Check Point Infinity
  • 02 Jun 2024
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Check Point Infinity

  • Dark
    Light
  • PDF

Article summary

Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This adapter supports the entire Infinity platform, including Check Point firewalls.

Note:

In Checkpoint Infinity Management API>Access Settings, Accept API calls must be set to All IP addresses that can be used for GUI clients, or to All IP Addresses, in order for Axonius to be able to fetch data.
When working with a Tunnel, in the Checkpoint Management Server WEB UI configuration the IP address of the Tunnel Server must be added to Host Access.

Related Enforcement Actions:

Parameters

  1. CheckpointR80 Host URL - The hostname of the Check Point Infinity server
  2. User Name and Password (required) - The credentials for a user account that has Read-only permissions to fetch assets.
  3. CheckPoint Domain (optional) - An optional domain to connect within the Check Point Infinity server.
  4. API Version (default: v1.5 or earlier) - Select the API Version to use, either v1.5 or earlier, or v1.6 and later. Refer to Check Point Management API Reference
  5. Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
  6. HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.

CheckPointInfiNew


Advanced Settings

Note:

Advanced settings can either apply for all connections for this adapter, or you can set different advanced settings and/or different scheduling for a specific connection, refer to ​Advanced Configuration for Adapters.

  1. Calculate Last Seen from creation/modification date (optional) - Select whether to calculate Last Seen based on the Last Modified Date or Creation Date.
  2. Compare devices to "Unused Objects" database (optional) - When selected, assets that match a record in the Unused Objects database by their UID receive a new Detected as Unused Object field set to Yes in the Query Wizard; assets that don't match any such records are set to No in the Query Wizard.
  3. Exclude devices that match "Unused Objects" (optional) - When selected, regardless of the Compare devices to "Unused Objects" database parameter, assets that match a record in the Unused Objects database are excluded from the fetch, and aren't added to Axonius.
  4. Create Devices from Smart Mgmt logs (optional) - Select to create devices from Smart Management API logs.
  5. Extended NAT Handling for device enrichment - Select this option to match host objects against the NAT rulebase to anticipate additional IP addresses for those objects.
  6. Add IPs from NAT policy as device interfaces - Select this option to add IP addresses from the NAT policy as devices interfaces.
  7. Policy Packages for Extended NAT handling (All when empty) - Enter policy packages to use for extended NAT handling.
  8. Match NAT rules on original columns (default: Original Source or Destination) - Select how to match the NAT rules on original columns.
  9. Match NAT rule method - Select this option to match the NAT rule method.
  10. Internal CIDR blocks *(optional, default: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) - Enter the internal CIDR blocks that you want to fetch from.
  11. Log search timeframe (optional, default: last-hour) - Filter search results of logs by the specified timeframe. The Smart Management log API can return a maximum of 1 million records.
  12. Log search criteria (optional, default: blade:"Firewall") - Filter search results of logs by specific types of devices and products.


Note:

To learn more about Adapter Configuration tab advanced settings, see Adapter Advanced Settings.


Creating a read-only user for Check Point Infinity

Creating a read-only user varies between different versions of Check Point Infinity and instructions for doing so can be found in the Check Point user manual. As a general reference, the following guide can be used to create read-only administrators.


Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.