Configuring Check Point Event Logging - Extreme Networks Summit WM20 User Manual

Version 4.2
Hide thumbs Also See for Summit WM20:
Table of Contents

Advertisement

Availability and Controller Functionality
3 To use Network Time Protocol, select the Use NTP radio button.
4 In the Use System TIme box, type the time setting using the mm-dd-yyyy hh:mm format.
5 In the Time Server 1 box, type the IP address or FQDN of a standard NTP Time Server. You can
repeat this step for the Time Server 2 and Time Server 3 boxes.
6 To apply your changes, click Apply.

Configuring Check Point Event Logging

The Summit WM Controller can forward specified event messages to an ELA server using the OPSEC
ELA protocol - Event Logging API (Application Program Interface). On the ELA server, the event
messages are tracked and analyzed, so suspicious messages can be forwarded to a firewall application
that can take corrective action.
Check Point created the OPSEC (Open Platform for Security) alliance program for security application
and appliance vendors to enable an open industry-wide framework for inter operability.
When ELA is enabled on the Summit WM Controller, it forwards the specified event messages from its
internal event server to the designated ELA Management Station on the enterprise network.
NOTE
Before you set up the Summit WM Controller, you must first create OPSEC objects for Summit WM Controller in the
Check Point management software. The name and password you define must also be entered into the Summit WM
Controller Check Point configuration screen.
160
Summit WM20 User Guide, Software Release 4.2

Advertisement

Table of Contents
loading

Table of Contents