Comments
-
remaining question : what is the goal of the first checkbox then ?
-
Seems that the second checkbox did the job : "Enable logging for reports for traffic sent from this device (Fireware OS version 11.10.5 and higher)".
-
NB : setup / logging / Diagnostic log level / "Enable Logging from traffic sent from this device" has been unchecked.
-
another new issue since beginning of May, some fields are nos separated by multiple "space" instead of only 1. Don't know if it's due to the new month or due to our recent upgrade to the latest version : May 3 16:35:02 10.40.1.254 May 3 16:35:02 MYFIREWALL.mycorp.lan firewall: msg_id="3000-0148" 2 spaces after the 2 "May"…
-
Hello James, I know i can double click on the rule in the search results, this is not my point ;-)) i just want to be able to identify the number of each rule to avoid having to do the same search again and again for each rule i have to check...
-
Great for the future ! but not yet "Cloud managed" device here ;-((
-
i think question is not to know if a policy is used or not (even if it's just useful also according to me..) but to identify any un-used port defined in a policy ;-))
-
Would be great to be able to put SSL-VPN tunnel exception using target domain name, not only IPs...
-
example of something that could be useful in terms of log format : Apr 27 13:04:59 172.21.70.254 Apr 27 13:04:59 host="myfirewall.mycorp.lan" process="firewall:" msg_id="3000-0148" disposition="Deny" src_int="MY-SUPER-INTERNAL-INTERFACE-NAME" dst_int="MY STUPID EXTERNAL INTERFACE NAME" 52 pr="tcp" 20 127…