<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query to find perimeter fw details in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647199#M224016</link>
    <description>&lt;P&gt;Source is&amp;nbsp;MF VLAN subnet( 30 subnets)&amp;nbsp; hitting to -&amp;gt;MF firewall- hitting to -&amp;gt;perimeter f/w -&amp;gt;internet&lt;BR /&gt;To find the traffic flow&amp;nbsp; where it is getting deny at the manufactuing f/w or perimeter f/w.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 15 Jun 2023 17:48:30 GMT</pubDate>
    <dc:creator>AL3Z</dc:creator>
    <dc:date>2023-06-15T17:48:30Z</dc:date>
    <item>
      <title>How to write query to find perimeter fw details?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/646920#M223911</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am trying to build a query on perimeter firewall how we can find the ips hitting to the fw.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 18:06:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/646920#M223911</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-15T18:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/646928#M223913</link>
      <description>&lt;P&gt;What events relating to this do you have in Splunk?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 08:04:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/646928#M223913</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-14T08:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647145#M223998</link>
      <description>&lt;P&gt;I' m trying to find the&amp;nbsp; traffic for (we have a list of subnets&amp;nbsp; we need to place it in lookup table )mf vlan subnet &amp;gt; mf firewall &amp;gt; perimeter fw &amp;gt; internet&amp;nbsp;&lt;BR /&gt;here I would like to know the device names whether the traffic is allowed or denied&amp;nbsp; if it is denied where it is denied is at the mf firewall or perimeter firewall.&lt;BR /&gt;how we can build the query for this use case ..&lt;/P&gt;&lt;P&gt;event:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;{"TimeReceived":"2023-06-15T11:50:35.000000Z","LogType":"TRAFFIC","Subtype":"end","TimeGenerated":"2023-06-15T11:50:34.000000Z","SourceAddress":"10.241.0.56","DestinationAddress":"142.250.145.83","NATSource":"","NATDestination":"","Rule":"mobile-user-to-any-destination","SourceUser":null,"DestinationUser":null,"Application":"traceroute","FromZone":"serv-conn-vpn","ToZone":"l3-corp-inside","SessionID":1090981,"RepeatCount":1,"SourcePort":64638,"DestinationPort":443,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"tcp","Action":"allow","Bytes":144,"BytesSent":74,"BytesReceived":70,"PacketsTotal":2,"SessionStartTime":"2023-06-15T11:50:26.000000Z","SessionDuration":0,"URLCategory":"any","SourceLocation":"10.0.0.0-10.255.255.255","DestinationLocation":"US","PacketsSent":1,"PacketsReceived":1,"SessionEndReason":"aged-out","DeviceName":"PALUERFW1","ActionSource":"from-policy","ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","X-Forwarded-ForIP":null}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 11:55:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647145#M223998</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-15T11:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647149#M223999</link>
      <description>&lt;P&gt;Which part&amp;nbsp; or parts of the event tells you whether it was allowed or denied and where it was denied?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 12:19:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647149#M223999</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-15T12:19:24Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647185#M224008</link>
      <description>&lt;P&gt;Under the Action field we can see Allow/ deny.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 15:41:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647185#M224008</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-15T15:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647194#M224012</link>
      <description>&lt;P&gt;And which part tells you where the action was?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 16:46:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647194#M224012</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-15T16:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647197#M224014</link>
      <description>&lt;P&gt;Let me share the another event&amp;nbsp;&lt;BR /&gt;{"TimeReceived":"2023-06-15T17:02:58.000000Z","LogType":"TRAFFIC","Subtype":"end","TimeGenerated":"2023-06-15T17:02:56.000000Z","SourceAddress":"10.384.31.97","DestinationAddress":"147.728.76.106","NATSource":"","NATDestination":"","Rule":"mobile-user-to-any-destination","SourceUser":"us\\john vassos","DestinationUser":null,"Application":"ldap","FromZone":"serv-conn-vpn","ToZone":"l3-corp-inside","SessionID":1363671,"RepeatCount":1,"SourcePort":70834,"DestinationPort":385,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"udp","&lt;FONT color="#FF0000"&gt;Action":"allow&lt;/FONT&gt;","Bytes":487,"BytesSent":271,"BytesReceived":216,"PacketsTotal":2,"SessionStartTime":"2023-06-15T16:32:54.000000Z","SessionDuration":0,"URLCategory":"any","SourceLocation":"10.0.0.0-10.255.255.255","DestinationLocation":"US","PacketsSent":1,"PacketsReceived":1,"SessionEndReason":"aged-out","DeviceName":"PALUWF91","ActionSource":"from-policy","ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","X-Forwarded-ForIP":null}&lt;/P&gt;&lt;P&gt;I have a bunch of subnets using these ips how we can build the query to find the hitting ips to the&amp;nbsp; internet (url) passing through the perimeter f/w which ips are getting blocked/allowed is my usecase&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 17:11:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647197#M224014</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-15T17:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647198#M224015</link>
      <description>&lt;P&gt;So, is the SourceAddress your firewall, or the DestinationAddress, or could be either depending on the direction of traffic? Can you identify which fw it is from one of these addresses? Is that what your lookup table is for?&lt;/P&gt;&lt;P&gt;Having identified the firewall, possibly the direction and the action (and presumably the time), what do you want to do next?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 17:28:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647198#M224015</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-15T17:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647199#M224016</link>
      <description>&lt;P&gt;Source is&amp;nbsp;MF VLAN subnet( 30 subnets)&amp;nbsp; hitting to -&amp;gt;MF firewall- hitting to -&amp;gt;perimeter f/w -&amp;gt;internet&lt;BR /&gt;To find the traffic flow&amp;nbsp; where it is getting deny at the manufactuing f/w or perimeter f/w.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 17:48:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647199#M224016</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-15T17:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647204#M224021</link>
      <description>&lt;P&gt;So, for this flow you would get up to two log entries? One for VLAN to MF firewall, and one for MF Firewall to perimeter firewall?&lt;/P&gt;&lt;P&gt;If the first is deny, obviously, there wouldn't be a second?&lt;/P&gt;&lt;P&gt;Do you have lookups for both VLAN subnets and for MF Firewalls?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 18:25:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647204#M224021</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-15T18:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647208#M224023</link>
      <description>&lt;P&gt;Then we go with the mf vlan subnets hitting to the perimeter firewall&amp;nbsp; in this usecase. I have the vlan subnets lookup.&lt;/P&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 18:46:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647208#M224023</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-15T18:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647248#M224028</link>
      <description>&lt;P&gt;Can you use FromZone and ToZone to identify the events you want?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 06:40:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647248#M224028</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-16T06:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647250#M224029</link>
      <description>&lt;P&gt;yes, how we can edit this search&amp;nbsp;index=firewall&amp;nbsp; FromZone=mf-vlan |table FromZone,dvc_name,ToZone,Action&lt;BR /&gt;&lt;BR /&gt;how we can add the list of mf-vlan subnets to this search and check which of these subnets are getting allow/deny .&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 08:12:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647250#M224029</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-16T08:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647254#M224030</link>
      <description>&lt;P&gt;Add SourceAddress to the table and do a lookup on your vlan subnet csv - the csv needs to be defined with CIDR on the subnet field&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 08:46:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647254#M224030</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-16T08:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647272#M224032</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;If MF firewall is allowed then would like to know whether perimeter is allowing or denying&lt;BR /&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 11:00:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647272#M224032</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-16T11:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647273#M224033</link>
      <description>&lt;P&gt;Do you have log examples of mf Firewall to perimeter Firewall?&lt;/P&gt;&lt;P&gt;Is there a way to correlate entries e.g. do they have the same SessionId, or is the ParentSessionId in the mf&amp;nbsp; f/w to perimeter f/w the same as the SessionId in the vpn to mf f/w?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 11:05:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647273#M224033</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-16T11:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647279#M224035</link>
      <description>&lt;P&gt;These are few events realated to mf&amp;nbsp; and perimeter&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;{"TimeReceived":"2023-06-16T11:37:31.000000Z","LogType":"TRAFFIC","Subtype":"end","TimeGenerated":"2023-06-16T11:37:11.000000Z","SourceAddress":"11.13.92.54","DestinationAddress":"56.082.943.911","NATSource":"","NATDestination":"","Rule":"Rule 57-APPID","SourceUser":null,"DestinationUser":null,"Application":"ssl","FromZone":"mf-vlan","ToZone":"outside","SessionID":41222,"RepeatCount":1,"SourcePort":50545,"DestinationPort":443,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"tcp","Action":"allow","Bytes":10254,"BytesSent":4529,"BytesReceived":5725,"PacketsTotal":25,"SessionStartTime":"2023-06-16T11:36:49.000000Z","SessionDuration":19,"URLCategory":"low-risk","SourceLocation":"10.0.0.0-10.255.255.255","DestinationLocation":"US","PacketsSent":13,"PacketsReceived":12,"SessionEndReason":"tcp-fin","DeviceName":"PALGRTG1","ActionSource":"from-policy","ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","X-Forwarded-ForIP":null}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;{"TimeReceived":"2023-06-16T11:37:31.000000Z","LogType":"TRAFFIC","Subtype":"end","TimeGenerated":"2023-06-16T11:37:11.000000Z","SourceAddress":"19.138.12.49","DestinationAddress":"92.182.143.211","NATSource":"","NATDestination":"","Rule":"Rule 57-APPID","SourceUser":null,"DestinationUser":null,"Application":"ssl","FromZone":"mf-vlan","ToZone":"outside","SessionID":297581,"RepeatCount":1,"SourcePort":55338,"DestinationPort":443,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"tcp","Action":"allow","Bytes":13420,"BytesSent":7635,"BytesReceived":5785,"PacketsTotal":28,"SessionStartTime":"2023-06-16T11:36:49.000000Z","SessionDuration":19,"URLCategory":"low-risk","SourceLocation":"10.0.0.0-10.255.255.255","DestinationLocation":"US","PacketsSent":15,"PacketsReceived":13,"SessionEndReason":"tcp-fin","DeviceName":"PALGRTG1","ActionSource":"from-policy","ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","X-Forwarded-ForIP":null}&lt;BR /&gt;&lt;BR /&gt;{"TimeReceived":"2023-06-16T11:37:02.000000Z","LogType":"TRAFFIC","Subtype":"end","TimeGenerated":"2023-06-16T11:36:43.000000Z","SourceAddress":"10.39.40.7","DestinationAddress":"167.228.7.206","NATSource":"","NATDestination":"","Rule":"Rule 56-APPID","SourceUser":null,"DestinationUser":null,"Application":"ldap","FromZone":"mf-vlan","ToZone":"outside","SessionID":569136,"RepeatCount":1,"SourcePort":57857,"DestinationPort":389,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"tcp","Action":"allow","Bytes":6315,"BytesSent":2898,"BytesReceived":3417,"PacketsTotal":16,"SessionStartTime":"2023-06-16T11:36:29.000000Z","SessionDuration":0,"URLCategory":"any","SourceLocation":"12.0.0.0-19.255.255.255","DestinationLocation":"US","PacketsSent":8,"PacketsReceived":8,"SessionEndReason":"tcp-rst-from-server","DeviceName":"PALTAR1","ActionSource":"from-policy","ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","X-Forwarded-ForIP":null}&lt;BR /&gt;&lt;BR /&gt;{"TimeReceived":"2023-06-16T11:37:06.000000Z","LogType":"TRAFFIC","Subtype":"end","TimeGenerated":"2023-06-16T11:36:56.000000Z","SourceAddress":"19.48.133.47","DestinationAddress":"39131.127.126","NATSource":"","NATDestination":"","Rule":"Rule 57-APPID","SourceUser":null,"DestinationUser":null,"Application":"ssl","FromZone":"mf-vlan","ToZone":"outside","SessionID":892284,"RepeatCount":1,"SourcePort":59970,"DestinationPort":443,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"tcp","Action":"allow","Bytes":8868,"BytesSent":1985,"BytesReceived":6883,"PacketsTotal":27,"SessionStartTime":"2023-06-16T11:36:41.000000Z","SessionDuration":1,"URLCategory":"low-risk","SourceLocation":"10.0.0.0-10.255.255.255","DestinationLocation":"US","PacketsSent":11,"PacketsReceived":16,"SessionEndReason":"tcp-fin","DeviceName":"PALTAR1","ActionSource":"from-policy","ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","X-Forwarded-ForIP":null}&lt;BR /&gt;&lt;BR /&gt;{"TimeReceived":"2023-06-16T11:37:02.000000Z","LogType":"TRAFFIC","Subtype":"end","TimeGenerated":"2023-06-16T11:36:43.000000Z","SourceAddress":"19.89.40.9","DestinationAddress":"20.179.173.2","NATSource":"","NATDestination":"","Rule":"Rule 57-APPID","SourceUser":null,"DestinationUser":null,"Application":"ssl","FromZone":"mf-vlan","ToZone":"outside","SessionID":149859,"RepeatCount":1,"SourcePort":64406,"DestinationPort":443,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"tcp","Action":"allow","Bytes":12216,"BytesSent":6718,"BytesReceived":5498,"PacketsTotal":22,"SessionStartTime":"2023-06-16T11:36:28.000000Z","SessionDuration":1,"URLCategory":"low-risk","SourceLocation":"10.0.0.0-10.255.255.255","DestinationLocation":"US","PacketsSent":13,"PacketsReceived":9,"SessionEndReason":"tcp-fin","DeviceName":"PALTAR1","ActionSource":"from-policy","ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","X-Forwarded-ForIP":null}&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 11:50:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647279#M224035</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-16T11:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647291#M224036</link>
      <description>&lt;P&gt;What does DeviceName represent with respect to SourceAddress/DestinationAddress?&lt;/P&gt;&lt;P&gt;You could start with this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| stats count by DeviceName, SourceAddress, DestinationAddress, FromZone, ToZone&lt;/LI-CODE&gt;&lt;P&gt;to see if it gives you the insights you are looking for.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 13:09:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647291#M224036</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-16T13:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647293#M224037</link>
      <description>&lt;P&gt;&lt;SPAN&gt;For example, If MF firewall is allowed then would like to know whether perimeter is allowing or denying&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 13:21:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647293#M224037</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-06-16T13:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: Query to find perimeter fw details</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647295#M224039</link>
      <description>&lt;P&gt;There is no obvious correlation between the events, apart from time, but that is not reliable. The source address in the second set do not seem to align with the destination address in the first set; the parent fields are unused; and, I presume, the device id relates to the sender of the fw device?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 13:26:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-write-query-to-find-perimeter-fw-details/m-p/647295#M224039</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-16T13:26:46Z</dc:date>
    </item>
  </channel>
</rss>

