<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to filter a established connection logs (request-reply) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236881#M45932</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I'm just deploy a new internal CP Firewall (to control traffic for Server Farm Zone). I'm creating the policy using logs in Firewall.&lt;/P&gt;&lt;P&gt;I to filter a log which established (Log at Session Start - Log at Session Start) connection like Palo Alto Firewall, to except incoming log which have no reply.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PaloAlto-SecurityRule-LogSettings-Highlight.png" style="width: 442px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29009i2CEEB1EF53DDFFFB/image-dimensions/442x221?v=v2" width="442" height="221" role="button" title="PaloAlto-SecurityRule-LogSettings-Highlight.png" alt="PaloAlto-SecurityRule-LogSettings-Highlight.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;(example: Server1 only port 3389 are listening, 443 not enable. User1 scan port 3389, 443 to Server1 =&amp;gt; only port 3389 reply, 443 will not reply =&amp;gt; I want to filter the log that 3389 request-reply)&lt;/P&gt;&lt;P&gt;I already choose Session at Action-Rules option, but it's still have a log session port 443 although 443 on server is not enable (user access to server:443 failed either)  &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg" style="width: 506px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29010iCE318DD6E1C790B3/image-dimensions/506x377?v=v2" width="506" height="377" role="button" title="z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg" alt="z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;A lot of logs port 443 have duration 3 hours:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg" style="width: 507px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29011i0AEC4B9876D64E6D/image-dimensions/507x389?v=v2" width="507" height="389" role="button" title="z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg" alt="z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Does anyone facing this problem before? Please help me.&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Best Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mk_83&lt;/P&gt;</description>
    <pubDate>Thu, 26 Dec 2024 11:15:18 GMT</pubDate>
    <dc:creator>Mk_83</dc:creator>
    <dc:date>2024-12-26T11:15:18Z</dc:date>
    <item>
      <title>How to filter a established connection logs (request-reply)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236881#M45932</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I'm just deploy a new internal CP Firewall (to control traffic for Server Farm Zone). I'm creating the policy using logs in Firewall.&lt;/P&gt;&lt;P&gt;I to filter a log which established (Log at Session Start - Log at Session Start) connection like Palo Alto Firewall, to except incoming log which have no reply.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PaloAlto-SecurityRule-LogSettings-Highlight.png" style="width: 442px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29009i2CEEB1EF53DDFFFB/image-dimensions/442x221?v=v2" width="442" height="221" role="button" title="PaloAlto-SecurityRule-LogSettings-Highlight.png" alt="PaloAlto-SecurityRule-LogSettings-Highlight.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;(example: Server1 only port 3389 are listening, 443 not enable. User1 scan port 3389, 443 to Server1 =&amp;gt; only port 3389 reply, 443 will not reply =&amp;gt; I want to filter the log that 3389 request-reply)&lt;/P&gt;&lt;P&gt;I already choose Session at Action-Rules option, but it's still have a log session port 443 although 443 on server is not enable (user access to server:443 failed either)  &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg" style="width: 506px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29010iCE318DD6E1C790B3/image-dimensions/506x377?v=v2" width="506" height="377" role="button" title="z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg" alt="z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;A lot of logs port 443 have duration 3 hours:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg" style="width: 507px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29011i0AEC4B9876D64E6D/image-dimensions/507x389?v=v2" width="507" height="389" role="button" title="z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg" alt="z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Does anyone facing this problem before? Please help me.&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Best Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mk_83&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 11:15:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236881#M45932</guid>
      <dc:creator>Mk_83</dc:creator>
      <dc:date>2024-12-26T11:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a established connection logs (request-reply)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236891#M45933</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Interesting, but the webserver can't cause this limit? I mean, the server closes the connection in every 3 hours.&lt;/P&gt;
&lt;P&gt;If you switch on "Accounting" in the log column, you will se more details. First try this.&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 16:01:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236891#M45933</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-26T16:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a established connection logs (request-reply)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236917#M45937</link>
      <description>&lt;P&gt;If I'm understanding you correctly, you only want to log TCP SYNs if and only if a SYN/ACK is received for that SYN?&lt;BR /&gt;As far as I know, this isn't possible.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 21:34:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236917#M45937</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-12-26T21:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a established connection logs (request-reply)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236935#M45939</link>
      <description>&lt;P&gt;Or other way around - log only connections for which the firewall recieved reply from the server.&lt;/P&gt;
&lt;P&gt;Interesting idea, since currently Check Point firewall is creating one log entry only for connection which has the same source port+source IP+protocol+destination port+destination IP and which is allowed by rulebase (or implied rules) while Track option in not "None".&lt;/P&gt;
&lt;P&gt;It is sometimes not clear from firewall logs if connection is properly working or not. You need to enable Accounting and open log entry to check statistics of sent/recieved packets. Or do live packet capture, or telnet from the firewall.&lt;/P&gt;
&lt;P&gt;Such a log feature will help firewall operators identify the problem much faster and speed up problem resolution.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 06:27:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/236935#M45939</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-12-27T06:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a established connection logs (request-reply)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/237005#M45954</link>
      <description>&lt;P&gt;A TCP SYN is sent from the client.&lt;BR /&gt;A TCP SYN/ACK is sent from the server (the response).&lt;BR /&gt;It's basically what was asked.&lt;/P&gt;
&lt;P&gt;We do offer TCP state logging, but it is not enabled by default:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk101221" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk101221&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;While we cannot log ONLY if a SYNACK is received, we can generate an additional log when it does with option 3: "When connection state changes"&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 22:00:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/237005#M45954</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-12-27T22:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter a established connection logs (request-reply)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/237068#M45989</link>
      <description>&lt;P&gt;Many thanks for your information.&amp;nbsp;&lt;BR /&gt;That actually my pain point. I will try the sk.&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Best Regards.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2024 17:15:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-filter-a-established-connection-logs-request-reply/m-p/237068#M45989</guid>
      <dc:creator>Mk_83</dc:creator>
      <dc:date>2024-12-28T17:15:22Z</dc:date>
    </item>
  </channel>
</rss>

