<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Command to identify the non-standard ports in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134524#M20168</link>
    <description>&lt;P&gt;No problem, I will check a bit later and see if anything comes up.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Fri, 19 Nov 2021 16:23:42 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2021-11-19T16:23:42Z</dc:date>
    <item>
      <title>Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134510#M20160</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;It will be appreciated, if could help me with command to show the service usage. example, Need to verify the port 23 or port 80 is used in policy or not.&amp;nbsp; Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 14:45:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134510#M20160</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-11-19T14:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134513#M20161</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 397px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14323i7F7231781C70279D/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 15:07:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134513#M20161</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2021-11-19T15:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134515#M20162</link>
      <description>&lt;P&gt;I think what Danny gave you works, but as far as actual shell command for this, not sure if that exists though...maybe someone else can confirm.&lt;/P&gt;
&lt;P&gt;You can always do something like netstat -an | grep "port number"...for example netstat -an | grep "443", but mind you thats only for 1 port...not sure if there is a flag you can use for group of ports.&lt;/P&gt;
&lt;P&gt;I tried netstat -an | grep "1-700", but nothing came up, so guess that does not work. I will play around and update you.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 15:26:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134515#M20162</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-19T15:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134522#M20166</link>
      <description>&lt;P&gt;Hi Danny,&lt;/P&gt;&lt;P&gt;thank you for your update. I am looking in CLI format. I have tried the command -&amp;nbsp;mgmt_cli show service-tcp name "telnet" but actually it did not tell whether telnet service is used in policy or not.&lt;/P&gt;&lt;P&gt;Once again thank you for your reply.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:20:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134522#M20166</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-11-19T16:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134523#M20167</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;, thank you for your response. Kindly let me know your update. Thank you once again.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:22:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134523#M20167</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-11-19T16:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134524#M20168</link>
      <description>&lt;P&gt;No problem, I will check a bit later and see if anything comes up.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:23:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134524#M20168</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-19T16:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134550#M20173</link>
      <description>&lt;P&gt;You can use “where-used” to determine if it’s in use anywhere but you have to parse the results as it will include all policy packages.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 22:40:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134550#M20173</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-19T22:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134552#M20175</link>
      <description>&lt;P&gt;Im sorry, I tried so many combinations on command like, but cant get one for range of ports with netstat. Not sure if thats even possible...&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 22:52:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134552#M20175</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-19T22:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134580#M20190</link>
      <description>&lt;P&gt;On the gateway from expert mode try &lt;STRONG&gt;fw up_execute ipp=6 dport=80&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Omitted parameters such as src,dst,sport are assumed to be Any.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 18:26:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134580#M20190</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-20T18:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134669#M20214</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;, thank you. let me try.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 15:57:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134669#M20214</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-11-22T15:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134670#M20215</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;, np. thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 15:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/134670#M20215</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-11-22T15:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136010#M20537</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;, Apologies for late response, It took sometime to build the lab. I have tried the option but I am ending with error below.&lt;/P&gt;&lt;P&gt;CP-MGMT&amp;gt; mgmt_cli show service-tcp name "telnet" where-used&lt;BR /&gt;MGMT9000 Error: The parameters of show-service-tcp command should be provided in pairs (key and value). You have provided an odd number of parameters which suggests that you are probably missing a parameter.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 14:20:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136010#M20537</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-12-10T14:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136011#M20538</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;, thank you for update and apologies for late response. I have tried but its not giving the exact result.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 14:24:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136011#M20538</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-12-10T14:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136014#M20539</link>
      <description>&lt;P&gt;This should work: &lt;STRONG&gt;where-used name telnet&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 14:51:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136014#M20539</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-12-10T14:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136017#M20541</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; Yes, thank you...&amp;nbsp; it wokred ...&lt;/P&gt;&lt;P&gt;mgmt_cli where-used name "telnet" --format json&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 15:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136017#M20541</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-12-10T15:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136036#M20545</link>
      <description>&lt;P&gt;Note that this only tells you where the object named "telnet" is used. If somebody set up a separate service object and named it "elnet-tay", then gave that object TCP port 23 and used it in a rule, 'where-used name telnet' would not find it.&amp;nbsp;You should dump all the service-tcp and service-udp objects, filter them for the ports you care about (careful with port ranges!), then use 'where-used' on those.&lt;/P&gt;
&lt;P&gt;And of course, none of this will tell you about rules with the service set to "Any".&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 19:18:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136036#M20545</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-12-10T19:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136133#M20568</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;, Thank you for the update, I will try it.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 07:39:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/136133#M20568</guid>
      <dc:creator>Logesh_Kumar_Ma</dc:creator>
      <dc:date>2021-12-13T07:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/188615#M34723</link>
      <description>&lt;P&gt;Hello, my friend.&lt;/P&gt;
&lt;P&gt;Taking advantage of this "discussion" from a couple of years ago.&lt;/P&gt;
&lt;P&gt;A doubt, based on the following image.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CH1.png" style="width: 975px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21967i1CA81687ABE194DB/image-size/large?v=v2&amp;amp;px=999" role="button" title="CH1.png" alt="CH1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;It means that this "box" where I am applying the command "netstat -an | ....", is "listening" on port 443, to any address in general, right?&lt;/P&gt;
&lt;P&gt;It can be either connections from the same LAN, or from the Internet, or am I wrong?&lt;BR /&gt;&lt;BR /&gt;Cheers. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 22:27:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/188615#M34723</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-08-03T22:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Command to identify the non-standard ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/188616#M34724</link>
      <description>&lt;P&gt;Its applicable regardless where traffic comes from.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 23:09:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Command-to-identify-the-non-standard-ports/m-p/188616#M34724</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-08-03T23:09:39Z</dc:date>
    </item>
  </channel>
</rss>

