- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
I have been asked to identify all rules where the destination is the Internet within a Check Point policy.
On the same policy layer, there are inline rules, and while I initially thought I could use a simple filter, this doesn't seem to be the case.
Rules to internet use an Internet object as a group with exclusion (any - rfc1918 for internal networks). When performing searches, it successfully finds rules, and also inlines rules, involving this group, but it doesn't identify rules where specific public IP addresses are directly configured as the destination.
Does anyone have a solution for this search?
I can try this in the lab Monday, but did you try just right click on Internet object in your policy and then "where used"? I believe same can be done via mgmt_cli as below:
https://sc1.checkpoint.com/documents/latest/APIs/?#cli/where-used~v2%20
Andy
Do you mean you tried the regular SmartConsole search (see image) but you need something more granular?
Yes, this search filter just Internet object but not specific public ip addresses.
On the search NOT is not expisting, our I would I have done easily NOT dst:10.0.0.0/8
Did you try below (example from my lab).
Andy
*********************
[Expert@CP-MANAGEMENT:0]# mgmt_cli where-used name "Internet" --format json
Username: admin
Password:
{
"used-directly" : {
"total" : 11,
"objects" : [ ],
"threat-prevention-rules" : [ ],
"nat-rules" : [ ],
"access-control-rules" : [ {
"rule" : {
"uid" : "25b0a4aa-7e12-44cc-8e75-9463990b6958",
"type" : "access-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Objects/accessRule",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "3",
"layer" : {
"uid" : "38271c2f-ab44-4e25-9aa4-e219cb6e12cf",
"name" : "network",
"type" : "access-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 1,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
}, {
"rule" : {
"uid" : "2831f491-21b5-437e-a1a4-1b92cf324a9e",
"name" : "AI test rule",
"type" : "access-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Objects/accessRule",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "2",
"layer" : {
"uid" : "0d66fd92-fb01-4862-8005-8871f976ad4f",
"name" : "appc+urlf",
"type" : "access-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 2,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
}, {
"rule" : {
"uid" : "fedb9a6c-b55b-42f1-83d2-d3802c602c9c",
"name" : "win11 access rule",
"type" : "access-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Objects/accessRule",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "4",
"layer" : {
"uid" : "38271c2f-ab44-4e25-9aa4-e219cb6e12cf",
"name" : "network",
"type" : "access-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 1,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
}, {
"rule" : {
"uid" : "443350ba-388c-4351-9d8d-03734b4e5a29",
"name" : "win11 inspection rule",
"type" : "access-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Objects/accessRule",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "1",
"layer" : {
"uid" : "0d66fd92-fb01-4862-8005-8871f976ad4f",
"name" : "appc+urlf",
"type" : "access-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 2,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
}, {
"rule" : {
"uid" : "19c21224-a633-4fa9-814c-827a7f2e3fcd",
"type" : "access-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Objects/accessRule",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "3",
"layer" : {
"uid" : "0d66fd92-fb01-4862-8005-8871f976ad4f",
"name" : "appc+urlf",
"type" : "access-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 2,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
} ],
"https-rules" : [ {
"rule" : {
"uid" : "4d020c0f-929e-4e1a-83c1-a8b806174a11",
"name" : "bypass rule",
"type" : "https-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "General/globalsNa",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "2",
"layer" : {
"uid" : "ecb98b31-5e17-44c5-bc05-ce1a8b3d1c3d",
"name" : "Default Outbound Layer",
"type" : "https-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 1,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
}, {
"rule" : {
"uid" : "4505771d-bef5-40aa-9c03-e4bef68cbf21",
"name" : "Predefined Rule",
"type" : "https-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "General/globalsNa",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "1",
"layer" : {
"uid" : "bff64df6-8eec-4d7d-9230-b4e53b5316c1",
"name" : "test-https-inspection-layer",
"type" : "https-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
}
}, {
"rule" : {
"uid" : "204a2b49-3382-438a-a4f5-ca5af2d1ace6",
"name" : "Health, Finance and Government HTTPS Rule",
"type" : "https-rule",
"domain" : {
"uid" : "a0bbbc99-adef-4ef8-bb6d-defdefdefdef",
"name" : "Check Point Data",
"domain-type" : "data domain"
},
"icon" : "General/globalsNa",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "1",
"layer" : {
"uid" : "10b93f12-9906-49af-b308-dffc294d0e09",
"name" : "VSX_Outbound_Default",
"type" : "https-layer",
"domain" : {
"uid" : "a0bbbc99-adef-4ef8-bb6d-defdefdefdef",
"name" : "Check Point Data",
"domain-type" : "data domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
}
}, {
"rule" : {
"uid" : "a8146f47-bb00-46d4-8859-e217369b0eb9",
"name" : "Predefined Rule",
"type" : "https-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "General/globalsNa",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "3",
"layer" : {
"uid" : "ecb98b31-5e17-44c5-bc05-ce1a8b3d1c3d",
"name" : "Default Outbound Layer",
"type" : "https-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 1,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
}, {
"rule" : {
"uid" : "776bd65a-f316-4ff7-b916-8d231763fff0",
"name" : "Predefined Rule",
"type" : "https-rule",
"domain" : {
"uid" : "a0bbbc99-adef-4ef8-bb6d-defdefdefdef",
"name" : "Check Point Data",
"domain-type" : "data domain"
},
"icon" : "General/globalsNa",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "2",
"layer" : {
"uid" : "10b93f12-9906-49af-b308-dffc294d0e09",
"name" : "VSX_Outbound_Default",
"type" : "https-layer",
"domain" : {
"uid" : "a0bbbc99-adef-4ef8-bb6d-defdefdefdef",
"name" : "Check Point Data",
"domain-type" : "data domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
}
}, {
"rule" : {
"uid" : "de4da8e8-1b60-4a38-8417-7b94a7f43bc9",
"name" : "MS copilot inspect",
"type" : "https-rule",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "General/globalsNa",
"color" : "black"
},
"rule-columns" : [ "destination" ],
"position" : "1",
"layer" : {
"uid" : "ecb98b31-5e17-44c5-bc05-ce1a8b3d1c3d",
"name" : "Default Outbound Layer",
"type" : "https-layer",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "ApplicationFirewall/rulebase",
"color" : "black"
},
"layer-position" : 1,
"package" : {
"uid" : "0fd04089-8f41-424a-aeb3-0534161618ca",
"name" : "R82-SSL-INSPECTION-LAB-POLICY",
"type" : "package",
"domain" : {
"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",
"name" : "SMC User",
"domain-type" : "domain"
},
"icon" : "Blades/Access",
"color" : "cyan"
}
} ]
}
}
[Expert@CP-MANAGEMENT:0]#
@Ilovecheckpoint I think you know all your internal networks. As an idea you can do a reverse search for destinations NOT your internal networks.
If you search for destination Internet not all destinations are matching. As an example domain-objects can not be found by IP-address.
Do you have SmartEvent enabled on mgmt? With this you can also build custom reports. Once made you can just run it every time you need. Also check out the new feature called: Policy Auditor -> check video here from minute 07:00
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
16 | |
4 | |
4 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY