<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logexporter Inline Layer filtering in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/162544#M70568</link>
    <description>&lt;P&gt;Okay got it now: Seems like the filter logic stops at the first matching field name. Because some of the fields are "reused" (layer_name for example), second field never matches. I checked that out with some of the fields that are used twice (layer_uuid, layer_name).&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2022-11-19T14:09:10.667206+01:00 192.168.1.11 time=1668863346|hostname=mgmt|product=Firewall|layer_name=gw1_policy Network|layer_name=Internet_Layer|layer_uuid=bdb7fd2d-1aa3-4b26-bc34-dec23ec0f56d|layer_uuid=b137cd6e-2d76-4a00-9c64-9e51941d6df5|match_id=7|match_id=33554436|parent_rule=0|parent_rule=7|rule_action=Inline|rule_action=Accept|rule_name=Internet|rule_name=Ping|rule_uid=cecf9f41-ae8f-4148-ad88-0350fe0d644e|rule_uid=fae758eb-85d2-43f9-8c50-c57a56286959|action=Accept|ifdir=inbound|ifname=eth2|logid=0|loguid={0x25131dc9,0x6ae54246,0x3980fb28,0x758bd658}|origin=192.168.1.1|originsicname=CN\=gw1,O\=mgmt..j9f8c7|sequencenum=1|time=1668863346|version=5|dst=1.1.1.1|icmp=Echo Request|icmp_code=0|icmp_type=8|nat_addtnl_rulenum=0|nat_rule_uid=e4feb9d1-a96b-4e73-bc17-611cf578a499|nat_rulenum=3|proto=1|service_id=icmp-proto|src=192.168.3.102|xlatedport=0|xlatedst=0.0.0.0|xlatesport=0|xlatesrc=192.168.4.1&lt;/LI-CODE&gt;&lt;P&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If I filter on inline policy parent rule name (field name="rule_name" +&amp;nbsp;&lt;SPAN&gt;value "Internet")&amp;nbsp;&lt;/SPAN&gt;instead of inline policy layer name, filtering works as expected because parent rule name occurs before inline policy rule name.&lt;/P&gt;&lt;P&gt;Will check that in production but in my lab setup, it works.&lt;/P&gt;</description>
    <pubDate>Sat, 19 Nov 2022 13:52:06 GMT</pubDate>
    <dc:creator>dj0Nz</dc:creator>
    <dc:date>2022-11-19T13:52:06Z</dc:date>
    <item>
      <title>Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161221#M70561</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I implemented log exporter with version 81.10 management at a customer site. All working perfectly execpt one thing: We wanted to filter based on Inline Layer names so only logs from a specific sub policy get exported. Working with a "rule_name" works well but the "layer_name" filter doesn't seem to work.&lt;/P&gt;&lt;P&gt;If I have a look at the unfiltered exported logs, it seems like the "layer_name" field occurs twice: One for the network layer and one for the inline layer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone has been successfully configured inline policy name filtering and has some hints for me?&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 10:41:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161221#M70561</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2022-11-04T10:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161275#M70562</link>
      <description>&lt;P&gt;What is your precise filter configuration?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 17:36:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161275#M70562</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-04T17:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161283#M70563</link>
      <description>&lt;P&gt;It's just a simple test configuration in a vmware lab:&lt;/P&gt;&lt;P&gt;&amp;lt;filters&amp;gt;&lt;BR /&gt;&amp;lt;filterGroup operator="and"&amp;gt;&lt;BR /&gt;&amp;lt;field name="action" operator="and"&amp;gt;&lt;BR /&gt;&amp;lt;/field&amp;gt;&lt;BR /&gt;&amp;lt;field name="origin" operator="and"&amp;gt;&lt;BR /&gt;&amp;lt;value operation="eq"&amp;gt;192.168.1.1&amp;lt;/value&amp;gt;&lt;BR /&gt;&amp;lt;/field&amp;gt;&lt;BR /&gt;&amp;lt;field name="product" operator="and"&amp;gt;&lt;BR /&gt;&amp;lt;/field&amp;gt;&lt;BR /&gt;&amp;lt;field name="layer_name" operator="and"&amp;gt;&lt;BR /&gt;&amp;lt;value operation="eq"&amp;gt;Internet_Layer&amp;lt;/value&amp;gt;&lt;BR /&gt;&amp;lt;/field&amp;gt;&lt;BR /&gt;&amp;lt;/filterGroup&amp;gt;&lt;BR /&gt;&amp;lt;/filters&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The policy is like&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18319iE9C8BE83C30C0997/image-size/large?v=v2&amp;amp;px=999" role="button" title="policy.PNG" alt="policy.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also simple. Just a test.&lt;/P&gt;&lt;P&gt;The thing is: Before, I had a test policy without inline policy layers. There, I was able to filter by "rule_name". Then, I redefined the policy using inline layers (because that's the case I have with the current customer).&lt;/P&gt;&lt;P&gt;This is a log entry I had on the syslog server before (with a "standard" policy):&lt;/P&gt;&lt;P&gt;Nov 3 18:10:14 192.168.1.11 time=1667495411|hostname=mgmt|product=Firewall|layer_name=gw1_policy Network|layer_name=Internet_Layer|layer_uuid=bdb7fd2d-1aa3-4b26-bc34-dec23ec0f56d|layer_uuid=b137cd6e-2d76-4a00-9c64-9e51941d6df5|match_id=4|match_id=33554433|parent_rule=0|parent_rule=4|rule_action=Inline|rule_action=Accept|rule_name=Internet|rule_name=Internet|rule_uid=cecf9f41-ae8f-4148-ad88-0350fe0d644e|rule_uid=fa880521-bf5a-44ba-96f9-52fa8e6f67c3|action=Accept|ifdir=inbound|ifname=eth2|logid=0|loguid={0xcc68996a,0x9fba251a,0x54ca8851,0x1e3a7415}|origin=192.168.1.1|originsicname=CN\=gw1,O\=mgmt..j9f8c7|sequencenum=2|time=1667495411|version=5|dst=84.16.76.218|inzone=Internal|nat_addtnl_rulenum=0|nat_rule_uid=e4feb9d1-a96b-4e73-bc17-611cf578a499|nat_rulenum=2|outzone=External|proto=6|s_port=57608|service=443|service_id=https|src=192.168.3.111|xlatedport=0|xlatedst=0.0.0.0|xlatesport=43416|xlatesrc=192.168.178.11&lt;/P&gt;&lt;P&gt;(I use splunk format here)&lt;/P&gt;&lt;P&gt;After changing to inline layer policies, it seems like only the origin filter is working. Neither layer_name nor rule_name does anything. I just get no logs at all.