I have not seen such a Server with soo much opened ports like a Provider1. The communications on those ports are encrypted, but they are opened to everybody on the Lan of that server, so it should be strongly adviced to plan for a Checkpoint Firewall Management a separated Management LAN.
The processes are documentet in the Administration Guide, “Architecture and Processes” section:
http://supportcontent.checkpoint.com/documentation_download?ID=11683
Or in the well-known ATRG_NGX.pdf.
In the following post I describe the ports what I see in my enviroment, but it can be different on other systems if other applications (like connectra or eventia) are installed.
The command to check the open ports is
lsof
[Expert@provider1]# lsof -i -n | head COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME sshd 2531 root 3u IPv4 4539 TCP *:ssh (LISTEN) cpd 2728 root 9u IPv4 4845 TCP 10.250.11.31:8989 (LISTEN) cpd 2728 root 10u IPv4 4851 TCP 10.250.11.31:18191 (LISTEN) cpd 2728 root 13u IPv4 4882 TCP 10.250.11.31:18196 (LISTEN) cpd 2728 root 41u IPv4 5516 TCP 10.250.11.31:18192 (LISTEN) cpd 2728 root 42u IPv4 5858 TCP 10.250.11.31:33316->10.250.11.31:1024 (ESTABLISHED) cpd 2728 root 44u IPv4 5785 TCP 10.250.11.31:44836->10.250.11.31:1024 (ESTABLISHED) cpd 2728 root 45u IPv4 5806 TCP 10.250.11.31:8989->10.250.11.31:44763 (ESTABLISHED) cpd 2728 root 46u IPv4 5859 TCP 10.250.11.31:59014->10.250.11.31:18190 (ESTABLISHED) |
or netstat
[Expert@provider1]# netstat -nap | head Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 10.250.11.31:256 0.0.0.0:* LISTEN 2748/fwd tcp 0 0 10.250.11.30:256 0.0.0.0:* LISTEN 2749/fwd tcp 0 0 10.250.11.31:1024 0.0.0.0:* LISTEN 2748/fwd tcp 0 0 10.250.11.30:1024 0.0.0.0:* LISTEN 2749/fwd tcp 0 0 10.250.11.15:256 0.0.0.0:* LISTEN 2765/fwd tcp 0 0 10.250.11.15:1024 0.0.0.0:* LISTEN 2765/fwd tcp 0 0 10.250.11.15:18208 0.0.0.0:* LISTEN 3000/cprid tcp 0 0 10.250.11.31:18209 0.0.0.0:* LISTEN 3244/cpca |
lsof seems to better as it shows the processes better if you for example check it for ssh.
Tcp/Udp listening services of a CMA
This CMA has VPN configurations with VPN-1 Edges as well.
tcp 0 0 10.10.10.10:256 0.0.0.0:* LISTEN 9926/fwd off (0.00/0/0) tcp 0 0 10.10.10.10:1024 0.0.0.0:* LISTEN 9926/fwd off (0.00/0/0) tcp 0 0 10.10.10.10:18209 0.0.0.0:* LISTEN 9942/cpca off (0.00/0/0) tcp 0 0 10.10.10.10:257 0.0.0.0:* LISTEN 9926/fwd off (0.00/0/0) tcp 0 0 10.10.10.10:18210 0.0.0.0:* LISTEN 9942/cpca off (0.00/0/0) tcp 0 0 10.10.10.10:18183 0.0.0.0:* LISTEN 9926/fwd off (0.00/0/0) tcp 0 0 10.10.10.10:18184 0.0.0.0:* LISTEN 9926/fwd off (0.00/0/0) tcp 0 0 10.10.10.10:18187 0.0.0.0:* LISTEN 9926/fwd off (0.00/0/0) tcp 0 0 10.10.10.10:18221 0.0.0.0:* LISTEN 9927/fwm off (0.00/0/0) tcp 0 0 10.10.10.10:18190 0.0.0.0:* LISTEN 9927/fwm off (0.00/0/0) tcp 0 0 10.10.10.10:18191 0.0.0.0:* LISTEN 9916/cpd off (0.00/0/0) tcp 0 0 10.10.10.10:18192 0.0.0.0:* LISTEN 9916/cpd off (0.00/0/0) tcp 0 0 10.10.10.10:18196 0.0.0.0:* LISTEN 9916/cpd off (0.00/0/0) tcp 0 0 10.10.10.10:18264 0.0.0.0:* LISTEN 9942/cpca off (0.00/0/0) tcp 0 0 10.10.10.10:18265 0.0.0.0:* LISTEN 9942/cpca off (0.00/0/0) tcp 0 0 10.10.10.10:8989 0.0.0.0:* LISTEN 9916/cpd off (0.00/0/0) udp 0 0 10.10.10.10:9282 0.0.0.0:* 21541/sms off (0.00/0/0) |
In the same order as above the processes that uses those ports (informations are mainly from Areasec)
256 | fwd | Check Point VPN-1 & FireWall-1 Service (Get topology information from SCt or CMA to FWM- Full synchronisation for HA configuration) |
1024 | ??? | |
18209 | cpca | Protocol used in SIC for communication between FWM and ICA (status, issue, revoke) |
257 | fwd | Check Point VPN-1 & FireWall-1 Logs – Protocol used for delivering logs from FWM to SCt – Protocol used for delivering logs from FWM to CMA or CLM |
18210 | cpca | Check Point Internal CA Pull Certificate Service – Protocol used by SIC for e.g. FWM pulling CA’s from SCt |
18183 | fwd | Check Point OPSEC Suspicious Activity Monitor API – Protocol e.g. for Block Intruder between SCt (or CMA) and FWM |
18184 | fwd | Check Point OPSEC Log Export API – Protocol for exporting logs from SCt |
18187 | fwd | Check Point OPSEC Event Logging API – Protocol for applications logging to the Firewall log at SCt |
18221 | fwm | Check Point Redundant Management Protocol – Protocol used for synchronizing primary and secondary SCt or CMA – Protocol used for synchronizing primary and secondary MDS |
18190 | fwm | Check Point Management Interface – Protocol for communication between GUI and SCt – Protocol for connections from MDG to MDS and CMA |
18191 | cpd | Check Point Daemon Protocol – Download of rulebase from SCt to FWM – Fetching rulebase, from FWM to SCt or CMA when starting FWM – Download of rulebase from MDS/CMA to FWM |
18192 | cpd | Check Point Internal Application Monitoring – Protocol for getting System Status, from SCt or MDS/CMA to FWM |
18196 | cpd | used for CPEPS which is part of User Monitor. |
18264 | cpca | Check Point Internal CA Fetch CRL and User Registration Services – Protocol for Certificate Revocation Lists and registering users when using the Policy Server – needed when e.g. FWM is starting |
18265 | cpca | Check Point Internal CA Management Tools – Protocol for managing the ICA, also used for central administration of certificates on SCt. – needs to be started separately with the command cpca_client. |
8989 | cpd | only internally used by CMA for Messaging (process: cpd) |
9282 | sms | VPN-1 Embedded / SofaWare Management Server (SMS) – Encrypted Protocol for communication between MM and Check Point Appliance (e.g. VPN-1 Edge) |
Ports are defined in the following links, expect tcp 1024, what is this?
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk14510
http://www.fw-1.de/aerasec/ngx/ports-ngx.html
Tcp/Udp listening services of an MDS
tcp 0 0 10.10.10.11:256 0.0.0.0:* LISTEN 21435/fwd off (0.00/0/0) tcp 0 0 10.10.10.11:1024 0.0.0.0:* LISTEN 21435/fwd off (0.00/0/0) tcp 0 0 10.10.10.11:18208 0.0.0.0:* LISTEN 4465/cprid off (0.00/0/0) tcp 0 0 10.10.10.11:18209 0.0.0.0:* LISTEN 21590/cpca off (0.00/0/0) tcp 0 0 10.10.10.11:257 0.0.0.0:* LISTEN 21435/fwd off (0.00/0/0) tcp 0 0 10.10.10.11:18210 0.0.0.0:* LISTEN 21590/cpca off (0.00/0/0) tcp 0 0 10.10.10.11:18183 0.0.0.0:* LISTEN 21435/fwd off (0.00/0/0) tcp 0 0 10.10.10.11:18184 0.0.0.0:* LISTEN 21435/fwd off (0.00/0/0) tcp 0 0 10.10.10.11:18187 0.0.0.0:* LISTEN 21435/fwd off (0.00/0/0) tcp 0 0 10.10.10.11:18221 0.0.0.0:* LISTEN 21436/fwm off (0.00/0/0) tcp 0 0 10.10.10.11:18190 0.0.0.0:* LISTEN 21436/fwm off (0.00/0/0) tcp 0 0 10.10.10.11:18191 0.0.0.0:* LISTEN 21434/cpd off (0.00/0/0) tcp 0 0 10.10.10.11:18192 0.0.0.0:* LISTEN 21434/cpd off (0.00/0/0) tcp 0 0 10.10.10.11:4434 0.0.0.0:* LISTEN 4353/cp_http_server off (0.00/0/0) tcp 0 0 10.10.10.11:18196 0.0.0.0:* LISTEN 21434/cpd off (0.00/0/0) tcp 0 0 10.10.10.11:18264 0.0.0.0:* LISTEN 21590/cpca off (0.00/0/0) tcp 0 0 10.10.10.11:18265 0.0.0.0:* LISTEN 21590/cpca off (0.00/0/0) tcp 0 0 10.10.10.11:8989 0.0.0.0:* LISTEN 21434/cpd off (0.00/0/0) |
Strange ports:
We have a CMA where we do not use any kind of VPN and even there is a service on port 264:
tcp 0 0 10.10.10.30:264 0.0.0.0:* LISTEN 20994/fwd off (0.00/0/0) |
CMA processes
- cpd: SVN Foundation infrastructure process.
