Checkpoint DDOS
Checkpoint DDOS
Protector
Quick-Start Guide
6.07
23 October 2012
© 2012 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of
relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional
improvements, stability fixes, security enhancements and protection against new and evolving attacks.
Latest Documentation
For additional technical information, visit the Check Point Support Center
(http://supportcenter.checkpoint.com).
Revision History
Date Description
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Check Point DDoS Protector 6.07
Quick Start Guide).
Contents
Introduction
Check Point DDoS Protector is a real-time DoS protection device, which maintains business continuity by
protecting the application infrastructure against existing and emerging network-based threats. Unlike market
alternatives that rely on static signatures, Check Point DDoS Protector provides unique behavioral-based,
automatically generated, real-time signatures, mitigating attacks that are not vulnerability based and zero-
minute attacks such as: network and application floods, HTTP page floods, malware propagation, Web
application brute force attacks aiming to defeat authentication schemes, and more - all without blocking
legitimate users’ traffic and with no need for human intervention.
Supported Appliances
These appliances support Check Point DDoS Protector:
x06 Series:
DP 506
DP 1006
DP 2006
DP 3006
x412 Series:
DP 4412
DP 8412
DP 12412
GROUNDING
Before connecting this device to the power line, the protective earth terminal screws of this device must be
connected to the protective earth in the building installation.
LASER
This equipment is a Class 1 Laser Product in accordance with IEC60825 - 1: 1993 + A1:1997 + A2:2001
Standard.
FUSES
Make sure that only fuses with the required rated current and of the specified type are used for replacement.
The use of repaired fuses and the short-circuiting of fuse holders must be avoided. Whenever it is likely that
the protection offered by fuses has been impaired, the instrument must be made inoperative and be secured
against any unintended operation.
LINE VOLTAGE
Before connecting this instrument to the power line, make sure the voltage of the power source matches the
requirements of the instrument. Refer to the Specifications for information about the correct power rating for
the device.
48V DC-powered platforms have an input tolerance of 36-72V DC. SPECIFICATION CHANGES
Specifications are subject to change without notice.
Note - This equipment has been tested and found to comply with the limits for a
Class A digital device pursuant to Part 15B of the FCC Rules and EN55022 Class
A, EN 55024; EN 61000-3-2; EN 61000-3-3; IEC 61000 4-2 to 4-6, IEC 61000 4-8
and IEC 61000-4-11 For CE MARK Compliance. These limits are designed to
provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in accordance with the
instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user is required to correct the interference at his own
expense.
4. Ensure that the chassis ventilation openings in the unit are NOT BLOCKED.
5. Replace a blown fuse ONLY with the same type and rating as is marked on the safety label adjacent to
the power inlet, housing the fuse.
6. Do not operate the device in a location where the maximum ambient temperature exceeds 40°C/104°F.
7. Be sure to unplug the power supply cord from the wall socket BEFORE attempting to remove and/or
check the main power fuse.
CLASS 1 LASER PRODUCT AND REFERENCE TO THE MOST RECENT LASER STANDARDS IEC 60
825-1:1993 + A1:1997 + A2:2001 AND EN 60825-1:1994+A1:1996+ A2:2001
AC units for Denmark, Finland, Norway, Sweden (marked on product):
Denmark - “Unit is class I - unit to be used with an AC cord set suitable with Denmark deviations. The cord
includes an earthing conductor. The Unit is to be plugged into a wall socket outlet which is connected to a
protective earth. Socket outlets which are not connected to earth are not to be used!”
Finland - (Marking label and in manual) - “Laite on liitettävä suojamaadoituskoskettimilla varustettuun
pistorasiaan”
Norway (Marking label and in manual) - “Apparatet må tilkoples jordet stikkontakt”
Unit is intended for connection to IT power systems for Norway only.
Sweden (Marking label and in manual) - “Apparaten skall anslutas till jordat uttag.”
To connect the power connection:
1. Connect the power cable to the main socket, located on the rear panel of the device.
2. Connect the power cable to the grounded AC outlet.
CAUTION
Risk of electric shock and energy hazard. Disconnecting one power supply disconnects only one power
supply module. To isolate the unit completely, disconnect all power supplies.
Instructions de sécurité
AVERTISSEMENT
Un dispositif de déconnexion facilement accessible sera incorporé au câblage du bâtiment.
En raison des risques de chocs électriques et des dangers énergétiques, mécaniques et d’incendie, chaque
procédure impliquant l’ouverture des panneaux ou le remplacement de composants sera exécutée par du
personnel qualifié.
Pour réduire les risques d’incendie et de chocs électriques, déconnectez le dispositif du bloc d’alimentation
avant de retirer le couvercle ou les panneaux.
La figure suivante montre l’étiquette d’avertissement apposée sur les plateformes Check Point DDoS
Protector dotées de plus d’une source d’alimentation électrique.
Étiquette d’avertissement de danger de chocs électriques
Avertissement de sécurité pour les systèmes dotes de deux sources d’alimentation électrique (en chinois)
Traduction de la Avertissement de sécurité pour les systèmes dotes de deux sources d’alimentation
électrique (en chinois):
Cette unité est dotée de plus d’une source d’alimentation électrique. Déconnectez toutes les sources
d’alimentation électrique avant d’entretenir l’appareil ceci pour éviter tout choc électrique.
ENTRETIEN
N’effectuez aucun entretien autre que ceux répertoriés dans le manuel d’instructions, à moins d’être qualifié
en la matière. Aucune pièce à l’intérieur de l’unité ne peut être remplacée ou réparée.
HAUTE TENSION
Tout réglage, opération d’entretien et réparation de l’instrument ouvert sous tension doit être évité. Si cela
s’avère indispensable, confiez cette opération à une personne qualifiée et consciente des dangers
impliqués.
Les condensateurs au sein de l’unité risquent d’être chargés même si l’unité a été déconnectée de la source
d’alimentation électrique.
MISE A LA TERRE
Avant de connecter ce dispositif à la ligne électrique, les vis de protection de la borne de terre de cette unité
doivent être reliées au système de mise à la terre du bâtiment.
LASER
Cet équipement est un produit laser de classe 1, conforme à la norme IEC60825 - 1: 1993 + A1: 1997 + A2:
2001.
FUSIBLES
Assurez-vous que, seuls les fusibles à courant nominal requis et de type spécifié sont utilisés en
remplacement. L’usage de fusibles réparés et le court-circuitage des porte-fusibles doivent être évités.
Lorsqu’il est pratiquement certain que la protection offerte par les fusibles a été détériorée, l’instrument doit
être désactivé et sécurisé contre toute opération involontaire.
TENSION DE LIGNE
Avant de connecter cet instrument à la ligne électrique, vérifiez que la tension de la source d’alimentation
correspond aux exigences de l’instrument. Consultez les spécifications propres à l’alimentation nominale
correcte du dispositif.
Les plateformes alimentées en 48 CC ont une tolérance d’entrée comprise entre 36 et 72 V CC.
MODIFICATIONS DES SPÉCIFICATIONS
Les spécifications sont sujettes à changement sans notice préalable.
Remarque: Cet équipement a été testé et déclaré conforme aux limites définies pour un appareil numérique
de classe A, conformément au paragraphe 15B de la réglementation FCC et EN55022 Classe A, EN 55024,
EN 61000-3-2; EN 61000-3-3; IEC 61000 4-2 to 4-6, IEC 61000 4-8, et IEC 61000-4-11, pour la marque de
conformité de la CE. Ces limites sont fixées pour fournir une protection raisonnable contre les interférences
nuisibles, lorsque l’équipement est utilisé dans un environnement commercial. Cet équipement génère,
utilise et peut émettre des fréquences radio et, s’il n’est pas installé et utilisé conformément au manuel
d’instructions, peut entraîner des interférences nuisibles aux communications radio. Le fonctionnement de
cet équipement dans une zone résidentielle est susceptible de provoquer des interférences nuisibles,
auquel cas l’utilisateur devra corriger le problème à ses propres frais.
DÉCLARATIONS SUR LES INTERFÉRENCES ÉLECTROMAGNÉTIQUES VCCI
Translation de la Déclaration pour l’équipement de classe A certifié KCC en langue coréenne: Cet
équipement est un matériel (classe A) en adéquation aux ondes électromagnétiques et levendeur ou
l’utilisateur doit prendre cela en compte. Ce matériel est donc fait pour être utilisé ailleurs qu’ á la maison.
NOTICE SPÉCIALE POUR LES UTILISATEURS NORD-AMÉRICAINS
Pour un raccordement électrique en Amérique du Nord, sélectionnez un cordon d’alimentation homologué
UL et certifié CSA 3 - conducteur, [18 AWG], muni d’une prise moulée à son extrémité, de 125 V, [5 A],
d’une longueur minimale de 1,5 m [six pieds] et maximale de 4,5m...Pour la connexion européenne,
choisissez un cordon d’alimentation mondialement homologué et marqué “<HAR>”, 3 - conducteur, câble de
0,75 mm2 minimum, de 300 V, avec une gaine en PVC isolée. La prise à l’extrémité du cordon, sera dotée
d’un sceau moulé indiquant: 250 V, 3 A.
ZONE A ACCÈS RESTREINT
L’équipement alimenté en CC ne pourra être installé que dans une zone à accès restreint.
CODES D’INSTALLATION
Ce dispositif doit être installé en conformité avec les codes électriques nationaux. En Amérique du Nord,
l’équipement sera installé en conformité avec le code électrique national américain, articles 110-16, 110 -
17, et 110 -18 et le code électrique canadien, Section 12. INTERCONNEXION DES UNÎTES.
Les câbles de connexion à l’unité RS232 et aux interfaces Ethernet seront certifiés UL, type DP-1 ou DP-2.
(Remarque- s’ils ne résident pas dans un circuit LPS) PROTECTION CONTRE LES SURCHARGES.
Un circuit de dérivation, facilement accessible, sur le dispositif de protection du courant de 15 A doit être
intégré au câblage du bâtiment pour chaque puissance consommée.
BATTERIES REMPLAÇABLES
Si l’équipement est fourni avec une batterie, et qu’elle est remplacée par un type de batterie incorrect, elle
est susceptible d’exploser. C’est le cas pour certaines batteries au lithium, les éléments suivants sont donc
applicables:
Si la batterie est placée dans une zone d’accès opérateur, une marque est indiquée sur la batterie ou
une remarque est insérée, aussi bien dans les instructions d’exploitation que d’entretien.
Si la batterie est placée ailleurs dans l’équipement, une marque est indiquée sur la batterie ou une
remarque est insérée dans les instructions d’entretien.
Cette marque ou remarque inclut l’avertissement textuel suivant: AVERTISSEMENT
RISQUE D’EXPLOSION SI LA BATTERIE EST REMPLACÉE PAR UN MODÈLE INCORRECT. METTRE
AU REBUT LES BATTERIES CONFORMÉMENT AUX INSTRUCTIONS.
Attention - Pour réduire les risques de chocs électriques et d’incendie
1. Cet équipement est conçu pour permettre la connexion entre le conducteur de mise à la terre du circuit
électrique CC et l’équipement de mise à la terre. Voir les instructions d’installation.
2. Tout entretien sera entrepris par du personnel qualifié. Aucune pièce à l’intérieur de l’unité ne peut être
remplacée ou réparée.
