- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
cp_log_export on MDS R81.10 runs fine. Multiple instances and destinations based on customer.
However, just recognized that the 'origin' in the external logging system appears with IP address instead of hostname or FQDN.
Looking on the MDS log inside a certain domain with the command 'fw log', the hostname of the gateways is visible. So my assumption was that this hostname should also be visible as origin.
I could not find the correct filter/parameter in sk122323 .
b.t.w. The hostnames of the MDS's appear properly.
Any ideas ?
Thanks
Best Regards
Origin is logged as an IP address, not a name.
Which means that’s exactly how Log Exporter will see and export that field.
In fw log and in SmartView, the origin IP is getting resolved automatically to a name when viewed.
What you’re asking for is very likely an RFE.
For reference log field descriptions are detailed in sk144192.
Hi,
the desired fields are in sk144192. But they can't be edited.
You can get the information about the log fields in one of these files (do not edit them) on your Management Server:
Or does it mean it will be send out by the cp_log_exporter tool and the destination logging tool does not interpret it or in a wrong manner ?
Best Regards
What is the far end and what log format are you currently sending?
Some will have a specific parser or may require field mapping changes to achieve.
Hi,
not exactly sure what the underlying technology of the data-lake is (remote side).
CEF is the desired protocol of the datalake-team.
name: LOG1 domain-server: : DOM1
enabled: true
target-server: x.x.x.x
target-port: xxx
protocol: tcp
format: cef
read-mode: raw
export-attachment-ids: false
export-link: false
export-attachment-link: false
At the end I try to understand if CheckPoint sends the hostname.
Or if there is a parser issue on the remote side.
Thanks
Regards
Looking at my lab splunk environment (using SPLUNK format) here is a log I received. The origin is the main IP of the GW as listed in smart console. You could use the originsicname field for the GW name. Could also if you wanted parse it with a regex pattern, but depending on volume may add an extra bit of CPU to your log environment that may not be acceptable.
Thanks Joseph,
I made some tests on SmartCenter R81.10 HF78 to rule out the cef topic. Simple tcpdump on management station. Even with standard syslog, origin is always IP address.
Which is in my understanding contrary to the statement in sk144192.
origin Orig string Name of the first Security Gateway that reported this event Yes
origin_ip N/A ipaddr IP address of the Security Gateway that generated this log Yes
This files $RTDIR/log_exporter/conf/LogFields.xml shows:
<field>
<log_field>orig</log_field>
<display_name>Origin</display_name>
<lea_type>ipaddr</lea_type>
<family>Log Info</family>
<deafult_width></deafult_width>
<resolve_type>_V4</resolve_type>
<no_index></no_index>
<no_show></no_show>
<dns_resolving>true</dns_resolving>
</field>
<field>
<log_field>origin_sic_name</log_field>
<display_name>Origin SIC Name</display_name>
<lea_type>string_id</lea_type>
<family></family>
<deafult_width></deafult_width>
<resolve_type></resolve_type>
<no_index></no_index>
<no_show></no_show>
</field>
<field>
<log_field>originip</log_field>
<display_name>Origin IP</display_name>
<lea_type>ipaddr</lea_type>
<family></family>
<deafult_width></deafult_width>
<resolve_type></resolve_type>
<no_index></no_index>
<no_show></no_show>
<dns_resolving>true</dns_resolving>
</field>
Regarding SIC name proposal:
SIC name contains hostname of firewall and name of the 'initial management station'.
So, if you have a grown environment with old, migrated management stations, you will see a lot of old stuff.
And even with that, it shows hostname not FQDN.
CN\=fw1,O\=OLD-INITIAL-MANAGEMENTSTATAION.xyz.RANDOM
At the end, the question is.
Why is CheckPoint not sending 'origin'. Or how can I enable this feature.
Best Regards
Origin is logged as an IP address, not a name.
Which means that’s exactly how Log Exporter will see and export that field.
In fw log and in SmartView, the origin IP is getting resolved automatically to a name when viewed.
What you’re asking for is very likely an RFE.
Hi,
Thanks
Then I do not understand sk: sk144192
But in this case, I consider co create an RFE
Thanks, Regards
I can see where the SK mentions name in that field.
In which case, it might be bug and you will need to address it with the TAC.
FYI: TAC: not supported
RFE has been created
Thanks
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 13 | |
| 9 | |
| 8 | |
| 8 | |
| 8 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY