- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear CheckMates,
I have faced below issue and kindly advise.
In R80.10 SmartConsole -
1) In "Network Layer" - given Track column as "NONE" for a Firewall rule
2) In "App Layer" - given Track column for a Rule as "Log/Detailed/Extended" with "Accounting/Connection/Session"
Now I could see the Logs available in Firewall Rule even though Track was set as "NONE".
Would like to know how this happens.
I did try this as well in Lab environment.
Regards, Prabu
Could you provide more information? For example rule details and log screenshot...
Interesting, Have you tried to disable App Layer rule log?
Yes, what I could see as below.
1) When I have only Firewall Blade enabled with Firewall Rule and Track set as "NONE" - No logs found - which is fine condition.
2) When I enable APP/URL blade with App rule and Track set as "log" - I could see Logs -which is weird.
3) When I set Track as "NONE" in both Firewall and App/URL - No logs found - which is fine condition.
Even though the Network layer didn’t explicitly log, the fact you also accepted and logging in the App layer means a log entry will be generated for that connection.
The fact the connection is accepted in the Network layer is also reflected in that log entry.
This is expected behavior.
Yes Dameon.
So the reason I used Track as "NONE' in Firewall rule is since Gateways were sending huge logs and unable to pull all logs for weekly basis in mgmt-IP/SmartView tool.
So we have disabled most of rule in Firewall, but we cannot disable Track in App rule.
But no luck in the above.
Any another idea or internal configuration for Firewall Log to be blocked for generation and allow only App rule?
Regards, Prabu
I'm not seeing in your screenshots where log entries are being generated with ONLY the firewall blade.
What you showed were log entries that logged as App Control but reflecting an accept in both layers, which as I said, is expected behavior,
Attaching
Like I said before, since you are logging the traffic in one of the layers, a log entry will be generated.
It's aware of both layers that accepted the traffic as a result of this.
I'm not convinced the log entries you are seeing in both screenshots are actually different--I believe they are, in fact, the same log entry.
You should visually inspect the log entries to see if they are actually different log entries or if they are, in fact, the same.
If double log entries are getting created, you should see double the number of logs in the Log and Monitor view than when viewing each individual rule.
That said, I did try to reproduce this with R80.20 Management managing a 1490 gateway (R77.20.81) and did not see the same behavior.
My firewall rule that matched had no logs generated, but my App Control layer did.
Only the App Control rule showed as having matched.
But that could easily be a difference between R77.x and R80.10 and you didn't say what version your gateway is.
Yes Dameon,
My Old FW was R80.10 where I could see Logs for Firewall NONE entry.
Also tried with R80.20 - which is good as your result.
Let me again try in R80.10 FW itself to reproduce.
Regards, Prabu
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 12 | |
| 10 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY