Monitoring Firewalls - Best Practises? Ideas?

Hello everyone.

Many of our customers are using enterprise-grade firewalls (like Palo Alto Networks, Fortinet, or Check Point) and are monitoring them through checkmk, of course. :slight_smile: Mostly via SNMP.

By default, only the “normal” hardware stuff is monitored such as CPU, memory, and interfaces. There are only a few firewall-/security-related checks built in. (On a Palo, its sessions, state, and users; on a Forti its sessions, signatures & versions, VPN tunnels.) On https://exchange.checkmk.com/ there are only some outdated plugins available.

→ We want to collect a few “mandatory” checks for firewalls, that should be checked by checkmk to give a baseline overview of those firewalls. Maybe some of you have already similar ideas or suggestions for that?

Of course, we cannot monitor our security infrastructure with such a monitoring system solely. There are other products like SIEM/NDR/XDR/whatever for that. It’s more about a rough overview for the 24/7 support team, to get an idea if some failures are related to the firewalls or not.

Some ideas would be:

  • threats: listed by severity; listed by action (drop or allow), listed by types (if grouped by the vendor already)
  • network anomalies: port scans, DDoS, missing ARP/NS
  • application/port distribution: listed by sessions and/or throughput
  • HA sync
  • routing changes (BGP, OSPF)

Please write any ideas you might have or any critical aspects. After that, we will try our best to get some of those basic checks into checkmk. :wink:

Thanks,
Johannes

You need vendor support to get the information you want to monitor.
Checkmk either gets the information via SNMP or an HTTP based API from the device. If the info is not available through these channels it cannot be monitored.

So apart from creating a wishlist of items you want to monitor you also have to research for each vendor and device where and how this information can be extracted.

Thats what we agreed on checkmk 2.0.0 with our Security Operation and domain leader for checkpoint firewalls in that datacenter and local on the site:

Firewall Module
HA Problem
HA Status
HTTPS Management URL
Interface
Memory System
Packet Statistics
Power Supply
SSH
SVN Status
Temperature
Uptime
Voltage
Tunnel Status

We have different levels depending on the size of the FW

Firewall Datacenter
Firewall Small Site
Firewall Mid Site
Firewall Big Site

1 Like

This topic was automatically closed 365 days after the last reply. New replies are no longer allowed. Contact an admin if you think this should be re-opened.