/
/
Security Products: Challenge, Accessibility, Approach to test

Security Products: Challenge, Accessibility, Approach to test

Article
January 19, 2023
Profile Icon

Jason Franscisco

We are often asked by our clients to setup security firewalls and networking products in a lab environment using popular emulators like EVE-NG or GNS3 etc. It is always not easy to find ways to emulate different security network products, but we are able to find workarounds to setup them in our lab environment. Network emulation requires virtual devices like routers, switches, and PCs to replicate in real time environment and analyse traffic coming through the devices. Vendors provides access to these images in different ways like ISO images, free software downloads or get access to their licensed versions. We have successfully worked on the following products: Sophos XG, Snort IDS & IPS, Juniper SRX Next Gen, Check Point, Symantec (SEPM), Symantec EDR, Trend Micro (Deep Security Manager), McAfee ePO, Cisco Umbrella Reporting, Cisco Firepower, Cisco ASA, Fortinet, Cisco Meraki, WatchGuard, Microsoft DHCP, Suricata and so on.

Some of the common use cases we have used these emulations in our lab for our clients include:

  1. Use this setup in a lab environment to create real time traffic and attacks for testing purpose and analyze various logs such as System event log, Anti-Malware event, Application Control event, Firewall event log, Integrity Monitoring log event, Intrusion Prevention event log, Log Inspection event, Web Reputation event. These logs can be ingested into various Log Management platforms like Splunk, Sumo Logic, Graylog, LogRhythm and so on in Syslog, CEF and JSON formats for further investigation
  2. Run the OS that emulates real behaviour of network hardware to create and test Threat Hunting rules like SIGMA and Vulnerabilities using OVAL
  3. Simulate a network with several network devices for Penetration testing
  4. Developing integrations with different TIP, SOAR and SIEM platforms. This will help us to demonstrate proof of concept (POC) and use cases that are possible with an integration or analyze the feasibility of an integration with a TIP, SOAR and SIEM platform

In this blog, we will demonstrate the first use case using Check Point Firewall as an example. This blog will cover the following:

  1. Deployment/Installing and Setting up Check Point firewall on a server
  2. Configuring and setting up a test network, using Check Point management server
  3. Creating policies, generating traffic and capturing Logs
  4. Finally Parsing and mapping Logs

1. Deployment/Installing and Setting up Check Point firewall on a server

  1. 1.1. Download the ISO Images – for Check Point, routers, switches, and virtual PCs and have access to a VMware Workstation and WinSCP (SFTP Client). Check Point ISO file can be downloaded from the website You can find several places to download the images for Routers, Switches and Virtual PCs, make sure that the images you download are compatible with Check Point
  2. 1.2. Install EVE-NG in a VMware workstation To setup Lab Environment for Check Point, you need to have access to a VMware Workstation, EVE-NG (Network Emulator) and WinSCP (SFTP Client). EVE-NG can be downloaded here and WinSCP can be downloaded here.
  3. 1.2.1. Network Emulator (EVE-NG) will be installed in VMware workstation and the Network settings will be set to Bridged mode to obtain IP address from DHCP
  4. 1.2.2. EVE-NG provides a Web UI which can be used to create your test environment with different routers, switches and Virtual PC’s
  5. 1.3. Setup Check Point firewall
  6. 1.3.1. Install WinSCP which is used to copy file between a local computer and to the VMware Workstation where we installed EVE-NG in the previous step using FTP, SFTP
  7. 1.3.2. Establish Connection between WinSCP and EVE-NG by entering EVE-NG IP address, Port, Username and Password
  8. 1.3.3. Create a Directory in EVE-NG and give permissions to transfer the files
  9. 1.3.4. Copy the ISO images to Directory in EVE-NG from local system
  10. 1.3.5. Once Images are copied to EVE-NG, Right click in the Web UI and you will be presented with an option to select all these images in Node
  11. 1.3.6. The next step is to select Management cloud from the network which will provide internet access to all the images (Bridges, Switch, Check Point Firewall, Virtual PC’s etc.)
  12. 1.4. Configure network topology In this step, we simulate a typical network which contains Firewall, routers, switches, Virtual PC’s to generate traffic and create logs.
  13. 1.4.1. Using Web UI, we will now connect all the images to create test environment
  14. 1.4.2. Images will be enabled and Connected to Management Cloud for Internet Access
  15. 1.4.3. Multiple Virtual PC’s (VPC) and Windows system image can be connected to Check Point firewall through Layer 2 Switches (SW, SW2)

Given below is a test network topology which contains the following devices: two Switches SW1 and SW2, PCs (Virtual PC’s and Windows) and a router R1. PCs are used to run commands like ping to generate traffic.

Sample Network Topology

2. Configuring and setting up a test network, using Check Point management server

2.1. Initial Check Point Image Configurations

Firewall will be configured with Static IP address, DNS, and User Credentials to access Web-UI. For the purpose of this BLOG, we chose Standalone Deployment where both Security Management and Security Gateway will be installed in same machine.

2.2. Configuring Check Point Gaia Portal

Gaia Portal is an advanced, web-based interface for Gaia platform configuration. Almost all system configuration tasks can be done through this interface.

  1. 2.2.1. Check Point Gaia portal can be accessed by using Static IP address configured in the Firewall Image
  2. 2.2.2. Add Static route in Check Point Network Management with Next hop as Default
  3. 2.2.3. Check Point Interfaces will be Enabled and assigned Security Zones
  4. 2.2.4. Virtual PC’s can be connected to Check Point Server using Switches and configured to access all the Internal and External Zones

Given below is a screen capture of Gaia Portal to accomplish the system configuration that are listed above.

Check Point Gaia Portal
  • 2.3. Smart Console Application
  • Check Point Server provides SmartConsole Applications which is used to manage Check Point environment.SmartConsole can be used to perform the following functions:
  • 2.3.1. Configure Security Policies
  • 2.3.2. Monitor products and events
  • 2.3.3. Install updates, and so on
  • UI makes it easy to manage security for complex networks.

Given below is a screen capture of SmartConsole Application.

SmartConsole Application

3. Creating policies, generating traffic, and capturing Logs

  1. 3.1. Enable Blades

Check Point offers Multiple Blades which is to enforce security policies and will help an organization to Monitor the incoming/outgoing traffic and Protect from External Attacks.

All the Software Blades can be activated in the Gateway Network Security Settings for which corresponding Security policies will be created. Once Enabled, Changes must be published and installed.

Given below is a screen capture to activate Blades which can be accessed from Check Point Gateway settings.

Blades Activation

  • 3.2. Creating Security Policies

Security Policies are a collection of rules and settings that control network traffic and Implement company requirement for protection. It provides access to resources with packet inspection.

All policies related to activated blades can be created in Security Policies Tab. Source, Destination, Services, Action, Gateways can be defined in the Rule and assigned to the required Virtual PC.

Check Point solution provides following types of Security Policies:

  • 3.2.1. Access Control Policy
  • 3.2.2. Threat Prevention Policy
  • 3.2.3. HTTPS Inspection Policy

Given below is a screen capture where Security Policies can be configured and installed.

Configuring Policies
  • 3.3. Generate Traffic and Attacks

Traffic can be generated by ICMP, Brute force sample attack, accessing malicious sites, and downloading sample malware files. Associated policy will act as per the action defined in it.

  • 3.3.1. Access Control Policy – Check Inbound and Outbound connections in VPC by ICMP, HTTP access
  • 3.3.2. Threat Prevention Policy – Accessing Websites and downloading risky file types which is set to be blocked in Policy creation
  • 3.3.3. HTTPS Inspection Policy – Access Blocked Applications in VPCs and send unauthorized files from Network
  • 3.4. Enable Syslog feature in Check Point server

To Collect the logs, we need to enable Syslog feature in the Check Point server, Logs can be collected in SmartConsole Dashboard by enabling SmartEvent Server and Log Indexing in the Gateway Management Settings.

Check Point can be configured to send logs to Third party Log Management system products like, LogRhythm’s, Graylog, Splunk etc. using Check Point feature – CP Log Exporter.

Log Manager IP address, Input Port number, Log format can be defined in Log Exporter to receive logs in Log Management Dashboard.

Given below is a screen capture to enable SmartEvent Server and SmartEvent Correlation Unit.

