Integration of Check Point Firewall Events from External Syslog Forwarders
Check Point Firewall events can be forwarded from external sources, such as Splunk Forwarders, or other third-party syslog forwarders that send events to JSA.
When Check Point Firewall events are provided from external sources in syslog format, the events identify with the IP address in the syslog header. This identification causes events to identify incorrectly when they are processed with the standard syslog protocol. The syslog redirect protocol provides administrators a method to substitute an IP address from the event payload into the syslog header to correctly identify the event source.
To substitute an IP address, administrators must identify a common field from their Check
Point Firewall event payload that contains the proper IP address. For example, events from
Splunk Forwarders use orig=
in the event payload to identify the original IP
address for the Check Point firewall. The protocol substitutes in the proper IP address to
ensure that the device is properly identified in the log source. As Check Point Firewall
events are forwarded, JSA automatically discovers and create new log sources for each
unique IP address.
Substitutions are that are performed with regular expressions and can support either TCP or UDP syslog events. The protocol automatically configures iptables for the initial log source and port configuration. If an administrator decides to change the port assignment a Deploy Full Configuration is required to update the iptables configuration and use the new port assignment.
Syslog Redirect Log Source Parameters for Check Point
If JSA does not automatically detect the log source, add a Check Point log source on the JSA Console by using the Syslog Redirect protocol.
When using the Syslog Redirect protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect Syslog Redirect events from Check Point:
Parameter |
Value |
---|---|
Log Source type |
Check Point |
Protocol Configuration |
Syslog Redirect |
Log Source Identifier |
Type the IP address or host name for the log source as an identifier for events from your Check Point devices. |