How to Troubleshoot SIC on Check Point Firewall
SIC (Secure Internal Communication) is used to establish trust between firewalls and managers. This is how to troubleshoot SIC:
SIC is actually a certificate based challenge, and the cert is generated by the one time password process. SIC is based on SSL with digital certificates. The CA (certificate authority) is created when the manager is installed. This CA issues certs afterwards to all processes/servers that communicate using SIC. Basically SIC establishes trust and allows the gateway to communicate with other Check Point devices that possess a SIC certificate, signed by the same ICA.
Check Point Support Center
There is an article on the Check Point support site that describes other things to look at relating to SIC: SK30579
Ports Related to SIC
- Port 18209
- Used for communication between the Security Gateway and the CA for status, to issue, and revoke.
- Port 18210
- Used to pull certificates from the CA.
- Port 18211
- Used by the cpd daemon on the Security Gateway to receive the Certificate (by clicking “Initialize” in SmartDashboard).
Basic SIC Troubleshooting
- Make sure the routes and connectivity exist between the gateway and Security Management Server.
- Allow any rules or ACLs that might block communication.
- Make sure server and gateway use the same SIC key.
- Verify date and time are accurate on both devices.
- Remote gateways need the /etc/hosts IP/name to resolve the management IP
SIC Related Processes
CPD is used for the SIC process. In the process of start/stopping CPD to debug SIC, you could affect the following services:
- Policy Fetch/Installation
- SIC (sic of course)
- Messaging for other SmartCenter Daemons
- Licensing
CPD can sometimes consume all available memory. Check the output of the “top” command (look at RES and CPU columns):
Restarting CPD Process
1 2 |
# cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop" # cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd" |
Inspect SIC Packets with FW Monitor
1 |
fw monitor -e 'accept (dport=18209 or dport=18210 or dport=18211);' |
What to look for:
- Look at the i I o O chain to tell interface entrance/exit or if it hits firewall at all
- If it goes through part of the i I o O chain but not all, it is dropped on the firewall and the drop may appear in the logs
Verify SIC Service is Listening
1 2 |
(windows)c:\> netstat -na | findstr 18211 (linux)expert# netstat -na | grep 18211 |
Error Messages Related to SIC
Failure to Initialize SIC
- sk12688
- Failed to connect the module
- sk35200
- Policy install fails on a rebuilt VSX cluster member
- sk25542
- SIC Status for
not communicating. Peer does not have a certificate for SIC - sk37295
- Rmote Security gateway does not receive the certificate
SIC General Failure
- sk37219
- CPD process consumes high CPU during SIC status test
- sk16200
- SIC general failure error no. 148
- sk32715
- CPD reaches high CPU after install QoS Policy with User Access
SIC Error no. 147
- sk36082
- Installing Policy to a VPN-1 gateway from a CMA fails with SIC error 147
- sk33849
- CPD debug shows: “SIC Error for CpdPing: received bad message length from peer”
- sk33764
- SIC Status for
Not communicating Authentication error err no 147
Misc SIC Errors
- sk43744
- Automatic SIC renewal mechanism does not function in R70.xx
- sk42916
- Security Gateway randomly loses SIC with SmartCenter
- sk44272
- Undefined Error in SmartDashboard when establing Trust with Virtual Device
- sk32183
- SIC fails even though SIC certificate was renewed