In R81 and lower versions, each Log Server Dedicated Check Point server that runs Check Point software to store and process logs. received a copy of every log. If one Log Server was disconnected, the Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. connected to the backup Log Server and sent it a copy of every log.
Starting in R81.10, with Dynamic Log Distribution, you can configure the Security Gateway / Cluster to distribute its logs between the active Log Servers.
If all the primary Log Servers are disconnected, logs are distributed between backup Log Servers.
If no Log Servers are connected, the Security Gateway / Cluster writes the logs locally.
Use Case - Log distribution reduces:
The high utilization of resources on the Log Servers.
The log traffic on each network that connects the Security Gateway / Cluster to its Log Server.
For more information, see Dynamic Log Distribution.