Hello everyone,
I'm just deploy a new internal CP Firewall (to control traffic for Server Farm Zone). I'm creating the policy using logs in Firewall.
I to filter a log which established (Log at Session Start - Log at Session Start) connection like Palo Alto Firewall, to except incoming log which have no reply.
![PaloAlto-SecurityRule-LogSettings-Highlight.png PaloAlto-SecurityRule-LogSettings-Highlight.png](https://community.checkpoint.com/t5/image/serverpage/image-id/29009i2CEEB1EF53DDFFFB/image-dimensions/442x221?v=v2)
(example: Server1 only port 3389 are listening, 443 not enable. User1 scan port 3389, 443 to Server1 => only port 3389 reply, 443 will not reply => I want to filter the log that 3389 request-reply)
I already choose Session at Action-Rules option, but it's still have a log session port 443 although 443 on server is not enable (user access to server:443 failed either)
![z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg z6168707391669_58ca1ed8c4c0c570a04c0d270cbc40c7.jpg](https://community.checkpoint.com/t5/image/serverpage/image-id/29010iCE318DD6E1C790B3/image-dimensions/506x377?v=v2)
A lot of logs port 443 have duration 3 hours:
![z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg z6168703426720_a3206d5dc9e7269b81976b8a57292b73.jpg](https://community.checkpoint.com/t5/image/serverpage/image-id/29011i0AEC4B9876D64E6D/image-dimensions/507x389?v=v2)
Does anyone facing this problem before? Please help me.
Thanks & Best Regards,
Mk_83