- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi.
On a 1595 cluster I have a manual NAT rule created that forwards Incoming traffic from the Internet that uses a custom port to a an internal IP address running a web service. I have a corresponding rule in access policy. Traffic flow is as expected and the rules does their job. However although the access policy rule is set to log, I do not see any logs of the accepted/NATted traffic.
The NAT and access policy rules have not been created by the server wizard. However by default in the wizard there is an unchecked box for logging accepted connections. It seems to me that this is the functionality I am looking, but I cannot find any checkbox for enabling this when rule is generated manually.
Do you have any idea how to get the logs working with manually created rules?
Can you share some screenshots? Also, what version? Local or central management?
We are using local management with cloud connected features for backups and extended monitoring. We are using R81.10.17 (996004653)
This is how the NAT rules look like:This is the corresponding access policy rule:
Traffic is flowing according to rules confirmed with TCPdump. But the related logs are not in the local security logs, nor int the cloud based Quantum Spark Management
In the sever wizard, which we did not use, there is this option:
I assume that when creating the rules manually, the "accepted connections" are not logged but I cannot find such an option/checkbox within the manually created rules that could enable this
Servers are not exactly NAT rules
Can you not go to Users and Objects > Network Resources > Servers and change the definition to log the connections?
Here’s my configuration for a server object:
Well I have tried now to do it both via single IP network objects and and via new server server object (like in your screenshot). Both times the traffic flow worked as expected, But I do not get any logs for the traffic.
There should be a bunch of accepted logs with the service 9001 with the same pair of source/destination IP addresses, which was clearly working, but nothing shows up
Have you opened a TAC case on this?
Not yet. I wanted to run this through the community first, just to see if it's not a config error on mi side.
Is your Access Policy Control set to Strict?
This is in Access Policy > Firewall > Blade Control
Policy is set to standard with "log all" for both blocked and allowed traffic
I second this question... have multiple custom inbound rules that work as expected. However, do not see any logged inbound traffic. Only rules where inbound TCP port is not redirected to a different port shows logs for outbound traffic. All other inbound rules redirect a custom TCP port to a different port (eg. TCP 1650 on WAN interface to TCP 22 on internal server); none of these rules log any traffic, despite logging enabled. All allowed traffic is logged and all denied traffic is logged.
I recommend opening a TAC case if this isn't working as expected.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
13 | |
3 | |
3 | |
2 | |
1 | |
1 | |
1 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY