Skip to content

Commit 5a45e66

Browse files
committed
regenerate doc with latest code.
1 parent 35c7566 commit 5a45e66

File tree

3 files changed

+220
-124
lines changed

3 files changed

+220
-124
lines changed

packages/checkpoint/_dev/build/docs/README.md

Lines changed: 110 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -2,122 +2,170 @@
22

33
## Overview
44

5-
The Check Point integration for Elastic enables you to collect and monitor network security events, firewall traffic, and audit logs from Check Point Security Gateways and Management Servers. This integration facilitates centralized visibility into security policies, blocked connections, accepted connections, and VPN activity. By collecting and analyzing this data, you can enhance threat detection, incident response, and compliance auditing.
5+
The Check Point integration for Elastic collects logs from Check Point Security Gateways and Management Servers. This enables comprehensive security monitoring, threat detection, and network traffic analysis within the Elastic Stack. By ingesting Check Point logs, you can gain centralized visibility into firewall traffic, security policies, VPN activity, and system health to enhance your security posture.
6+
7+
This integration facilitates:
8+
- Centralized visibility into security policies, blocked connections, accepted connections, and VPN activity.
9+
- Compliance auditing and reporting by centralizing Check Point logs.
10+
- Enhanced threat detection and incident response capabilities through real-time log analysis.
11+
- Monitoring of system health and administrator actions on Check Point appliances.
612

713
### Compatibility
814

9-
This integration is compatible with Check Point Security Gateways and Management Servers running R80.x, R81, and R81.x versions. It requires Kibana version 8.11.0 or later, or 9.0.0 or later.
15+
This integration is compatible with Check Point Security Gateways and Management Servers running R80.x, R81, and R81.x versions.
16+
17+
This integration is compatible with Elastic Stack version 8.11.0 or higher.
1018

1119
### How it works
1220

13-
This integration collects logs from Check Point devices using two primary methods:
14-
- **Syslog (UDP/TCP)**: The Check Point Log Exporter forwards logs in Syslog format to the Elastic Agent.
15-
- **Log file**: The Elastic Agent directly monitors and collects logs from files on the Check Point appliance, such as system logs.
21+
This integration collects logs from Check Point devices by receiving syslog data over TCP or UDP, or by reading directly from log files. An Elastic Agent is deployed on a host that is configured as a syslog receiver or has access to the log files. The agent forwards the logs to your Elastic deployment, where they can be monitored and analyzed.
1622

1723
## What data does this integration collect?
1824

19-
The Check Point integration collects the following types of data:
20-
* Check Point Security Gateway and Management Server logs in Syslog format (firewall connections, VPN, audit, system events).
21-
* Check Point firewall connection logs (accept, drop, reject, etc.).
22-
* VPN logs.
23-
* SmartConsole audit logs (administrator actions on the Management Server).
24-
* Gaia OS system-level logs (e.g., `/var/log/messages`, `/var/log/secure`, `/var/log/dmesg`) for appliance health and activity.
25+
The Check Point integration collects log messages of the following types:
26+
* Check Point Security Gateway and Management Server logs in Syslog format (firewall connections, VPN, audit, system events).
27+
* Check Point firewall connection logs (accept, drop, reject, etc.).
28+
* VPN logs.
29+
* SmartConsole audit logs (administrator actions on the Management Server).
30+
* Gaia OS system-level logs (e.g., `/var/log/messages`, `/var/log/secure`, `/var/log/dmesg`) for appliance health and activity.
2531

2632
### Supported use cases
2733

28-
- Gain centralized visibility into security policies, blocked connections, accepted connections, and VPN activity.
29-
- Facilitate compliance auditing and reporting by centralizing Check Point logs.
30-
- Enhance threat detection and incident response capabilities through real-time log analysis.
31-
- Monitor system health and administrator actions on Check Point appliances.
34+
- **Real-time Threat Detection**: Leverage Elastic SIEM to detect and respond to threats identified in firewall logs.
35+
- **Network Traffic Analysis**: Use Kibana dashboards to visualize and analyze network traffic patterns, helping to identify anomalies and optimize network performance.
36+
- **Compliance and Auditing**: Maintain a searchable, long-term archive of firewall logs to meet compliance requirements and conduct security audits.
37+
- **Incident Response**: Accelerate incident investigation by correlating firewall data with other security and observability data sources within Elastic.
3238

3339
## What do I need to use this integration?
3440

3541
### Vendor prerequisites
3642

37-
- Administrative access to Check Point SmartConsole.
38-
- SSH access to Check Point Security Gateways or Management Servers.
39-
- Knowledge of your Check Point environment, including IP addresses of Gateways/Management Servers.
40-
- Ensure network connectivity and open ports (e.g., UDP/TCP 514 or a custom port) between your Check Point devices and the Elastic Agent.
43+
- Administrative access to Check Point SmartConsole.
44+
- SSH access to Check Point Security Gateways or Management Servers (required for logfile collection and potentially for advanced troubleshooting).
45+
- Knowledge of your Check Point environment, including IP addresses of Gateways/Management Servers.
46+
- Ensure network connectivity and open ports (e.g., UDP/TCP 514 or a custom port) between your Check Point devices and the Elastic Agent acting as the log collector.
4147

4248
### Elastic prerequisites
4349

44-
- An active Elastic Stack deployment (Elasticsearch and Kibana) compatible with the integration.
45-
- An Elastic Agent deployed and enrolled in Fleet.
50+
- An active Elastic Stack deployment (Elasticsearch and Kibana) compatible with the integration (Kibana 8.11.0+ or 9.0.0+).
51+
- An Elastic Agent deployed and enrolled in Fleet, configured to receive logs from Check Point devices.
52+
- Network connectivity between the Elastic Agent and the Check Point devices.
4653

4754
## How do I deploy this integration?
4855

4956
### Agent-based deployment
5057

51-
Elastic Agent must be installed to stream data from the syslog or log file receiver and ship it to Elastic. For more details, check the Elastic Agent [installation instructions](https://www.elastic.co/guide/en/fleet/current/install-elastic-agents.html).
58+
Elastic Agent must be installed on a host that will act as the syslog or log file receiver. For more details, check the Elastic Agent [installation instructions](https://www.elastic.co/guide/en/fleet/current/install-elastic-agents.html). You can install only one Elastic Agent per host.
5259

53-
### Onboard / configure
60+
Elastic Agent is required to stream data from the syslog or log file receiver and ship the data to Elastic, where the events will then be processed via the integration's ingest pipelines.
5461

55-
#### Vendor set up steps
62+
### Set up steps in Check Point
5663

57-
##### For UDP/TCP (Syslog) Collection:
64+
#### For UDP/TCP (Syslog) Collection:
5865

5966
1. **Configure Log Exporter in SmartConsole:**
60-
* For each Check Point device, create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C_____2) in Check Point SmartConsole.
61-
* Navigate to **Objects > More object types > Server > Log Exporter/SIEM**.
62-
* Set the **Target Server** to the IP address of your Elastic Agent.
63-
* Specify the **Target Port** (e.g., `9001`).
64-
* Select the **Protocol** (**UDP** or **TCP**).
65-
* Choose the **Format** as **Syslog**.
67+
- For each Check Point Security Gateway or Management Server you wish to monitor, create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C%5F%5F%5F%5F%5F2) in Check Point SmartConsole.
68+
- Navigate to **Objects > More object types > Server > Log Exporter/SIEM**.
69+
- **Name:** Provide a descriptive name for the Log Exporter (e.g., `Elastic_Agent_Syslog_Export`).
70+
- **Target Server:** Set this to the IP address or hostname of your log collector (e.g., Elastic Agent).
71+
- **Target Port:** Specify the port number on which your log collector is listening (e.g., `514` for standard Syslog UDP/TCP, or a custom port like `9001` as often used by Elastic Agent).
72+
- **Protocol:** Select either **UDP** or **TCP**. The Check Point integration supports both.
73+
- **Format:** Choose **Syslog**.
74+
- **Export additional log fields:** (Optional) Select any additional fields you wish to export.
75+
- **Filter (Optional):** Define a filter if you only want to send specific log types or severities.
76+
- Click **OK** to save the Log Exporter configuration.
6677
2. **Install Policy:**
67-
* Install the updated policy on the relevant Security Gateways or Management Server.
78+
- After configuring the Log Exporter, install the updated policy on the relevant Security Gateways or Management Server for the changes to take effect.
6879

69-
##### For Logfile Collection:
80+
#### For Logfile Collection:
7081

7182
1. **Access the Check Point Appliance:**
72-
* Connect to the Check Point device via SSH.
83+
- Connect to the Check Point Security Gateway or Management Server via SSH.
7384
2. **Identify Log File Locations:**
74-
* System logs are typically in `/var/log/` (e.g., `/var/log/messages`, `/var/log/secure`).
75-
* Management Server audit logs can be found in `$FWDIR/log/cpm.elg`.
76-
77-
#### Kibana set up steps
78-
79-
1. In Kibana, navigate to **Integrations** > **Check Point**.
80-
2. Click **Add Check Point**.
81-
3. Add the integration to an Elastic Agent policy.
82-
4. Configure the input type:
83-
* **For UDP/TCP (Syslog)**: Select the **Collect Check Point firewall logs (input: tcp)** or **(input: udp)**. Specify the `Syslog Host` and `Syslog Port` to match the Log Exporter configuration.
84-
* **For Logfile Collection**: Select the **Collect Check Point firewall logs (input: logfile)**. Provide the `Paths` to the log files.
85-
5. Save the integration.
86-
87-
### Validation
85+
- **Gaia OS System Logs:** Standard Linux system logs are located in `/var/log/`. These include:
86+
- `/var/log/messages`: General system messages.
87+
- `/var/log/secure`: Authentication and authorization messages.
88+
- `/var/log/dmesg`: Kernel ring buffer messages.
89+
- **Management Server Logs:**
90+
- `$FWDIR/log/cpm.elg`: For SmartConsole audit events, which can be useful for auditing administrator actions.
91+
3. **Configure your Log Collector:**
92+
- Point your log file collector (Elastic Agent) to the desired log file paths on the Check Point appliance. Ensure the collector has appropriate permissions to read these files.
93+
- **Important:** For proprietary binary logs (e.g., `$FWDIR/log/fw.log`), a generic log collector will not be able to parse the content effectively. If security events are required, use the Log Exporter (Syslog) method. For standard text-based system logs (e.g., `/var/log/messages`), direct collection is viable.
94+
95+
### Set up steps in Kibana
96+
97+
1. In Kibana, navigate to **Management > Integrations**.
98+
2. Search for "Check Point" and select the integration.
99+
3. Click **Add Check Point**.
100+
4. Follow the prompts to add the integration to an existing Elastic Agent policy or create a new one.
101+
5. Configure the input types based on your vendor setup:
102+
- **For UDP/TCP (Syslog)**:
103+
- Select **Collect Check Point firewall logs (input: tcp)** or **(input: udp)**.
104+
- Specify the `Syslog Host` (IP address of the Elastic Agent where logs will be received).
105+
- Specify the `Syslog Port` (e.g., `9001` or `514`), ensuring it matches the `Target Port` configured in your Check Point Log Exporter.
106+
- **For Logfile Collection**:
107+
- Select **Collect Check Point firewall logs (input: logfile)**.
108+
- Provide the `Paths` to the desired log files on the Check Point appliance (e.g., `/var/log/messages`, `$FWDIR/log/cpm.elg`).
109+
6. Save the integration. The Elastic Agent will automatically update its configuration and begin ingesting data.
110+
111+
### Validation Steps
112+
113+
After configuring both the Check Point Log Exporter and the Elastic Agent integration:
88114

89115
1. **Trigger Data Flow on Check Point:**
90-
* Generate network traffic to create firewall logs.
91-
* Perform an action in SmartConsole to generate audit logs.
116+
- **For firewall logs**: On a Check Point Security Gateway, generate some network traffic to ensure firewall logs are generated.
117+
- **For audit logs**: Perform an action in SmartConsole to generate audit logs on the Management Server.
118+
- **For system logs**: Log in/out of the Check Point appliance via SSH or perform routine system commands.
92119
2. **Check Data in Kibana:**
93-
* Navigate to **Discover** and select the `checkpoint.firewall` data view.
94-
* Verify that logs are being ingested and parsed correctly.
95-
* Explore the provided Check Point dashboards.
120+
- Navigate to **Discover** in Kibana.
121+
- Filter by `data_stream.dataset : checkpoint.firewall`.
122+
- Verify that logs are being ingested and parsed correctly, looking for recent timestamps.
123+
- Explore the provided Check Point dashboards (e.g., Overview, Addresses and Ports) to see if data populates as expected.
96124

