<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Asset &amp;amp; Anomaly Detection - APCL logging in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Asset-amp-Anomaly-Detection-APCL-logging/m-p/86481#M11188</link>
    <description>&lt;P&gt;Hey guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just need some tips in order to start with an IoT deployment.&lt;/P&gt;&lt;P&gt;I need to gain informations about network traffic/protocol and app that are used in a specific environment.&lt;/P&gt;&lt;P&gt;Traffic is passing through R80.20 cluster.&lt;/P&gt;&lt;P&gt;The goal is to provide a better security for network traffic related to&amp;nbsp;&lt;SPAN&gt;air conditioning systems/video surveillance systems.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tried first to enable an ordered layer to log the application traffic with a rule :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotazione 2020-05-27 150749.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6258i073DDE11ACD9C555/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotazione 2020-05-27 150749.png" alt="Annotazione 2020-05-27 150749.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For now it seems the firewall is only able to log "ICMP Proto" application.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I'm assuming the layer is working properly and the app control is working properly as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way do you have any idea/tips?&lt;/P&gt;&lt;P&gt;Do you think that an AAD Management on a dedicated machine will help?&lt;/P&gt;&lt;P&gt;I was trying to to imagine a scenario where we configure a span port on the core switch in order to forward the traffic to AAD.&lt;/P&gt;&lt;P&gt;Do you think is it possible and is it a good idea in order to gain visibility?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know guys I hope someone can share his experience in this area.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;D!Z&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 May 2020 13:16:54 GMT</pubDate>
    <dc:creator>TheRealDiZ</dc:creator>
    <dc:date>2020-05-27T13:16:54Z</dc:date>
    <item>
      <title>Asset &amp; Anomaly Detection - APCL logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Asset-amp-Anomaly-Detection-APCL-logging/m-p/86481#M11188</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just need some tips in order to start with an IoT deployment.&lt;/P&gt;&lt;P&gt;I need to gain informations about network traffic/protocol and app that are used in a specific environment.&lt;/P&gt;&lt;P&gt;Traffic is passing through R80.20 cluster.&lt;/P&gt;&lt;P&gt;The goal is to provide a better security for network traffic related to&amp;nbsp;&lt;SPAN&gt;air conditioning systems/video surveillance systems.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tried first to enable an ordered layer to log the application traffic with a rule :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotazione 2020-05-27 150749.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6258i073DDE11ACD9C555/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotazione 2020-05-27 150749.png" alt="Annotazione 2020-05-27 150749.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For now it seems the firewall is only able to log "ICMP Proto" application.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I'm assuming the layer is working properly and the app control is working properly as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way do you have any idea/tips?&lt;/P&gt;&lt;P&gt;Do you think that an AAD Management on a dedicated machine will help?&lt;/P&gt;&lt;P&gt;I was trying to to imagine a scenario where we configure a span port on the core switch in order to forward the traffic to AAD.&lt;/P&gt;&lt;P&gt;Do you think is it possible and is it a good idea in order to gain visibility?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know guys I hope someone can share his experience in this area.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;D!Z&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2020 13:16:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Asset-amp-Anomaly-Detection-APCL-logging/m-p/86481#M11188</guid>
      <dc:creator>TheRealDiZ</dc:creator>
      <dc:date>2020-05-27T13:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: Asset &amp; Anomaly Detection - APCL logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Asset-amp-Anomaly-Detection-APCL-logging/m-p/86488#M11189</link>
      <description>Unless you have the Log field set at Detailed or Extended, App Control won't be fully activated with that particular rule.&lt;BR /&gt;We have several integrations with AAD vendors that work on that same basic premise (they listen for types of traffic and they tag hosts via the IDA API).</description>
      <pubDate>Wed, 27 May 2020 13:54:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Asset-amp-Anomaly-Detection-APCL-logging/m-p/86488#M11189</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-27T13:54:06Z</dc:date>
    </item>
  </channel>
</rss>

