<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Document: Logging in R80++ in a single security domain in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/196924#M95317</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for this article.&lt;/P&gt;&lt;P&gt;Is this relevant for R81.10? We deployed separate MLM for our MDS, didn't add CLM as logs target in the relevant gateway settings, but I'm able to see logs on this CLM. And in logs I see this CLM communicates with certain CMA only. Does it mean logs are syncing between CMA and CLM?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Nov 2023 14:56:50 GMT</pubDate>
    <dc:creator>OlKuts</dc:creator>
    <dc:date>2023-11-02T14:56:50Z</dc:date>
    <item>
      <title>Document: Logging in R80++ in a single security domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41847#M95312</link>
      <description>&lt;P style="margin: 0in 0in 0.0001pt; text-align: left;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Since R80.X much changed in the way the logging is handled and I see the subject popping-up either on its own or in other tangentially-related threads.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #3d3d3d; font-size: 11.5pt;"&gt;&lt;STRONG&gt;Changes from R77.30&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Notably absent the feature that was much welcomed, but short lived that allowed output of security events from the gateway to syslog server directly (&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk87560" target="_blank"&gt;&lt;SPAN style="font-size: 11.5pt; color: #2989c5;"&gt;sk87560&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #339966;"&gt;*There is now a hotfix available, but it must be requested from CP support referencing&amp;nbsp;&lt;SPAN style="background: white;"&gt;Issue ID 02646044&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: #339966; background: white;"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; color: #339966; background: white;"&gt;Long term prospects for this solution are unknown.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Temporary supplement to address the lack of firewall log forwarding capability called CPLog2Syslog (&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115392" target="_blank"&gt;&lt;SPAN style="font-size: 11.5pt; color: #2989c5;"&gt;sk115392&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;) was introduced, but it does not look like it is gaining traction. Instead, Check Point is now focusing on Log Exporter (&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk122323" target="_blank"&gt;&lt;SPAN style="font-size: 11.5pt; color: #2989c5;"&gt;sk122323&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Smart Reporter is no longer available as a separate item and has been merged with SmartEvent. It is not, strictly speaking a logging feature, but it worth mentioning it here, as there is a heavy dependency between logs and reports.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #3d3d3d; font-size: 11.5pt;"&gt;&lt;STRONG&gt;Gateways or Cluster Members:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;Typically configured to send logs to the external SMS, dedicated Log Server or SmartEvent Server, they do have capability of storing logs locally in addition to shipping them off. I would consider this to be a niche case, applicable in a situation where: a.) you may have bad or intermittent connectivity between the gateway or cluster and the rest of your management infrastructure and b.) your gateways or cluster members are equipped with rotating media (conventional HDDs).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Depending on legal requirements your organization is subject to, if you are resorting to this method of logging on a single gateway, it may have to be equipped with RAID array to assure&lt;/SPAN&gt;&lt;SPAN style="color: #222222; background: white;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #222222; background: white;"&gt;survivability&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;of the logs in the event of the single disk failure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;You may also configure either multiple concurrent, or failure-contingent logging targets on a gateways or cluster members. This will, for instance, allow you to simultaneously log to geographically distributed Log Servers or, log locally for best performance under normal conditions with failover to the remote log server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;With single SMS / Log Server in the environment your logging destination is predetermined:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65727_pastedImage_1.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;When more than one Log Server is present, your options are:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Multiple concurrent:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65728_pastedImage_2.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Failure Contingent:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65729_pastedImage_3.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #3d3d3d; font-size: 11.5pt; font-family: 'Helvetica',sans-serif;"&gt;Or a combination of both:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65730_pastedImage_4.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;While option to "Save logs locally, on this machine (Gateway's name)" is present, it is seldom used.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #3d3d3d; font-size: 11.5pt; font-family: 'Helvetica',sans-serif;"&gt;&lt;STRONG&gt;Single SMS&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;: simple enough if your logging rate or volume is not chocking the appliance or VM it is running on. All aspects of it, i.e. Logging and Status, SmartEvent and SmartEvent Correlation Unit could be configured on the same system with the "Log Indexing" enabled.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Logs are rotated at least once a day by default or more frequently, as could be specified in the host's properties/Logs/Additional Logging/Log Files section:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65731_pastedImage_5.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&lt;A href="https://community.checkpoint.com/migrated-users/41625" target="_blank"&gt;Timothy Hall&lt;/A&gt;‌ adding that:&amp;nbsp;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;&lt;EM&gt;log files will be forcibly rotated when they reach 2GB in size even if no log rotation checkboxes are set.&amp;nbsp; I believe this is due to the old 2GB file size limit inherent in the FAT32 filesystem in Windows NT, which is an OS that very early versions of the SMS frequently used.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Running Log Indexing is&amp;nbsp;limited&amp;nbsp;to the last 14 days by default, but this limit could be adjusted or disabled if larger indexed time-span is desired.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;By default, Log Forwarding, if enabled, will purge forwarded logs from local server, unless otherwise configured (&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106039" target="_blank"&gt;&lt;SPAN style="font-size: 11.5pt; color: #2989c5;"&gt;sk106039&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;No built-in archiving mechanism for the logs is available and, if required, cron scripts must be used to backup the logs for offline storage to prevent accidental overwrite.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #3d3d3d; font-size: 11.5pt; font-family: 'Helvetica',sans-serif;"&gt;&lt;STRONG&gt;Dedicated Log Server(s):&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&amp;nbsp;Depending on complexity of your infrastructure, the use cases for a dedicated log server may vary. For instance, if you prefer to manage your environment from Check Point appliances that are underpowered, but otherwise sound, you may limit them to compilation and installation of policies while designating separate unit or a virtual instance with ample CPU, memory, and high-performance local or SAN-based storage array to log processing and query execution.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Alternatively, you may already have a log server(s), either standalone or in combination with management or SmartEvent components but require a near-line storage for logs that extends far beyond their capacity.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Another common use is the log consolidation across organization with multiple offices. You may have local log servers in each but are forwarding logs from all of them to a central repository.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Multiple dedicated Log Servers could be provisioned and either designated as targets for concurrent or failure-contingent logging or used for scheduled log forwarding by other components of your Check Point infrastructure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Again, there is no built-in archiving mechanism for the logs and, if it is required, cron scripts must be used to backup the logs for offline storage to prevent accidental overwrite.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 11.5pt;"&gt;&lt;STRONG&gt;Dedicated Log Server(s) for SmartEvent:&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;to take maximum advantage of SmartEvent's analytical capabilities, it really should have the ability to examine all traffic terminated on or traversing your gateways. This includes traffic that you may not be interested in under normal circumstances and are either allowing or dropping without logging. These are also referred to as "Complementary Logs."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;To accommodate this requirement, Dedicated Log Server should be implemented. It is defined in two places: Global Properties/Reporting Tools and on each gateway or cluster.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65732_pastedImage_6.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&lt;IMG class="image-7 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65733_pastedImage_7.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Note that “Reporting Tools” in the properties of the gateways will appear only after it is enabled in the Global Properties.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="jive-image image-8" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65734_pastedImage_8.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 11.5pt;"&gt;&lt;STRONG&gt;&lt;EM&gt;If you are simply enabling SmartEvent and SmartEvent Correlation Unit&amp;nbsp;on SMS, you are NOT presented with the "Reporting Tool" options in the properties of your gateways.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Below is the screenshot of the SMS with SmartEvent and SmartEvent Correlation Unit enabled:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&lt;IMG class="image-9 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65735_pastedImage_9.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;But the "Reporting Tools" option is absent:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;&lt;IMG class="jive-image image-10" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65736_pastedImage_10.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To get an idea of what is being logged by the server designated in “Reporting Tools”, select it as the only source of the events in the “Logs” tab:&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-11 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65737_pastedImage_11.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To keep the nonsense traffic from being logged by the server defined in “Reporting Tools”, add it to the “Exemptions” either in “Global Properties” or in the properties of individual gateways (clusters):&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65738_pastedImage_12.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do NOT assume that by configuring “Reporting Tools” log server you will automatically retain and have access to logs for all events! Searches by the rules with logging not enabled, by rule UUID do not return anything:&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-13 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65739_pastedImage_13.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And search by source, destination and service or port number may show the only “security events of interest:”&lt;/P&gt;
&lt;P&gt;&lt;IMG class="jive-image image-14" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65740_pastedImage_14.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-15 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65741_pastedImage_15.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This behavior is difficult to explain, since the actual log files on the server defined in “Reporting Tools” do contain roughly same logs as the normal log servers in addition to specific additional data. We can see that by looking at the log size on both:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-16 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65742_pastedImage_16.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SMS HA:&lt;/STRONG&gt; &amp;nbsp;Used when uninterrupted management capabilities are required. Frequently implemented at a primary and secondary locations (datacenters). By default, even when blades are selected in the property of the Secondary SMS, logging to it is not automatically enabled on gateways and clusters and logs are NOT replicated:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-17 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65743_pastedImage_17.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You must add Secondary SMS to the concurrent logging targets on all the gateways and clusters to retain access to the logs in case of the loss of Primary server:&lt;/P&gt;
&lt;P&gt;&lt;IMG class="jive-image image-18" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65744_pastedImage_18.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Once it is done, and the policy is installed, you are logging to both SMS’ synchronously:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;IMG class="image-19 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65745_pastedImage_19.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;...Perhaps to be continued after your comments and feedback.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Vladimir Yakovlev&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 01:17:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41847#M95312</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-21T01:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in a single security domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41848#M95313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great article. Thanks a lot.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 20:35:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41848#M95313</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-05-23T20:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in a single security domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41849#M95314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are welcome &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;I'll try to maintain and update it should there be comments, corrections or suggestions from the community.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 20:38:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41849#M95314</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-05-23T20:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in a single security domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41850#M95315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Near section "&lt;SPAN style="font-size: 11.5pt; font-family: 'Helvetica',sans-serif; color: #3d3d3d;"&gt;Logs are rotated at least once a day by default or more frequently, as could be specified in the host's properties/Logs/Additional Logging/Log Files section:&lt;/SPAN&gt;" you may want to mention that log files will be forcibly rotated when they reach 2GB in size even if no log rotation checkboxes are set.&amp;nbsp; I believe this is due to the old 2GB file size limit inherent in the FAT32 filesystem in Windows NT, which is an OS that very early versions of the SMS frequently used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything else looks accurate to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;"IPS Immersion Training" Self-paced Video Class&lt;BR /&gt;&lt;SPAN&gt;Now Available at&lt;/SPAN&gt; &lt;A class="jive-link-external-small" href="http://www.maxpowerfirewalls.com"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 21:12:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41850#M95315</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-02-28T21:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in a single security domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41851#M95316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Tim, I'll add the caveat you've mentioned.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 01:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/41851#M95316</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-01T01:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Document: Logging in R80++ in a single security domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/196924#M95317</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for this article.&lt;/P&gt;&lt;P&gt;Is this relevant for R81.10? We deployed separate MLM for our MDS, didn't add CLM as logs target in the relevant gateway settings, but I'm able to see logs on this CLM. And in logs I see this CLM communicates with certain CMA only. Does it mean logs are syncing between CMA and CLM?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 14:56:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Document-Logging-in-R80-in-a-single-security-domain/m-p/196924#M95317</guid>
      <dc:creator>OlKuts</dc:creator>
      <dc:date>2023-11-02T14:56:50Z</dc:date>
    </item>
  </channel>
</rss>

