Mirror and Decrypt Logs
To Mirror and Decrypt the traffic, you create special rules in the Access Control Policy.
The Mirror and Decrypt feature adds the applicable information to the regular Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. logs.
To see the Mirror and Decrypt logs in SmartConsole:
Item |
Description |
|
---|---|---|
1 |
Connect with SmartConsole |
|
2 |
From the left navigation panel, click Logs & Monitor > Logs. |
|
3 |
In the search field, enter:
|
|
4 |
Double-click on the log and refer to the More section. |
The Mirror and Decrypt logs show this information in the More section > Mirror and Decrypt field:
Action |
Description |
---|---|
Mirror only |
Security Gateway / Cluster |
Decrypt and mirror |
Security Gateway / Cluster decrypted and mirrored the HTTP / HTTPS traffic Note - This can be the case even for a clear-text HTTP connection, because the HTTPS Inspection |
Partial mirroring (HTTPS inspection Bypass) |
Security Gateway / Cluster started to decrypt the traffic, but stopped later due to a Bypass rule Therefore, the mirrored connection is not complete. |