3. NE branchez pas, n’allumez pas ou n’essayez pas d’utiliser une unité manifestement endommagée.
4. Vérifiez que l’orifice de ventilation du châssis dans l’unité n’est PAS OBSTRUE.
5. Remplacez le fusible endommagé par un modèle similaire de même puissance, tel qu’indiqué sur
l’étiquette de sécurité adjacente à l’arrivée électrique hébergeant le fusible.
6. Ne faites pas fonctionner l’appareil dans un endroit, où la température ambiante dépasse la valeur
maximale autorisée. 40°C/104°F.
7. Débranchez le cordon électrique de la prise murale AVANT d’essayer de retirer et/ou de vérifier le
fusible d’alimentation principal.
PRODUIT LASER DE CLASSE 1 ET RÉFÉRENCE AUX NORMES LASER LES PLUS RÉCENTES: IEC 60
825-1: 1993 + A1: 1997 + A2: 2001 ET EN 60825-1: 1994+A1: 1996+ A2: 2001
Unités à CA pour le Danemark, la Finlande, la Norvège, la Suède (indiqué sur le produit):
Danemark - Unité de classe 1 - qui doit être utilisée avec un cordon CA compatible avec les déviations
du Danemark. Le cordon inclut un conducteur de mise à la terre. L’unité sera branchée à une prise
murale, mise à la terre. Les prises non-mises à la terre ne seront pas utilisées!
Finlande (Étiquette et inscription dans le manuel) - Laite on liitettävä suojamaadoituskoskettimilla
varustettuun pistorasiaan
Norvège (Étiquette et inscription dans le manuel) - Apparatet må tilkoples jordet stikkontakt
L’unité peut être connectée à un système électrique IT (en Norvège uniquement).
Suède (Étiquette et inscription dans le manuel) - Apparaten skall anslutas till jordat uttag.
Pour brancher à l’alimentation électrique:
1. Branchez le câble d’alimentation à la prise principale, située sur le panneau arrière de l’unité.
2. Connectez le câble d’alimentation à la prise CA mise à la terre.
AVERTISSEMENT
Risque de choc électrique et danger énergétique. La déconnexion d’une source d’alimentation électrique ne
débranche qu’un seul module électrique. Pour isoler complètement l’unité, débranchez toutes les sources
d’alimentation électrique.
ATTENTION
Risque de choc et de danger électriques. Le débranchement d’une seule alimentation stabilisée ne
débranche qu’un module “Alimentation Stabilisée”. Pour Isoler complètement le module en cause, il faut
débrancher toutes les alimentations stabilisées.
Attention: Pour Réduire Les Risques d’Électrocution et d’Incendie
1. Toutes les opérations d’entretien seront effectuées UNIQUEMENT par du personnel d’entretien qualifié.
Aucun composant ne peut être entretenu ou remplacée par l’utilisateur.
2. NE PAS connecter, mettre sous tension ou essayer d’utiliser une unité visiblement défectueuse.
3. Assurez-vous que les ouvertures de ventilation du châssis NE SONT PAS OBSTRUÉES.
4. Remplacez un fusible qui a sauté SEULEMENT par un fusible du même type et de même capacité,
comme indiqué sur l’étiquette de sécurité proche de l’entrée de l’alimentation qui contient le fusible.
5. NE PAS UTILISER l’équipement dans des locaux dont la température maximale dépasse 40 degrés
Centigrades.
6. Assurez vous que le cordon d’alimentation a été déconnecté AVANT d’essayer de l’enlever et/ou vérifier
le fusible de l’alimentation générale.
Sicherheitsanweisungen
VORSICHT
Die Elektroinstallation des Gebäudes muss ein unverzüglich zugängliches Stromunterbrechungsgerät
integrieren.
Aufgrund des Stromschlagrisikos und der Energie-, mechanische und Feuergefahr dürfen Vorgänge, in
deren Verlauf Abdeckungen entfernt oder Elemente ausgetauscht werden, ausschließlich von qualifiziertem
Servicepersonal durchgeführt werden.
Zur Reduzierung der Feuer- und Stromschlaggefahr muss das Gerät vor der Entfernung der Abdeckung
oder der Paneele von der Stromversorgung getrennt werden.
Folgende Abbildung zeigt das VORSICHT-Etikett, das auf die Check Point DDoS Protector-Plattformen mit
Doppelspeisung angebracht ist.
Warnetikett Stromschlaggefahr
AUSTAUSCHBARE BATTERIEN
Wird ein Gerät mit einer austauschbaren Batterie geliefert und für diese Batterie durch einen falschen
Batterietyp ersetzt, könnte dies zu einer Explosion führen. Dies trifft zu für manche Arten von
Lithiumsbatterien zu, und das folgende gilt es zu beachten:
Wird die Batterie in einem Bereich für Bediener eingesetzt, findet sich in der Nähe der Batterie eine
Markierung oder Erklärung sowohl im Betriebshandbuch als auch in der Wartungsanleitung.
Ist die Batterie an einer anderen Stelle im Gerät eingesetzt, findet sich in der Nähe der Batterie eine
Markierung oder einer Erklärung in der Wartungsanleitung.
Diese Markierung oder Erklärung enthält den folgenden Warntext: VORSICHT EXPLOSIONSGEFAHR,
FALLS BATTERIE DURCH EINEN FALSCHEN BATTERIETYP ERSETZT WIRD.
GEBRAUCHTE BATTERIEN DEN ANWEISUNGEN ENTSPRECHEND ENTSORGEN.
Denmark - “Unit is class I - mit Wechselstromkabel benutzen, dass für die Abweichungen in Dänemark
eingestellt ist. Das Kabel ist mit einem Erdungsdraht versehen. Das Kabel wird in eine geerdete
Wandsteckdose angeschlossen. Keine Steckdosen ohne Erdungsleitung verwenden!”
Finland - (Markierungsetikett und im Handbuch) - Laite on liitettävä suojamaadoituskoskettimilla
varustettuun pistorasiaan
Norway - (Markierungsetikett und im Handbuch) - Apparatet må tilkoples jordet stikkontakt
Ausschließlich für Anschluss an IT-Netzstromsysteme in Norwegen vorgesehen
Sweden - (Markierungsetikett und im Handbuch) - Apparaten skall anslutas till jordat uttag.
Anschluss des Stromkabels:
1. Schließen Sie das Stromkabel an den Hauptanschluss auf der Rückseite des Gerätes an.
2. Schließen Sie das Stromkabel an den geerdeten Wechselstromanschluss an. VORSICHT
Stromschlag- und Energiegefahr Die Trennung einer Stromquelle trennt nur ein
Stromversorgungsmodul von der Stromversorgung. Um das Gerät komplett zu isolieren, muss es von der
gesamten Stromversorgung getrennt werden.
Vorsicht - Zur Reduzierung der Stromschlag- und Feuergefahr
1. Dieses Gerät ist dazu ausgelegt, die Verbindung zwischen der geerdeten Leitung des
Gleichstromkreises und dem Erdungsleiter des Gerätes zu ermöglichen. Siehe Montageanleitung.
2. Wartungsarbeiten jeglicher Art dürfen nur von qualifiziertem Servicepersonal ausgeführt werden. Es gibt
innerhalb des Gerätes keine vom Benutzer zu wartenden Teile.
3. Versuchen Sie nicht, ein offensichtlich beschädigtes Gerät an den Stromkreis anzuschließen,
einzuschalten oder zu betreiben.
4. Vergewissern Sie sich, dass sie Lüftungsöffnungen im Gehäuse des Gerätes NICHT BLOCKIERT SIND.
5. Ersetzen Sie eine durchgebrannte Sicherung ausschließlich mit dem selben Typ und von der selben
Stärke, die auf dem Sicherheitsetikett angeführt sind, das sich neben dem Stromkabelanschluss, am
Sicherungsgehäuse.
6. Betreiben Sie das Gerät nicht an einem Standort, an dem die Höchsttemperatur der Umgebung 40°C
überschreitet.
7. Vergewissern Sie sich, das Stromkabel aus dem Wandstecker zu ziehen, BEVOR Sie die
Hauptsicherung entfernen und/oder prüfen.
Only copper cables, 18 AWG or larger, must be used for grounding purposes.
When mounting a Check Point DDoS Protector platform with a DC power supply, battery return terminals must
be in the configuration of an Isolated DC Return (DC-I) or Common DC Return (DC-C).
The following diagram shows the proper grounding connection to a Check Point DDoS Protector platform.
Proper Grounding
Lug or
Chasis
terminal
Screw
Toothed washer
The Check Point DDoS Protector platform must be connected to the grounding wire by means of the
grounding screw using the listed lug.
Bare conductors must be coated with antioxidant before making crimp connections.
A star washer (tooth washer) must be used next to opposite sides of the grounding lug or terminal. This
provides the proper locking mechanism. The internal tooth washer removes paint from the chassis to
establish a metal-to-metal contact to the un-plated surface.
Port Cables
Ethernet port cables should be shielded and grounded at both ends.
Caution - After you mount the platform, ensure that there is adequate airflow
surrounding it.
Caution - Installation of the equipment in a rack should be such that the amount of
airflow required for safe operation of the equipment is not compromised.
Caution - Mounting of the equipment in the rack should be such that a hazardous
condition is not achieved due to uneven mechanical loading.
Caution - If the platform is equipped with an AC power supply, connecting a ground wire
is not required, but is recommended.
Note - Check Point supplies a RJ-45–to–DE-9 adapter cable to connect the console
port of the platform to a console PC.
DP x06 Series
DP 506, 1006, 2006 and 3006, run on the DP x06 series platform.
DP x06 Series DP x06 Series Front Panel
Feature Label/Description
Power button. Turns power on and off. Press 1 to 4 seconds for a graceful shutdown, to
preserve system integrity. If you press longer, the hardware shuts down.
RJ-45 GbE ports for traffic and in-band management. The platform supports four RJ-45
GbE ports for traffic and two ports for management.
LEDs:
ACT - Flashing indicates activity.
LINK - Green indicates 1000 Mbit/s. Yellow indicates 10 or 100 Mbit/s.
SFP GbE ports for traffic. The platform supports two SFP GbE ports for traffic ports for
traffic.
LEDs:
ACT - Flashing indicates activity.
LINK - Green indicates 1000 Mbit/s.
Status LEDs:
PWR OK - Green indicates nominal operation. When the LED is red, a
qualified service person should immediately check the power source and the
power supply.
SYS OK - Green indicates nominal operation. Red indicates that the device
is booting. Red or alternating red and green indicates a warning (for
example, the temperature is high, but still in the allowed range).
Feature Label/Description
Ground screws Screws to ground the platform chassis to the rack. 1U units have one
ground screw. Typically, 2U units have two ground screws.
Power supply socket(s) The socket to which the power cable is connected.
Note - If the power is disconnected and reconnected (for example, after the power cord is
removed and replaced, or after a power failure), the platform returns to its previous state. For
example, if the platform was running, and then you disconnect the power cord, when you
reconnect the power cord, the platform automatically switches on. Likewise, if the platform is
not running, if you disconnect the power cord and reconnect it, the platform stays powered off
until you press the power button.
DP x412 Series
DP 4412, 8412, and 12412 run on DP x412 Series.
DP x412 Series Front Panel
Feature Label/Description
10 Gigabit Ethernet (10GbE) ports for traffic or management. The platform supports four
XFP ports.
LEDs:
ACT - Flashing indicates activity.
LINK - Green indicates 10GbE.
SFP GbE ports for traffic or management. The platform supports four SFP ports.
LEDs:
ACT - Flashing indicates activity.
LINK - Green indicates 1000 Mbit/s.
RJ-45 GbE ports for traffic or management. The platform supports eight GbE ports.
LEDs:
ACT - Flashing indicates activity.
LINK - Green indicates 1000 Mbit/s. Yellow indicates 10 or 100 Mbit/s.
Feature Label/Description
Power button. Turns power on and off. Pressing the button for 1 to 4 seconds causes a
graceful shutdown of the system, thus preserving system integrity. Pressing the button
for more than four (4) seconds causes the hardware to power down.
Management ports. The platform supports two RJ-45 10/100/1000 Ethernet ports, which
are for management only.
LEDs:
ACT - Flashing indicates activity.
LINK - Green indicates 1000 Mbit/s. Yellow indicates 10 or 100 Mbit/s.
Status LEDs:
PWR - Green indicates nominal operation. When the platform carries a dual
power supply, red indicates that one of the two power cables is not supplying
power or that one of the power supplies is malfunctioning. When the LED is
red, a qualified service person should immediately check the power source
and the power supply.
FAN - Green indicates nominal operation. Red indicates that one or more
fans is not operating.
SYS OK - Green indicates nominal operation. Red indicates that the device is
booting. Red or alternating red and green indicates a warning (for example,
the temperature is high, but still in the allowed range).
Feature Label/Description
Power supply socket(s) The socket to which the power cable is connected.
Ground screws Screws to ground the platform chassis to the rack. 1U units have one ground
screw. Typically, 2U units have two ground screws.
Note - If the power is disconnected and reconnected (for example, after the power cord is
removed and replaced, or after a power failure), the platform returns to its previous state. For
example, if the platform was running, and then you disconnect the power cord, when you
reconnect the power cord, the platform automatically switches on. Likewise, if the platform is
not running, if you disconnect the power cord and reconnect it, the platform stays powered off
until you press the power button.
You can use the LCD module for detailed device monitoring and for the initial configuration of the
management port.
This section contains the following:
“LCD Menu Buttons”
“Nominal Display”
“Initial Configuration of the Management Port Using the LCD Module”
“LCD Menus”
Nominal Display
When you turn on an OnDemand Switch, the LCD displays the following:
o ODS<Version>
o Loading…
During the boot process, the third line, Loading…, changes to Loaded Boot <Boot version>.
After the initial configuration, when the device completes booting—or after 30 minutes without any activity,
the LCD displays the following:
o <Product>
o <Product version>
o Time: <HH:MM:SS>
Caution - When the LCD displays Setup Config, you have 30 seconds to enter the
setup configuration. After these 30 seconds elapse, the platform uses the defaults,
192.168.1.1, 255.255.255.0, and G-1 respectively. However, later, using the CLI, you can
change the values as required.
When you configure the management IP address and IP subnet mask using the LCD module, the buttons
have the following additional functionality:
The up and down arrow buttons increase or decrease numbers.
The left and right arrow buttons move the cursor to the next digit or returns the cursor to the previous
number.
At the end of the management IP address or subnet mask, the right arrow button moves the cursor to
the next field in this menu. To return to the previous field, press the left arrow button.
Enter (9) to set the values.
Escape (x) leaves the value unchanged.
To configure the management port using the LCD module:
1. Turn on the DP x412 series platform. The boot process starts.
2. Within 30 seconds after the LCD displays Setup Config, press the right arrow. The LCD displays IP
address with the value 000.000.000.000, and the cursor on the first number.
3. Specify the IP address of the management port for the Check Point DDoS Protector, and, after the last
number, press the right arrow button. The LCD displays IP subnet mask with the value
255.000.000.000.
4. Specify the IP subnet mask of the management port for the Check Point DDoS Protector, and, after the
last number, press the right arrow button. The LCD displays the selected management port.
5. Scroll down to the physical port that you want to use as the management port, for example, MNG-2.
6. Press the right arrow button. The LCD displays Enable web and its value, Yes or No. Press the up
arrow for Yes. Press the down arrow for No.
7. Press the right arrow button. The LCD displays Enable telnet and its value, Yes or No. Press the
up arrow for Yes. Press the down arrow for No.
8. Press the right arrow button. The LCD displays Enable SSH and its value, Yes or No. Press the up
arrow for Yes. Press the down arrow for No.
9. Press 9 to save and exit the startup configuration. The Check Point DDoS Protector reboots with your
configuration.
LCD Menus
After the Check Point DDoS Protector boots, press any of the LCD buttons to access the LCD menus.
Settings LCD Contrast Contrast Increase or decrease LCD contrast using the
right and left arrow buttons.
Serial Baud Rate Serial baud rate The selected rate is enclosed in asterisks, for
example *19200*. Press the down and up
arrow buttons to scroll between the values.
Note - The LCD displays statistics per port and refreshes them every second. Thus, the
packets-in, packets-out, megabytes-in, and megabytes-out values are per second.
Note – The configuration wizard binds traffic inspection ports pair automatically.
The following table lists the boot commands that the Check Point DDoS Protector platforms support and
which you may use.
Feature Label/Description
Caution - Some boot commands are intended only for use by Check Point Technical Support.
The boot menu does not directly launch the startup-wizard process. The startup-wizard process launches
when the device-startup process encounters no configuration file.
To remove the configuration file and launch the startup-wizard process
1. Enter the boot command q 1. Note that there is a space between the q and the 1.
2. Enter @ to continue with the boot process. DDoS Protector continues the boot process with the startup-
wizard.
Example:
> q 1
You can define up to five subnets to be included in the default network policy, using a network address and
mask, and setting the action to Block or Report.
Default Profiles
The DDoS Protector default network policy is assigned with the default profiles of the various protection
modules.
DDoS Protector supports default profiles for the following protections:
DoS Signatures – Uses the Dos-All profile as the default profile.
BDoS – Supports the NetFlood_Default default protection profile. Bandwidth settings of the profile are
set according to the throughput license of the device.
DNS – Supports the DNSFlood_Default default protection profile. QPS settings of the default profile
are set to 1000 QPS.
SYN Protection – Supports the SYNFlood_Default default protection profile. The profile includes all
static SYN-protection attacks (that is, FTP Control, HTTP, HTTPS, IMAP, POP3, RPC, RTSP, SMTP,
and Telnet).
OOS Protection – Supports the OOSFlood_Default default protection profile.
Service Discovery – Supports the default discovery setting for identifying Web servers that need to be
protected, based on inspection of HTTP responses from the protected network.
You can always modify the default policy settings. You can add or remove protection modules, as well as
replace the default profiles or modify them. After initial configuration is completed, you can apply changes
by accessing device’s CLI or WBM.
Caution – The initial configuration wizard will return to regular boot process, even if
configuration was not completed, after 5 minutes of inactivity.
Consider the following when connecting to copper (RJ-45) ports for traffic inspection:
When turned off, the device ports are set as switch ports (MDIX).
Connect the device with the power off as you would connect a switch.
Use a straight-through cable to connect a server or a router.
Use a crossover cable to connect a switch.
Make sure your link is active (internal bypass is working).
Turn on the device and make sure your link is active.
Note – Cables may be purchased from third-party suppliers.
Note – Use the upper menu bar to jump to the configuration pane for the relevant protection
profiles.
3. Click Set.
Specifies the protected network classification. You can define this as CIDR or
Destination Address
using a Network Class value.
Select DoS-All.
Signatures Profile Note: The DoS Shield feature must be enabled. For more information, see
“DoS Shield.”
SYN Flood status Specifies whether this profile protects against SYN Flood attacks.
Default: Inactive
TCP Reset Flood status Specifies whether this profile protects against TCP Reset Flood attacks.
Default: Inactive
TCP FIN+ACK Flood Specifies whether this profile protects against TCP FIN+ACK Flood attacks.
status Default: Inactive
TCP SYN+ACK Flood Specifies whether this profile protects against TCP SYN+ACK Flood attacks.
status Default: Inactive
TCP Fragmented Flood Specifies whether this profile protects against TCP Fragmented Flood
status attacks.
Default: Inactive
UDP Flood status Specifies whether this profile protects against UDP Flood attacks.
Default: Inactive
IGMP Flood status Specifies whether this profile protects against IGMP Flood attacks.
Default: Inactive
ICMP Flood status Specifies whether this profile protects against ICMP Flood attacks.
Default: Inactive
Configuration of the Specifies the highest expected volume, in Kbit/s, of inbound traffic in Kbit/s,
inbound traffic in on the relevant network segment.
[Kbit/Sec]
Configuration of the Specifies the highest expected volume, in Kbit/s, of outbound traffic, on the
outbound traffic in relevant network segment.
[Kbit/Sec]
DNS A Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS A Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS MX Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS MX Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS PTR Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS PTR Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS AAAA Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS AAAA Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS TEXT Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS TEXT Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS SOA Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS SOA Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS NAPTR Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS NAPTR Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS SRV Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS SRV Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DNS OTHER Flood status Specifies whether this profile protects against these attacks.
Default: Inactive
DNS OTHER Quota[%] Set a value or use the default. The device displays the value 0 until
you click Set and reset the device. Then, the actual default value is
displayed.
DoS Shield
The DoS Shield mechanism implements a sampling algorithm, and detects traffic flooding.
The DoS Shield protection is exposed as the DoS-All option for the Signatures Profile parameter in a
Network Protection policy.
To configure DoS Shield global parameters:
1. From the DDoS Protector menu, select Intrusion Protection > Signature Protection > DoS Shield >
Global Parameters.
2. Configure the fields.
3. Click Set.
Field Name Description or Recommended Value
Sampling Rate The rate at which the DoS Shield mechanism samples a packet to check for an
attack. For example, if the specified value is 5001, the DoS Shield mechanism
checks 1 out of 5001 packets.
Default: 5001
Sampling Frequency How often, in seconds, the DoS Shield mechanism compares the predefined
thresholds for each dormant attack to the current value of packet counters
matching the attack.
Default: 5
Note: If the sampling time is very short, there are frequent comparisons of
counters to thresholds, so regular traffic bursts might be considered attacks. If
the sampling time is too long, the DoS Shield mechanism cannot detect real
attacks quickly enough.
Packet Anomalies
Packet Anomalies is a global protection, which is not related to a Network Protection policy or Server
Protection policy.
Generally, whenever a packet matching one of the predefined checks arrives, it is automatically blocked,
discarded, and reported. However, if you require, you can allow certain anomalous traffic to flow through the
device without inspection.
To configure the Packet Anomalies parameters:
1. From the DDoS Protector menu, select Packet Anomalies > Table.
2. From the Packet Trace Status drop-down list, select disable.
3. To modify the configuration of a packet anomaly:
a) Select the relevant ID from the table.
b) Configure the fields.
c) Click Set.
4. Click Set.
Field Name Description or Recommended Value
Action Values:
no-report
report
block
ReportAction (Read-only) The action of the device when the Action is report or no-report.
Values:
Bypass - The anomalous packet is forwarded to the destination with
no further inspection.
Process - The anomalous packet continues to be inspected by the
protection modules.
ID Enter 0. The system generates an identifier, beginning with 450000, when you
click Set. Afterwards, the ID is read-only.
Destination App. Port Specifies the application port or ports of the destination.
Values:
A Layer 4 port that represents the application you want to protect.
An Application-Port-Group class, string object, for example h.
A blank field to specify any port.
Note: You can modify and configure Application Port Group classes. For more
information, see “Viewing and Configuring Application-Port-Group Classes.”
Protocol Specifies the Layer4 protocol of the application you want to protect.
Values: tcp, udp
Threshold Specifies the maximum number of new TCP connections, or new UDP
sessions, per second, allowed for each source, destination or source-and-
destination pair. All additional sessions are dropped. When the threshold is
reached, attacks are identified and a security event generated.
Tracking Type Specifies the Layer 3 parameters according to which you want to track
sessions.
Values:
Source Count - Sessions are counted per source IP address.
Target Count - Sessions are counted per destination IP address.
Source and Target Count - Sessions are counted per source- and
destination-IP-address combination.
Note: When the Tracking Type is Target Count, the Suspend Action can only
be None.
Action Mode Specifies the action that the device takes for sessions that are over the
threshold.
Values: Report Only, Drop, Reset Source
Suspend Action Specifies whether the source IP addresses that were identified as the source
of the flooding attack are suspended.
Values:
None - The suspend action is disabled for this attack.
SrcIP - All traffic from the IP address identified as source of this
attack is suspended.
SrcIP\, DestIP - Traffic from the IP address identified as source of
this attack to the destination IP under attack is suspended.
SrcIP\, DestPort - Traffic from the IP address identified as source of
this attack to the application (destination port) under attack is
suspended.
SrcIP\, DestIP\, DestPort - Traffic from the IP address identified as
source of this attack to the destination IP and port under attack is
suspended.
SrcIP\, DestIP\, SrcPort, DestPort - Traffic from the IP address and
port identified as source of this attack to the destination IP and port
under attack is suspended
Connection Limiting Attack Specifies the name of an Attack from the Connection Limiting
Attacks that you configured.
Activation Threshold If the average rate of SYN packets received at a certain Destination is higher
than this threshold, the protection is activated.
Values: 1 - 150,000
Default: 2500
Termination Threshold If the average rate of SYN packets received at a certain Destination for the
duration of the tracking period drops below this threshold, the protection is
stopped.
Values: 1 – 150,000
Risk Specifies the risk assigned to this Attack for reporting purposes.
Values: Low, Medium, High
ID Enter 0. The system generates an identifier, beginning with 500000, when you
click Set. Afterwards, the ID is read-only.
ApplicationPortGroup The group of TCP ports that represent the application that you want to protect.
Values:
A Layer 4 port that represents the application you want to protect.
An Application-Port-Group class, string object, for example http.
A blank field specifies any port.
Note: You can modify and configure Application Port Group classes. See
“Viewing and Configuring Application-Port-Group Classes.”
Activation Threshold If the average rate of SYN packets received at a certain Destination is higher
than this threshold, the protection is activated.
Values: 1 - 150,000
Default: 2500
Termination Threshold If the average rate of SYN packets received at a certain Destination for the
duration of the tracking period drops below this threshold, the protection is
stopped.
Risk Specifies the risk assigned to this Attack for reporting purposes.
Values: Low, Medium, High
Specifies the Attack definition. The list contains the predefined and user-
SYN Attack
defined Attacks.
Authentication Method Specifies the Authentication Method that the device uses at the transport
layer. When the device is installed in and ingress-only topology, select the
safe-reset method.
Values:
transparent-proxy - When the device receives a SYN packet,
the device replies with a SYN ACK packet with a cookie in the
Sequence Number field. If the response is an ACK that
contains the cookie, the device considers the session to be
legitimate. Then, the device opens a connection with the
destination and acts as transparent proxy between the source
and the destination.
safe-reset - When the device receives a SYN packet, the
device responds with an ACK packet with an invalid Sequence
Number field as a cookie. If the client responds with RST and
Check Point DDoS Protector 6.07 Quick Start Guide | 37
Configuring a Network Protection Policy
HTTP Authentication Specifies the method that the profile uses to authenticates HTTP traffic at
method the application layer.
Values:
Redirect - The device authenticates HTTP traffic using a 302-
Redirect response code.
JavaScript - The device authenticates HTTP traffic using a
JavaScript object generated by the device.
Default: Redirect
Activation Threshold The rate, in PPS, of out-of-state packets above which the profile considers the
packets to be part of a flood attack. When the device detects an attack, it
issues an appropriate alert and drops the out-of-state packets that exceed the
threshold. Packets that do not exceed the threshold bypass the Check Point
DDoS Protector device.
Values: 1 – 250,000
Default: 5000
Termination Threshold The rate, in PPS, of out-of-state packets below which the profile considers the
flood attack to have stopped; and the device resumes normal operation.
Values: 1 – 250,000
Default: 4000
SYN-ACK Allow status Specifies whether a SYN-ACK packet bypasses the Check Point DDoS
Protector device even when the device has not inspected SYN packet for the
session.
Default: enable
Profile Risk The risk - for reporting purposes - assigned to the attack that the profile
detects.
Values: info, low, medium, high
Default: low
Profile Action The action that the profile takes when it encounters out-of-state packets.
Values: Block and Report, Report Only
Default: Block and Report
Action Check Point recommends the default value Block and Report.
The action that the device takes when the profile detects suspicious traffic.
Values:
Block and Report - Blocks and reports on the suspicious traffic.
Report Only - Reports the suspicious traffic.
Default: Block and Report
Chapter 6
Viewing and Configuring Classes
Viewing and Configuring Network Classes
Network classes classify traffic in a Network Protection policy.
You can view and configure network classes, as you require.
To view the configuration of a network class:
From the Classes menu, select View Active > Networks.
To configure a network class:
1. From the Classes menu, select Modify > Networks > Create.
2. Configure the fields.
3. Click Set.
Sub Index The unique index number of the subnet. Each network can have several subnets. The
Sub Indexes for the subnets within the same network must be unique.
