Version 1

    Does just what it says - strips port numbers from syslog messages...

    Sample originating syslog message:

    Jan 4 19:37:17 Firewall src="192.168.10.10:4150" dst="66.100.69.118:80" msg="66.100.69.118 (Policy)" ...

    Overloaded syslog message:

    Jan 4 19:37:17 Firewall src="192.168.10.10" dst="66.100.69.118" msg="66.100.69.118 (Policy)" ...

    Kiwi Syslog Server sample rule:

    Rule {Existing}
    +Filters
    --{Existing, if any}
    +Actions
    -> Run-Script "Script_StripPort.txt" : VBScript, full R/W permissions
    --{Existing actions}