&lt;/P&gt;&lt;P&gt;I have the strong feeling I just missed an important piece of configuration here... &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;(BTW: I didn't touch fields configuration)&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 20:31:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161283#M70563</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2022-11-04T20:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161284#M70564</link>
      <description>&lt;P&gt;Okay the log entry is with inline layer but only origin filter. But I had logs before with a simple policy and just rule_name filter. Maybe it's a problem that the "layer_name" occurs twice? But why doesn't the "rule_name" filter work any more with inline policy?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 20:37:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161284#M70564</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2022-11-04T20:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161290#M70565</link>
      <description>&lt;P&gt;I could be wrong when I say this, but not sure if it works based on below from the log exporter sk. Maybe worth checking with TAC.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;CODE&gt;cp_log_export set name &amp;lt;target-name&amp;gt; filter-action-in "accept,drop"&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Only logs with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;action = "accept"&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;OR&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;action = "drop"&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are exported&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 05 Nov 2022 00:05:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161290#M70565</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-05T00:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161323#M70566</link>
      <description>&lt;P&gt;Thanks for your answer. But that's not the problem IMHO because logs get exported corretly if I only use the origin filter.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Nov 2022 14:40:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/161323#M70566</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2022-11-05T14:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/162117#M70567</link>
      <description>&lt;P&gt;Ok solved that: Will use a of Store-And-Forward server (rsyslog) to filter on inline layer names as long as this isn't working natively.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 12:02:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/162117#M70567</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2022-11-15T12:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Logexporter Inline Layer filtering</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/162544#M70568</link>
      <description>&lt;P&gt;Okay got it now: Seems like the filter logic stops at the first matching field name. Because some of the fields are "reused" (layer_name for example), second field never matches. I checked that out with some of the fields that are used twice (layer_uuid, layer_name).&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2022-11-19T14:09:10.667206+01:00 192.168.1.11 time=1668863346|hostname=mgmt|product=Firewall|layer_name=gw1_policy Network|layer_name=Internet_Layer|layer_uuid=bdb7fd2d-1aa3-4b26-bc34-dec23ec0f56d|layer_uuid=b137cd6e-2d76-4a00-9c64-9e51941d6df5|match_id=7|match_id=33554436|parent_rule=0|parent_rule=7|rule_action=Inline|rule_action=Accept|rule_name=Internet|rule_name=Ping|rule_uid=cecf9f41-ae8f-4148-ad88-0350fe0d644e|rule_uid=fae758eb-85d2-43f9-8c50-c57a56286959|action=Accept|ifdir=inbound|ifname=eth2|logid=0|loguid={0x25131dc9,0x6ae54246,0x3980fb28,0x758bd658}|origin=192.168.1.1|originsicname=CN\=gw1,O\=mgmt..j9f8c7|sequencenum=1|time=1668863346|version=5|dst=1.1.1.1|icmp=Echo Request|icmp_code=0|icmp_type=8|nat_addtnl_rulenum=0|nat_rule_uid=e4feb9d1-a96b-4e73-bc17-611cf578a499|nat_rulenum=3|proto=1|service_id=icmp-proto|src=192.168.3.102|xlatedport=0|xlatedst=0.0.0.0|xlatesport=0|xlatesrc=192.168.4.1&lt;/LI-CODE&gt;&lt;P&gt;&lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If I filter on inline policy parent rule name (field name="rule_name" +&amp;nbsp;&lt;SPAN&gt;value "Internet")&amp;nbsp;&lt;/SPAN&gt;instead of inline policy layer name, filtering works as expected because parent rule name occurs before inline policy rule name.&lt;/P&gt;&lt;P&gt;Will check that in production but in my lab setup, it works.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2022 13:52:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logexporter-Inline-Layer-filtering/m-p/162544#M70568</guid>
      <dc:creator>dj0Nz</dc:creator>
      <dc:date>2022-11-19T13:52:06Z</dc:date>
    </item>
  </channel>
</rss>

