- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I created a rule to explicitly ALLOW and LOG ICMP "PING" traffic .
Any , Any, Allowed, ICMP , Log
However I am not seeing this traffic in my logs . What gives?
Please Help.
Is it accepted by implied rules and are those set to log?
i tried that setting as well and it also did not show up in the logs .
What do you see if using packet mode (sk118592) or fw up_execute to verify the rule matching...
[Expert@MyGW:0]# fw up_execute src=s.s.s.s dst=d.d.d.d ipp=1
I see it matching rule 1 - this is the any any rule i created for testing .
admin@172.31.255.1's password:
Last login: Thu Jul 14 17:48:10 2022 from 172.31.255.12
ESSN-CP-01> fw up_execute src=172.31.254.2 ipp=1 dst=172.31.255.100
Rulebase execution ended successfully.
Overall status:
----------------
Active clob mask: 0
Required clob mask: 0
Match status: MATCH
Match action: Accept
Per Layer:
------------
Layer name: ESSN-SHARED-SVCS-MGMT
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 1
Possible rules: 1 11 22 16777215
ESSN-CP-01>
Are there any filters being applied to the log search?
Does the problem persist if you install the policy again?
The bi-directional traffic is visible in a packet capture on the firewall?
If the ping has been running continuously while you created rule 1 and installed policy, it will not match rule 1 until you stop the ping for about 30 seconds and restart it (or just ping a different address). That is because the old ICMP "connection" still exists in the state table matching whatever rule (probably implied) was there before allowing it.
Still un-resolve ah ?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 16 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY