The Only Multi-vendor Log and Configuration Monitoring Software for Network Security Devices
Check Point Firewall Log Analysis using LEA
Comprehensive Log Analysis & Reporting For Check Point Firewalls
Firewall Analyzer can analyze, report, and archive logs from your Check Point Firewalls (it also supports other firewalls). Firewall Analyzer has been OPSEC™ certified by Check Point and has joined the OPSEC Alliance.
You need to configure Check Point firewalls to support the Check Point logs. Firewall Analyzer supports log import from most versions and Log Extraction API (LEA) support for versions R54 and above. Firewall Analyzer lets you add LEA servers to establish connections and retrieve logs from Check Point firewalls. You can add as many LEA servers as needed, and set up authenticated or unauthenticated connections to retrieve firewall logs.
Firewall syslogs (Check Point logs) reveal a lot of information on the nature of traffic coming in and going out of the firewall, allows you to plan your bandwidth requirement based on the bandwidth usage across the firewalls. Analyzing these firewall traffic logs is vital to understanding network and bandwidth usage and plays an important role in business risk assessment. Firewall Analyzer (Check Point Log Analyzer) offers many features that help in collecting, analyzing and reporting on firewall logs.
Firewall Analyzer supports the following reports for Check Point firewall: