If you understand the inspection points in Check Point and can use FW Monitor to get the required logs/captures then you can read further on how how to analyze those logs. So to start off with, lets see what the different fields are in the above picture of a sample log from the console; Virtual Firewall System This […]Image may be NSFW.
Clik here to view.
Clik here to view.
