What can I do here?
Use this window to search the access control, NAT, or Threat Prevention Rule Base.
Getting Here - Security Policies > Access/NAT/Threat Prevention > Policy. Click inside the Rule Base search bar. |
The search box looks for the query term in all columns of the Rule Base. For example, if the query term is "Check Point" , the search finds all rules that use this term. The results returned by the query are direct or indirect.
You can also search the Rule Base using these predefined tokens:
Button Name |
Text name |
Refers to an object in the: |
---|---|---|
Source |
|
Source column |
Destination |
|
Destination column |
Services |
|
Services and Applications column |
Applications |
|
Services and Applications column |
Install On |
|
Install On column |
Note - These tokens are used for searching the access control policy. The NAT and Threat Prevention policies use different but similar ones.
To use a token in a search:
Suggestions for Source or Destination show.
Suggestions for source show after typing the final colon (:)
Suggestions for source show after typing the final colon (:)
A token can be written in any combination of upper and lower case letters.
The content name is appended to the token, for example: src:DMZNet
.
Note - Typing the token name into the search box does not always produce the same results as selecting from the list. For example:
app:http
searches for words with an http prefix.app:
then selecting http from the list searches for exact matches on http. Objects selected from the list show in bold font.Use operators by typing them into the query in upper case format only. For example: "mycompany OR src: AuxiliaryNet".
If an operator is not used, the default AND operator applies. For example app:http John
produces the same result as app:http
AND John
.
Query Examples:
To stop a running query: