<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CPHE - Firewall Blade Blocking Traffic - BlockAllTmpLog Rule in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/145232#M5455</link>
    <description>&lt;P&gt;Did you find the solution? I'm also having some macbooks with network problems in E84.70 matching in "&lt;SPAN&gt;BlockAllTmpLog" rule...&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2022 10:40:01 GMT</pubDate>
    <dc:creator>jgarcias</dc:creator>
    <dc:date>2022-04-01T10:40:01Z</dc:date>
    <item>
      <title>CPHE - Firewall Blade Blocking Traffic - BlockAllTmpLog Rule</title>
      <link>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/140443#M5098</link>
      <description>&lt;P&gt;We are seeing many firewall drops in the CP Harmony Endpoint logs stating that it is due to the "BlockAllTmpLog" Access Rule. We have one inbound rule that says any any allow, and one outbound rule that says any any allow.&lt;/P&gt;&lt;P&gt;My question is where do I find documentation or understand what the BlockAllTmpLog Access Rule is?&lt;/P&gt;&lt;P&gt;Below is a sample log&lt;/P&gt;&lt;P&gt;cp_severity=Low&lt;BR /&gt;loguid={0x61fc5ed3,0x0,0x80164a4,0xc091799}&lt;BR /&gt;sequencenum=16777215&lt;BR /&gt;version=1&lt;BR /&gt;client_version=84.70.0990&lt;BR /&gt;dst_dns_name=**************&lt;BR /&gt;ep_rule_id=0&lt;BR /&gt;event_type=Firewall&lt;BR /&gt;host_type=MacBookAir8,2&lt;BR /&gt;installed_products=Firewall Anti-Malware VPN Forensics Threat Emulation&lt;BR /&gt;local_time=1643967085&lt;BR /&gt;machine_guid=&lt;BR /&gt;os_name=macOS&lt;BR /&gt;os_version=11.6.1&lt;BR /&gt;policy_date=1643929240&lt;BR /&gt;policy_guid={F71F2C17-E66B-495B-87ED-2B155CC10CE7}&lt;BR /&gt;policy_name=Default Firewall settings for the entire organization&lt;BR /&gt;policy_type=10&lt;BR /&gt;product=Firewall&lt;BR /&gt;program_name=CPFWD&lt;BR /&gt;rule_name=BlockAllTmpLog&lt;BR /&gt;src_dns_name=**************&lt;BR /&gt;user_name=bill.samuelson@microsoft.com&lt;BR /&gt;user_sid=S-1-5-21-2229093338-1663155082-2634640864-65716&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;~Keith Smith&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 23:43:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/140443#M5098</guid>
      <dc:creator>rmsource_dotcom</dc:creator>
      <dc:date>2022-02-03T23:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: CPHE - Firewall Blade Blocking Traffic - BlockAllTmpLog Rule</title>
      <link>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/140461#M5099</link>
      <description>&lt;P&gt;Hey Keith,&lt;/P&gt;
&lt;P&gt;Im not an expert in harmony endpoint (more firewall guy), but one thing caught my eye when reviewing the log you pasted. Just curious, the line that gives the policy name says&amp;nbsp;&lt;SPAN&gt;Default Firewall settings for the entire organization...to me, logically, that would equate to default implicit rule on regular firewall that would say any any block. Is there any way you can confirm rule(s) in that policy?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Again, apologies if it sounds like a dumb question, but just going based on my own logic here : - )&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Andy&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Feb 2022 03:01:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/140461#M5099</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-04T03:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: CPHE - Firewall Blade Blocking Traffic - BlockAllTmpLog Rule</title>
      <link>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/143154#M5303</link>
      <description>&lt;P&gt;Does the issue persists for you on the latest release E86.20?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 15:49:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/143154#M5303</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-07T15:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: CPHE - Firewall Blade Blocking Traffic - BlockAllTmpLog Rule</title>
      <link>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/143156#M5305</link>
      <description>&lt;P&gt;That's a good question. We only have a few clients on 86.20 and do not see those clients with&amp;nbsp;drops from&amp;nbsp;&lt;SPAN&gt;BlockAllTmpLog. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For everyone so you know what it is, it is in position 0 and is an implied rule created by Check Point. There is no documentation on it internally/externally from CP as of a couple weeks ago. You cannot change or view the settings of this rule.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 16:10:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/143156#M5305</guid>
      <dc:creator>rmsource_dotcom</dc:creator>
      <dc:date>2022-03-07T16:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: CPHE - Firewall Blade Blocking Traffic - BlockAllTmpLog Rule</title>
      <link>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/145232#M5455</link>
      <description>&lt;P&gt;Did you find the solution? I'm also having some macbooks with network problems in E84.70 matching in "&lt;SPAN&gt;BlockAllTmpLog" rule...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 10:40:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/CPHE-Firewall-Blade-Blocking-Traffic-BlockAllTmpLog-Rule/m-p/145232#M5455</guid>
      <dc:creator>jgarcias</dc:creator>
      <dc:date>2022-04-01T10:40:01Z</dc:date>
    </item>
  </channel>
</rss>

