Check Point Firewall NetFlow Integration with ThreatSync+ NDR

The Check Point firewall uses the NetFlow protocol to export data about IP traffic that enters its interfaces and exports this data as NetFlow fields to a NetFlow collector. The NetFlow collector is a server used to collect network traffic and upload to ThreatSync+ NDR to analyze for security, administration, accounting, and troubleshooting.

WatchGuard provides integration instructions to help customers configure WatchGuard products to work with products created by other organizations. If you want more information or technical support about how to configure a third-party product, go to the documentation and support resources for that product.

This document describes how to integrate the Check Point firewall with ThreatSync+ NDR using the NetFlow protocol.

Contents

Integration Summary

The hardware and software used to complete the steps outlined in this document include:

  • Check Point L-72W/770 with R77.20.40
  • WatchGuard Cloud account with a ThreatSync+ NDR or Total NDR license
  • ThreatSync+ NDR Collection Agent (for more information, go to About ThreatSync+ NDR Collection Agents)

Topology

This diagram shows the integration topology of the Check Point Networks firewall and ThreatSync+ NDR.

Screenshot of the ThreatSync+ NDR and Palo Alto topology diagram

Configure the ThreatSync+ NDR Collection Agent

Make sure the ThreatSync+ NDR Collection Agent is installed on your Windows or Linux computer, and the status of the collection agent is Success. For detailed instructions about the ThreatSync+ NDR Collection Agent installation, go to Configure Collection Agents for ThreatSync+ NDR (Windows Computers) or Configure Collection Agents for ThreatSync+ NDR (Linux Computers).

Configure the Check Point Firewall

Before you can configure Check Point NetFlow, configure these basic settings.

  1. Log in to the Check Point Web UI at https://<IP address of the Check Point device>:<port of the Check Point device>.
  2. Configure the Internet connection.
  3. Screenshot of Check Point, Basic Settings 1

  4. Configure the local subnet that allows the collection agent to gather NetFlow traffic. In our example, we configured LAN3 with subnet 10.0.66.0/255.255.255.0.
  5. Screenshot of Check Point, Basic Settings 2

  1. Configure the DNS to resolve domains.
  2. Screenshot of Palo Alto, Basic Settings 3

  3. Create a network object for the local subnet to facilitate policy configurations in the next steps. In our example, we created internal-1 for the local subnet.
  4. Screenshot of Check Point, Basic Settings 4

  5. Configure NAT for traffic from the internal network to the Internet.
  6. Screenshot of Check Point, Basic Settings 5

  7. Configure the policy to allow the internal traffic out through the WAN interface.
  8. Screenshot of Check Point, Basic Settings 6

For more information, go to the Check Point Support Center.

Configure NetFlow on Check Point Firewall

To configure your Check Point firewall as a NetFlow exporter:

  1. Log in to the Check Point CLI page through the console port.
  2. Enter the following commands to configure the NetFlow exporter. For information about how to configure the exporter, go to Check Point collector settings.

    This is a generic template for configuration commands:
  3. !add netflow collector ip <IPv4 Address of Collector> port <Destination Port on Collector> [srcaddr <Source IPv4 Address>] export-format {Netflow_V5 | Netflow_V9} is-enabled {true | false}

    In our example, the collector ip is 10.0.66.10, the collector port is 2055, the source ip is 10.0.66.1, the export-format is Netflow_V9, and select is enabled to true.

    Enter this command to configure the collector:

    add netflow collector ip 10.0.66.10 port 2055 export-format Netflow_V9 srcaddr 10.0.66.1 is-enabled true

Test the Integration

To test the Check Point Firewall integration with ThreatSync+ NDR:

  1. Log in to your WatchGuard Cloud account.
  2. Select Configure > ThreatSync+ Integrations > Collection Agents. If you have a Service Provider account, you must select an account from Account Manager.
  3. Select the ThreatSync+ NDR Collection Agents tab to view the Last Activity column of your collection agent. This column shows the last time the collection agent uploaded the NetFlow records to ThreatSync+ NDR. It might take a few hours for the first upload.
  4. Screenshot of WatchGuard Cloud, the ThreatSync+ Collectors page, Test Integration 1

  5. From the navigation menu, select Monitor > ThreatSync+ to view the Network Summary page.
  6. Screenshot of WatchGuard Cloud, the ThreatSync+ Network Summary page, Test Integration 2

For more information about ThreatSync+, go to ThreatSync+.