- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Policy Verification - "Too many errors"
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Policy Verification - "Too many errors"
Hi Everyone,
I'm working on policy audit and I'm trying to identify shadowed and redundant rules.
The management server in scope is Check Point Multi Domain Server R81.20 Jumbo HFA Take:92
I decided to enable RHR as per sk161574 to be able to identify hidden rules.
My question is:
Whenever I run Policy verification from Smart Console or using mgmt_cli I got only limited output ending with "Too many errors". (see below). I believe, this is most likely related to the buffer limit (sk138153), however SK says version R80.10 only.
Is there any way to get a full list? I tried to debug policy verification, but I'm unable too see those errors. (sk44338)
"Verify policy operation" failed (100%)
tasks:
- task-id: "01234567-89ab-cdef-9a3c-406faee92d10"
task-name: "Verify policy operation"
status: "failed"
progress-percentage: 100
suppressed: false
task-details:
- workSession: "381bb463-4f9f-44bc-ac0c-5e9241ff8cd6"
title: "Verification of policy 'Standard' completed with errors"
notifications: []
warnings: []
errors:
- "Error: Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 4 (AZURE TUNNEL ICMP/ALL) for Services & Applications: echo-request ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 6 for Services & Applications: domain-udp ,domain-tcp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 9 for Services & Applications: domain-udp ,domain-tcp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 15 for Services & Applications: domain-udp ,domain-tcp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 64 for Services & Applications: domain-udp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 67 for Services & Applications: domain-tcp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 68 for Services & Applications: domain-tcp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 74 for Services & Applications: domain-udp ,domain-tcp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 75 for Services & Applications: domain-udp ,domain-tcp ."
- " Layer Standard Network: Rule 71 Hides rule 77 for Services & Applications: TCP-9996 ,TCP-9999 ,TCP_9997 ."
- " Layer Standard Network: Rule 95 (GOOGLE CLOUD) Hides rule 96 (GOOGLE CLOUD) for Services & Applications: https ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 110 (Cloud-AZURE EMEA - Azure t...) for Services & Applications: domain-udp ,domain-tcp ."
- " Layer Standard Network: Rule 2 (Testing rules for Cloud pee...) Hides rule 111 (Cloud-AZURE EMEA- Internal...) for Services & Applications: domain-udp ,domain-tcp ."
- " Layer Standard Network: R"
- " Too many errors."
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Does it match with what you see in smart console?
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, it does.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I suspect it's the same underlying issue and you'll have to request the relevant fix to be ported to your version.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I'll ask R&D owner if there is a way to see all the errors.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to the R&D owner, there is no way to view all errors. Open an SR and ask for a task to be opened for CFG to create an HF for the customer.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for that update Tal, good to know.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks a lot. I'm going to raise SR.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to the TAC engineer, it is not possible to view full list of errors. (SR#6-0004235685 Policy Verification - "Too many errors" ) I'm waiting for an official statement.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @L180rMal35
As I remember, when I had this error, the solution was to solve the problems one by one. And it was R81.20.
I hope it helps.
Akos
\m/_(>_<)_\m/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @AkosBakos,
I'm doing audit, not fixing problematic rules, hence I need a full list of the conflicting rules.
Thanks for advise.
Libor
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ahhh, this is bad news. And what if you temporarily disable rule 2. Are thre a lof of hides too?
\m/_(>_<)_\m/
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That removes rule 2 errors and gives me another rule errors 🙂
"Verify policy operation" failed (100%)
tasks:
- task-id: "01234567-89ab-cdef-af1f-d592e809e970"
task-name: "Verify policy operation"
status: "failed"
progress-percentage: 100
suppressed: false
task-details:
- workSession: "6bb0202b-2d8b-4fd5-9e04-e8677051d17d"
title: "Verification of policy 'Standard' completed with errors"
notifications: []
warnings: []
errors:
- "Error: Layer Standard Network: Rule 71 Hides rule 77 for Services & Applications: TCP-9999 ,TCP_9997 ,TCP-9996 ."
- " Layer Standard Network: Rule 95 (GOOGLE CLOUD) Hides rule 96 (GOOGLE CLOUD) for Services & Applications: https ."
- " Layer Standard Network: Rule 122 (Cloud-AZURE EMEA) Hides rule 123 (Cloud-AZURE EMEA) for Services & Applications: https ."
- " Layer Standard Network: Rule 130 (Cloud-AZURE EMEA) Hides rule 133 (Cloud-AZURE EMEA) for Services & Applications: MS-SQL-Server ."
- " Layer Standard Network: Rule 122 (Cloud-AZURE EMEA) Hides rule 146 for Services & Applications: https ."
- " Layer Standard Network: Rule 137 (Cloud-AZURE EMEA) Hides rule 161 (Cloud-AZURE EMEA) for Services & Applications: Remote_Desktop_Protocol ."
- " Layer Standard Network: Rule 145 Hides rule 176 for Services & Applications: https ,smtp ."
- " Layer Standard Network: Rule 122 (Cloud-AZURE EMEA) Hides rule 177 for Services & Applications: https ."
- " Layer Standard Network: Rule 146 Hides rule 177 for Services & Applications: https ,smtp ."
- " Layer Standard Network: Rule 147 Hides rule 178 for Services & Applications: smtp ."
- " Layer Standard Network: Rule 181 Hides rule 191 for Services & Applications: LSA-SAM-Netlogon ,TCP_135 ."
- " Layer Standard Network: Rule 181 Hides rule 195 for Services & Applications: TCP_135 ."
- " Layer Standard Network: Rule 187 Hides rule 196 for Services & Applications: UDP_5723 ,TCP_5723 ."
- " Layer Standard Network: Rule 209 (SAPHEC) Hides rule 223 (SAPHEC) for Services & Applications: TCP_9000 ,TCP_4304 ."
- " Layer Standard Network: Rule 221 (SAPHEC) Hides rule 223 (SAPHEC) for Services & Applications: TCP_9000 ,TCP_4304 ."
- " Layer Standard Network: Rule 99 (GOOGLE CLOUD) Hides rule 233 (SAPHEC) for Services & Applications: htt"
- " Too many errors."
Executed command failed. Changes are discarded.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
**bleep** happens 😕 I ran out of ideas.
Maybe the best solution would be to rebuild the policy in a new package, then make the audit.
Akos
\m/_(>_<)_\m/
