<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Mode, a new way of searching through your security policy in R80.10 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3815#M101699</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please help me where exactly filter option exist in API tools, i searched through it, but I could not found it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Sep 2017 17:08:54 GMT</pubDate>
    <dc:creator>kishore_lal</dc:creator>
    <dc:date>2017-09-11T17:08:54Z</dc:date>
    <item>
      <title>Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3810#M101694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;R80.10 introduces a new feature called Packet Mode. This is a search mode that searches through a security policy as if a packet is traveling through it. Take a look at this video and see how this can help you in your daily tasks working with R80.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/videos/5447"&gt; Video Link : 5447 &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know what other topics you would like to see addressed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jun 2017 05:57:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3810#M101694</guid>
      <dc:creator>Dutch_Arling</dc:creator>
      <dc:date>2017-06-28T05:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3811#M101695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Awesome video!! &amp;nbsp;thx&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" class="jive-link-profile-small jive_macro jive_macro_user" href="https://community.checkpoint.com/people/jfiscfae7bf2f-78ab-4b00-a9b4-a6d6e32e4ab8"&gt;Jony Fischbein&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jun 2017 07:11:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3811#M101695</guid>
      <dc:creator>Moti</dc:creator>
      <dc:date>2017-06-28T07:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3812#M101696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Didn't know about this. Thanks for sharing.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jun 2017 09:26:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3812#M101696</guid>
      <dc:creator>Pedro_Madeira</dc:creator>
      <dc:date>2017-06-29T09:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3813#M101697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you export the access-rules after filtering with packet mode ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Aug 2017 13:04:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3813#M101697</guid>
      <dc:creator>SD_Networking</dc:creator>
      <dc:date>2017-08-18T13:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3814#M101698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;API tools should assist for this. use the "filter"&amp;nbsp;and "filter-settings" parameters to perform packet mode search. then export the results to desired files.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-access-rulebase~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-access-rulebase~v1.1"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Aug 2017 07:57:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3814#M101698</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2017-08-20T07:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3815#M101699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please help me where exactly filter option exist in API tools, i searched through it, but I could not found it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Sep 2017 17:08:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3815#M101699</guid>
      <dc:creator>kishore_lal</dc:creator>
      <dc:date>2017-09-11T17:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3816#M101700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the following reference page should show you the command "show access-rulebase":&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#gui-cli/show-access-rulebase~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#gui-cli/show-access-rulebase~v1.1"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it demonstrates running it with packet mode filter:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58473_packet.png" style="width: 620px; height: 309px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Sep 2017 17:58:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3816#M101700</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2017-09-11T17:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3817#M101701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tomer,&lt;/P&gt;&lt;P&gt;This link was incredibly helpful but I think I found a bug. When I run packet mode in the console I get the expected result. But when I run through the API it seems like the object ANY has the same uid as several services including http, dns, ftp, icmp, and probably more. So when I do the API call with packet mode, if I have dns, http, https, ftp, etc in the service column it will match ANY service and return the associated rule which is not correct. It works in the console which is the perplexing part. Any ideas??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 16:49:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3817#M101701</guid>
      <dc:creator>Kris_Meldrum</dc:creator>
      <dc:date>2018-08-01T16:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3818#M101702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How are you doing the API call?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 17:04:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3818#M101702</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-01T17:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3819#M101703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So far just using either the CLI or with the API interface in the console. No external tools yet...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 17:07:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3819#M101703</guid>
      <dc:creator>Kris_Meldrum</dc:creator>
      <dc:date>2018-08-01T17:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3820#M101704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok then example CLI command you're using with the different results &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 17:25:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3820#M101704</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-01T17:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3821#M101705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SmartDashboard:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67759" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67759_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So upon closer inspection they're not all the same uid, just very close. But not sure why rule 4 shows up as a possible in CLI vs in UI&lt;/P&gt;&lt;P&gt;You'll also notice at the bottom that it is showing it matched on two rules for the same filter, the other being rule 4. Snip with rule 4 below included so you can see there is no https in the service column&lt;/P&gt;&lt;P&gt;CLI:&lt;/P&gt;&lt;P&gt;&amp;gt; show access-rulebase name network filter "src:10.0.0.1 dst:192.168.137.5 svc:443" filter-settings.search-mode packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;uid: "8a5e96fb-c793-457f-b78f-c667074223a5"&lt;/P&gt;&lt;P&gt;name: "Network"&lt;/P&gt;&lt;P&gt;rulebase:&lt;/P&gt;&lt;P&gt;- uid: "14568d6e-eb4d-4f84-9bca-0ebe438c67e6"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "access-rule"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "SMC