Integration of Check Point Firewall events from external syslog forwarders
Check Point Firewall events can be forwarded from external sources, such as Splunk Forwarders, or other third-party syslog forwarders that send events to IBM QRadar.
When Check Point Firewall events are provided from external sources in syslog format, the events identify with the IP address in the syslog header. This identification causes events to identify incorrectly when they are processed with the standard syslog protocol. The syslog redirect protocol provides administrators a method to substitute an IP address from the event payload into the syslog header to correctly identify the event source.
To substitute an IP address, administrators must identify a common field from their Check Point
Firewall event payload that contains the proper IP address. For example, events from Splunk
Forwarders use orig=
in the event payload to identify the original IP address for
the Check Point firewall. The protocol substitutes in the proper IP address to ensure that the
device is properly identified in the log source. As Check Point Firewall events are forwarded, QRadar automatically discovers and
create new log sources for each unique IP address.
Substitutions are that are performed with regular expressions and can support either TCP or UDP syslog events. The protocol automatically configures iptables for the initial log source and port configuration. If an administrator decides to change the port assignment a Deploy Full Configuration is required to update the iptables configuration and use the new port assignment.