Firewall Analyzer supports "Log Exporter" for Check Point firewall versions R77.30, R80.10, R80.20, and later versions.
Follow these steps in the Smart Dashboard of Check Point Firewall:
After applying the hotfix, restart the Check Point firewall.
Use Telnet/SSH to connect to the firewall and enter:
cp_log_export add name <name> target-server <Firewall Analyzer IP> target-port 1514 protocol udp format cef
To start the log exporter:
cp_log_export restart name <name>
Log Exporter is already integrated in version R80.20. No separate installation is needed.
Note:
Install this release on a Multi-Domain Server, Security Management Server, Log Server, or SmartEvent Server.
Note:
Install this release on a Multi-Domain Server, Security Management Server, Log Server, or SmartEvent Server.
Note:
Before importing logs, configure Smart View Tracker:
Version | Date | CPUSE Online Identifier | CPUSE Offline Package |
---|---|---|---|
R80.10 | 20 January 2019 | Check_Point_R80.10_Log_Exporter_T43_sk122323_FULL.tgz | (TGZ) |
R77.30 | 06 November 2018 | Check_Point_R77.30_Log_Exporter_T30_sk122323_FULL.tgz | (TGZ) |
fw logexport -d ; -i fw.log -o exportresult.log -n
For Check Point NG:
fwm logexport -d ; -i fw.log -o exportresult.log -n
Copy the resulting file to the Firewall Analyzer machine and import it.
exportresult.log
.No additional configuration is required for virtual firewalls.
If the orig_name
attribute is present in the syslog, Firewall Analyzer detects it as a virtual firewall. Otherwise, it considers it a physical device.
Thank you for your feedback!