<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP Wildcard in custom report? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201147#M59471</link>
    <description>&lt;P&gt;I don't think the solution that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43193"&gt;@clonesheep&lt;/a&gt;&amp;nbsp;mentioned is going to work here because you vary the third octet. You could do the entire range and just negate the specific destination ports that you don't want in the report; but I'm guessing that if that was an option you would have already done so.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't care about the logs for this traffic at all, for example if it's AD traffic you are trying to ignore, you could push out a security policy that didn't actually have any logging enabled. That way you wouldn't have to worry about the logs at all, you could run the reports as needed, and if you have an issue you could simply update the policy to enable logging again. Maybe that would be a solution?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Feb 2018 15:41:31 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-02-19T15:41:31Z</dc:date>
    <item>
      <title>IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200843#M59372</link>
      <description>&lt;P&gt;I have a custom report,&amp;nbsp;I need to exclude 40 Instances of&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;192.168.x.100 to dest port (1234 or 1235)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there a short way to do this or am I faced with 40 repeating lines like this....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;( addr.src notin 192.168.10.100 and ((port.dst neq 1234) or (port.dst neq 1235)))&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;( addr.src notin 192.168.10.100 and ((port.dst neq 1234) or (port.dst neq 1235)))&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;( addr.src notin 192.168.10.100 and ((port.dst neq 1234) or (port.dst neq 1235)))&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 12:17:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200843#M59372</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-02-16T12:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200851#M59373</link>
      <description>&lt;P&gt;Wow this is proving to be frustrating...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although I can run myu LARGE query , I can't save it as there is a 2048 Character limit..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried by host name "Branch &amp;nbsp;Office&amp;nbsp; * "&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the * wildcard does nothing....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 13:05:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200851#M59373</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-02-16T13:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200903#M59398</link>
      <description>&lt;P&gt;You can't use wildcard in query, therefor you can't utilize it within the custom report.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 15:38:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200903#M59398</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-16T15:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200910#M59405</link>
      <description>&lt;P&gt;Any idea how I can excluded the 40 entries from the report then?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 15:41:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200910#M59405</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-02-16T15:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200911#M59406</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;It looks like your trying to obfuscate&amp;nbsp;your actual query, which I can understand, but you've done it to the degree that you'll need to let on a little bit more on what you are actually trying to do.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What actually changes in your query? The src IP, the negated ports, from what you have displayed your query doesn't make much sense.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 15:43:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200911#M59406</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-16T15:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200916#M59411</link>
      <description>&lt;P&gt;Was an error in my obfuscation, &amp;nbsp;the third octet changes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;( addr.src notin 192.168.10.100 and ((port.dst neq 1234) or (port.dst neq 1235)))&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;( addr.src notin 192.168.11.100 and ((port.dst neq 1234) or (port.dst neq 1235)))&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;( addr.src notin 192.168.12.100 and ((port.dst neq 1234) or (port.dst neq 1235)))&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 15:51:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/200916#M59411</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-02-16T15:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201131#M59464</link>
      <description>&lt;P&gt;anyone think of a solution??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Robin&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 14:25:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201131#M59464</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-02-19T14:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201134#M59466</link>
      <description>&lt;P&gt;Use a host range? something like a.a.a.a /CIDR&lt;/P&gt;&lt;P&gt;( addr.src notin 192.168.0.0/16 and ((port.dst neq 1234) or (port.dst neq 1235))&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then you have all 192.168.0.0 to 192.168.255.255 or set this to "192.168.10.100 - 192.168.20.100"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look here.. &lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Basics-of-Traffic-Monitor-Filtering/ta-p/65244" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Basics-of-Traffic-Monitor-Filtering/ta-p/65244&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or do I get it wrong?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 15:02:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201134#M59466</guid>
      <dc:creator>clonesheep</dc:creator>
      <dc:date>2018-02-19T15:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201147#M59471</link>
      <description>&lt;P&gt;I don't think the solution that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43193"&gt;@clonesheep&lt;/a&gt;&amp;nbsp;mentioned is going to work here because you vary the third octet. You could do the entire range and just negate the specific destination ports that you don't want in the report; but I'm guessing that if that was an option you would have already done so.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't care about the logs for this traffic at all, for example if it's AD traffic you are trying to ignore, you could push out a security policy that didn't actually have any logging enabled. That way you wouldn't have to worry about the logs at all, you could run the reports as needed, and if you have an issue you could simply update the policy to enable logging again. Maybe that would be a solution?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 15:41:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201147#M59471</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-19T15:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: IP Wildcard in custom report?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201151#M59475</link>
      <description>&lt;P&gt;Think I have it now, I am not sure if the logic was just wrong somewhere or if the parsing is not quite what I was expecting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway i changed where the "not s " were&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and&amp;nbsp;made the whole match &amp;nbsp;"&lt;STRONG&gt;and not" &lt;/STRONG&gt;instead of&lt;STRONG&gt; "not"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's sorted it, not very elegant but works, not sure how many characters it takes up and what the maximum would be. Certainly it's not going to be great if we need more exclusions for other items.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(action neq allow)&lt;BR /&gt;and&lt;BR /&gt;(zone.src eq TRUST)&lt;BR /&gt;and&lt;BR /&gt;(zone.dst eq UNTRUST)&lt;BR /&gt;&lt;STRONG&gt;and not&lt;/STRONG&gt;&lt;BR /&gt;((( addr.src in 10.100.20.123 )&lt;BR /&gt;or( addr.src in 10.100.21.123 )&lt;BR /&gt;or( addr.src in 10.100.22.123 )&lt;BR /&gt;or( addr.src in 10.100.23.123 )&lt;BR /&gt;or( addr.src in 10.100.24.123 )&lt;BR /&gt;or( addr.src in 10.100.25.123 )&lt;BR /&gt;or( addr.src in 10.100.26.123 )&lt;BR /&gt;or( addr.src in 10.100.27.123 )&lt;BR /&gt;or( addr.src in 10.100.28.123 )&lt;BR /&gt;or( addr.src in 10.100.29.123 )&lt;BR /&gt;or( addr.src in 10.100.30.123 )&lt;BR /&gt;or( addr.src in 10.100.31.123 )&lt;BR /&gt;or( addr.src in 10.100.32.123 )&lt;BR /&gt;or( addr.src in 10.100.33.123 )&lt;BR /&gt;or( addr.src in 10.100.34.123 )&lt;BR /&gt;or( addr.src in 10.100.35.123 )&lt;BR /&gt;or( addr.src in 10.100.36.123 )&lt;BR /&gt;or( addr.src in 10.100.37.123 )&lt;BR /&gt;or( addr.src in 10.100.38.123 )&lt;BR /&gt;or( addr.src in 10.100.39.123 )&lt;BR /&gt;or( addr.src in 10.100.40.123 )&lt;BR /&gt;or( addr.src in 10.100.41.123 )&lt;BR /&gt;or( addr.src in 10.100.42.123 )&lt;BR /&gt;or( addr.src in 10.100.43.123 )&lt;BR /&gt;or( addr.src in 10.100.44.123 )&lt;BR /&gt;or( addr.src in 10.100.45.123 )&lt;BR /&gt;or( addr.src in 10.100.46.123 )&lt;BR /&gt;or( addr.src in 10.100.47.123 )&lt;BR /&gt;or( addr.src in 10.100.48.123 )&lt;BR /&gt;or( addr.src in 10.100.49.123 )&lt;BR /&gt;or( addr.src in 10.100.50.123 )&lt;BR /&gt;or( addr.src in 10.100.51.123 )&lt;BR /&gt;or( addr.src in 10.100.52.123 )&lt;BR /&gt;or( addr.src in 10.100.53.123 )&lt;BR /&gt;or( addr.src in 10.100.54.123 )&lt;BR /&gt;or( addr.src in 10.100.55.123 )&lt;BR /&gt;or( addr.src in 10.100.56.123 )&lt;BR /&gt;) and ((port.dst eq 8800)&lt;BR /&gt;or (port.dst eq 12366)))&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 16:02:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-wildcard-in-custom-report/m-p/201151#M59475</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-02-19T16:02:42Z</dc:date>
    </item>
  </channel>
</rss>

