<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to get Rule based Zone/Interface details in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16903#M1138</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;For the following rulebase:&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74597_pastedImage_38.png" /&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;You get the following output from show access-rulebase (relevant bits bolded).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;As you can see:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class=""&gt;The UID for InternalZone and ExternalZone are listed in the source/destination of the rule.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;The UID for both InternalZone and ExternalZone also exist in the objects dictionary.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Just to make sure this wasn't unique to R80.20 (where I initially checked this), I also tested this in R80.10 in Demo Mode.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;STRONG&gt;show access-rulebase name "Test_Policy Network"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;uid: "e9aa723f-8a29-4f0e-91a5-e0372c270708"&lt;BR /&gt;name: "Test_Policy Network"&lt;BR /&gt;rulebase: &lt;BR /&gt;- uid: "0b453763-589b-41ea-a747-9d7685ea8388"&lt;BR /&gt; name: "Outbound Rule"&lt;BR /&gt; type: "access-rule"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;BR /&gt; rule-number: 1&lt;BR /&gt; track: &lt;BR /&gt; type: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;BR /&gt; per-session: false&lt;BR /&gt; per-connection: true&lt;BR /&gt; accounting: false&lt;BR /&gt; alert: "none"&lt;BR /&gt; &lt;STRONG&gt;source: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; - "e8131db2-8388-42a5-924a-82de32db20f7"&lt;/STRONG&gt;&lt;BR /&gt; source-negate: false&lt;BR /&gt; &lt;STRONG&gt;destination: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; - "237a4cbc-7fb6-4d50-872a-4904468271c4"&lt;/STRONG&gt;&lt;BR /&gt; destination-negate: false&lt;BR /&gt; service: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; service-negate: false&lt;BR /&gt; vpn: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; action: "6c488338-8eec-4103-ad21-cd461ac2c472"&lt;BR /&gt; action-settings: &lt;BR /&gt; enable-identity-captive-portal: false&lt;BR /&gt; content: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; content-negate: false&lt;BR /&gt; content-direction: "any"&lt;BR /&gt; time: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; custom-fields: &lt;BR /&gt; field-1: ""&lt;BR /&gt; field-2: ""&lt;BR /&gt; field-3: ""&lt;BR /&gt; meta-info: &lt;BR /&gt; lock: "unlocked"&lt;BR /&gt; validation-state: "ok"&lt;BR /&gt; last-modify-time: &lt;BR /&gt; posix: 1542387448601&lt;BR /&gt; iso-8601: "2018-11-16T18:57+0200"&lt;BR /&gt; last-modifier: "admin"&lt;BR /&gt; creation-time: &lt;BR /&gt; posix: 1542387423017&lt;BR /&gt; iso-8601: "2018-11-16T18:57+0200"&lt;BR /&gt; creator: "admin"&lt;BR /&gt; comments: ""&lt;BR /&gt; enabled: true&lt;BR /&gt; install-on: &lt;BR /&gt; - "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;BR /&gt;- uid: "99458043-2ec9-4e37-b43b-c8b83e9c9be2"&lt;BR /&gt; name: "Cleanup rule"&lt;BR /&gt; type: "access-rule"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;BR /&gt; rule-number: 2&lt;BR /&gt; track: &lt;BR /&gt; type: "29e53e3d-23bf-48fe-b6b1-d59bd88036f9"&lt;BR /&gt; per-session: false&lt;BR /&gt; per-connection: false&lt;BR /&gt; accounting: false&lt;BR /&gt; alert: "none"&lt;BR /&gt; source: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; source-negate: false&lt;BR /&gt; destination: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; destination-negate: false&lt;BR /&gt; service: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; service-negate: false&lt;BR /&gt; vpn: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; action: "6c488338-8eec-4103-ad21-cd461ac2c473"&lt;BR /&gt; action-settings: {}&lt;BR /&gt; content: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; content-negate: false&lt;BR /&gt; content-direction: "any"&lt;BR /&gt; time: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; custom-fields: &lt;BR /&gt; field-1: ""&lt;BR /&gt; field-2: ""&lt;BR /&gt; field-3: ""&lt;BR /&gt; meta-info: &lt;BR /&gt; lock: "unlocked"&lt;BR /&gt; validation-state: "ok"&lt;BR /&gt; last-modify-time: &lt;BR /&gt; posix: 1542387390812&lt;BR /&gt; iso-8601: "2018-11-16T18:56+0200"&lt;BR /&gt; last-modifier: "admin"&lt;BR /&gt; creation-time: &lt;BR /&gt; posix: 1542387390812&lt;BR /&gt; iso-8601: "2018-11-16T18:56+0200"&lt;BR /&gt; creator: "admin"&lt;BR /&gt; comments: ""&lt;BR /&gt; enabled: true&lt;BR /&gt; install-on: &lt;BR /&gt; - "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;BR /&gt;objects-dictionary: &lt;BR /&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c472"&lt;BR /&gt; name: "Accept"&lt;BR /&gt; type: "RulebaseAction"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "Any"&lt;BR /&gt; type: "CpmiAnyObject"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c473"&lt;BR /&gt; name: "Drop"&lt;BR /&gt; type: "RulebaseAction"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;&lt;STRONG&gt;- uid: "237a4cbc-7fb6-4d50-872a-4904468271c4"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "ExternalZone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; type: "security-zone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "Check Point Data"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain-type: "data domain"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;- uid: "e8131db2-8388-42a5-924a-82de32db20f7"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "InternalZone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; type: "security-zone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "Check Point Data"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain-type: "data domain"&lt;/STRONG&gt;&lt;BR /&gt;- uid: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;BR /&gt; name: "Log"&lt;BR /&gt; type: "Track"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "29e53e3d-23bf-48fe-b6b1-d59bd88036f9"&lt;BR /&gt; name: "None"&lt;BR /&gt; type: "Track"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;BR /&gt; name: "Policy Targets"&lt;BR /&gt; type: "Global"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;from: 1&lt;BR /&gt;to: 2&lt;BR /&gt;total: 2&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Nov 2018 17:02:21 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-11-16T17:02:21Z</dc:date>
    <item>
      <title>How to get Rule based Zone/Interface details</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16898#M1133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using "&lt;SPAN class=""&gt;show-access-rulebase&lt;/SPAN&gt;" API to get rule details, but the JSON output not contains rule vs Zone/Interface mapping details, but in the syslog contains accessed rule and interface details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to find out corresponding rule interface/zone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Veera&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 05:31:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16898#M1133</guid>
      <dc:creator>Veeraselvam_man</dc:creator>
      <dc:date>2018-11-16T05:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to get Rule based Zone/Interface details</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16899#M1134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What the API outputs as part of show-rulebase are the UIDs of&amp;nbsp;the objects in the rules.&lt;/P&gt;&lt;P&gt;An objects dictionary is also returned, which dereferences all the UIDs, including the zones.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 05:41:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16899#M1134</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T05:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to get Rule based Zone/Interface details</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16900#M1135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch-Abernathy&lt;/A&gt;‌:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Interface/zone UID objects are not available in the rulebase and objects dictionary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;In my test setup, i added below test rules:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="74582" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74582_ruleData.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the syslog print:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="74583" alt="" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74583_syslog.jpg" /&gt;&lt;/P&gt;&lt;P&gt;In this case "&lt;SPAN class=""&gt;show-access-rulebase&lt;/SPAN&gt;" output is not contains "eth0" interface details, How to get rule("allow rule") and interface ("eth0") mapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to configure source/destination interfaces in access rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 06:39:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16900#M1135</guid>
      <dc:creator>Veeraselvam_man</dc:creator>
      <dc:date>2018-11-16T06:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to get Rule based Zone/Interface details</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16901#M1136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interfaces cannot be configured as a source/destination in rules so it will never show as part of the rulebases.&lt;/P&gt;&lt;P&gt;The zones used in a rule most definitely show up in the object directory just like any other object.&lt;/P&gt;&lt;P&gt;Will post an example later.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 14:40:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16901#M1136</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T14:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to get Rule based Zone/Interface details</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16902#M1137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you &lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch-Abernathy&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 14:52:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16902#M1137</guid>
      <dc:creator>Veeraselvam_man</dc:creator>
      <dc:date>2018-11-16T14:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to get Rule based Zone/Interface details</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16903#M1138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;For the following rulebase:&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74597_pastedImage_38.png" /&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;You get the following output from show access-rulebase (relevant bits bolded).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;As you can see:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class=""&gt;The UID for InternalZone and ExternalZone are listed in the source/destination of the rule.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;The UID for both InternalZone and ExternalZone also exist in the objects dictionary.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Just to make sure this wasn't unique to R80.20 (where I initially checked this), I also tested this in R80.10 in Demo Mode.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;STRONG&gt;show access-rulebase name "Test_Policy Network"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;uid: "e9aa723f-8a29-4f0e-91a5-e0372c270708"&lt;BR /&gt;name: "Test_Policy Network"&lt;BR /&gt;rulebase: &lt;BR /&gt;- uid: "0b453763-589b-41ea-a747-9d7685ea8388"&lt;BR /&gt; name: "Outbound Rule"&lt;BR /&gt; type: "access-rule"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;BR /&gt; rule-number: 1&lt;BR /&gt; track: &lt;BR /&gt; type: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;BR /&gt; per-session: false&lt;BR /&gt; per-connection: true&lt;BR /&gt; accounting: false&lt;BR /&gt; alert: "none"&lt;BR /&gt; &lt;STRONG&gt;source: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; - "e8131db2-8388-42a5-924a-82de32db20f7"&lt;/STRONG&gt;&lt;BR /&gt; source-negate: false&lt;BR /&gt; &lt;STRONG&gt;destination: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; - "237a4cbc-7fb6-4d50-872a-4904468271c4"&lt;/STRONG&gt;&lt;BR /&gt; destination-negate: false&lt;BR /&gt; service: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; service-negate: false&lt;BR /&gt; vpn: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; action: "6c488338-8eec-4103-ad21-cd461ac2c472"&lt;BR /&gt; action-settings: &lt;BR /&gt; enable-identity-captive-portal: false&lt;BR /&gt; content: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; content-negate: false&lt;BR /&gt; content-direction: "any"&lt;BR /&gt; time: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; custom-fields: &lt;BR /&gt; field-1: ""&lt;BR /&gt; field-2: ""&lt;BR /&gt; field-3: ""&lt;BR /&gt; meta-info: &lt;BR /&gt; lock: "unlocked"&lt;BR /&gt; validation-state: "ok"&lt;BR /&gt; last-modify-time: &lt;BR /&gt; posix: 1542387448601&lt;BR /&gt; iso-8601: "2018-11-16T18:57+0200"&lt;BR /&gt; last-modifier: "admin"&lt;BR /&gt; creation-time: &lt;BR /&gt; posix: 1542387423017&lt;BR /&gt; iso-8601: "2018-11-16T18:57+0200"&lt;BR /&gt; creator: "admin"&lt;BR /&gt; comments: ""&lt;BR /&gt; enabled: true&lt;BR /&gt; install-on: &lt;BR /&gt; - "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;BR /&gt;- uid: "99458043-2ec9-4e37-b43b-c8b83e9c9be2"&lt;BR /&gt; name: "Cleanup rule"&lt;BR /&gt; type: "access-rule"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;BR /&gt; rule-number: 2&lt;BR /&gt; track: &lt;BR /&gt; type: "29e53e3d-23bf-48fe-b6b1-d59bd88036f9"&lt;BR /&gt; per-session: false&lt;BR /&gt; per-connection: false&lt;BR /&gt; accounting: false&lt;BR /&gt; alert: "none"&lt;BR /&gt; source: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; source-negate: false&lt;BR /&gt; destination: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; destination-negate: false&lt;BR /&gt; service: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; service-negate: false&lt;BR /&gt; vpn: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; action: "6c488338-8eec-4103-ad21-cd461ac2c473"&lt;BR /&gt; action-settings: {}&lt;BR /&gt; content: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; content-negate: false&lt;BR /&gt; content-direction: "any"&lt;BR /&gt; time: &lt;BR /&gt; - "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; custom-fields: &lt;BR /&gt; field-1: ""&lt;BR /&gt; field-2: ""&lt;BR /&gt; field-3: ""&lt;BR /&gt; meta-info: &lt;BR /&gt; lock: "unlocked"&lt;BR /&gt; validation-state: "ok"&lt;BR /&gt; last-modify-time: &lt;BR /&gt; posix: 1542387390812&lt;BR /&gt; iso-8601: "2018-11-16T18:56+0200"&lt;BR /&gt; last-modifier: "admin"&lt;BR /&gt; creation-time: &lt;BR /&gt; posix: 1542387390812&lt;BR /&gt; iso-8601: "2018-11-16T18:56+0200"&lt;BR /&gt; creator: "admin"&lt;BR /&gt; comments: ""&lt;BR /&gt; enabled: true&lt;BR /&gt; install-on: &lt;BR /&gt; - "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;BR /&gt;objects-dictionary: &lt;BR /&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c472"&lt;BR /&gt; name: "Accept"&lt;BR /&gt; type: "RulebaseAction"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "Any"&lt;BR /&gt; type: "CpmiAnyObject"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c473"&lt;BR /&gt; name: "Drop"&lt;BR /&gt; type: "RulebaseAction"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;&lt;STRONG&gt;- uid: "237a4cbc-7fb6-4d50-872a-4904468271c4"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "ExternalZone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; type: "security-zone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "Check Point Data"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain-type: "data domain"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;- uid: "e8131db2-8388-42a5-924a-82de32db20f7"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "InternalZone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; type: "security-zone"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; name: "Check Point Data"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; domain-type: "data domain"&lt;/STRONG&gt;&lt;BR /&gt;- uid: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;BR /&gt; name: "Log"&lt;BR /&gt; type: "Track"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "29e53e3d-23bf-48fe-b6b1-d59bd88036f9"&lt;BR /&gt; name: "None"&lt;BR /&gt; type: "Track"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;- uid: "6c488338-8eec-4103-ad21-cd461ac2c476"&lt;BR /&gt; name: "Policy Targets"&lt;BR /&gt; type: "Global"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;from: 1&lt;BR /&gt;to: 2&lt;BR /&gt;total: 2&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 17:02:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16903#M1138</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T17:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to get Rule based Zone/Interface details</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16904#M1139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh, I see the problem--your rule does not list &lt;EM&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;/EM&gt; zones as source or destinations.&lt;/P&gt;&lt;P&gt;As such, querying the rulebase will not give you this information.&lt;/P&gt;&lt;P&gt;Your best bet is to query the &lt;EM&gt;&lt;STRONG&gt;gateway&lt;/STRONG&gt;&lt;/EM&gt; that accepted the connection (by name or UID) using show simple-gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One potential issue I see is that you won't see the interface zone if you use the "default" zone for that interface (i.e. "According to topology"):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74600_pastedImage_6.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, you'll have to work it out from the interface topology which interfaces are InternalZone or ExternalZone.&lt;/P&gt;&lt;P&gt;In this case, it's eth0.&lt;/P&gt;&lt;P&gt;For others not marked as topology external, you can assume they are in the InternalZone if one is not listed.&lt;/P&gt;&lt;P&gt;In the case of eth2, I set an explicit zone for that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;STRONG&gt;show simple-gateway name Corporate-GW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;uid: "8c134e6d-7b92-4f6a-b572-a819905c1918"&lt;BR /&gt;name: "Corporate-GW"&lt;BR /&gt;type: "simple-gateway"&lt;BR /&gt;domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;BR /&gt;interfaces: &lt;BR /&gt;- name: "eth3"&lt;BR /&gt; ipv4-address: "198.51.100.8"&lt;BR /&gt; ipv4-network-mask: "255.255.255.0"&lt;BR /&gt; ipv4-mask-length: 24&lt;BR /&gt; ipv6-address: ""&lt;BR /&gt; topology: "internal"&lt;BR /&gt; topology-settings: &lt;BR /&gt; ip-address-behind-this-interface: "network defined by the interface ip and net mask"&lt;BR /&gt; interface-leads-to-dmz: false&lt;BR /&gt; anti-spoofing: false&lt;BR /&gt; security-zone: false&lt;BR /&gt;&lt;STRONG&gt;- name: "eth0"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv4-address: "198.51.100.5"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv4-network-mask: "255.255.255.0"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv4-mask-length: 24&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv6-address: ""&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; topology: "external"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; anti-spoofing: false&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-zone: false&lt;/STRONG&gt;&lt;BR /&gt;- name: "eth1"&lt;BR /&gt; ipv4-address: "198.51.100.6"&lt;BR /&gt; ipv4-network-mask: "255.255.255.0"&lt;BR /&gt; ipv4-mask-length: 24&lt;BR /&gt; ipv6-address: ""&lt;BR /&gt; topology: "internal"&lt;BR /&gt; topology-settings: &lt;BR /&gt; ip-address-behind-this-interface: "network defined by the interface ip and net mask"&lt;BR /&gt; interface-leads-to-dmz: false&lt;BR /&gt; anti-spoofing: false&lt;BR /&gt; security-zone: false&lt;BR /&gt;&lt;STRONG&gt;- name: "eth2"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv4-address: "198.51.100.7"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv4-network-mask: "255.255.255.0"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv4-mask-length: 24&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ipv6-address: ""&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; topology: "internal"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; topology-settings: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ip-address-behind-this-interface: "network defined by the interface ip and net mask"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; interface-leads-to-dmz: false&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; anti-spoofing: false&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-zone: true&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-zone-settings: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; auto-calculated: false&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; specific-zone: "DMZZone"&lt;/STRONG&gt;&lt;BR /&gt;ipv4-address: "198.51.100.4"&lt;BR /&gt;dynamic-ip: false&lt;BR /&gt;version: "R80"&lt;BR /&gt;os-name: "Gaia"&lt;BR /&gt;hardware: "21000 Appliances"&lt;BR /&gt;sic-name: ""&lt;BR /&gt;sic-state: "uninitialized"&lt;BR /&gt;firewall: true&lt;BR /&gt;firewall-settings: &lt;BR /&gt; auto-maximum-limit-for-concurrent-connections: true&lt;BR /&gt; maximum-limit-for-concurrent-connections: 25000&lt;BR /&gt; auto-calculate-connections-hash-table-size-and-memory-pool: true&lt;BR /&gt; connections-hash-size: 131072&lt;BR /&gt; memory-pool-size: 6&lt;BR /&gt; maximum-memory-pool-size: 30&lt;BR /&gt;vpn: true&lt;BR /&gt;vpn-settings: &lt;BR /&gt; maximum-concurrent-ike-negotiations: 1000&lt;BR /&gt; maximum-concurrent-tunnels: 10000&lt;BR /&gt;application-control: true&lt;BR /&gt;url-filtering: true&lt;BR /&gt;ips: true&lt;BR /&gt;content-awareness: true&lt;BR /&gt;anti-bot: true&lt;BR /&gt;anti-virus: true&lt;BR /&gt;threat-emulation: true&lt;BR /&gt;save-logs-locally: false&lt;BR /&gt;send-alerts-to-server: &lt;BR /&gt;- "mgmt"&lt;BR /&gt;send-logs-to-server: &lt;BR /&gt;- "mgmt"&lt;BR /&gt;send-logs-to-backup-server: []&lt;BR /&gt;logs-settings: &lt;BR /&gt; rotate-log-by-file-size: false&lt;BR /&gt; rotate-log-file-size-threshold: 1000&lt;BR /&gt; rotate-log-on-schedule: false&lt;BR /&gt; alert-when-free-disk-space-below-metrics: "mbytes"&lt;BR /&gt; alert-when-free-disk-space-below: true&lt;BR /&gt; alert-when-free-disk-space-below-threshold: 20&lt;BR /&gt; alert-when-free-disk-space-below-type: "popup alert"&lt;BR /&gt; delete-when-free-disk-space-below-metrics: "mbytes"&lt;BR /&gt; delete-when-free-disk-space-below: true&lt;BR /&gt; delete-when-free-disk-space-below-threshold: 5000&lt;BR /&gt; before-delete-keep-logs-from-the-last-days: false&lt;BR /&gt; before-delete-keep-logs-from-the-last-days-threshold: 0&lt;BR /&gt; before-delete-run-script: false&lt;BR /&gt; before-delete-run-script-command: ""&lt;BR /&gt; stop-logging-when-free-disk-space-below-metrics: "mbytes"&lt;BR /&gt; stop-logging-when-free-disk-space-below: true&lt;BR /&gt; stop-logging-when-free-disk-space-below-threshold: 100&lt;BR /&gt; reject-connections-when-free-disk-space-below-threshold: false&lt;BR /&gt; reserve-for-packet-capture-metrics: "mbytes"&lt;BR /&gt; reserve-for-packet-capture-threshold: 500&lt;BR /&gt; delete-index-files-when-index-size-above-metrics: "mbytes"&lt;BR /&gt; delete-index-files-when-index-size-above: false&lt;BR /&gt; delete-index-files-when-index-size-above-threshold: 100000&lt;BR /&gt; delete-index-files-older-than-days: false&lt;BR /&gt; delete-index-files-older-than-days-threshold: 14&lt;BR /&gt; forward-logs-to-log-server: false&lt;BR /&gt; perform-log-rotate-before-log-forwarding: false&lt;BR /&gt; update-account-log-every: 3600&lt;BR /&gt; detect-new-citrix-ica-application-names: false&lt;BR /&gt; turn-on-qos-logging: true&lt;BR /&gt;groups: []&lt;BR /&gt;comments: ""&lt;BR /&gt;color: "black"&lt;BR /&gt;icon: "NetworkObjects/gateway"&lt;BR /&gt;tags: []&lt;BR /&gt;meta-info: &lt;BR /&gt; lock: "unlocked"&lt;BR /&gt; validation-state: "ok"&lt;BR /&gt; last-modify-time: &lt;BR /&gt; posix: 1542390183151&lt;BR /&gt; iso-8601: "2018-11-16T19:43+0200"&lt;BR /&gt; last-modifier: "admin"&lt;BR /&gt; creation-time: &lt;BR /&gt; posix: 1460464877124&lt;BR /&gt; iso-8601: "2016-04-12T15:41+0300"&lt;BR /&gt; creator: "admin"&lt;BR /&gt;read-only: false&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 17:57:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-get-Rule-based-Zone-Interface-details/m-p/16904#M1139</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T17:57:07Z</dc:date>
    </item>
  </channel>
</rss>

