
Private ThreatCloud-only Configuration:
In this type of installation, the Private ThreatCloud is installed on a different appliance than the Download Agent and receives continuous updates from it.
This section describes the procedure for this type of installation once the initial configuration is complete.
Add the Private ThreatCloud license on the server.
Restart the server.
Connect to the command line on the server.
Log in to the Expert mode.
Run the Private ThreatCloud Setup Wizard: ptc_cli mgmt
Select: Adding a new Private ThreatCloud
Follow the instructions in the wizard.
Download Agent-only Configuration:
In this type of installation, the Download Agent is installed on a different appliance or VM than the Private ThreatCloud.
The Download Agent connects to the Internet and sends unidirectional updates to the Private ThreatCloud.
In this deployment, the Private ThreatCloud cannot access the Internet.
This section describes the procedure for this type of installation once the initial configuration is complete.
Connect to the command line on the server.
Log in to the Expert mode.
Run the Download Agent Wizard: ptc_cli config
Follow the instructions in the wizard and add the applicable Private ThreatCloud that receives updates from this Download Agent.
To get the License Certificate Key:
Get the Certificate Key from your User Center account,or use the Private ThreatCloud:
Connect to the command line on your Private ThreatCloud in another shell.
Log in to the Expert mode.
Get the list of the currently installed licenses and their Certificate Keys: cplic print The Certificate Key is the last item in the line. It has one of these formats:
You must establish trust between the Security Management/Domain Management Server and the Security Gateways that you want to connect to the Private ThreatCloud.
To download updates directly from the Management Server/ Multi Domain Management server, you must configure it as a client to the Private ThreatCloud.
No need to add any configuration for Private ThreatCloud in SmartConsole.
Before you begin:
Disable the Internet proxy on the Security Gateways or other devices that use the Private ThreatCloud.
This makes sure that they cannot bypass the Private ThreatCloud to the Internet.
Transfer the ptc_mgmt_addon.rpm file to the Management Server that manages the Security Gateways or other Check Point devices.
Transfer this RPM package to the Management Server to the /home/admin/ directory.
You can extract this RPM package from the Private ThreatCloud in one of these ways:
Copy the file from the /home/admin/ directory on the Private ThreatCloud.
Download the file from this URL:
http://<IP Address of Private ThreatCloud>/client_cli/ptc_mgmt_addon.rpm
Connect to the command line on the Management Server.
Log in to the Expert mode.
Install the RPM:
rpm -ihv /home/admin/ptc_mgmt_addon.rpm
Adding a client to the Private ThreatCloud from a Security Management Server:
Connect to your Security Management with SSH.
Run: ptc_cli mgmt
Select: Configure Security Gateways or other Check Point devices
Select: Add an externally managed Private ThreatCloud
Follow the instructions in the wizard.
To configure the Security Management Server as a client to the Private ThreatCloud, enter 127.0.0.1 in the list of IP addresses that can connect to the Private ThreatCloud.
Adding a client to the Private ThreatCloud from R80.20 and higher Multi-Domain Server:
Connect to the command line on the Multi-Domain Security Management.
Go to the context of the applicable Domain Management Server: mdsenv <IP Address or Name of Domain Management Server>
Run: ptc_cli mgmt
Select: Configure Security Gateways or other Check Point devices
Select: Add an externally managed Private ThreatCloud
Follow the instructions in the wizard.
To configure the Multi-Domain Server / Domain Management Server as a client to the Private ThreatCloud, enter 127.0.0.1 in the list of IP addresses that can connect to the Private ThreatCloud.
Adding a client to the Private ThreatCloud from R77.30 Multi-Domain Server:
Connect to the command line on your Multi-Domain Security Management.
Go to the context of the Domain Management Server: mdsenv <IP Address or Name of Domain Management Server>
Run: /home/admin/ptc_mgmt_addon/ptc_cli_slim.sh
Select: connect a Security Gateways or other Check Point Devices to your Private ThreatCloud
Follow the instructions in the wizard.
To configure the Multi-Domain Server / Domain Management Server as a client to the Private ThreatCloud, enter 127.0.0.1 in the list of IP addresses that can connect to the Private ThreatCloud.
To revert the client configuration:
From the Management Server that has SIC with the client, run: ptc_cli mgmt
Select: Configuring the Security Gateways or other Check Point devices that use the Private ThreatCloud
Select: Revert Security Gateways or other Check Point Devices back to public ThreatCloud
Follow the instructions in the wizard.
