<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identify ports on a rule having Any Service Access in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276465#M46123</link>
    <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;.&lt;/P&gt;
&lt;P&gt;Alternatively you could export the logs in text format and create a script to extract the information based on the rule UID (this ID doesnt't change if you add rules above), or, if you have time, use Log Exporter to export logs for the specific rule to a syslog server and eventually, create a script on this syslog server that import the logs into a SQL database to simplify queries (in the past I've done something similar, by creating a script that read logs, filters out specific information like source, destination, protocol and port, and import these information in a MySQL DB).&lt;/P&gt;</description>
    <pubDate>Tue, 05 May 2026 07:11:37 GMT</pubDate>
    <dc:creator>simonemantovani</dc:creator>
    <dc:date>2026-05-05T07:11:37Z</dc:date>
    <item>
      <title>Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276462#M46121</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;I am curious whether there exists a pre-made script or extension that can display the ports utilized for rules that have ANY as a service. I am currently developing a Python script; however, the challenge arises when someone adds a rule either above or below, as this alters the rule number, making it difficult to identify the correct results later. Therefore, I am inquiring if such results are achievable. I attempted to use SmartView, but it is taking a considerable amount of time. Does the community have any readily available solutions for this?&lt;/P&gt;
&lt;P&gt;Thanks and Regards,&lt;/P&gt;
&lt;P&gt;Blason R&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 05:23:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276462#M46121</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2026-05-05T05:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276464#M46122</link>
      <description>&lt;P&gt;Maybe give this one a try? Not sure if you can find ''any'' services:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/SmartConsole-Extensions/Policy-Audit-Extension/m-p/272730#M605" target="_blank"&gt;https://community.checkpoint.com/t5/SmartConsole-Extensions/Policy-Audit-Extension/m-p/272730#M605&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Alternative:&lt;/P&gt;
&lt;P&gt;compliance blade can also do this.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or Policy auditor / insights&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/This-Month-s-Spotlight-Features-You-Should-Start-Using-Today/td-p/268548#:~:text=Policy%20Auditor%20is%20currently%20available,to%20the%20relevant%20policy%20rules" target="_blank"&gt;https://community.checkpoint.com/t5/Firewall-and-Security-Management/This-Month-s-Spotlight-Features-You-Should-Start-Using-Today/td-p/268548#:~:text=Policy%20Auditor%20is%20currently%20available,to%20the%20relevant%20policy%20rules&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 06:48:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276464#M46122</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-05-05T06:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276465#M46123</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;.&lt;/P&gt;
&lt;P&gt;Alternatively you could export the logs in text format and create a script to extract the information based on the rule UID (this ID doesnt't change if you add rules above), or, if you have time, use Log Exporter to export logs for the specific rule to a syslog server and eventually, create a script on this syslog server that import the logs into a SQL database to simplify queries (in the past I've done something similar, by creating a script that read logs, filters out specific information like source, destination, protocol and port, and import these information in a MySQL DB).&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 07:11:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276465#M46123</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-05T07:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276466#M46124</link>
      <description>&lt;P&gt;If the rule is logged you can filter logs for that rule in the log viewer and then look at 'Top Services'. It won't be accurate for too far back (as it won't load all the logs) but if your goal is to limit the services matching you can add another rule over your 'any' rule with the same sources and destinations, and put your identified services that are doing most of the matching and that you want to allow in there, to take them out of the 'any' rule. Keep doing that until you have all the services you need and you'll have it cleaned up eventually.&lt;/P&gt;
&lt;P&gt;Else the new Policy Insights service can be of service here to basically figure all that out for you.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 07:33:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276466#M46124</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-05-05T07:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276468#M46125</link>
      <description>&lt;P&gt;This approach does not appear to be appropriate, as exporting the logs may lead to inconsistencies if someone has added or deleted a rule. Consequently, the numbers will not align, and the results will, of course, differ.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 07:42:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276468#M46125</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2026-05-05T07:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276469#M46126</link>
      <description>&lt;P&gt;Yes, I am aware of that; however, it would be challenging once more, as we have five firewall administrators, making it consistently difficult to maintain the rule numbers. Additionally, since this is a manual task and we have over 400 rules, with approximately 60 of those identified as Any Service, it is causing me an issue.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 07:44:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276469#M46126</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2026-05-05T07:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276470#M46127</link>
      <description>&lt;P&gt;I understand, in this case you should evaluate to adopt a tool like Policy Auditor or some other 3rd party product like Tufin; on of these solutions will give you the information and visibility you need in a faster way with little effort.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 07:51:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276470#M46127</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-05T07:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276497#M46134</link>
      <description>&lt;P&gt;The rule numbers change, sure, but the rule UUID doesn't. Just use that in the filter.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 13:38:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276497#M46134</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-05T13:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Identify ports on a rule having Any Service Access</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276521#M46138</link>
      <description>&lt;P&gt;The best way to refer to a specific rule is by uid, not by rule number.&lt;BR /&gt;This way, you don't have to worry about its precise position in the rulebase.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 16:20:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identify-ports-on-a-rule-having-Any-Service-Access/m-p/276521#M46138</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-05-05T16:20:45Z</dc:date>
    </item>
  </channel>
</rss>