- cpca: The Certificate Authority manager process. This process doesn’t run on Log Managers and Container MDSs.
- fwd: Log server process.
- fwm: Security Management server main process.
- status_proxy: Status collection of SmartLSM Security Gateways. This process runs only on CMAs that were enabled for Large Scale Management.
- sms: Manages communication (status collection, logs collection, policy update, configuration update) with UTM-1 Edge gateways. This process runs only on CMAs that manage UTM-1 Edge devices.
Example
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm |
CMA processes with Edge Firewall
If The Firewall Policy in Smartdashboard contains any rule (or just VPN community?) configuration for an Edge Firewall, then after the first Policy Install the Sofaware Management Server will be started through a watchdog deamon:
/bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
Processes for Polcy installation
Policy install on Firewall
Source CMA: mycma01
Destination Firewall: myfirewall
Policy name: VPN_test.W
1. Processes before Policy install (for Gateway in Smartdashboard)
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
2. After starting it “fwm load” starts
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm load -M -s99bd6f8 -p firewall -r /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test myfirewall1 /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
.
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fw dbloadlocal -d /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/state/__tmp/CPDB /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm load -M -s99bd6f8 -p firewall -r /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test myfirewall1 \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fw_loader dbload mycma01 \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fw_loader load -r -M /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test.W myfirewall1 \_ /bin/csh -f /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwc -DPROFILE_0 /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test.pf myfirewall1 \_ fwcomp /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/tmp/VPN_test.cpp myfirewall1 /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
.
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm load -M -s99bd6f8 -p firewall -r /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test myfirewall1 \_ [fw_loader] \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fw_loader load -r -M /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test.W myfirewall1 /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
3. Processes after policy install is ready
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
Policy install on Edge Firewall
Source CMA: mycma01
Destination Edge Firewall: Test-Edge
Policy name: VPN_test
1. Processes before Policy install (for Edge in Smartdashboard)
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
2. After starting it “fwm load” starts
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm load -M -s99bd6f8 -p sofaware_gw -r /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test Test-Edge /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
3. Sofaware Loader starts
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm load -M -s99bd6f8 -p sofaware_gw -r /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test Test-Edge \_ /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/bin/SofawareLoader -generate /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/conf/VPN_test.W Test-Edge \_ /bin/csh -f /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/bin/SofaWareTopology.sh /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70 Test-Edge VPN_test -new_format \_ vpn sw_topology -dir /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/tmp/ -name dummy -profile Test-Edge -policy VPN_test -new_format /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
.
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm load -M -s99bd6f8 -p sofaware_gw -r /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/VPN_test Test-Edge \_ /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/bin/SofawareLoader -generate /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/conf/VPN_test.W Test-Edge \_ /bin/csh -f /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/bin/SofaWareViaRules.sh /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70 VPN_test \_ vpn sw_vpn_policy -policy VPN_test -dir /opt/CPmds-R70/customers/mycma01/CPEdgecmp-R70/tmp// -filename VPN_test.via /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
4. In case of HA CMA, the config will be replicated
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm \_ fwarchive b -l -path /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/tmp/mgha -target backup.tar -conf /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/tmp/mgha/backup.conf \_ /opt/CPmds-R70/customers/mycma01/CPshrd-R70/util/gzip -f backup.tar /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
5. Processes after policy install
/opt/CPmds-R70/customers/mycma01/CPshrd-R70/bin/cpd /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwd -n \_ cpca /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/fwm /bin/sh /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/smsstart_wd \_ /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/bin/sms -confdir /opt/CPmds-R70/customers/mycma01/CPsuite-R70/fw1/conf/sofaware |
Ports used on Gateway for SecureClient and Endpoint Connect.
sk62692
259 | udp | RDP (necessary only for MEP resolving and dynamic interface resolving) |
264 | tcp | Topology download |
500 | udp | IKEv1 |
500 | tcp | IKE over TCP |
18231 | tcp | Policy Server login (seen on the network using SSL if SecureClient/Endpoint Connect has an IP address in the VPN Domain; not necessary to open this port if SecureClient/Endpoint Connect is not in the VPN Domain.) |
50 | IP | ESP |
2746 | udp | UDP encapsulation (encapsulates protocol 50 ESP packets) |
4500 | udp | NAT-T port for industry standard udp encapsulation |
443 | tcp | in visitor mode, all VPN traffic is tunneled through port 443 |
18234 | udp | Tunnel test – Used Through the Tunnel |
18231 | tcp | Policy Server login (will be encrypted if SecureClient IP address is not in the VPN Domain) |
18233 | udp | SCV update |
Posted on November 7, 2011
0