Hi Check Point Community,
We encountered a consistent log parsing issue on our R81.20 gateway (Build: XXX, Jumbo Hotfix: XXX):
### Symptom:
- Multiple legitimate internal source IPs (e.g., 10.108.12.10, 10.108.11.16) are **all incorrectly displayed as 0.0.127.190** in SmartConsole Logs & Monitor.
- The affected traffic is Nessus Security Scanner detections (IPS blade, "Scanner Enforcement Violation" protection).
- Only the timestamp varies between logs; all other fields (destination IP: 10.108.40.51, service: TCP/59302, protection name) are identical.
### Verification with Packet Capture:
- When we export the packet capture from the affected log, the **real source IP in the pcap is correct** (e.g., 10.108.12.10), not 0.0.127.190.
- This confirms the traffic itself is valid; the bug is in log parsing/display.
### Questions:
1. Is this a known issue in R81.20? Are there any related Jumbo Hotfixes to resolve this log parsing bug?
2. Could this be related to SecureXL acceleration or IPS signature parsing for Nessus scans?
3. Are there any temporary workarounds to display the correct source IP in logs while we wait for a fix?
Thanks in advance for any insights or guidance!