<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to filter traffic log by using CLI ? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23996#M89593</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found the way filtering log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;expert mode&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clish -c "fw log -n -p" | grep 'src: 1.2.3.4;.*dst: 2.3.4.5;.*sport_svc: 443;'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but I have a question about this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@gw-18ee86:0]# clish -c "fw log -n -p" | grep 'src: 172.31.6.61;.*dst: 61.219.11.151.*sport_svc: 443;'&lt;BR /&gt; 10:19:30 5 N/A 1 drop 172.31.6.61 &amp;lt; eth0 LogId: 1; ContextNum: &amp;lt;max_null&amp;gt;; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; HighLevelLogKey: 18446744073709551615; TCP packet out of state: First packet isn't SYN; tcp_flags: FIN-PUSH-ACK; src: 172.31.6.61; dst: 61.219.11.151; proto: tcp; ProductName: VPN-1 &amp;amp; FireWall-1; svc: 64006; sport_svc: 443; ProductFamily: Network;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this result, svc is source and sport_svc is dest ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or is it the opposite???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Jan 2019 05:32:24 GMT</pubDate>
    <dc:creator>yongjun_jin</dc:creator>
    <dc:date>2019-01-14T05:32:24Z</dc:date>
    <item>
      <title>how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23994#M89591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello. I would like to find specific traffic log by using CLI ( for example src IP, dst IP, dst Port, time...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found command 'fw log' but I can't use filter.&lt;/P&gt;&lt;P&gt;( also I have to use AND condition)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to use grep command and pipe command. It did not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;EM&gt;gw-18ee86&amp;gt; fw log -n -h&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Missing origin&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Usage:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;fw log [-f|-t] [-x start_pos] [-y end_pos] [-z] [-n] [-p] [-l] [-o] [-g] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-k (alert_type|all)] [-a] [-u unification_scheme_file] [-m (initial|semi|raw)] [logfile]&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;-f - Only in case of active log file - Upon reaching end of file, wait for new records and print them as well.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-t - Same as -f flag, only start at end of file.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-x - Start printing at the specified position.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-y - End printing at the specified position.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-z - Continue printing the next records, in case of an error. Default is to stop printing&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-n - No IP resolving. Default is to resolve all IPs.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-p - No port resolving. Default is to resolve all ports.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-q - Show log header fields names.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-i - Show log Uid.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-l - Show date and time per log record. Default is to show the date above the relevant records, and then the time per log record.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-o - Show detailed log chains - all the log segments a log record consists of.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-g - Not delimited style. Default is ':' after field name and ';' after field value.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-c - Selection by action, e.g., accept, drop, reject, etc.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-h - Selection by origin, given as IP or name.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-s - Selection by start time. See format below. All records after the given time will be selected.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-e - Selection by end time. See format below. All records before the given time will be selected.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-b - Selection by time range. See format below. Start and End time are expected after the flag.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-k - Selection by specific alert type. Default is 'all' for any alert type.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-a - Select account records only. Default is print all records.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-u - Unification scheme file name. Default is log_unification_scheme.C.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-m - Unification mode: initial-order, semi-unified, or raw. Default is 'initial'.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logfile - Log file name. Default is the active log file, fw.log.&lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use AWS Instance(R80.10) standalone model.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2019 03:07:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23994#M89591</guid>
      <dc:creator>yongjun_jin</dc:creator>
      <dc:date>2019-01-14T03:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23995#M89592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fw log only looks at one log file at a time (the current log).&lt;/P&gt;&lt;P&gt;In R80.x, the firewall log is automatically rotated at midnight, so at most you'll see up to the last 24 hours.&lt;/P&gt;&lt;P&gt;You can have fw log read previous logs but only one log at a time can be examined.&lt;/P&gt;&lt;P&gt;Also, the -h option is meant to read logs from a different host, which is not applicable in your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fw log offers no search capabilities.&lt;/P&gt;&lt;P&gt;You would have to pipe the output thru grep or some other tool capable of searching the output.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2019 04:07:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23995#M89592</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-14T04:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23996#M89593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found the way filtering log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;expert mode&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clish -c "fw log -n -p" | grep 'src: 1.2.3.4;.*dst: 2.3.4.5;.*sport_svc: 443;'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but I have a question about this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@gw-18ee86:0]# clish -c "fw log -n -p" | grep 'src: 172.31.6.61;.*dst: 61.219.11.151.*sport_svc: 443;'&lt;BR /&gt; 10:19:30 5 N/A 1 drop 172.31.6.61 &amp;lt; eth0 LogId: 1; ContextNum: &amp;lt;max_null&amp;gt;; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; HighLevelLogKey: 18446744073709551615; TCP packet out of state: First packet isn't SYN; tcp_flags: FIN-PUSH-ACK; src: 172.31.6.61; dst: 61.219.11.151; proto: tcp; ProductName: VPN-1 &amp;amp; FireWall-1; svc: 64006; sport_svc: 443; ProductFamily: Network;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this result, svc is source and sport_svc is dest ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or is it the opposite???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2019 05:32:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23996#M89593</guid>
      <dc:creator>yongjun_jin</dc:creator>
      <dc:date>2019-01-14T05:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23997#M89594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sport = source port&lt;/P&gt;&lt;P&gt;dport = destination port&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2019 09:23:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23997#M89594</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-01-14T09:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23998#M89595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;[Expert@gw-18ee86:0]# clish -c "fw log -n -p" | grep 'src: 172.31.6.61;.*dst: 61.219.11.151.*sport_svc: 443;'&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #ffffff;" /&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;10:19:30 5 N/A 1 drop 172.31.6.61 &amp;lt; eth0 LogId: 1; ContextNum: &amp;lt;max_null&amp;gt;; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; HighLevelLogKey: 18446744073709551615; TCP packet out of state: First packet isn't SYN; tcp_flags: FIN-PUSH-ACK; src: 172.31.6.61; dst: 61.219.11.151; proto: tcp; ProductName: VPN-1 &amp;amp; FireWall-1; svc: 64006; sport_svc: 443; ProductFamily: Network;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Hi Danny Jung.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;I know sport means source port and dport means destination port.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;but this log only show svc and sport_svc(estimated to be a port)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know why this log doesn't have dport.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess One of them is the destination port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2019 06:47:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23998#M89595</guid>
      <dc:creator>yongjun_jin</dc:creator>
      <dc:date>2019-01-15T06:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23999#M89596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;svc is "service" I.e. Destination port. In some cases it will not be a numeric value but rather a name.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2019 13:38:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/23999#M89596</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-15T13:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/24000#M89597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one more question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found that drop log have src, dst, srv but accpet log only have ruleId.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can I get same thing(src, dst, srv) from accept log ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[Expert@gw-18ee86:0]# fw log -n -p -c drop&lt;/P&gt;&lt;P&gt;14:45:45 5 N/A 1 drop 172.31.6.61 &amp;gt; eth0 LogId: 1; ContextNum: &amp;lt;max_null&amp;gt;; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; HighLevelLogKey: 18446744073709551615; TCP packet out of state: First packet isn't SYN; tcp_flags: RST; src: 101.109.41.74; dst: 172.31.6.61; proto: tcp; ProductName: VPN-1 &amp;amp; FireWall-1; svc: 1433; sport_svc: 45194; ProductFamily: Network;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@gw-18ee86:0]# fw log -n -p -c accept&lt;BR /&gt; Date: Jan 16, 2019&lt;BR /&gt; 8:07:08 5 N/A 1 accept 172.31.6.61 &amp;gt; N/A LogId: &amp;lt;max_null&amp;gt;; ContextNum: &amp;lt;max_null&amp;gt;; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; OriginSicName: cn=cp_mgmt,o=gw-18ee86..hu5ufg; HighLevelLogKey: 18446744073709551615; rule_guid: {4A3B1474-A403-4742-893D-E501A5C5C5B0}; hit: 3; policy: fw1; first_hit_time: 1547593568; last_hit_time: 1547593621; log_id: 10; ProductName: VPN-1 &amp;amp; FireWall-1; ProductFamily: Network;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2019 06:05:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/24000#M89597</guid>
      <dc:creator>yongjun_jin</dc:creator>
      <dc:date>2019-01-16T06:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: how to filter traffic log by using CLI ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/24001#M89598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At least on R80.20, I appear to be getting the desired information with the same command line.&lt;/P&gt;&lt;P&gt;That said, I am not checking on a standalone box in AWS, but rather a management station I'm running in VMware.&lt;/P&gt;&lt;P&gt;Perhaps there is something in the rule--can you post a screenshot of the rule that is supposedly accepting this traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2019 14:58:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-filter-traffic-log-by-using-CLI/m-p/24001#M89598</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-16T14:58:37Z</dc:date>
    </item>
  </channel>
</rss>

