Configure Check Point Firewall to forward syslog to Radiant Security.
Overview
In this guide, you will create a new entry in the Check Point Log Exporter configuration. This is required in order to send Check Point Firewalls logs to Radiant Security with the use of an intermediary syslog relay server for additional security.
To do this, you’ll need to complete the following configuration steps:
- Add the data connector in Radiant Security
- Configure a local Radiant Security Syslog Collector
- Enable extended logging on policies and rules
- Configure syslog forwarding
Add the data connector in Radiant Security
First, you’ll add the Check Point Networks Firewall data connector in Radiant Security.
Configure a local Radiant Security Syslog Collector
Refer to the Deploy a Radiant Security Syslog Collector guide to set up a local Radiant Syslog Collector.
Enable extended logging on policies and rules
Before setting up the syslog forwarding, it's important to make sure the security policies and rules are configured to generate logs. To do so, enable the Track option and set it to Log, and when applicable, enable the Extended Log feature.
For more details on how to set up the tracking and logging options, refer to the Check Point documentation.
Configure syslog forwarding
By default, the log exporter module comes installed on R80.10 and later versions. If you are running a Check Point version older than R80.10, then you won't have access to the built-in Log Exporter feature and will have to forward the logs via OPSEC LEA.
If the Check Point gateways are managed by a central console, refer to the Centrally managed gateways section. If the gateways are individually managed, refer to the Individual gateways section.
Centrally managed gateways
If the Check Point gateways are managed by a central console, then complete the following steps:
- Connect to the SmartConsole using Administrator credentials.
- Go to Logs & Monitor and select Log Exporter under the Gateways tab.
- Click + Add Exporter to create a new log exporter.
- Enter the following parameters:
- Name:
RadiantSecurityForwarder
- Target Server:
- IPv4 Address:
<syslogCollectorIPAddress>
- Protocol:
TCP
- Port:
6514
- IPv4 Address:
- Format:
JSON
- Select
Show Obfuscated Fields
(if present) - Under Select Logs to Forward, select only
Security Logs
- Name:
- Click OK to save the configuration.
- Navigate to Gateways & Servers in SmartConsole.
- Select the gateway or cluster to configure and click Edit.
- Go to Logs > Log Export Settings.
- Under Log Exporter, select the previously created log exporter (e.g.,
RadiantSecurityForwarder
). - Click OK to save changes.
- Click Publish to confirm the changes.
- Navigate to Security Policies and click Install Policy to apply the configuration to the selected gateways.
Individual gateways
If the Check point gateways are individually managed, then complete the following steps:
- Access the gateway's WebUI using Administrator credentials.
- Navigate to Logs & Monitoring or System Logs (the naming varies based on firmware version).
- Locate the Log Exporter or Syslog configuration section.
- Click Add Syslog Server.
- Enter the following parameters:
- Name:
RadiantSecurityForwarder
- IPv4 Address:
<syslogCollectorIPAddress>
- Protocol:
TCP
- Port:
6514
- Format:
JSON
- Select
Show Obfuscated Fields
(if present) - Under Select Logs to Forward, select only
Security Logs
- Name:
- Click OK to save the configuration.
We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai
Last updated: 2024-12-27