User guide
ManageEngine Firewall Analyzer :: User Guide 
209 
Zoho Corp. 
The difference between the two ways are:  
If you configure LEA connection, the logs will be collected automatically and processed 
by the Firewall Analyzer. Whereas, if you want import the logs, manual intervention is 
required. You need to export the syslogs in Check Point Management Station or from 
Check Point Smart Tracker UI and then manually import the syslog file in Firewall 
Analyzer. 
Configuring LEA Connection 
The following instructions will help you set up an authenticated or unauthenticated 
connection between Firewall Analyzer and the Check Point Management Server. For 
additional information please refer the Check Point documentation or contact Check Point 
technical support. 
For managing the LEA servers the configurations that needs to be done for the different 
check point firewalls are explained below: 
•  Setting up an Unauthenticated LEA Connection 
•  Setting up an Authenticated LEA Connection 
Setting up an Unauthenticated LEA Connection 
Follow the steps below to configure an unauthenticated connection from the Check Point 
Firewall: 
Carryout the configuration in the Check Point Firewall Management Station. 
1.  In the FWDIR\conf directory on the computer where the Check Point Management 
Server is installed, edit the fwopsec.conf file to include the following line: 
lea_server port 18184 
lea_server auth_port 0 
2.  Restart the firewall service 
[4.1] fwstop ; fwstart 
[NG] cpstop ; cpstart 
3.  Add a rule to the policy to allow the port defined above port 18184 (assuming 
default LEA connection port) from the Firewall Analyzer machine to the Check 
Point Management Server and vice versa.  
4.  Install the policy 
Adding to LEA Server Lists on Firewall Analyzer 
Once this unauthenticated LEA connection has been set up, follow the instructions for 
Adding an LEA Server to the Firewall Analyzer.  
If you are unable to view the Check Point Firewall reports refer the Trouble Shooting Tip.  
Setting up an Authenticated LEA Connection 
Follow the steps below to configure an authenticated connection from the Check Point 
Firewall: 
Carryout the configuration in the Check Point Firewall Management Station. 
1.  In the FWDIR\conf directory on the computer where the Check Point Management 
Server is installed, edit the fwopsec.conf file to include the following line: 










