<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange service match for firewall rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193097#M35855</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/49765"&gt;@Graham1&lt;/a&gt;&amp;nbsp;one simple question to start…. How about the policy install after adding the new rule, done ?&lt;/P&gt;</description>
    <pubDate>Tue, 19 Sep 2023 19:27:34 GMT</pubDate>
    <dc:creator>Wolfgang</dc:creator>
    <dc:date>2023-09-19T19:27:34Z</dc:date>
    <item>
      <title>Strange service match for firewall rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193090#M35854</link>
      <description>&lt;P&gt;I am witnessing a strange matching situation, and trying to find out if this is expected.&lt;BR /&gt;&lt;BR /&gt;We splitting our Servers to a new VLAN (long overdue and don't get me started).&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have created a new rule:&lt;BR /&gt;src: 10.95.20.0/24&lt;BR /&gt;dst: 10.95.0.0/20&lt;BR /&gt;svc: Active Directory Application&lt;BR /&gt;action: Accept&lt;BR /&gt;&lt;BR /&gt;This rule is just below:&lt;BR /&gt;src: 10.95.20.0/24&lt;BR /&gt;dst: 10.95.0.0/20&lt;BR /&gt;svc: (Negate) Active Directory Application&lt;BR /&gt;action: Accept&lt;BR /&gt;&lt;BR /&gt;I am find that the logs for rule 4 are matching for tcp/389, eventhough it should match rule 3.&lt;/P&gt;&lt;P&gt;fw up_execute src=10.95.20.20 ipp=6 dport=389 dst=10.95.0.71&lt;BR /&gt;Rulebase execution ended successfully.&lt;BR /&gt;Overall status:&lt;BR /&gt;----------------&lt;BR /&gt;Active clob mask: 2&lt;BR /&gt;Required clob mask: 2&lt;BR /&gt;Match status: POSSIBLE&lt;BR /&gt;Match action: Accept&lt;/P&gt;&lt;P&gt;Per Layer:&lt;BR /&gt;------------&lt;BR /&gt;Layer name: Std-EXTFW1 Network&lt;BR /&gt;Layer id: 0&lt;BR /&gt;Match status: POSSIBLE&lt;BR /&gt;Match action: Accept&lt;BR /&gt;Possible rules: 1 3 4 16777215&lt;BR /&gt;&lt;BR /&gt;The Active Directory Application object is using recommended Match Settings.&amp;nbsp; According to what I read in documentation, it should be working under rule 3.&lt;BR /&gt;&lt;BR /&gt;Am I missing something major?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 18:21:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193090#M35854</guid>
      <dc:creator>Graham1</dc:creator>
      <dc:date>2023-09-19T18:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Strange service match for firewall rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193097#M35855</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/49765"&gt;@Graham1&lt;/a&gt;&amp;nbsp;one simple question to start…. How about the policy install after adding the new rule, done ?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 19:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193097#M35855</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-09-19T19:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Strange service match for firewall rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193098#M35856</link>
      <description>&lt;P&gt;The Active Directory application requires more than one packet to match successfully.&lt;BR /&gt;Apparently, the relevant traffic isn't matching the signature, which is why it is falling through to the next rule.&lt;BR /&gt;To fully understand why, you would need to take packet captures and open a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;In this case, you should use the LDAP service (TCP 389), which will match on the first packet.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 19:27:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193098#M35856</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-19T19:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: Strange service match for firewall rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193100#M35861</link>
      <description>&lt;P&gt;My personal experience with fw up_execute command is, lets just put it bluntly, very inconsistent. I find it works properly MAYBE 50% of the time, so I would not rely on it too much.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do you see in the logs?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 19:43:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193100#M35861</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-19T19:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: Strange service match for firewall rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193105#M35862</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1447"&gt;@Wolfgang&lt;/a&gt;&amp;nbsp;Yes this policy is installed and active.&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;I have already tried support and their suggestion is to remove rule 4 since it is overlapping rule 3.&amp;nbsp; I just didn't think it should be "inconsistent" in the is way.&amp;nbsp; What you are saying does make sense however&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;The logs confirm what fw up_execute confirm what the logs are saying in that some packets are matched by rule 3 and other packets are match by rule 4.&amp;nbsp; all on tcp/389&lt;BR /&gt;&lt;BR /&gt;I guess my only re-course in the instance is to create a service group with the match services in the app object.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:09:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193105#M35862</guid>
      <dc:creator>Graham1</dc:creator>
      <dc:date>2023-09-19T20:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: Strange service match for firewall rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193107#M35863</link>
      <description>&lt;P&gt;I know sometimes disabling/re-enabling rule can also work, just remember to install policy after every change.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:11:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193107#M35863</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-19T20:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Strange service match for firewall rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193110#M35865</link>
      <description>&lt;P&gt;The rules don't overlap, the issue is the signature isn't matching everything for whatever reason.&lt;BR /&gt;Easiest way to resolve this is to use a group of simple TCP/UDP services instead of the Active Directory signature.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:25:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-service-match-for-firewall-rules/m-p/193110#M35865</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-19T20:25:22Z</dc:date>
    </item>
  </channel>
</rss>