Chapter 7
Configuring Services
Configuring Syslog Reporting
You can get report of the system performance in the Syslog Reporting window. The device issues syslog
messages during the system operation.
To enable syslog messages:
1. From the Services menu, select Syslog Reporting.
2. Configure the fields.
3. Click Set.
Syslog Station Address The IP address of the device running the syslog service (syslogd).
Syslog Station Facility The type of the device of the sender. This is sent with Syslog messages.
Default: Local Use 6
Syslog Destination Port Specifies the address for the Syslog Destination port.
Syslog Source Port Sets the UDP port that is used by Syslog messages.
Values: 1025 - 65535
Default: 514
Chapter 8
Configuring Black Lists and White
Lists
Configuring Black Lists
Check Point DDoS Protector drops packets that match an active Black List policy. The device blacklists
packets if all the criteria for the policy evaluate to true. You can use Black List policies to block traffic that
you know to be malicious.
To configure a Black List policy:
1. From the DDoS Protector menu, select Black List > Create.
2. Configure the fields.
3. Click Set.
State Specifies whether the policy is active. You can select inactive to deactivate
the policy without removing it from the list.
Values: active, inactive
Default: active
SrcNetwork The source network or IP address for the policy. The network must be
configured on the device.
Default: any - That is, traffic from any source.
DstNetwork The destination network or IP address for the policy. The network must be
configured on the device.
Default: any - any - That is, traffic to any destination network.
SrcPortGroup The source, port group for the policy. The port group must be configured on
the device in the Application Port Group table.
This parameter is relevant only for UDP, TCP, and SCTP traffic. You cannot
use a port group for ICMP, IGMP, or GRE.
DstPortGroup The destination, port group for the policy. The port group must be configured
on the device in the Application Port Group table.
This parameter is relevant only for UDP, TCP, and SCTP traffic. You cannot
use a port group for ICMP, IGMP, or GRE.
VLANTag The VLAN tag group that you want for the policy.
Direction The direction of packets for the policy. This parameter relates to L4 sessions
only.
Values:
One-direct - The protection applies to sessions originating from
sources to destinations that match the network definitions of the
policy.
Bi-direct - The protection applies to sessions that match the
network definitions of the policy regardless of their direction.
Default: one-direct
ReportAction The report action that the device takes when it encounters a packet that
matches the policy.
Value:
report - The device issues a trap when it encounters a black-listed
packet.
no-report - The device issues no trap when it encounters a black-
listed packet.
Default: report
Entry Expiration Timer The Expiration Timer can be used only with dynamic Black List rules. The
(Hours) Expiration Timer for a static Black List rule must be set to 0 (zero hours and
zero minutes).
When the rule expires (that is, when the Entry Expiration Timer elapses), the
rule disappears from the Black List Policy table when the table refreshes.
The maximum Expiration Timer is two hours.
Entry Expiration Timer Specifies the hours remaining for the rule.
(Minutes)
The Expiration Timer can be used only with dynamic Black List rules. The
Expiration Timer for a static Black List rule must be set to 0 (zero hours and
Detector IP address that can identify the root cause of the black list rule identify. This
parameter has no affect on Check Point DDoS Protector operation.
Detector Security Module A security module that can identify the root cause of the black list rule. This
parameter has no affect on Check Point DDoS Protector operation.
Caution - Check Point DDoS Protector continues to block packets from a source or
destination that is part of an active attack even after you add the source or destination to the
White List per protection.
Note - Since IP addresses belonging to the White List are not inspected, certain protections
are not applied for the opposite direction. For example, with SYN Protection, this can cause
servers not to be added to known destinations due to ACK packets not being inspected.
State Specifies whether the policy is active. You can select inactive to deactivate
the policy without removing it from the list.
Values: active, inactive
Default: active
SrcNetwork The source network or IP address for the policy. The network must be
configured on the device.
Default: any - That is, traffic from any source.
DstNetwork The destination network or IP address for the policy. The network must be
configured on the device.
Default: any - That is, traffic to any destination network
SrcPortGroup The source, port group for the policy. The port group must be configured on
the device in the Application Port Group table.
This parameter is relevant only for UDP, TCP, and SCTP traffic. You cannot
use a port group for ICMP, IGMP, or GRE.
DstPortGroup The destination, port group for the policy. The port group must be configured
on the device in the Application Port Group table.
This parameter is relevant only for UDP, TCP, and SCTP traffic. You cannot
use a port group for ICMP, IGMP, or GRE.
VLANTag The VLAN tag group that you want for the policy.
Direction The direction of packets for the policy. This parameter relates to L4 sessions
only.
Values: bi-direct, src, dest
Default: src
ReportAction The report action that the device takes when it encounters a packet that
matches the policy.
Value: no-report - The device issues no trap when it encounters a white-
listed packet.
All Modules Bypass Specifies whether the packets that match the criteria for the policy bypass all
protection modules (SYN Protection, Stateful Inspection, Anti-Scanning,
Signature Protection, and HTTP Mitigator).
Values: active, inactive
Default: active
Signature Protection Specifies whether the packets that match the criteria for the policy bypass
Bypass the Signature Protection module.
Values: active, inactive
Default: active
Anti-Scanning Bypass Specifies whether the packets that match the criteria for the policy bypass
the Anti-Scanning module.
Values: active, inactive
Default: active
Stateful Inspection Specifies whether the packets that match the criteria for the policy bypass
Bypass the Stateful Inspection module.
Values: active, inactive
Default: active
SYN Protection Bypass Specifies whether the packets that match the criteria for the policy bypass
the Stateful Inspection module.
Values: active, inactive
Default: active
HTTP Mitigator Bypass Specifies whether the packets that match the criteria for the policy bypass
the HTTP Mitigator module.
Values: active, inactive
Default: active