Enable Logging

3.5. Check Point provides following logs

  • 3.5.1. Security – This Blade provides Audit logs, system logs and also Firewall policy related logs
  • 3.5.2. Antivirus logs -Protect Computers and remove malicious software or code designed to damage computers or data
  • 3.5.3. Application Control – granular policies based on users or groups—to identify, block or limit usage of applications and widgets
  • 3.5.4. URL Filtering – controls access to millions of web sites by category, users, groups, and machines to protect users from malicious sites and enable safe use of the Internet
  • 3.5.5. Data Loss Prevention – to prevent the exposure of sensitive information outside of an organization, especially regulated data such as personally identifiable information
  • 3.5.6. Anti-Malware – Shows scanning detection statistics, top ten infections during the past 30 days and computers that have Anti-Malwareupdates installed
  • 3.5.7. IPS – provides complete threat coverage for vulnerabilities in clients, servers, operating systems, and widely available applications such as PDF
  • 3.5.8. Threat Emulation – Software Blade on a Security Gateway that monitors the behaviour of files in a sandbox to determine whether they are malicious

4.1. Understanding and analysing raw logs

  • 4.1.1. Raw logs are sent to SIEM Input from the Product Setup
  • 4.1.2. Research and understand product’s official log documents
  • 4.1.3. Segregate logs based on event_type or msg_id or event_description fields in the raw message
  • 4.1.4. Following Image is for Sample Threat Log in RAW format for Symantec Endpoint Protection Product

4.2. Log Management Parsing Flow

Log Management Input

Configuration file (toml)

Workflow Sequence

Logs parsing and Source Mapping

  • 4.2.1. Log Management Input can be created with Title and Port Number which will be configured in Product setup
  • 4.2.2. “toml” file is created with ID, Title, and description to route the logs into the Workflow sequence
  • 4.2.3. Workflow dictate the execution of Parsing Rules (GROK, Regex pattern and Source Mapping) to parse the logs
  • 4.2.4. Here is the basic syntax format of grok filter:  % {SYNTAX: SEMANTIC} or % {PATTERN: Fieldname}
  • 4.2.5. Grok Debugger and Regex101 tools are used to validate that the patterns are efficient

4.3. Source Mapping

  • 4.3.1. Once Fields are Extracted and in readable format, Source mapping is done to map Field names to Common Field name
  • 4.3.2. Field name with src_ip will be renamed to source_ip so the log message can be understood by the end user
  • 4.3.3. Field names will be allocated to values which do not have keys (field names) assigned to it

Given below is RAW Threat Log Message which is sent from Firewall to Log Management System.The Fields that are Highlighted in below Image are mapped into common field names of the target Log Management System.

RAW field Name Example Values Source mapping Notes
Timestamp 2022-10-31 15:12:33 event_received_time Date/time that the event was received by the reporting host.
risk_action Access denied alert_signature Vendor-provided Alert text description
ip_address 172.16.14.42 source_ip IPv4 and IPv6 addresses
application_type Trojan Worm alert_category The type of application process
application_hash 85dd6f8edf142f53746a51d11dcba853104bb0207cdf2d6c3529917c3c0fc8df hash_sha256 SHA256 hash value
Description Message event_description Description associated with the message
event_time 2022-10-31 15:10:57 event_created Date/time that the event was created
end_time 2022-10-31 15:10:57 event_end Date/time that event concluded
domain_name Default,Group user_domain AD or LDAP domain

Given below is an image how Logs would be after Parsing and Source mapping is completed which helps in analysing the traffic captured by Check Point.

Source Mapping

Explore Cybersecurity Platforms

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros.

Learn more
white arrow pointing top right

About Loginsoft

For over 16 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media and more have come to rely on Loginsoft as a trusted resource for technology talent. Whether Onsite, Offsite, or Offshore, we deliver.

Loginsoft is a leading Cybersecurity services company providing Security Advisory Research to generate metadata for vulnerabilities in Open source components, Discovering ZeroDay Vulnerabilities, Developing Vulnerability Detection signatures using MITRE OVAL Language.

Expertise in Integrations with Threat Intelligence and Security Products, integrated more than 200+ integrations with leading TIP, SIEM, SOAR and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar, IBM Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency APIs with Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet and so on.

Interested to learn more? Let’s start a conversation.

Book a meeting

IN-HOUSE EXPERTISE

Latest Articles

Get practical solutions to real-world challenges, straight from experts who conquered them.

View all our articles

Sign up to our Newsletter