97125
## Troubleshooting
98126

99-
- **No data in Kibana**: Verify network connectivity between the Check Point device and the Elastic Agent. Ensure the Log Exporter policy is installed and the port/IP settings match in both configurations.
100-
- **Parsing issues**: Ensure the format in the Log Exporter is set to `Syslog`.
101-
- **Fingerprint collisions**: In some instances firewall events may have the same Checkpoint `loguid` and arrive during the same timestamp resulting in a fingerprint collision. To avoid this [enable semi-unified logging](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Appendix.htm?TocPath=Log%20Exporter%7C_____9) in the Checkpoint dashboard.
127+
### Common Configuration Issues
128+
129+
- **No data collected in Kibana**:
130+
- **Network Connectivity**: Verify network connectivity between your Check Point device and the Elastic Agent. Check any intermediate firewalls or security groups that might block Syslog traffic.
131+
- **Policy Installation**: Ensure the Log Exporter policy has been successfully installed on the relevant Check Point Security Gateway or Management Server.
132+
- **Port/IP Mismatch**: Double-check that the `Target Server` IP and `Target Port` in SmartConsole's Log Exporter match the `Syslog Host` and `Syslog Port` in the Elastic Agent integration.
133+
- **Elastic Agent Status**: Confirm the Elastic Agent is running and healthy. Check its logs for any errors related to input listeners.
134+
- **Logfile Permissions**: For logfile collection, ensure the Elastic Agent has appropriate read permissions on the specified log file paths.
135+
- **Data collected, but parsing issues or missing fields**:
136+
- **Syslog Format**: Ensure the `Format` in Check Point Log Exporter is explicitly set to `Syslog`.
137+
- **Input Type Mismatch**: Verify that the correct input type (UDP, TCP, or Logfile) is selected and configured in the Elastic Agent integration.
102138

103-
For additional help, check the [Common problems](https://www.elastic.co/guide/en/fleet/current/troubleshooting.html) documentation.
139+
### Ingestion Errors
104140

105-
## Scaling
141+
- Check the Elastic Agent logs for any specific error messages related to log processing, parsing failures, or communication with Elasticsearch.
142+
- In Kibana Discover, look for documents with an `error.message` field, which can indicate issues during ingestion or processing.
143+
- In some instances, firewall events may have the same Checkpoint `loguid` and arrive at the same timestamp, resulting in a fingerprint collision. To avoid this, [enable semi-unified logging](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Appendix.htm?TocPath=Log%20Exporter%7C_____9) in the Checkpoint dashboard.
106144

107-
For high-volume environments, consider deploying multiple Elastic Agents to distribute the log collection load. Refer to Check Point's documentation for sizing guidelines. For more information on scaling, see the [Ingest Architectures](https://www.elastic.co/guide/en/ingest/current/ingest-reference-architectures.html) documentation.
145+
### Vendor Resources
146+
147+
- [Check Point R81 Logging and Monitoring Administration Guide - Log Exporter Configuration](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C%5F%5F%5F%5F%5F2)
148+
- [Check Point sk122323: R80.x / R81.x Log Exporter command line utility](https://support.checkpoint.com/results/sk/sk122323)
149+
150+
## Performance and scaling
151+
152+
For high-volume environments, consider deploying multiple Elastic Agents to distribute the log collection load. Check Point's Log Exporter allows for flexible log forwarding, including the ability to send logs to multiple targets, enabling distributed log collection setups.
153+
154+
For more information on architectures that can be used for scaling this integration, check the [Ingest Architectures](https://www.elastic.co/docs/manage-data/ingest/ingest-reference-architectures) documentation.
108155

109156
## Reference
110157

111158
### firewall
112159

113-
The `firewall` data stream collects log entries from the Check Point Log Exporter in Syslog format.
160+
The `firewall` data stream provides events from Check Point devices, including firewall traffic, VPN logs, audit logs, and system events.
114161

115162
#### firewall fields
116163

117164
{{ fields "firewall" }}
118165

166+
#### firewall sample event
167+
119168
{{ event "firewall" }}
120169

121170
### Inputs used
122-
123-
{{ inputDocs }}
171+
{{ inputDocs }}

0 commit comments

Comments
 (0)