Administering the Private ThreatCloud
This section describes how to administer and reconfigure the Private ThreatCloud and the Download Agent after you run the ptc_cli mgmt Setup Wizard.
General Notes:
When configuring Cluster Members as clients to the Private ThreatCloud, use the real IP addresses of the Cluster Members, and not the Cluster VIP address.
The Private ThreatCloud also receives software updates for the Private ThreatCloud itself. Engine updates with security updates are downloaded by the Private ThreatCloud Download Agent when available, and are automatically updated on the Private ThreatCloud.
The Private ThreatCloud software is updated by the automatic engine updates. Do not use CPUSE to update the Private ThreatCloud, as this can break the Private ThreatCloud's functionality.
In VSX environments, you must only add VS0 (the context of the VSX Gateway / VSX Cluster Member itself) as a Private ThreatCloud client.
Changing the IP Address of the Private ThreatCloud
Use the Gaia Portal or Gaia Clish to change the Private ThreatCloud IP address (see the Gaia Administration Guide for you version).
Use the the Gaia Portal or Gaia Clish to remove existing licenses and install new licenses generated for the new IP address.
Note: In your User Center account, generate the Private ThreatCloud license for the Private ThreatCloud IP address to select a Local license. Do not use the Management IP address to select a Central license.
Procedure:
To change the Private ThreatCloud IP address in the Gaia Portal, go to Network Management > Network Interfaces.
Install the license for the Private ThreatCloud.
Restart the appliance.
Connect with SmartConsole to the new Private ThreatCloud IP address.
From the left navigation panel, click Gateways & Servers.
Double-click the Private ThreatCloud object.
Update the IP address in the object.
Click OK.
Install the database (in the top left corner, click Menu > Install database > select the Private ThreatCloud object > click Install).
On the Download Agent:
Connect to the command line on the Private ThreatCloud Download Agent.
Log in to the Expert mode.
Run: ptc_cli config
Select: Private ThreatCloud configuration.
Change the IP address of the Private ThreatCloud.
Configure the Security Gateways or other Check Point devices that trust and are connected to the Private ThreatCloud to use the new IP address. For more information, read the section 'Configuring Check Point Devices to Use the Private ThreatCloud'.
CPUSE and Threat Emulation require very large updates. With the Private ThreatCloud, you can configure the time at which the downloads for these updates start. You can configure a daily or weekly update, or you can set an interval (for example, 2 days).
Using your download schedule, the Private ThreatCloud Download Agent requests new updates from the public ThreatCloud. Configure the time at which the Private ThreatCloud Download Agent starts to download the updates. When an update is found, the Private ThreatCloud Download Agent downloads until all parts get to the ThreatCloud. These downloads might take several hours.
To configure the download schedule:
Connect to the command line on the Private ThreatCloud Download Agent.
Log in to the Expert mode.
Run: ptc_cli config
Select: Large file downloads scheduling
Select a schedule: Daily, Weekly, or Periodically.
The Private ThreatCloud automatically saves backups at 24-hour intervals. If necessary, you can restore the appliance settings from a backup.
To restore the Private ThreatCloud:
Connect to the command line on the Private ThreatCloud.
Log in to the Expert mode.
Run: ptc_cli mgmt
Select: Restoring the Private ThreatCloud from a backup
Enter the number of the backup.
On the Private ThreatCloud Download Agent, run: ptc_cli config
Select to restore updates after a backup version restore.
Note: When you use a backup, you cannot restore it again. For example, if you have three backups and you restore number 2, the next time you see the backups, number 2 does not appear. When a restore begins, the database is locked and updates are disabled.
Private ThreatCloud supports High Availability using the 'keepalived' open source solution.
'Keepalived' is a routing software and its main goal is to provide simple and robust facilities for load balancing and high-availability to Linux system and Linux based infrastructures.
Starting engine version 18, the failover mechanism includes both networking and services functionalities, and adjusts the priority accordingly to achieve the highest performance of the Private ThreatCloud.
Before activating the 'keepalived' on the Private ThreatCloud, you must use the same certificate for both the 'Master' and 'Slave' servers.
On the 'Master' Private ThreatCloud, get these files:
/web/conf/server.crt
/web/conf/server.key
On the 'Slave' Private ThreatCloud:
Transfer the server.crt and server.key files (from the 'Master' Private ThreatCloud) to the /home/admin/ directory.
Connect to the command line.
Log in to the Expert mode.
Run: ptc_cli config
Select: Generate/import a certificate
Press the "i" key to import a certificate from an external certificate authority.
