• 网络与数据中心管理
  • 服务器与应用性能管理
  • IT服务管理
  • Windows AD域管理
  • 终端管理
  • IT安全
  • MSP
  • IT运维平台
 
 
应用性能管理(APM)
保证物理、虚拟、云环境的应用性能
 
 
简化终端设备管理
全面管控PC计算机、智能手机以及平板电脑,确保网络安全
 
 
IT运维外包服务工具
多租户模式,为您的客户提供更好的服务
IT运维管理平台
统一监控、集中运维
 

Check Point Firewall Log Analysis using LEA

Comprehensive Log Analysis & Reporting For Check Point Firewalls

Firewall Analyzer can analyze, report, and archive logs from your Check Point Firewalls (it also supports other firewalls). Firewall Analyzer has been OPSEC™ certified by Check Point and has joined the OPSEC Alliance.

You need to configure Check Point firewalls to support the Check Point logs. Firewall Analyzer supports log import from most versions and Log Extraction API (LEA) support for versions R54 and above. Firewall Analyzer lets you add LEA servers to establish connections and retrieve logs from Check Point firewalls. You can add as many LEA servers as needed, and set up authenticated or unauthenticated connections to retrieve firewall logs.

Firewall syslogs (Check Point logs) reveal a lot of information on the nature of traffic coming in and going out of the firewall, allows you to plan your bandwidth requirement based on the bandwidth usage across the firewalls. Analyzing these firewall traffic logs is vital to understanding network and bandwidth usage and plays an important role in business risk assessment. Firewall Analyzer (Check Point Log Analyzer) offers many features that help in collecting, analyzing and reporting on firewall logs.

Firewall Analyzer supports the following reports for Check Point firewall:

展开