- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I realize this is a very subjective question as it all depends on your environment, but I've noticed a dramatic rise in log files over the years as we've migrated from an R77 environment to R81.10.
We log basically two datacenters in our single log server with one of them getting the majority of the Internet traffic inbound/outbound. We have the server set to rotate the logs every 2 GB. We probably are generating one 2 GB file every 20-30 minutes. Yesterday alone we generated 52 2GB log files. And so far on our 4 TB log server we've generated 2.3T of fw logs since Jan 13.
Just to add context, I opened a support case back in October 2016. At that time we were struggling because we were generating 24GB of logs a day. And at that time that was a significant increase from what we had seen in the past. Mind you, this is the same datacenter so the number of users has stayed constant over the years for the most part. We were able to get to about half of that by not logging telnet drops before the final drop rule.
Since then its risen to 40-50 GB a day (without the final drop rule log) and with the drop rule logging it's almost double that. I would say 66% of the logs are inbound Internet drops from our major datacenter. I used to be able to get a better count by using the older SmartView Tracker application and opening up a single file for analysis, but the log files being generated now don't play so well with that tool anymore. I just don't understand why several years ago we saw this dramatic increase and it has only gotten worse. Each 2 GB file is made up of approximately 8 million entries (based on SmartView tracker). So that's almost 260 bytes of data per entry and roughly 320,000 entries a minute.
Is this just normal? I know there isn't an exact size on log entries produced, but I just feel like we're drowning in data.
Hey Trevor,
Personally, thats not normal, in my opinion. Here is what I would suggest...this is just my guess, as I dont know anything about your environment, apart from what you mentioned here. Can you tell which rules have highest hit number? Can you disable logging for those rules and see the results after policy push?
Andy
As mentioned previously, a good majority of logs are generated just on our cleanup rule. Yesterday, I changed the cleanup rules so that traffic from the Internet to our internal networks would be dropped but not logged, and our final cleanup rule now is only traffic from internal going to the Internet being dropped and logged. I've kind of been running it in this mode before. Today (half way through the day) we've now only generated 23GB of logs. So, approximately 46GB of logs will be generated today, which I still consider a lot, but far better than 85-100GB a day.
Will not logging Internet inbound drops affect anything? I'm not sure. From a troubleshooting standpoint, I'm mostly concerned with traffic going out. From a security standpoint, I don't know if not logging this traffic affects any of our reports. That is, would SmartEvent not be able to detect things like ping sweeps from outside, etc. or do we even care if the traffic is getting dropped. That is, should I be more concerned about what is getting in from the Internet that is unwanted than worrying about what's beating at our door but can't get in?
Not logging inbound drops won't impact your environment, but interested in what your internet bandwidth usage looks like starting on Jan 13th to see if there is any correlation between firewall traffic and increased bandwidth utilization on your internet circuits. I would personally start with tracking down whom are the largest talkers in/out of the environment to understand the traffic flow/patterns. From that point I think you can follow other contributors ideas as it relates to NULL routes, Geo Policy, etc.
You can also review the following to limit traffic.
Advanced Track options will increase the log file size.
Detailed Log and Extended Log are only available if one or more of these Blades are enabled on the Layer: Applications & URL Filtering, Content Awareness, or Mobile Access.
Log Generation you have the ability to limit size by doing per session instead of the default per connection.
Also, since you have a date I would review all changes associated with the firewall policy to see if any type of rules/configuration item changed that has caused this increase in log file size generation.
We do have some of our outbound web rules that are set for Extended Logs. We wanted to be able to capture URLs that users are going to as we get the occasional request from managers, etc. as to what sites their users are browsing. I'm not certain how to provide that data as we're not running an internal proxy for them to use. (Perhaps something we should look into). Most rules however are set to Log only.
We also are coming from migrating from older versions of Checkpoint over several years and our Access Control policy contains multiple layers that include App and URL filtering. Initially, the security layer was just firewall but we've been trying to move some of what we did in the application layer into the security layer now that we're on more current versions of Checkpoint (R81.10).
I've looked at changing some rules to Session logs only, but I'm not a fan of them because I lose out on seeing any NAT information in them which at times is crucial for troubleshooting. That leaves us with doing per Connection logs on many of those rules.
Do you employ any upstream filtering at your edge routers e.g.
* Bogon filters
* Null routing unused / dormant public facing subnets
* Geo blocking
I've reached out to the networking team, but my guess is no on all accounts. I had to look into what bogon filters were. Just based on our logs when searching for Address Spoofing as well as some non-private address ranges, I really don't see any high number of logs generated, but I didn't go through the full bogon list either.
As for geo blocking, we're just doing that today on the Checkpoint gateways. In some cases, we don't even log the drop. So I don't know if we're gaining a lot from a logging perspective by filtering sooner.
@Trevor_Bruss did you ever get to the bottom of
this?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 13 | |
| 9 | |
| 8 | |
| 8 | |
| 8 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY