<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FW object rule report in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26001#M1545</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Phan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately Web Virtualization Tool is not supported for R80 and above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Important Note: This solution refers for R77.x versions only. For R80 and higher use "Show Package Tool" described in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120342" target="_blank"&gt;sk120342&lt;/A&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And looking at the question Bill is already on R80.x&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Feb 2018 18:49:31 GMT</pubDate>
    <dc:creator>Astardzhiev</dc:creator>
    <dc:date>2018-02-01T18:49:31Z</dc:date>
    <item>
      <title>FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25994#M1538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are on R80.10 management station.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any one know of a way to get FW object information across our policies in a readable format?&amp;nbsp; The where used function works but it only lists out the rule number.&amp;nbsp; I guess we would like a more detailed version which spits out the groups the object is in and instead of the rule numbers it&amp;nbsp;lists out the actual rule (src, dst, service port), and on which policy the rule is in?&amp;nbsp; I've used '&lt;SPAN style="font-style: italic; background: white;"&gt;$MDS_FWDIR/scripts/web_api_show_package.sh'&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: white;"&gt; t&lt;/SPAN&gt;&lt;SPAN style="background: white;"&gt;o export policies but painstakingly do searches within each policy for the specific objects.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-style: italic; background: white;"&gt;Thanks in advance,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-style: italic; background: white;"&gt;Bill&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 19:15:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25994#M1538</guid>
      <dc:creator>Bill_Ng</dc:creator>
      <dc:date>2018-01-30T19:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25995#M1539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This kind of information can be obtained by combining several API commands and mining the required information.&lt;/P&gt;&lt;P&gt;First, you should use the "where-used" command to get the policy/rulebase information (uid is enough), and then use the "show-access-rule" command with that preliminary info to retrieve the specific details about the rule.&lt;/P&gt;&lt;P&gt;Robert.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 20:50:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25995#M1539</guid>
      <dc:creator>Robert_Decker</dc:creator>
      <dc:date>2018-01-30T20:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25996#M1540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tufin is the answer. It's simply awesome for stuff like that&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 06:12:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25996#M1540</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-01-31T06:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25997#M1541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tufin is a&amp;nbsp;good option with products on the shelf that cost.&lt;/P&gt;&lt;P&gt;We should provide here answers that are for free.&lt;/P&gt;&lt;P&gt;Robert.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 08:22:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25997#M1541</guid>
      <dc:creator>Robert_Decker</dc:creator>
      <dc:date>2018-01-31T08:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25998#M1542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was just pulling a small joke Robert&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 08:28:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25998#M1542</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-01-31T08:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25999#M1543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wow, we actually took it seriously.. lol.. Tufin is an excellent product and a great technology partner with Check Point.&amp;nbsp;But&amp;nbsp;if you are willing to customize and automate your Check Point Management workflow yourself using the Check Point Management API's we are here to help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 09:45:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/25999#M1543</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-01-31T09:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26000#M1544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may search&amp;nbsp;Web Visualization Tool then try it &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;It can list rules, objects (network and service), ... as the samples below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Rules" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62700_WVT1.PNG" style="width: 620px; height: 152px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Objects" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62701_WVT2.PNG" style="width: 620px; height: 138px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 00:55:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26000#M1544</guid>
      <dc:creator>Phan_Tuan_Loi</dc:creator>
      <dc:date>2018-02-01T00:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26001#M1545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Phan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately Web Virtualization Tool is not supported for R80 and above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Important Note: This solution refers for R77.x versions only. For R80 and higher use "Show Package Tool" described in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120342" target="_blank"&gt;sk120342&lt;/A&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And looking at the question Bill is already on R80.x&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 18:49:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26001#M1545</guid>
      <dc:creator>Astardzhiev</dc:creator>
      <dc:date>2018-02-01T18:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26002#M1546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Alexander for you comment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2018 01:10:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26002#M1546</guid>
      <dc:creator>Phan_Tuan_Loi</dc:creator>
      <dc:date>2018-02-02T01:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26003#M1547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for pointing me in the right direction.&amp;nbsp; We are in process of using powershell from the modules that tkoopman created to extract that info.&amp;nbsp; I found a guy on my team that's really good with Powershell.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2018 12:31:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26003#M1547</guid>
      <dc:creator>Bill_Ng</dc:creator>
      <dc:date>2018-02-02T12:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26004#M1548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to compare, attached below typical output of R8x show-package tool. As you can see, information&amp;nbsp;completely replaces the same functionality of R7x Web Visualization Tool.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="62805" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62805_show-package-rulebase.png" style="width: 620px; height: 347px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="62806" alt="" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62806_show-package-object.png" style="width: 620px; height: 329px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This thread however discusses how to get full rule information when searching for usages of objects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option 1: run "where used", collect the UID's of the rules, then run "show access-rule" for each rule UID.&lt;/P&gt;&lt;P&gt;Option 2: run "where used" with "details-level full". This will show the full objects that use the given object. However, it will show a lot of other information and may result with a slow response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option 3: run "where used", collect the rule positions, then look at the show-package HTML output (see image above) and locate the rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's demonstrate option 1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1: where used for host "Marco". We want to see its indirect usages, because Marco belongs to a network group which appears in some rules.&amp;nbsp;From the output we would like to isolate the rule UID and the layer UID because both parameters are required for the next step. So we will use JQ to parse the output and select only the things that we care about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mgmt_cli where-used name Marco indirect true -s id.txt --format json | jq -r '."used-indirectly"."access-control-rules"[] | (.rule.name // "no rule name", .rule.uid, .layer.name, .layer.uid)'&lt;BR /&gt;no rule name&lt;BR /&gt;97ed7f41-f56d-4ef5-99e9-9f698ad55902&lt;BR /&gt;FinanceSolutions Network&lt;BR /&gt;19942103-1419-4e71-b655-e1aad4c82535&lt;BR /&gt;no rule name&lt;BR /&gt;86f56fc4-7652-4518-8d94-3f9ec6ced892&lt;BR /&gt;FinanceSolutions Network&lt;BR /&gt;19942103-1419-4e71-b655-e1aad4c82535&lt;BR /&gt;no rule name&lt;BR /&gt;1030a2d1-7663-462f-b43b-8825abf39e21&lt;BR /&gt;FinanceSolutions Network&lt;BR /&gt;19942103-1419-4e71-b655-e1aad4c82535&lt;BR /&gt;no rule name&lt;BR /&gt;c0d19b8f-10d7-4ea2-8684-61968c7e94d7&lt;BR /&gt;FinanceSolutions Network&lt;BR /&gt;19942103-1419-4e71-b655-e1aad4c82535&lt;BR /&gt;no rule name&lt;BR /&gt;69ea551c-ad13-4a5f-8b68-897928119da8&lt;BR /&gt;FinanceSolutions Network&lt;BR /&gt;19942103-1419-4e71-b655-e1aad4c82535&lt;BR /&gt;no rule name&lt;BR /&gt;5f0d2800-1e9d-44f6-9f39-7953a33b82a2&lt;BR /&gt;FinanceSolutions Network&lt;BR /&gt;19942103-1419-4e71-b655-e1aad4c82535&lt;BR /&gt;no rule name&lt;BR /&gt;0fb52774-487a-4e3c-afcc-65d1ccbaffb7&lt;BR /&gt;FinanceSolutions Network&lt;BR /&gt;19942103-1419-4e71-b655-e1aad4c82535&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We got groups of 4 - rule name (which shows "no rule name" in case it has no name), rule UID, layer name, layer UID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now we can run show access-rule on each result to see the full rule. For example, for the first result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mgmt_cli show access-rule uid 69ea551c-ad13-4a5f-8b68-897928119da8 layer 19942103-1419-4e71-b655-e1aad4c82535 -s id.txt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2018 15:14:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26004#M1548</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-02-02T15:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: FW object rule report</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26005#M1549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, glad to help.&lt;/P&gt;&lt;P&gt;Robert.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2018 15:35:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/FW-object-rule-report/m-p/26005#M1549</guid>
      <dc:creator>Robert_Decker</dc:creator>
      <dc:date>2018-02-02T15:35:44Z</dc:date>
    </item>
  </channel>
</rss>