User"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "domain"&lt;/P&gt;&lt;P&gt;&amp;nbsp; rule-number: 4&lt;/P&gt;&lt;P&gt;&amp;nbsp; filter-match-details:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - column: "source"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; objects:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - "432f5a1a-1eb0-45cd-b860-261c984e377d"&lt;/P&gt;&lt;P&gt;&amp;nbsp; track:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; type: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; per-session: false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; per-connection: true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; accounting: false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert: "none"&lt;/P&gt;&lt;P&gt;&amp;nbsp; source:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "432f5a1a-1eb0-45cd-b860-261c984e377d"&lt;/P&gt;&lt;P&gt;&amp;nbsp; source-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="background: yellow;"&gt;- "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; service:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="background: yellow;"&gt;- "97aeb3d0-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;&amp;nbsp; - "97aeb406-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;&amp;nbsp; - "97aeb46b-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;&amp;nbsp; - "97aeb470-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; vpn:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; action: "6c488338-8eec-4103-ad21-cd461ac2c472"&lt;/P&gt;&lt;P&gt;&amp;nbsp; action-settings:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; enable-identity-captive-portal: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; content:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; content-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; content-direction: "any"&lt;/P&gt;&lt;P&gt;&amp;nbsp; time:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; custom-fields:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; field-1: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; field-2: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; field-3: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp; meta-info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; lock: "unlocked"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; validation-state: "ok"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; last-modify-time:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; posix: 1533138381161&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iso-8601: "2018-08-01T08:46-0700"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; last-modifier: "admin"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; creation-time:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; posix: 1533138052702&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iso-8601: "2018-08-01T08:40-0700"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; creator: "admin"&lt;/P&gt;&lt;P&gt;&amp;nbsp; comments: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp; enabled: true&lt;/P&gt;&lt;P&gt;&amp;nbsp; install-on:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;/P&gt;&lt;P&gt;- uid: "0f62cb69-736a-4559-a6d0-a54048abb3eb"&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "Cleanup rule"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "access-rule"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "SMC User"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "domain"&lt;/P&gt;&lt;P&gt;&amp;nbsp; rule-number: 5&lt;/P&gt;&lt;P&gt;&amp;nbsp; filter-match-details:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - column: "source"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; objects:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; track:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; type: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; per-session: false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; per-connection: true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; accounting: false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert: "none"&lt;/P&gt;&lt;P&gt;&amp;nbsp; source:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; source-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; service:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; vpn:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; action: "6c488338-8eec-4103-ad21-cd461ac2c473"&lt;/P&gt;&lt;P&gt;&amp;nbsp; action-settings: {}&lt;/P&gt;&lt;P&gt;&amp;nbsp; content:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; content-negate: false&lt;/P&gt;&lt;P&gt;&amp;nbsp; content-direction: "any"&lt;/P&gt;&lt;P&gt;&amp;nbsp; time:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/P&gt;&lt;P&gt;&amp;nbsp; custom-fields:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; field-1: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; field-2: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; field-3: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp; meta-info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; lock: "unlocked"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; validation-state: "ok"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; last-modify-time:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; posix: 1533138382512&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iso-8601: "2018-08-01T08:46-0700"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; last-modifier: "admin"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; creation-time:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; posix: 1513308839753&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; iso-8601: "2017-12-14T19:33-0800"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; creator: "System"&lt;/P&gt;&lt;P&gt;&amp;nbsp; comments: ""&lt;/P&gt;&lt;P&gt;&amp;nbsp; enabled: true&lt;/P&gt;&lt;P&gt;&amp;nbsp; install-on:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;/P&gt;&lt;P&gt;objects-dictionary:&lt;/P&gt;&lt;P&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c472"&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "Accept"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "RulebaseAction"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;- uid: "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "Any"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "CpmiAnyObject"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;- uid: "97aeb46b-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "dns"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "service-group"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c473"&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "Drop"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "RulebaseAction"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;- uid: "97aeb406-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "echo-reply"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "service-icmp"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;- uid: "97aeb3d0-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "ftp"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "service-tcp"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;&amp;nbsp; port: "21"&lt;/P&gt;&lt;P&gt;- uid: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "Log"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "Track"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;- uid: "432f5a1a-1eb0-45cd-b860-261c984e377d"&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "LXXL-10.0.0.0_m8"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "network"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "SMC User"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "domain"&lt;/P&gt;&lt;P&gt;&amp;nbsp; subnet4: "10.0.0.0"&lt;/P&gt;&lt;P&gt;&amp;nbsp; mask-length4: 8&lt;/P&gt;&lt;P&gt;&amp;nbsp; subnet-mask: "255.0.0.0"&lt;/P&gt;&lt;P&gt;- &lt;SPAN style="background: yellow;"&gt;uid: "97aeb470-9aea-11d5-bd16-0090272ccb3&lt;/SPAN&gt;0"&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "ntp"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "service-group"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;/P&gt;&lt;P&gt;&amp;nbsp; name: "Policy Targets"&lt;/P&gt;&lt;P&gt;&amp;nbsp; type: "Global"&lt;/P&gt;&lt;P&gt;&amp;nbsp; domain:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name: "Check Point Data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-type: "data domain"&lt;/P&gt;&lt;P&gt;from: 1&lt;/P&gt;&lt;P&gt;to: 2&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;total: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;&lt;IMG __jive_id="67763" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67763_pastedImage_2.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 17:44:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3821#M101705</guid>
      <dc:creator>Kris_Meldrum</dc:creator>
      <dc:date>2018-08-01T17:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3822#M101706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SmartConsole UI search uses &lt;STRONG&gt;by default&lt;/STRONG&gt; an "AND" operator between the operands, while API uses an "OR" operator.&lt;/P&gt;&lt;P&gt;Therefore the mismatch between the results.&lt;/P&gt;&lt;P&gt;If you run API command with "AND" between the operands, you will get the same results.&lt;/P&gt;&lt;P&gt;We will fix the API documentation to state this fact clearly.&lt;/P&gt;&lt;P&gt;Robert.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2018 08:41:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3822#M101706</guid>
      <dc:creator>Robert_Decker</dc:creator>
      <dc:date>2018-08-02T08:41:05Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3823#M101707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Robert! That was the issue, definitely would be good to have the documentation reflect that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current document reads:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters."&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;The "&lt;SPAN&gt;exactly the same as it would be given in Smart Console" is what was throwing me off since I wasn't using any of the operators in the Console.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;Thanks again for the help!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2018 15:05:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/3823#M101707</guid>
      <dc:creator>Kris_Meldrum</dc:creator>
      <dc:date>2018-08-02T15:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/51838#M101708</link>
      <description>&lt;P&gt;Hi Dutch_Arling,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have problems, when working with NSX-Security-Groups:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;mode: Packet src:1.2.3.4 dst:4.3.2.1 svc:12345&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;does not match the corresponding security-group, even though destination 4.3.2.1 is included in &amp;lt;My_Sec_Group&amp;gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have to filter for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;mode: Packet src:1.2.3.4 dst:"My_Sec_Group" svc:12345&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;to find the corresponding rule.&lt;/P&gt;&lt;P&gt;The other way round (I search for a Group but have a rule with a fix IP) neither works.&lt;/P&gt;&lt;P&gt;Is there a fix on this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 12:55:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/51838#M101708</guid>
      <dc:creator>Linus_Espach</dc:creator>
      <dc:date>2019-04-25T12:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/164027#M101709</link>
      <description>&lt;P&gt;This is a somewhat old post, but this behaviour seems to still be the case in API 1.9 and the latest smart console. When using packet mode it doesn't include the data center objects. When using general, it will, but then rules with any won't show up in the results, so both situations won't reflect what will actually happen with the packet. I carefully looked through the API settings, but I can't get it to work. I could try to combine both results in my Checkpoint rule search webinterface, but I'm not sure what kind of trouble I'll then run into. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2022 20:33:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/164027#M101709</guid>
      <dc:creator>Niek-Vlessert</dc:creator>
      <dc:date>2022-12-02T20:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/164096#M101710</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I reproduced the issue in my lab and opened an issue for relevant R&amp;amp;D owner.&lt;/P&gt;
&lt;P&gt;Will monitor to see when it is fixed.&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Sun, 04 Dec 2022 17:27:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/164096#M101710</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2022-12-04T17:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/166372#M101711</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Any news from the developers? I can also start a ticket through our Diamond support contract, if it's useful. But I guess the missing data center objects in the results when using packet mode is simply a bug, the developer probably will see the need to fix this anyway. The missing any objects when not using packet mode and also not having the option to include them anyway is a weird missing feature to me, but I don't have the whole overview, maybe a performance thing.&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Fri, 30 Dec 2022 09:47:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/166372#M101711</guid>
      <dc:creator>Niek-Vlessert</dc:creator>
      <dc:date>2022-12-30T09:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/166412#M101712</link>
      <description>&lt;P&gt;Recommend opening a TAC case in parallel.&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/585"&gt;@Tal_Paz-Fridman&lt;/a&gt;&amp;nbsp;can you provide the bug ID you opened?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Dec 2022 16:54:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/166412#M101712</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-30T16:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Mode, a new way of searching through your security policy in R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/166421#M101713</link>
      <description>&lt;P&gt;&lt;A id="key-val" class="issue-link" href="https://jira-prd.checkpoint.com/browse/PMTR-89197" rel="1125401" data-issue-key="PMTR-89197" target="_blank"&gt;PMTR-89197&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/47537"&gt;@dovb&lt;/a&gt;&amp;nbsp;- can this be added to one of the upcoming JHFs?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Tal&lt;/P&gt;</description>
      <pubDate>Sat, 31 Dec 2022 11:42:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Mode-a-new-way-of-searching-through-your-security-policy/m-p/166421#M101713</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2022-12-31T11:42:12Z</dc:date>
    </item>
  </channel>
</rss>

