BTW, if you need the ability to differentiate gateways by name in the forwarded logs, (i.e. if you are shipping logs to external SIEM provider to be parsed):
Below are the steps to have the syslog contain the origin_sic_name field.
Perform these steps on the Log server that has CPLogToSyslog installed:
1. Stop services on the Log Server.
[Expert@HostName]# cpstop
- Backup and modify $FWDIR/conf/log_fields.C
[Expert@HostName]# cp -pv $FWDIR/conf/log_fields.C
$FWDIR/conf/log_fields.C_ORIGINAL
[Expert@HostName]# vi $FWDIR/conf/log_fields.C
- Search for "origin_sic_name" and under ":display_mode" there will be a
field, ":application_name (FWLog)". Change from:
: (
:AdminInfo (
:chkpf_uid ("{5DF46778-79F6-487B-AF90-8CE40333E117}")
:ClassName (application_display_mode_object)
)
:application_display_mode (none)
:application_name (FWLog)
)
TO:
: (
:AdminInfo (
:chkpf_uid ("{5DF46778-79F6-487B-AF90-8CE40333E117}")
:ClassName (application_display_mode_object)
)
:application_display_mode (own_column)
:application_name (FWLog)
)
- Start services.
[Expert@HostName]# cpstart
The logs will now contain the origin_sic_name field:
Nov 9 2017 14:39:50
Nov 9 2017 19:39:50 GMT
Thu Nov 9 14:39:50 Log host CPLogToSyslog: 0 16386 encrypt 52.184.158.74 >eth1 LogId: <max_null>; ContextNum: <max_null>; OriginSicName: <max_null>; log_sequence_num: 0; is_first_for_luuid: 131072; inzone: Internal; outzone: External; rule: 90; rule_uid: {AE182161-16C0-4367-A732-B036B35935E9}; rule_name: Internet access; service_id: domain-udp; src: 10.aaa.aaa.aaa; dst: 10.bbb.bbb.bbb; proto: 17; scheme: IKE; methods: ESP: AES-128 + SHA1; peer gateway: 62.aaa.bbb.ccc; community: Onprem-AzureCloud; fw_subproduct: VPN-1; vpn_feature_name: VPN; origin_sic_name: CN=gatewayname,O=managementserver.domain.com.d4w394; aba_customer: SMC User; date: 9Nov2017; hour: 14:29:57; type: log; Interface: < eth1; ProductName: VPN-1 & FireWall-1; svc: 53; sport_svc: 9679;