Check Point Firewall provides small, medium, and large customers with the latest data and network security protection in an integrated next-generation firewall platform, which reduces complexity and lowers the total cost of ownership. Whether you need next-generation security for your data center, enterprise, small business or home office, Check Point has a solution for you.
This document provides information about the Check Point Firewall connector, which facilitates automated interactions, with a Check Point Firewall server using FortiSOAR™ playbooks. Add the Check Point Firewall connector as a step in FortiSOAR™ playbooks and perform automated operations, such as blocking or unblocking IP addresses, URLs, or applications, or retrieving a list of blocked IP addresses, URLs, or applications.
Connector Version: 1.0.0
Compatibility with FortiSOAR™ Versions: 4.10.2-225 and later
Compatibility with Check Point Firewall Versions: R80.10 and later
For the procedure to install a connector, click here.
To block or unblock IP Addresses, you must create a policy. Following steps define the process of adding a policy
Destination
As any and the Action
as Drop, as shown in the image in step 1.IP Block Policy
configuration parameter. In our example, we have named our network group as cybersponse-block-ip
, therefore, you must enter cybersponse-block-ip in the IP Block Policy
field.URL Block Policy
configuration parameter. In our example, we have named our application or site object as cybersponse-url-block
, therefore, you must enter cybersponse-url-block in the URL Block Policy
field.Application Block Policy
configuration parameter. In our example, we have named our application or site group object as cybersponse-app-block-group
, therefore, you must enter cybersponse-app-block-group in the Application Block Policy
field.SSH
to log on to the management server in the expert mode
and type api restart
.For the procedure to configure a connector, click here.
In FortiSOAR™, on the Connectors page, select the Check Point Firewall connector and click Configure to configure the following parameters:
Parameter | Description |
---|---|
Server URL | IP address or Hostname of the Check Point Firewall server to which you will connect and perform automated operations. |
Port | Port number used for connecting to the Check Point Firewall server. |
Username | Username to access the Check Point Firewall server to which you will connect and perform the automated operations. |
Password | Password to access the Check Point Firewall server to which you will connect and perform the automated operations. |
IP Block Policy (Network Group Name) | List of the IP Hosts that you have specified in Check Point Firewall for blocking or unblocking IP addresses. See the Blocking or Unblocking IP addresses, URLs, or applications in Check Point Firewall section. |
URL Block Policy (Application/Site Name) | Name of the URL Group that you have specified in Check Point Firewall for blocking or unblocking URLs. See the Blocking or Unblocking IP addresses, URLs, or applications in Check Point Firewall section. |
Application Block Policy (Application/Site Group Name) | Name of the application group that you have specified in Check Point Firewall for blocking or unblocking applications. See the Blocking or Unblocking IP addresses, URLs, or applications in Check Point Firewall section. |
Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True . |
Actions supported by the connector
The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Block URLs | Blocks URLs using the URL Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
block_url Containment |
Unblock URLs | Unblocks URLs using the URL Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
unblock_url Remediation |
Block IP Address | Blocks IP addresses using the IP Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
block_ip Containment |
Unblock IP Address | Unblocks IP addresses using the IP Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
unblock_ip Remediation |
Block Application | Blocks IP addresses using the Application Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
block_app Containment |
Unblock Application | Unblocks IP addresses using the Application Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
unblock_app Remediation |
Get Blocked URLs | Retrieves a list of URLs that are blocked on Check Point Firewall. | get_blocked_url Investigation |
Get Blocked IPs | Retrieves a list of IP Addresses that are blocked on Check Point Firewall. | get_blocked_ip Investigation |
Get Blocked Application Names | Retrieves a list of application names that are blocked on Check Point Firewall. | get_blocked_app Investigation |
Validate Configuration Policies | Checks whether the policies that you have mentioned in the Configuration parameters section are valid or not. | validate_policies Investigation |
Get Sessions | Retrieves a list of active sessions from Check Point Firewall. | get_sessions Investigation |
Get Session | Retrieves details of the session, based on the session UID that you have specified, from Check Point Firewall. | get_session Investigation |
Terminate Session | Terminates a session on Check Point Firewall, based on the Session UID you have specified. | terminate_sessions Remediation |
Get Applications Detail | Retrieves a list of applications and associated details from Check Point Firewall. | get_app_details Investigation |
Parameter | Description |
---|---|
URLs | URLs that you want to block. URLs must be in the list format. For example, ["www.example1.com", "www.example2.com"] |
The JSON output contains a status message of whether or not the URLs are successfully blocked.
Following image displays a sample output:
Parameter | Description |
---|---|
URLs | URLs that you want to unblock. URLs must be in the list format. For example, ["www.example1.com", "www.example2.com"] |
The JSON output contains a status message of whether or not the URLs are successfully unblocked.
Following image displays a sample output:
Parameter | Description |
---|---|
IPs | IP addresses that you want to block. IP addresses must be in the list format. For example, ["X..X.X.X", "Y.Y.Y.Y"] |
The JSON output contains a status message of whether or not the IP addresses are successfully blocked.
Following image displays a sample output:
Parameter | Description |
---|---|
IPs | IP addresses that you want to unblock. IP addresses must be in the list format. For example, ["www.example1.com", "www.example2.com"] |
The JSON output contains a status message of whether or not the IP addresses are successfully unblocked.
Following image displays a sample output:
Parameter | Description |
---|---|
Application Name List | List of application names that you want to block. Application names must be in the list format. For example, ["TeamViewer FileTransfer", "TeamViewer Conferencing"] |
The JSON output contains a status message of whether or not the applications are successfully blocked.
Following image displays a sample output:
Parameter | Description |
---|---|
Application Name List | List of application names that you want to block. Application names must be in the list format. For example, ["TeamViewer FileTransfer", "TeamViewer Conferencing"] |
The JSON output contains a status message of whether or not the applications are successfully unblocked.
Following image displays a sample output:
None
The JSON output contains a list of URLs that are blocked on Check Point Firewall.
Following image displays a sample output:
None
The JSON output contains a list of IP addresses that are blocked on Check Point Firewall.
Following image displays a sample output:
None
The JSON output contains a list of application names that are blocked on Check Point Firewall.
Following image displays a sample output:
None
The JSON output contains a status message of whether the policies mentioned in the Configuration parameters section are valid or not.
Following image displays a sample output:
None
The JSON output contains a list of active sessions from Check Point Firewall.
Following image displays a sample output:
Parameter | Description |
---|---|
Session UID | UID of the session for which you want to retrieve details from Check Point Firewall. |
The JSON output contains details of the session, based on the session UID that you have specified, from Check Point Firewall.
Following image displays a sample output:
Parameter | Description |
---|---|
Session UID | UID of the session that you want to discard on Check Point Firewall. |
The JSON output contains a status message of whether or not the session is terminated successfully on Check Point Firewall.
Following image displays a sample output:
Parameter | Description |
---|---|
Start Index | Start Index from where you want to retrieve results from Check Point Firewall. |
Number of Results (0 to 500) | Number of results you want to display. Maximum results that can be displayed in 500. |
The JSON output contains a list of applications and associated details from Check Point Firewall.
Following image displays a sample output:
The Sample-Check Point Firewall-1.0.0
playbook collection comes bundled with the Check Point Firewall connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Check Point Firewall connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.
Check Point Firewall provides small, medium, and large customers with the latest data and network security protection in an integrated next-generation firewall platform, which reduces complexity and lowers the total cost of ownership. Whether you need next-generation security for your data center, enterprise, small business or home office, Check Point has a solution for you.
This document provides information about the Check Point Firewall connector, which facilitates automated interactions, with a Check Point Firewall server using FortiSOAR™ playbooks. Add the Check Point Firewall connector as a step in FortiSOAR™ playbooks and perform automated operations, such as blocking or unblocking IP addresses, URLs, or applications, or retrieving a list of blocked IP addresses, URLs, or applications.
Connector Version: 1.0.0
Compatibility with FortiSOAR™ Versions: 4.10.2-225 and later
Compatibility with Check Point Firewall Versions: R80.10 and later
For the procedure to install a connector, click here.
To block or unblock IP Addresses, you must create a policy. Following steps define the process of adding a policy
Destination
As any and the Action
as Drop, as shown in the image in step 1.IP Block Policy
configuration parameter. In our example, we have named our network group as cybersponse-block-ip
, therefore, you must enter cybersponse-block-ip in the IP Block Policy
field.URL Block Policy
configuration parameter. In our example, we have named our application or site object as cybersponse-url-block
, therefore, you must enter cybersponse-url-block in the URL Block Policy
field.Application Block Policy
configuration parameter. In our example, we have named our application or site group object as cybersponse-app-block-group
, therefore, you must enter cybersponse-app-block-group in the Application Block Policy
field.SSH
to log on to the management server in the expert mode
and type api restart
.For the procedure to configure a connector, click here.
In FortiSOAR™, on the Connectors page, select the Check Point Firewall connector and click Configure to configure the following parameters:
Parameter | Description |
---|---|
Server URL | IP address or Hostname of the Check Point Firewall server to which you will connect and perform automated operations. |
Port | Port number used for connecting to the Check Point Firewall server. |
Username | Username to access the Check Point Firewall server to which you will connect and perform the automated operations. |
Password | Password to access the Check Point Firewall server to which you will connect and perform the automated operations. |
IP Block Policy (Network Group Name) | List of the IP Hosts that you have specified in Check Point Firewall for blocking or unblocking IP addresses. See the Blocking or Unblocking IP addresses, URLs, or applications in Check Point Firewall section. |
URL Block Policy (Application/Site Name) | Name of the URL Group that you have specified in Check Point Firewall for blocking or unblocking URLs. See the Blocking or Unblocking IP addresses, URLs, or applications in Check Point Firewall section. |
Application Block Policy (Application/Site Group Name) | Name of the application group that you have specified in Check Point Firewall for blocking or unblocking applications. See the Blocking or Unblocking IP addresses, URLs, or applications in Check Point Firewall section. |
Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True . |
Actions supported by the connector
The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Block URLs | Blocks URLs using the URL Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
block_url Containment |
Unblock URLs | Unblocks URLs using the URL Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
unblock_url Remediation |
Block IP Address | Blocks IP addresses using the IP Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
block_ip Containment |
Unblock IP Address | Unblocks IP addresses using the IP Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
unblock_ip Remediation |
Block Application | Blocks IP addresses using the Application Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
block_app Containment |
Unblock Application | Unblocks IP addresses using the Application Block Policy that you have specified while configuring the Check Point Firewall connector. See the Configuration parameters section. |
unblock_app Remediation |
Get Blocked URLs | Retrieves a list of URLs that are blocked on Check Point Firewall. | get_blocked_url Investigation |
Get Blocked IPs | Retrieves a list of IP Addresses that are blocked on Check Point Firewall. | get_blocked_ip Investigation |
Get Blocked Application Names | Retrieves a list of application names that are blocked on Check Point Firewall. | get_blocked_app Investigation |
Validate Configuration Policies | Checks whether the policies that you have mentioned in the Configuration parameters section are valid or not. | validate_policies Investigation |
Get Sessions | Retrieves a list of active sessions from Check Point Firewall. | get_sessions Investigation |
Get Session | Retrieves details of the session, based on the session UID that you have specified, from Check Point Firewall. | get_session Investigation |
Terminate Session | Terminates a session on Check Point Firewall, based on the Session UID you have specified. | terminate_sessions Remediation |
Get Applications Detail | Retrieves a list of applications and associated details from Check Point Firewall. | get_app_details Investigation |
Parameter | Description |
---|---|
URLs | URLs that you want to block. URLs must be in the list format. For example, ["www.example1.com", "www.example2.com"] |
The JSON output contains a status message of whether or not the URLs are successfully blocked.
Following image displays a sample output:
Parameter | Description |
---|---|
URLs | URLs that you want to unblock. URLs must be in the list format. For example, ["www.example1.com", "www.example2.com"] |
The JSON output contains a status message of whether or not the URLs are successfully unblocked.
Following image displays a sample output:
Parameter | Description |
---|---|
IPs | IP addresses that you want to block. IP addresses must be in the list format. For example, ["X..X.X.X", "Y.Y.Y.Y"] |
The JSON output contains a status message of whether or not the IP addresses are successfully blocked.
Following image displays a sample output:
Parameter | Description |
---|---|
IPs | IP addresses that you want to unblock. IP addresses must be in the list format. For example, ["www.example1.com", "www.example2.com"] |
The JSON output contains a status message of whether or not the IP addresses are successfully unblocked.
Following image displays a sample output:
Parameter | Description |
---|---|
Application Name List | List of application names that you want to block. Application names must be in the list format. For example, ["TeamViewer FileTransfer", "TeamViewer Conferencing"] |
The JSON output contains a status message of whether or not the applications are successfully blocked.
Following image displays a sample output:
Parameter | Description |
---|---|
Application Name List | List of application names that you want to block. Application names must be in the list format. For example, ["TeamViewer FileTransfer", "TeamViewer Conferencing"] |
The JSON output contains a status message of whether or not the applications are successfully unblocked.
Following image displays a sample output:
None
The JSON output contains a list of URLs that are blocked on Check Point Firewall.
Following image displays a sample output:
None
The JSON output contains a list of IP addresses that are blocked on Check Point Firewall.
Following image displays a sample output:
None
The JSON output contains a list of application names that are blocked on Check Point Firewall.
Following image displays a sample output:
None
The JSON output contains a status message of whether the policies mentioned in the Configuration parameters section are valid or not.
Following image displays a sample output:
None
The JSON output contains a list of active sessions from Check Point Firewall.
Following image displays a sample output:
Parameter | Description |
---|---|
Session UID | UID of the session for which you want to retrieve details from Check Point Firewall. |
The JSON output contains details of the session, based on the session UID that you have specified, from Check Point Firewall.
Following image displays a sample output:
Parameter | Description |
---|---|
Session UID | UID of the session that you want to discard on Check Point Firewall. |
The JSON output contains a status message of whether or not the session is terminated successfully on Check Point Firewall.
Following image displays a sample output:
Parameter | Description |
---|---|
Start Index | Start Index from where you want to retrieve results from Check Point Firewall. |
Number of Results (0 to 500) | Number of results you want to display. Maximum results that can be displayed in 500. |
The JSON output contains a list of applications and associated details from Check Point Firewall.
Following image displays a sample output:
The Sample-Check Point Firewall-1.0.0
playbook collection comes bundled with the Check Point Firewall connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Check Point Firewall connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.