The Check Point link lets you manage the LEA servers (Check Point Management Servers) that have been configured to connect to Check Point firewalls and access the log files.
The list of LEA servers (Check Point Management Servers) configured, along with the respective LEA listener port and authentication details, is displayed. The details of the Check Point Firewalls are listed in a table. The description of the table columns are as given below:
Parameter | Description |
---|---|
Firewall Name | The name of the Check Point Firewall being monitored. |
SysLog Server | The name of the SysLog server from which the log will be extracted. |
Lea Port | The port on which Firewall Analyzer has to connect to the Check Point firewall for LEA (Log Extraction API) access. |
Authenticated | Indicates whether the connection between Firewall Analyzer and Check Point Firewall is authenticated. |
Action | To remove the Check Point Firewall in Firewall Analyzer from being monitored. |
Carry out the following procedure to add a Check Point Firewall in the Firewall Analyzer:
If you are unable to view the Check Point Firewall reports carry out the following procedure:
Note: | The Configuring Check Point Firewalls section includes detailed instructions on configuring Check Point firewalls for reporting in Firewall Analyzer |