diff --git a/interface-definitions/include/firewall/common-rule-bridge.xml.i b/interface-definitions/include/firewall/common-rule-bridge.xml.i
index a27cae43b..6de770c79 100644
--- a/interface-definitions/include/firewall/common-rule-bridge.xml.i
+++ b/interface-definitions/include/firewall/common-rule-bridge.xml.i
@@ -1,39 +1,39 @@
 <!-- include start from firewall/common-rule-bridge.xml.i -->
 #include <include/firewall/action-l2.xml.i>
 #include <include/firewall/nft-queue.xml.i>
 <node name="destination">
   <properties>
     <help>Destination parameters</help>
   </properties>
   <children>
     #include <include/firewall/mac-address.xml.i>
   </children>
 </node>
 <leafNode name="disable">
   <properties>
     <help>Option to disable firewall rule</help>
     <valueless/>
   </properties>
 </leafNode>
 <leafNode name="jump-target">
   <properties>
     <help>Set jump target. Action jump must be defined to use this setting</help>
     <completionHelp>
       <path>firewall bridge name</path>
     </completionHelp>
   </properties>
 </leafNode>
 #include <include/firewall/log.xml.i>
-#include <include/firewall/rule-log-options.xml.i>
+#include <include/firewall/log-options.xml.i>
 <node name="source">
   <properties>
     <help>Source parameters</help>
   </properties>
   <children>
     #include <include/firewall/mac-address.xml.i>
   </children>
 </node>
 #include <include/firewall/inbound-interface.xml.i>
 #include <include/firewall/outbound-interface.xml.i>
 #include <include/firewall/match-vlan.xml.i>
-<!-- include end -->
\ No newline at end of file
+<!-- include end -->
diff --git a/interface-definitions/include/firewall/common-rule-inet.xml.i b/interface-definitions/include/firewall/common-rule-inet.xml.i
index aabefcb27..6f56ecc85 100644
--- a/interface-definitions/include/firewall/common-rule-inet.xml.i
+++ b/interface-definitions/include/firewall/common-rule-inet.xml.i
@@ -1,259 +1,259 @@
 <!-- include start from firewall/common-rule-inet.xml.i -->
 #include <include/firewall/action.xml.i>
 #include <include/generic-description.xml.i>
 #include <include/firewall/dscp.xml.i>
 #include <include/firewall/packet-options.xml.i>
 #include <include/firewall/firewall-mark.xml.i>
 #include <include/firewall/connection-mark.xml.i>
 #include <include/firewall/conntrack-helper.xml.i>
 #include <include/firewall/nft-queue.xml.i>
 <leafNode name="disable">
   <properties>
     <help>Option to disable firewall rule</help>
     <valueless/>
   </properties>
 </leafNode>
 <node name="fragment">
   <properties>
     <help>IP fragment match</help>
   </properties>
   <children>
     <leafNode name="match-frag">
       <properties>
         <help>Second and further fragments of fragmented packets</help>
         <valueless/>
       </properties>
     </leafNode>
     <leafNode name="match-non-frag">
       <properties>
         <help>Head fragments or unfragmented packets</help>
         <valueless/>
       </properties>
     </leafNode>
   </children>
 </node>
 <node name="ipsec">
   <properties>
     <help>Inbound IPsec packets</help>
   </properties>
   <children>
     <leafNode name="match-ipsec">
       <properties>
         <help>Inbound IPsec packets</help>
         <valueless/>
       </properties>
     </leafNode>
     <leafNode name="match-none">
       <properties>
         <help>Inbound non-IPsec packets</help>
         <valueless/>
       </properties>
     </leafNode>
   </children>
 </node>
 <node name="limit">
   <properties>
     <help>Rate limit using a token bucket filter</help>
   </properties>
   <children>
     <leafNode name="burst">
       <properties>
         <help>Maximum number of packets to allow in excess of rate</help>
         <valueHelp>
           <format>u32:0-4294967295</format>
           <description>Maximum number of packets to allow in excess of rate</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 0-4294967295"/>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="rate">
       <properties>
         <help>Maximum average matching rate</help>
         <valueHelp>
           <format>txt</format>
           <description>integer/unit (Example: 5/minute)</description>
         </valueHelp>
         <constraint>
           <regex>\d+/(second|minute|hour|day)</regex>
         </constraint>
       </properties>
     </leafNode>
   </children>
 </node>
 #include <include/firewall/log.xml.i>
-#include <include/firewall/rule-log-options.xml.i>
+#include <include/firewall/log-options.xml.i>
 <node name="connection-status">
   <properties>
     <help>Connection status</help>
   </properties>
   <children>
     <leafNode name="nat">
       <properties>
         <help>NAT connection status</help>
         <completionHelp>
           <list>destination source</list>
         </completionHelp>
         <valueHelp>
           <format>destination</format>
           <description>Match connections that are subject to destination NAT</description>
         </valueHelp>
         <valueHelp>
           <format>source</format>
           <description>Match connections that are subject to source NAT</description>
         </valueHelp>
         <constraint>
           <regex>(destination|source)</regex>
         </constraint>
       </properties>
     </leafNode>
   </children>
 </node>
 <leafNode name="protocol">
   <properties>
     <help>Protocol to match (protocol name, number, or "all")</help>
     <completionHelp>
       <script>${vyos_completion_dir}/list_protocols.sh</script>
       <list>all tcp_udp</list>
     </completionHelp>
     <valueHelp>
       <format>all</format>
       <description>All IP protocols</description>
     </valueHelp>
     <valueHelp>
       <format>tcp_udp</format>
       <description>Both TCP and UDP</description>
     </valueHelp>
     <valueHelp>
       <format>u32:0-255</format>
       <description>IP protocol number</description>
     </valueHelp>
     <valueHelp>
       <format>&lt;protocol&gt;</format>
       <description>IP protocol name</description>
     </valueHelp>
     <valueHelp>
       <format>!&lt;protocol&gt;</format>
       <description>IP protocol name</description>
     </valueHelp>
     <constraint>
       <validator name="ip-protocol"/>
     </constraint>
   </properties>
 </leafNode>
 <node name="recent">
   <properties>
     <help>Parameters for matching recently seen sources</help>
   </properties>
   <children>
     <leafNode name="count">
       <properties>
         <help>Source addresses seen more than N times</help>
         <valueHelp>
           <format>u32:1-255</format>
           <description>Source addresses seen more than N times</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 1-255"/>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="time">
       <properties>
         <help>Source addresses seen in the last second/minute/hour</help>
         <completionHelp>
           <list>second minute hour</list>
         </completionHelp>
         <valueHelp>
           <format>second</format>
           <description>Source addresses seen COUNT times in the last second</description>
         </valueHelp>
         <valueHelp>
           <format>minute</format>
           <description>Source addresses seen COUNT times in the last minute</description>
         </valueHelp>
         <valueHelp>
           <format>hour</format>
           <description>Source addresses seen COUNT times in the last hour</description>
         </valueHelp>
         <constraint>
           <regex>(second|minute|hour)</regex>
         </constraint>
       </properties>
     </leafNode>
   </children>
 </node>
 #include <include/firewall/synproxy.xml.i>
 #include <include/firewall/state.xml.i>
 #include <include/firewall/tcp-flags.xml.i>
 #include <include/firewall/tcp-mss.xml.i>
 <node name="time">
   <properties>
     <help>Time to match rule</help>
   </properties>
   <children>
     <leafNode name="startdate">
       <properties>
         <help>Date to start matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter date using following notation - YYYY-MM-DD</description>
         </valueHelp>
         <constraint>
           <regex>(\d{4}\-\d{2}\-\d{2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="starttime">
       <properties>
         <help>Time of day to start matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter time using using 24 hour notation - hh:mm:ss</description>
         </valueHelp>
         <constraint>
           <regex>([0-2][0-9](\:[0-5][0-9]){1,2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="stopdate">
       <properties>
         <help>Date to stop matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter date using following notation - YYYY-MM-DD</description>
         </valueHelp>
         <constraint>
           <regex>(\d{4}\-\d{2}\-\d{2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="stoptime">
       <properties>
         <help>Time of day to stop matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter time using using 24 hour notation - hh:mm:ss</description>
         </valueHelp>
         <constraint>
           <regex>([0-2][0-9](\:[0-5][0-9]){1,2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="weekdays">
       <properties>
         <help>Comma separated weekdays to match rule on</help>
         <valueHelp>
           <format>txt</format>
           <description>Name of day (Monday, Tuesday, Wednesday, Thursdays, Friday, Saturday, Sunday)</description>
         </valueHelp>
         <valueHelp>
           <format>u32:0-6</format>
           <description>Day number (0 = Sunday ... 6 = Saturday)</description>
         </valueHelp>
       </properties>
     </leafNode>
   </children>
 </node>
 <!-- include end -->
diff --git a/interface-definitions/include/firewall/common-rule-ipv4-raw.xml.i b/interface-definitions/include/firewall/common-rule-ipv4-raw.xml.i
index e040c9b13..0d749aa27 100644
--- a/interface-definitions/include/firewall/common-rule-ipv4-raw.xml.i
+++ b/interface-definitions/include/firewall/common-rule-ipv4-raw.xml.i
@@ -1,332 +1,332 @@
 <!-- include start from firewall/common-rule-ipv4-raw.xml.i -->
 #include <include/firewall/action-and-notrack.xml.i>
 #include <include/generic-description.xml.i>
 #include <include/firewall/dscp.xml.i>
 #include <include/firewall/ttl.xml.i>
 #include <include/firewall/nft-queue.xml.i>
 <node name="destination">
   <properties>
     <help>Destination parameters</help>
   </properties>
   <children>
     #include <include/firewall/address.xml.i>
     #include <include/firewall/address-mask.xml.i>
     #include <include/firewall/fqdn.xml.i>
     #include <include/firewall/geoip.xml.i>
     #include <include/firewall/mac-address.xml.i>
     #include <include/firewall/port.xml.i>
     #include <include/firewall/source-destination-group.xml.i>
   </children>
 </node>
 <leafNode name="disable">
   <properties>
     <help>Option to disable firewall rule</help>
     <valueless/>
   </properties>
 </leafNode>
 <node name="fragment">
   <properties>
     <help>IP fragment match</help>
   </properties>
   <children>
     <leafNode name="match-frag">
       <properties>
         <help>Second and further fragments of fragmented packets</help>
         <valueless/>
       </properties>
     </leafNode>
     <leafNode name="match-non-frag">
       <properties>
         <help>Head fragments or unfragmented packets</help>
         <valueless/>
       </properties>
     </leafNode>
   </children>
 </node>
 <node name="icmp">
   <properties>
     <help>ICMP type and code information</help>
   </properties>
   <children>
     <leafNode name="code">
       <properties>
         <help>ICMP code</help>
         <valueHelp>
           <format>u32:0-255</format>
           <description>ICMP code (0-255)</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 0-255"/>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="type">
       <properties>
         <help>ICMP type</help>
         <valueHelp>
           <format>u32:0-255</format>
           <description>ICMP type (0-255)</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 0-255"/>
         </constraint>
       </properties>
     </leafNode>
     #include <include/firewall/icmp-type-name.xml.i>
   </children>
 </node>
 <node name="ipsec">
   <properties>
     <help>Inbound IPsec packets</help>
   </properties>
   <children>
     <leafNode name="match-ipsec">
       <properties>
         <help>Inbound IPsec packets</help>
         <valueless/>
       </properties>
     </leafNode>
     <leafNode name="match-none">
       <properties>
         <help>Inbound non-IPsec packets</help>
         <valueless/>
       </properties>
     </leafNode>
   </children>
 </node>
 <node name="limit">
   <properties>
     <help>Rate limit using a token bucket filter</help>
   </properties>
   <children>
     <leafNode name="burst">
       <properties>
         <help>Maximum number of packets to allow in excess of rate</help>
         <valueHelp>
           <format>u32:0-4294967295</format>
           <description>Maximum number of packets to allow in excess of rate</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 0-4294967295"/>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="rate">
       <properties>
         <help>Maximum average matching rate</help>
         <valueHelp>
           <format>txt</format>
           <description>integer/unit (Example: 5/minute)</description>
         </valueHelp>
         <constraint>
           <regex>\d+/(second|minute|hour|day)</regex>
         </constraint>
       </properties>
     </leafNode>
   </children>
 </node>
 <leafNode name="log">
   <properties>
     <help>Option to log packets matching rule</help>
     <completionHelp>
       <list>enable disable</list>
     </completionHelp>
     <valueHelp>
       <format>enable</format>
       <description>Enable log</description>
     </valueHelp>
     <valueHelp>
       <format>disable</format>
       <description>Disable log</description>
     </valueHelp>
     <constraint>
       <regex>(enable|disable)</regex>
     </constraint>
   </properties>
 </leafNode>
-#include <include/firewall/rule-log-options.xml.i>
+#include <include/firewall/log-options.xml.i>
 <node name="connection-status">
   <properties>
     <help>Connection status</help>
   </properties>
   <children>
     <leafNode name="nat">
       <properties>
         <help>NAT connection status</help>
         <completionHelp>
           <list>destination source</list>
         </completionHelp>
         <valueHelp>
           <format>destination</format>
           <description>Match connections that are subject to destination NAT</description>
         </valueHelp>
         <valueHelp>
           <format>source</format>
           <description>Match connections that are subject to source NAT</description>
         </valueHelp>
         <constraint>
           <regex>(destination|source)</regex>
         </constraint>
       </properties>
     </leafNode>
   </children>
 </node>
 <leafNode name="protocol">
   <properties>
     <help>Protocol to match (protocol name, number, or "all")</help>
     <completionHelp>
       <script>${vyos_completion_dir}/list_protocols.sh</script>
       <list>all tcp_udp</list>
     </completionHelp>
     <valueHelp>
       <format>all</format>
       <description>All IP protocols</description>
     </valueHelp>
     <valueHelp>
       <format>tcp_udp</format>
       <description>Both TCP and UDP</description>
     </valueHelp>
     <valueHelp>
       <format>u32:0-255</format>
       <description>IP protocol number</description>
     </valueHelp>
     <valueHelp>
       <format>&lt;protocol&gt;</format>
       <description>IP protocol name</description>
     </valueHelp>
     <valueHelp>
       <format>!&lt;protocol&gt;</format>
       <description>IP protocol name</description>
     </valueHelp>
     <constraint>
       <validator name="ip-protocol"/>
     </constraint>
   </properties>
 </leafNode>
 <node name="recent">
   <properties>
     <help>Parameters for matching recently seen sources</help>
   </properties>
   <children>
     <leafNode name="count">
       <properties>
         <help>Source addresses seen more than N times</help>
         <valueHelp>
           <format>u32:1-255</format>
           <description>Source addresses seen more than N times</description>
         </valueHelp>
         <constraint>
           <validator name="numeric" argument="--range 1-255"/>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="time">
       <properties>
         <help>Source addresses seen in the last second/minute/hour</help>
         <completionHelp>
           <list>second minute hour</list>
         </completionHelp>
         <valueHelp>
           <format>second</format>
           <description>Source addresses seen COUNT times in the last second</description>
         </valueHelp>
         <valueHelp>
           <format>minute</format>
           <description>Source addresses seen COUNT times in the last minute</description>
         </valueHelp>
         <valueHelp>
           <format>hour</format>
           <description>Source addresses seen COUNT times in the last hour</description>
         </valueHelp>
         <constraint>
           <regex>(second|minute|hour)</regex>
         </constraint>
       </properties>
     </leafNode>
   </children>
 </node>
 <node name="source">
   <properties>
     <help>Source parameters</help>
   </properties>
   <children>
     #include <include/firewall/address.xml.i>
     #include <include/firewall/address-mask.xml.i>
     #include <include/firewall/fqdn.xml.i>
     #include <include/firewall/geoip.xml.i>
     #include <include/firewall/mac-address.xml.i>
     #include <include/firewall/port.xml.i>
     #include <include/firewall/source-destination-group.xml.i>
   </children>
 </node>
 #include <include/firewall/tcp-flags.xml.i>
 #include <include/firewall/tcp-mss.xml.i>
 <node name="time">
   <properties>
     <help>Time to match rule</help>
   </properties>
   <children>
     <leafNode name="startdate">
       <properties>
         <help>Date to start matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter date using following notation - YYYY-MM-DD</description>
         </valueHelp>
         <constraint>
           <regex>(\d{4}\-\d{2}\-\d{2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="starttime">
       <properties>
         <help>Time of day to start matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter time using using 24 hour notation - hh:mm:ss</description>
         </valueHelp>
         <constraint>
           <regex>([0-2][0-9](\:[0-5][0-9]){1,2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="stopdate">
       <properties>
         <help>Date to stop matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter date using following notation - YYYY-MM-DD</description>
         </valueHelp>
         <constraint>
           <regex>(\d{4}\-\d{2}\-\d{2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="stoptime">
       <properties>
         <help>Time of day to stop matching rule</help>
         <valueHelp>
           <format>txt</format>
           <description>Enter time using using 24 hour notation - hh:mm:ss</description>
         </valueHelp>
         <constraint>
           <regex>([0-2][0-9](\:[0-5][0-9]){1,2})</regex>
         </constraint>
       </properties>
     </leafNode>
     <leafNode name="weekdays">
       <properties>
         <help>Comma separated weekdays to match rule on</help>
         <valueHelp>
           <format>txt</format>
           <description>Name of day (Monday, Tuesday, Wednesday, Thursdays, Friday, Saturday, Sunday)</description>
         </valueHelp>
         <valueHelp>
           <format>u32:0-6</format>
           <description>Day number (0 = Sunday ... 6 = Saturday)</description>
         </valueHelp>
       </properties>
     </leafNode>
   </children>
 </node>
 <!-- include end -->
diff --git a/interface-definitions/include/firewall/rule-log-options.xml.i b/interface-definitions/include/firewall/log-options.xml.i
similarity index 100%
rename from interface-definitions/include/firewall/rule-log-options.xml.i
rename to interface-definitions/include/firewall/log-options.xml.i
diff --git a/interface-definitions/include/firewall/log.xml.i b/interface-definitions/include/firewall/log.xml.i
index 21b883e6a..21548f3fb 100644
--- a/interface-definitions/include/firewall/log.xml.i
+++ b/interface-definitions/include/firewall/log.xml.i
@@ -1,8 +1,8 @@
 <!-- include start from firewall/log.xml.i -->
 <leafNode name="log">
   <properties>
-    <help>Enable log</help>
+    <help>Log packets hitting this rule</help>
     <valueless/>
   </properties>
 </leafNode>
 <!-- include end -->