- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Mates.
The customer pointed out something unusual:
We can see traffic on the firewall via tcpdump, but no corresponding logs appear in SmartConsole (management).
Additional, the latest logs available in date back to a week ago, although traffic is clearly flowing through the firewall.
Do you have any ideas on what could be causing this behavior on S1C R82?
Thanks,
Hey brother,
Just to confirm, have them verify fw is not logging locally
Have them run this on the gateway from expert -> ls -lh $FWDIR/log/fw.log
If it shows anything other than 8.2 K, it might be logging locally to itself. Or ask them to run watch -d in front that command for 2-3 mins and see if size is growing.
Andy
Checked bro seem's fine:
-rw-rw---- 1 admin root 8.2K Oct 1 00:00 /opt/CPsuite-R81.20/fw1/log/fw.log
Hm...thats odd, makes me wonder if it could be something S1C related. I know one time, while back, I was working with customer and there was some strange issue in the portal, then we tried another browser and was fine.
Can they try that, just to make sure?
Andy
Hey brother,
Can you check with the customer please what are the last logs they see in the portal? What exact date?
Andy
Is it an existing connection (long standing, even) or a new connection?
Because the log entry will show when the connection is initially established and, with appropriate policy/log settings, update every 10 minutes or so with statistics.
Of course, if you're not seeing ANY logs, that's a different issue, and yes, you should check if you're logging locally.
cpstat fw -f log_connection from expert mode is another way to do that.
See also: https://support.checkpoint.com/results/sk/sk170331
Restarting fwd is probably all you need to do here.
It's an existing connection
On top of the other suggestions here, make sure the date / time / time zone are correct. The logs come in with a timestamp from the gateway, so if the gateway thinks it's last week then all the logs will be from last week too.
Excellent point, Emma.
Andy
yes it's correct
A couple of things:
1) Depending on the type of policy layer, if "Connection Logging" is not set for the rule matching the traffic, each individual connection will not get its own log every time. A series of related connections will be "rolled up" into a single log entry by Session Logging, with only a counter being incremented in the existing log for additional related connections. Note that Threat Prevention has its own separate log suppression mechanism. For more information about all this, see here: Max Gander: The Hidden World of Log Generation and Log Suppression at Check Point
2) It is possible that you have an indexer database issue that is keeping you from seeing the proper logs in searches, but they do actually exist in the raw log files on the SMS/Log Server, if you look directly at them without indexing. This problematic behavior became much less likely when the log indexer mechanism was reworked around R81 or so. Try disabling indexing on your SMS/Log Server, but only do this to confirm that an indexer issue is present, as doing this will make log searching very slow.
Alternatively, you can try opening the current fw.log file directly from the Logs & Monitor tab of SmartConsole to verify that the logs are really there. To do this, select the "hamburger" menu on the far right and then select File...Open Log File.
All super valid points, Tim.
Hey brother, did you end up fixing this?
Best,
Andy
Also did you capture the packets on management server on port 257? That would show if the connection at least established and firewall is sending the logs to management server on port 257
port 257 it's estabilshed i'm working with tac, it is sip traffic btw
Hey bro,
ONLY sip does not get logged, all else does?
Andy
yes
Silly ?, but do they have logging enabled for that rule?
Andy
yes the rule it's the log per connection
Mind sending screenshot? Please blur out any sensitive data.
Andy
Of what? the rule is:
SRC: Network Group to DST: Network Group service any log (per connection)
can you send the actual screenshot?
K, thank you! Looks right...can you see if you hover over hits column when last hit was? Anything changed since then? Can you try disable the rule, install policy, re-enable and install again?
Best,
Andy
hi bro
note also that i've tried to put a rule above this one with specific host involved and the rule seem's not matched
I would try do remote with TAC buddy to see if it can be solved. Not sure at this point why it would stop logging out of the blue. I mean, one way to confirm would be to revert revision from the time it worked, but if there lots of changes since then, it would be risky.
Andy
Sure sounds like an indexer issue to me not properly indexing SIP logs which is why you can't see them, but they are actually there. Have seen this before with VPN logs where all logs from all gateways were visible...except for VPN logs. Turn off indexing, and BAM there they are. It is possible that the gateway is not generating just the SIP logs at all, but I'd say that is less likely than an indexer issue.
Hi Tim, How can i do that? (turn off index)
Hey bro,
I believe you can do this even from smart console object, I will attach screenshot later.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
13 | |
12 | |
12 | |
11 | |
9 | |
8 | |
7 | |
6 | |
5 | |
5 |
Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY