<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Smart Event Report Filter in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Smart-Event-Report-Filter/m-p/23479#M95582</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would a filter similar to below work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(src:internal_network NOT "IP Fragmentation") OR (NOT src:internal_network AND "IP Fragmentation")&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 May 2018 20:05:13 GMT</pubDate>
    <dc:creator>Matt_Ricketts</dc:creator>
    <dc:date>2018-05-11T20:05:13Z</dc:date>
    <item>
      <title>Smart Event Report Filter</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Smart-Event-Report-Filter/m-p/23477#M95580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;We are trying to generate the report where we can discard the specific event ( ip fragmentation) for internal lan ip but we need the event report (ip fragmentation) for other external ip (public IP). Is it possible? We tried with the filter option but all ip fragmentation event from report were excluded which was not the desire output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sagar Manandhar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 14:03:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Smart-Event-Report-Filter/m-p/23477#M95580</guid>
      <dc:creator>Sagar_Manandhar</dc:creator>
      <dc:date>2018-05-11T14:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Smart Event Report Filter</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Smart-Event-Report-Filter/m-p/23478#M95581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems like you should be able to filter this out.&lt;/P&gt;&lt;P&gt;What did your filter look like?&lt;/P&gt;&lt;P&gt;Screenshots helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 15:20:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Smart-Event-Report-Filter/m-p/23478#M95581</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-11T15:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: Smart Event Report Filter</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Smart-Event-Report-Filter/m-p/23479#M95582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would a filter similar to below work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(src:internal_network NOT "IP Fragmentation") OR (NOT src:internal_network AND "IP Fragmentation")&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 20:05:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Smart-Event-Report-Filter/m-p/23479#M95582</guid>
      <dc:creator>Matt_Ricketts</dc:creator>
      <dc:date>2018-05-11T20:05:13Z</dc:date>
    </item>
  </channel>
</rss>