Provide the location of the files and approve the change.
To activate the 'keepalived' on the Private ThreatCloud:
Connect to the command line.
Log in to the Expert mode.
Run: ptc_cli config
Select: Cluster Configuration
Configure these settings:
The IP of the Private ThreatCloud interface
The state - Master or Slave
Interface IP address of the second Private ThreatCloud member
Interface name used for the local Private ThreatCloud
Cluster Virtual IP address
Notes:
Cluster configuration that was made prior to engine version 18:
To use the new failover mechanism, run the 'ptc_cli config' command in the Expert mode and select 'Cluster Configuration'. The wizard overwrites the existing configuration in the /etc/keepalived/keepalived.conf file.
Private Threat Cloud Clusters that are not configured with the new failover capabilities, keep working with the old 'keepalived' mechanism.
The Active cluster member contains the Virtual IP address. To see this VIP address, run in the Expert mode: ip address
To stop the 'keepalived' service, run in the Expert mode: service keepalived stop
To start the 'keepalived' service, run in the Expert mode: service keepalived start
The priority mechanism has changed and by default it is configured to 201 on the 'Master' and 200 on the 'Slave'. Do not change this configuration manually.
Save certificate files on removable media or an external computer. If you install the Private ThreatCloud again, use the original certificate. If you use a new certificate, you must change the certificate on all the Security Gateways and other devices that receive Private ThreatCloud updates.
To export your current certificate, copy these files from your Private ThreatCloud to a different device or computer:
/web/conf/server.crt
/web/conf/server.key
To import the certificate you saved elsewhere:
Copy both files to the newly installed Private ThreatCloud.
Connect to the command line on your Private ThreatCloud.
Log in to the Expert mode.
Run: ptc_cli config
Select: Generate/import a certificate
Follow the instructions in the wizard. You must provide the two files you copied from your previous Private ThreatCloud installation.
The Private ThreatCloud Download Agent on the Private ThreatCloud starts to download updates and push them to the Private ThreatCloud.
You can access the ThreatCloud services after the Private ThreatCloud Download Agent finishes downloading updates.
The initial download after set up takes approximately 2 hours, depending on your connection speed.
You can monitor the Private ThreatCloud Download Agent to see the download progress.
If you run Private ThreatCloud monitoring before the Private ThreatCloud Download Agent finishes downloading updates, not all services will be available.
To monitor the Private ThreatCloud Download Agent:
On the command line of the Private ThreatCloud Download Agent, run in the Expert mode: ptc_cli downloads
To monitor the Private ThreatCloud:
Use one or more of these options to make sure that the Private ThreatCloud appliance is ready and that all services are available:
If you enabled web access to the system monitoring, browse to: http://<IP_Address_of_Private_ThreatCloud>/ptcd/report.html
Browse to (JSON viewer is recommended): http://IP_Address_of_Private_ThreatCloud/ptcd/monitor
On the command line of the Private ThreatCloud, run in the Expert mode: ptc_cli monitor
After upgrade of the Multi-Domain Security Management / Security Management Server, the "ptc_mgmt_addon.rpm" must be installed again on the upgraded server.
IPS
Offline Update is not supported (Using the offline method of the upf file to update the Private ThreatCloud itself is not supported).
Multi-Domain Security Management environment
It is not possible to configure only one Domain to work with the Private ThreatCloud. It is only possible to configure all Domains or none.
Threat Prevention
In SmartDashboard, when you try to access the Threat Prevention tab - Protections pane, the pane will not be displayed, and an error message will appear: "Cannot access protection information due to connectivity issue."
Application & URL Filtering
Categorizing of social network widgets is not supported.
Anti-Spam
Anti-Spam is not supported when using Private ThreatCloud.
ThreatWiki
Access from logs to ThreatWiki is not supported.
SmartConsole overview
Updates for 'Protections' overview in SmartConsole are not supported.
Client configuration on the Private ThreatCloud
Adding a client from the SmartConsole connected to Private ThreatCloud is not supported. The client must be connected from a different Management Server.
Upgrade
Direct upgrade from an R77.30 Private ThreatCloud to an R80.20 Private ThreatCloud is not supported.
Jumbo Hotfixes
Installing Jumbo Hotfixes (any version) on top of the Private ThreatCloud is not supported.
Platform Portal Port
Configuring the Platform Portal port in the Private ThreatCloud object in SmartConsole is not supported (the URL must not contain a port number, so it uses the default port 443).
Give us Feedback
Thanks for your feedback!
Are you sure you want to rate this stars?