Log samples for Checkpoint

Sample 1:

..code-block:: console

Apr 11 11:04:48 hostng Checkpoint: 21Aug2007 12:00:00 accept 10.10.10.2 >eth0 rule: 100; rule_uid: {00000000-0000-0000-0000-000000000000}; service_id: nbdatagram; src: 10.10.10.3; dst: 10.10.10.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138;

Sample 2:

Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:28 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.14.120.9; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32769; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:28 accept 192.168.99.1 >eth5 rule: 33; rule_uid: {AAAAAAAA-9999-8888-F33256AF77FB}; service_id: lotus; src: 192.168.11.131; dst: 192.168.99.13; proto: tcp; product: VPN-1 & FireWall-1; service: 1352; s_port: 2555; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:28 accept 192.168.99.1 >eth5 rule: 33; rule_uid: {AAAAAAAA-9999-8888-F33256AF77FB}; service_id: lotus; src: 192.168.11.131; dst: 192.168.99.13; proto: tcp; product: VPN-1 & FireWall-1; service: 1352; s_port: 2556; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:29 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.11.131; dst: 192.168.99.10; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:35 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.10; dst: 192.168.200.2; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:35 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.10; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:12:04 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.131; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:12:08 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 4.23.34.126; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2854; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:49 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.11.200; dst: 192.168.99.10; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:10:54 192.168.99.1 Checkpoint: 3Sep2007 15:10:52 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:10:54 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.99.226; dst: 192.168.11.200; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:10:54 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: microsoft-ds; src: 192.168.99.226; dst: 192.168.11.200; proto: tcp; product: VPN-1 & FireWall-1; service: 445; s_port: 1726; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:10:54 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.185; dst: 192.149.252.44; proto: tcp; product: VPN-1 & FireWall-1; service: 43; s_port: 57172; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:10:54 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.11.200; dst: 192.168.99.226; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:10:56 accept 192.168.99.1 >eth5 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.0.254; dst: 192.168.11.3; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:12:24 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbname; src: 192.168.11.200; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 137; s_port: 137; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:12:24 drop 192.168.11.7 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 172.18.40.250; dst: 172.18.40.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:11:00 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 148.160.29.6; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33120; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:12:29 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 8.255.17.254; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2855; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:11:08 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.200.2; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:11:15 drop 192.168.99.1 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.0.180; dst: 192.168.0.255; proto: udp; product: VPN-1 & FireWall-1; service: 137; s_port: 137; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:11:16 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 64.243.236.3; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 46485; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:12:49 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.35; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:12:50 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 204.160.122.126; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2856; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:11:25 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:12:53 accept 192.168.11.7 >eth8 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.11.99; dst: 218.185.224.7; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 4538; Sep 3 15:11:40 192.168.99.1 Checkpoint: 3Sep2007 15:11:29 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 216.230.128.228; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 50268; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:11:41 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.195; dst: 192.168.56.10; proto: tcp; product: VPN-1 & FireWall-1; service: 3013; s_port: 1352; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:13:11 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 4.23.34.126; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2857; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:11:45 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 202.134.1.10; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 1061; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:11:49 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.99.228; dst: 192.168.11.200; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:11:49 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: microsoft-ds; src: 192.168.99.228; dst: 192.168.11.200; proto: tcp; product: VPN-1 & FireWall-1; service: 445; s_port: 1434; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:11:54 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:11:54 accept 192.168.99.1 >eth8 rule: 40; rule_uid: {33333333-2222-1111-C048F9B6D5DA}; service_id: smtp; src: 192.168.99.185; dst: 192.168.13.18; proto: tcp; product: VPN-1 & FireWall-1; service: 25; s_port: 39250; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:13:22 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.116; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:11:57 accept 192.168.99.1 >eth5 rule: 33; rule_uid: {AAAAAAAA-9999-8888-F33256AF77FB}; service_id: lotus; src: 192.168.11.115; dst: 192.168.99.13; proto: tcp; product: VPN-1 & FireWall-1; service: 1352; s_port: 3084; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:12:00 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.99.47; dst: 192.168.11.200; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:12:00 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: microsoft-ds; src: 192.168.99.47; dst: 192.168.11.200; proto: tcp; product: VPN-1 & FireWall-1; service: 445; s_port: 1268; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:12:00 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: nbsession; src: 192.168.99.47; dst: 192.168.11.200; proto: tcp; product: VPN-1 & FireWall-1; service: 139; s_port: 1269; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:12:04 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.185; dst: 199.43.0.144; proto: tcp; product: VPN-1 & FireWall-1; service: 43; s_port: 47703; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:13:32 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 8.255.17.254; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2858; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:12:05 accept 192.168.99.1 >eth5 rule: 33; rule_uid: {AAAAAAAA-9999-8888-F33256AF77FB}; service_id: lotus; src: 192.168.11.131; dst: 192.168.99.13; proto: tcp; product: VPN-1 & FireWall-1; service: 1352; s_port: 2568; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:12:05 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 209.244.7.35; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 5304; Sep 3 15:12:20 192.168.99.1 Checkpoint: 3Sep2007 15:13:48 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbname; src: 192.168.11.33; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 137; s_port: 137; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:12:22 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.75.51.132; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33504; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:13:53 drop 192.168.11.7 >eth2 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; ICMP: Echo Request; src: 203.193.149.227; dst: 64.129.8.245; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:13:53 drop 192.168.11.7 >eth2 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; ICMP: Echo Request; src: 203.193.149.227; dst: 64.129.8.246; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:13:53 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 204.160.122.126; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2859; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:12:29 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:12:31 accept 192.168.99.1 >eth5 rule: 106; rule_uid: {33333333-2222-1111-F25776101B8B}; rule_name: VOIP?; service_id: SAV-Intel-PDS; src: 192.168.11.117; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 38293; s_port: 1061; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:12:36 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 148.160.29.6; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33120; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:05 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.200; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:05 drop 192.168.11.7 >eth2 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; ICMP: Echo Request; src: 203.193.149.227; dst: 64.129.8.249; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:12:45 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 213.51.144.168; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 5353; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:12 accept 192.168.11.7 >eth8 rule: 114; rule_uid: {33333333-2222-1111-7E7A07E3B187}; service_id: http; src: 192.168.11.154; dst: 216.239.51.91; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 57720; xlatesport: 30022; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:12 drop 192.168.11.8 >eth2 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 61.153.230.18; dst: 64.128.3.60; proto: udp; product: VPN-1 & FireWall-1; service: 1434; s_port: 1112; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:14 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 8.255.17.254; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2861; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:21 drop 192.168.11.7 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 172.18.40.250; dst: 172.18.40.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:24 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; src: 192.168.11.154; dst: 209.85.199.109; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 995; s_port: 57722; xlatesport: 30023; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:24 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; src: 192.168.11.154; dst: 209.85.199.109; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 995; s_port: 57723; xlatesport: 30024; Sep 3 15:12:56 192.168.99.1 Checkpoint: 3Sep2007 15:14:24 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; src: 192.168.11.154; dst: 209.85.199.109; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 995; s_port: 57724; xlatesport: 30025; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:14:25 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; src: 192.168.11.154; dst: 209.85.199.109; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 995; s_port: 57725; xlatesport: 30026; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:14:26 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; src: 192.168.11.154; dst: 209.85.199.109; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 995; s_port: 57726; xlatesport: 30027; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:12:57 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:14:26 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; src: 192.168.11.154; dst: 209.85.199.109; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 995; s_port: 57727; xlatesport: 30028; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:14:30 accept 192.168.11.7 >eth8 rule: 114; rule_uid: {33333333-2222-1111-7E7A07E3B187}; service_id: http; src: 192.168.11.154; dst: 65.55.139.125; proto: tcp; xlatesrc: 64.128.3.58; NAT_rulenum: 7; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 57728; xlatesport: 30029; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:03 accept 192.168.99.1 >eth5 rule: 111; rule_uid: {AAAAAAAA-9999-8888-6F8CB5EB44F2}; service_id: CAP; src: 192.168.11.200; dst: 192.168.99.10; proto: tcp; product: VPN-1 & FireWall-1; service: 1026; s_port: 1628; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:03 accept 192.168.99.1 >eth5 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.0.254; dst: 192.168.11.3; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:03 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 62.145.135.100; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 53; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:04 accept 192.168.99.1 >eth8 rule: 40; rule_uid: {33333333-2222-1111-C048F9B6D5DA}; service_id: smtp; src: 192.168.99.185; dst: 192.168.13.18; proto: tcp; product: VPN-1 & FireWall-1; service: 25; s_port: 39259; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:14:35 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 4.23.34.126; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2862; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:15 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 202.52.162.40; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 9867; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:16 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.200.2; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:17 accept 192.168.99.1 >eth5 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.0.254; dst: 192.168.11.4; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:17 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 166.70.31.250; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 1045; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:18 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 64.191.208.15; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 55555; Sep 3 15:13:24 192.168.99.1 Checkpoint: 3Sep2007 15:13:19 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 202.108.12.72; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 28585; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:25 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 206.13.28.16; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 54618; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:28 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 160.124.208.1; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 49173; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:28 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: MS-RPC; src: 192.168.11.119; dst: 192.168.99.10; proto: tcp; product: VPN-1 & FireWall-1; service: 135; s_port: 4597; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:28 accept 192.168.99.1 >eth5 rule: 111; rule_uid: {AAAAAAAA-9999-8888-6F8CB5EB44F2}; service_id: CAP; src: 192.168.11.119; dst: 192.168.99.10; proto: tcp; product: VPN-1 & FireWall-1; service: 1026; s_port: 4598; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:14:56 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 8.12.217.126; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2863; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:14:58 accept 192.168.11.7 >eth8 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.11.99; dst: 202.71.97.92; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 32242; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:30 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: SAV-Roaming-Clients; src: 192.168.99.10; dst: 192.168.11.159; proto: udp; product: VPN-1 & FireWall-1; service: 2967; s_port: 2967; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:32 accept 192.168.99.1 >eth5 rule: 40; rule_uid: {33333333-2222-1111-C048F9B6D5DA}; service_id: smtp; src: 192.168.11.240; dst: 192.168.13.18; proto: tcp; product: VPN-1 & FireWall-1; service: 25; s_port: 50412; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:33 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:34 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: MS-RPC; src: 192.168.99.228; dst: 192.168.11.200; proto: tcp; product: VPN-1 & FireWall-1; service: 135; s_port: 1443; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:34 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: Remote_Storm; src: 192.168.99.228; dst: 192.168.11.200; proto: tcp; product: VPN-1 & FireWall-1; service: 1025; s_port: 1444; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:37 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.11.141; dst: 192.168.99.10; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:38 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 217.114.163.198; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 54816; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:39 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: SAV-Roaming-Clients; src: 192.168.99.10; dst: 192.168.11.160; proto: udp; product: VPN-1 & FireWall-1; service: 2967; s_port: 2967; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:41 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.195; dst: 192.168.56.10; proto: tcp; product: VPN-1 & FireWall-1; service: 3013; s_port: 1352; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:15:14 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.34; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:13:48 192.168.99.1 Checkpoint: 3Sep2007 15:13:47 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 212.139.132.22; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 10724; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:13:49 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; src: 192.168.11.141; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 389; s_port: 3032; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:13:50 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; src: 192.168.11.141; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 389; s_port: 3033; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:13:55 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 198.231.24.101; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33025; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:13:59 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:00 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 195.229.242.132; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32775; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:02 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 80.82.99.203; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 4876; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:15:32 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbname; src: 192.168.11.34; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 137; s_port: 137; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:06 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.23.242.202; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 65397; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:06 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.23.242.196; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32796; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:15:36 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.9; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2866; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:09 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 202.188.0.132; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 62699; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:11 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 202.188.0.132; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32822; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:12 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 148.160.29.6; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33120; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:15:40 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.113; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:14 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.185; dst: 192.149.252.44; proto: tcp; product: VPN-1 & FireWall-1; service: 43; s_port: 51922; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:22 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 24.92.226.9; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 41255; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:15:57 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.8; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2867; Sep 3 15:14:36 192.168.99.1 Checkpoint: 3Sep2007 15:14:36 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 211.76.137.41; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 36551; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:14:36 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 195.170.2.2; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 44444; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:14:36 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 195.170.0.113; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 44444; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:14:37 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:16:06 accept 192.168.11.7 >eth8 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.11.99; dst: 193.225.14.161; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 2432; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:16:09 accept 192.168.11.7 >eth8 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.11.99; dst: 141.82.30.252; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 17335; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:14:49 accept 192.168.99.1 >eth5 rule: 111; rule_uid: {AAAAAAAA-9999-8888-6F8CB5EB44F2}; service_id: CAP; src: 192.168.11.200; dst: 192.168.99.10; proto: tcp; product: VPN-1 & FireWall-1; service: 1026; s_port: 1633; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:14:50 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 24.172.50.197; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32775; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:16:18 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.9; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2869; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:15:02 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:16:33 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.112; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:15:06 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.183; dst: 192.168.13.19; proto: udp; product: VPN-1 & FireWall-1; service: 161; s_port: 35054; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:15:11 drop 192.168.99.1 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.200.11; dst: 192.168.99.186; proto: udp; product: VPN-1 & FireWall-1; service: 162; s_port: 161; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:15:11 drop 192.168.99.1 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.200.11; dst: 192.168.99.186; proto: udp; product: VPN-1 & FireWall-1; service: 514; s_port: 514; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:15:11 accept 192.168.99.1 >eth5 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.0.254; dst: 192.168.11.3; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:16:39 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbname; src: 192.168.11.33; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 137; s_port: 137; Sep 3 15:15:14 192.168.99.1 Checkpoint: 3Sep2007 15:16:39 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.8; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2870; Sep 3 15:15:15 192.168.99.1 Checkpoint: 3Sep2007 15:15:14 accept 192.168.99.1 >eth8 rule: 40; rule_uid: {33333333-2222-1111-C048F9B6D5DA}; service_id: smtp; src: 192.168.99.185; dst: 192.168.13.18; proto: tcp; product: VPN-1 & FireWall-1; service: 25; s_port: 39268; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:15 drop 192.168.99.1 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.200.12; dst: 192.168.99.186; proto: udp; product: VPN-1 & FireWall-1; service: 514; s_port: 514; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:15 drop 192.168.99.1 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.200.12; dst: 192.168.99.186; proto: udp; product: VPN-1 & FireWall-1; service: 162; s_port: 161; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:17 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 64.102.255.43; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 53; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:19 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.11.114; dst: 192.168.99.10; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:19 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.185; dst: 199.43.0.144; proto: tcp; product: VPN-1 & FireWall-1; service: 43; s_port: 47721; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:20 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 24.94.163.100; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32784; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:21 accept 192.168.99.1 >eth8 rule: 132; rule_uid: {11111111-2222-3333-80CE-68F956E049EE}; service_id: snmp; src: 192.168.99.183; dst: 192.168.11.20; proto: udp; product: VPN-1 & FireWall-1; service: 161; s_port: 35137; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:16:58 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.114; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:31 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 87.86.189.66; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32769; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:17:00 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.9; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2872; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:39 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 69.50.181.10; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 3372; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:40 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 211.99.188.37; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32769; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:41 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:41 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.195; dst: 192.168.56.10; proto: tcp; product: VPN-1 & FireWall-1; service: 3013; s_port: 1352; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:48 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 148.160.29.6; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33120; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:15:49 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.11.200; dst: 192.168.99.10; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:15:56 192.168.99.1 Checkpoint: 3Sep2007 15:17:21 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.8; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2873; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:15:58 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: icmp-proto; ICMP: Echo Request; src: 192.168.11.130; dst: 192.168.99.10; proto: icmp; ICMP Type: 8; ICMP Code: 0; product: VPN-1 & FireWall-1; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:17:26 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.36; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:02 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 67.18.92.158; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 57903; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:04 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:05 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 61.8.0.101; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33217; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:17:38 accept 192.168.11.7 >eth8 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.11.99; dst: 216.135.38.249; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 5862; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:13 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 68.87.85.99; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32788; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:14 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 217.116.0.179; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 53; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:17:43 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.8; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2875; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:16 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.28.4.129; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32000; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:17 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41207; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:17 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41208; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:17:46 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41207; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:17:46 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41208; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:17:47 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48028; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:19 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.185; dst: 192.149.252.44; proto: tcp; product: VPN-1 & FireWall-1; service: 43; s_port: 51932; Sep 3 15:16:22 192.168.99.1 Checkpoint: 3Sep2007 15:16:19 accept 192.168.99.1 >eth8 rule: 40; rule_uid: {33333333-2222-1111-C048F9B6D5DA}; service_id: smtp; src: 192.168.99.185; dst: 192.168.13.18; proto: tcp; product: VPN-1 & FireWall-1; service: 25; s_port: 39278; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:16:23 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 150.63.3.240; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 47343; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:17:51 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 47925; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:17:51 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: https; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 443; s_port: 47903; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:17:52 drop 192.168.11.8 >eth2 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 58.20.228.52; dst: 64.128.3.60; proto: udp; product: VPN-1 & FireWall-1; service: 1434; s_port: 3479; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:16:29 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41209; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:16:29 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41210; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:17:58 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41209; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:17:59 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41210; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:18:02 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 47997; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:18:02 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48039; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:18:04 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 72.253.127.9; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2876; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:16:38 accept 192.168.99.1 >eth5 rule: 111; rule_uid: {AAAAAAAA-9999-8888-6F8CB5EB44F2}; service_id: CAP; src: 192.168.11.200; dst: 192.168.99.10; proto: tcp; product: VPN-1 & FireWall-1; service: 1026; s_port: 1640; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:18:07 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 47932; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:18:08 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48097; Sep 3 15:16:42 192.168.99.1 Checkpoint: 3Sep2007 15:16:41 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 24.92.226.9; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 40777; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:18:10 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 47993; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:18:11 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 47991; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:47 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1131; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:47 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 68.87.73.245; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33100; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:18:15 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48061; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:47 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1132; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:48 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1133; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:48 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1134; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:48 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1135; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:48 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1136; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:49 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1137; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:49 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.229.56; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1139; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:49 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1140; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:49 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1141; Sep 3 15:16:48 192.168.99.1 Checkpoint: 3Sep2007 15:16:49 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41211; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:50 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1142; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:50 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1143; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:50 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1144; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:51 drop 192.168.99.1 >eth5 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.0.180; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:18:19 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41211; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:18:19 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48114; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:53 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1145; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:54 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1146; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:54 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1147; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:54 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1148; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:18:23 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 47909; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:57 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 68.87.73.244; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32960; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:16:57 accept 192.168.99.1 >eth8 rule: 122; rule_uid: {11111111-2222-3333-88DB-BA1479422786}; rule_name: Wireless; service_id: http; src: 192.168.99.23; dst: 153.2.228.50; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 1149; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:18:27 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48051; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:18:29 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.37; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:17:00 192.168.99.1 Checkpoint: 3Sep2007 15:17:00 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 202.188.0.132; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32822; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:01 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; src: 192.168.11.119; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 389; s_port: 4919; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:01 accept 192.168.99.1 >eth5 rule: 112; rule_uid: {11111111-2222-3333-97BB-2362F0B7F576}; service_id: Kerberos_v5_UDP; src: 192.168.11.119; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 88; s_port: 4920; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:18:30 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 47939; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:18:30 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48017; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:05 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 66.75.164.90; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 60893; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:18:33 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbdatagram; src: 192.168.11.202; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 138; s_port: 138; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:07 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; dst: 255.255.255.255; proto: udp; product: VPN-1 & FireWall-1; service: 67; s_port: 68; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:08 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 66.232.146.192; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 55675; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:08 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.33.146.233; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32777; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:08 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.33.146.169; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32777; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:18:36 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48046; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:11 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41212; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:11 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41213; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:11 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41214; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:11 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41215; Sep 3 15:17:10 192.168.99.1 Checkpoint: 3Sep2007 15:17:11 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41216; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:17:11 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41217; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:17:11 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41218; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:39 accept 192.168.11.7 >eth8 rule: 116; rule_uid: {11111111-2222-3333-8836-09283F665349}; service_id: nbname; src: 192.168.11.34; dst: 192.168.11.255; proto: udp; product: VPN-1 & FireWall-1; service: 137; s_port: 137; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:40 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41212; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:40 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41213; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:40 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41214; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:40 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41215; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:40 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41216; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:40 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41217; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:41 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41218; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:17:13 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 200.23.242.209; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 55850; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:43 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48043; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:18:43 drop 192.168.11.7 >eth8 rule: 113; rule_uid: {AAAAAAAA-9999-8888-FFCF33A92D27}; service_id: http; src: 192.168.11.34; dst: 65.55.200.189; proto: tcp; product: VPN-1 & FireWall-1; service: 80; s_port: 2879; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:17:17 accept 192.168.99.1 >eth2 rule: 33; rule_uid: {AAAAAAAA-9999-8888-F33256AF77FB}; service_id: lotus; src: 192.168.13.103; dst: 192.168.99.13; proto: tcp; product: VPN-1 & FireWall-1; service: 1352; s_port: 1684; Sep 3 15:17:18 192.168.99.1 Checkpoint: 3Sep2007 15:17:17 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41219; Sep 3 15:17:26 192.168.99.1 Checkpoint: 3Sep2007 15:18:46 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48084; Sep 3 15:17:26 192.168.99.1 Checkpoint: 3Sep2007 15:18:47 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41219; Sep 3 15:17:26 192.168.99.1 Checkpoint: 3Sep2007 15:17:19 accept 192.168.99.1 >eth8 rule: 40; rule_uid: {33333333-2222-1111-C048F9B6D5DA}; service_id: smtp; src: 192.168.99.185; dst: 192.168.13.18; proto: tcp; product: VPN-1 & FireWall-1; service: 25; s_port: 51744; Sep 3 15:17:26 192.168.99.1 Checkpoint: 3Sep2007 15:17:20 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 68.237.161.36; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32769; Sep 3 15:17:26 192.168.99.1 Checkpoint: 3Sep2007 15:17:20 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41220; Sep 3 15:17:26 192.168.99.1 Checkpoint: 3Sep2007 15:17:21 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41221; Sep 3 15:17:26 192.168.99.1 Checkpoint: 3Sep2007 15:17:21 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41222; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:18:50 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41220; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:18:50 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41221; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:18:50 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41222; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:17:23 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 148.160.29.6; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 33120; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:17:24 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 194.204.159.8; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 32881; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:17:24 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.99.10; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:17:24 drop 192.168.99.1 >eth8 rule: 134; rule_uid: {11111111-2222-3333-BD17-711F536C7C33}; src: 192.168.99.185; dst: 192.149.252.44; proto: tcp; product: VPN-1 & FireWall-1; service: 43; s_port: 34350; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:18:52 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48117; Sep 3 15:17:27 192.168.99.1 Checkpoint: 3Sep2007 15:18:55 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48023; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:18:56 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48126; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:18:56 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48144; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:18:56 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48132; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:28 accept 192.168.99.1 >eth2 rule: 9; rule_uid: {11111111-2222-3333-8A67-F54CED606693}; service_id: domain-udp; src: 216.230.128.228; dst: 192.168.99.184; proto: udp; product: VPN-1 & FireWall-1; service: 53; s_port: 7186; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:18:57 accept 192.168.11.7 >eth2 rule: 99; rule_uid: {11111111-2222-3333-A397-FB37E6816BE5}; rule_name: NAT; service_id: http; src: 64.29.79.218; dst: 64.129.8.241; proto: tcp; xlatedst: 192.168.123.250; NAT_rulenum: 5; NAT_addtnl_rulenum: 0; product: VPN-1 & FireWall-1; service: 80; s_port: 48005; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:31 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41223; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:31 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41224; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:31 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41225; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:31 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41226; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:31 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41227; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:31 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41228; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:31 accept 192.168.99.1 >eth5 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41229; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:17:32 accept 192.168.99.1 >eth2 rule: 27; rule_uid: {33333333-2222-1111-A2B0-72699238CD27}; rule_name: Change after replacement; service_id: ntp-udp; src: 192.168.13.3; dst: 192.168.200.2; proto: udp; product: VPN-1 & FireWall-1; service: 123; s_port: 123; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:19:01 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41223; Sep 3 15:17:32 192.168.99.1 Checkpoint: 3Sep2007 15:19:01 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41224; Sep 3 15:17:52 192.168.99.1 Checkpoint: 3Sep2007 15:19:01 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41225; Sep 3 15:17:52 192.168.99.1 Checkpoint: 3Sep2007 15:19:01 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41226; Sep 3 15:17:52 192.168.99.1 Checkpoint: 3Sep2007 15:19:01 accept 192.168.11.7 >eth3 rule: 92; rule_uid: {11111111-2222-3333-2D9FEAB89E67}; rule_name: consultants API; service_id: consultants_API; src: 192.168.123.240; dst: 192.168.0.254; proto: tcp; product: VPN-1 & FireWall-1; service: 8000; s_port: 41227;

Table Of Contents