Appliance Configuration
Check Point 1400 Appliances Centrally Managed Administration Guide R77.20.85 | 112
• Infected only - Shows only devices or servers classified as infected.
• High and above severity only - Shows devices and servers that are infected or possibly
infected with malwares that have a severity classification of high or critical.
To add a malware exception rule for a specified protection:
1.
Select the list entry that contains the protection for which to create an exception.
Click Add Protection Exception.
Click the links in the rule summary or the table cells to select network objects or options that
fill out the exception rule fields.
• Scope - Select either Any or a specific scope from the list. If necessary, you can create a
New network object, network object group, or local user.
If it is necessary to negate a specified scope, select the scope and select the Any Scope
except checkbox.
For example, if the scope of the exception should include all scopes
except
for the DMZ
network, select DMZ network and select the Any Scope except checkbox.
• Action - Select the applicable action to enforce on the matching traffic: Ask, Prevent,
Detect or Inactive. See the Threat Prevention > Threat Prevention Blade Control page for
a description of the action types.
• Log - Select the tracking option: None, Log, or Alert. Logs are shown on the Logs &
Monitoring > Security Logs page. An alert is a flag on a log. You can use it to filter logs.
Optional - Add a comment in the Write a comment field.
Click Apply.
The rule is added to Malware Exceptions on the Threat Prevention > Exceptions page.
To view the logs of a specified entry:
1.
Select the list entry for which to view logs.
Click Logs.
The Logs & Monitoring > Security Logs page opens and shows the logs applicable to the
IP/MAC address.
Note - This page is available from the Home and Logs & Monitoring tabs.
Viewing VPN Tunnels
In the VPN Tunnels page you can see current VPN tunnels opened between this gateway and
remote sites. Some sites are configured so tunnels are established only when necessary and
some are configured with permanent tunnels. When the appliance is managed by Cloud Services,
this table also shows the tunnels for the gateways in the community.
This page is commonly used to see the permanent tunnels. The table shows each tunnel's details
when there is an active VPN tunnel.
From
Host name or IP address of the tunnel’s source gateway.
Site Name Name of the VPN site name.
Peer Address Host name or IP address of the tunnel’s destination gateway.